1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-10 22:24:18 +02:00
This commit is contained in:
OPSXCQ
2018-02-08 13:06:34 -03:00
parent a92c670a36
commit e0d8794df7
99 changed files with 133272 additions and 0 deletions

View File

@@ -0,0 +1,226 @@
*{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}
BEING INVOLVED WITH A CONFERENCE IS ONE OF THE PHONE PHREAK'S PHUNNEST
ACTIVITIES.
*{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}
AS FAR AS I KNOW, THERE WERE PHREAK CONFERENCES LONG BEFORE I WAS BORN,
AND THERE WILL CONTINUE TO BE CONFERENCES LONG AFTER I LEAVE THE PHREAKING
WORLD. THEY ARE ONE OF THE BEST MEANS THAT I KNOW OF TO ACTUALLY HEAR AND
TALK TO YOUR PHELLOW PHREAKS. THIS IS BECAUSE YOU DO NOT HAVE TO WORRY ABOUT
YOUR SCC COMING OVER TO THE RECEIVER'S HOUSE AND ASKING, "WHO IN THE PHUCK
CALLED YOU AT X:XX FROM X???" THEY ARE OBVIOUSLY BETTER THAN BULLETIN BOARDS.
THE EARLIEST CONFERENCE THAT I KNOW OF IS THE "2111" CONFERENCE.
AS RON ROSENBAUM PUT IT, "...THE LAST BIG CONFERENCE--THE HISTORIC '2111'
CONFERENCE--HAD BEEN ARRANGED THROUGH AN UNUSED TELEX TEST-BOARD TRUNK
SOMEWHERE IN THE INNARDS OF A 4A SWITCHING MACHINE IN VANCOUVER, CANADA. FOR
MONTHS, PHONE PHREAKS COULD M-F THEIR WAY INTO VANCOUVER, BEEP OUT 604 (THE
VANCOUVER AREA CODE) AND THEN BEEP OUT 2111 (THE INTERNAL PHONE-COMPANY CODE
FOR TELEX TESTING), AND FIND THEMSELVES, AT ANY TIME, DAY OR NIGHT, ON AN
OPEN WIRE TALKING WITH AN ARRAY OF PHONE PHREAKS FROM COAST TO COAST,
OPERATORS FROM BERMUDA, TOKYO, AND LONDON WHO ARE PHONE PHREAK SYMPATHIZERS,
AND MISCELLANEOUS GUESTS AND TECHNICAL EXPERTS. THE CONFERENCE WAS A MASSIVE
EXCHANGE OF INFORMATION. PHONE PHREAKS PICKED EACH OTHER'S BRAINS CLEAN,
THEN DEVELOPED NEW WAYS TO PICK THE PHONE COMPANY'S BRAINS CLEAN..."
THIS TYPE OF CONFERENCE WAS THE STANDARD OF ALL THE EARLY CONFERENCES,
SINCE BACK THEN THERE WAS NO SUCH THING AS THE NOW FAMOUS "ALLIANCE
TELECONFERENCE LINES." IT IS UNDERSTANDABLE HOW THE PHREAKS MUST HAVE FELT
WHEN THE TRUNKS WERE CLOSED. THIS IS AGAIN ILLUSTRATED, "LAST APRIL 1,
HOWEVER, THE LONG VANCOUVER CONFERENCE WAS SHUT OFF. THE PHONE PHREAKS KNEW
IT WAS COMING. VANCOUVER WAS IN THE PROCESS OF CONVERTING TO A STEP-BY-STEP
FROM A 4A AND THE 2111 TELEX CIRCUIT WAS TO BE WIPED OUT IN THE PROCESS. THE
PHONE PHREAKS LEARNED THE ACTUAL DAY ON WHICH THE CONFERENCE WOULD BE ERASED
ABOUT A WEEK AHEAD OF TIME OVER THE PHONE COMPANY'S INTERNAL-NEWS AND
SHOP-TALK RECORDING.
FOR THE NEXT FRANTIC SEVEN DAYS EVERY PHONE PHREAK IN AMERICA WAS ON
AND OFF THE 2111 CONFERENCE TWENTY-FOUR HOURS A DAY. PHONE PHREAKS WHO WERE
JUST LEARNING THE GAME OR DIDN'T HAVE M-F CAPABILITY WERE BOOSTED UP TO THE
CONFERENCE BY MORE EXPERIENCED PHREAKS SO THEY COULD GET A GLIMPSE OF WHAT IT
WAS LIKE BEFORE IT DISAPPEARED. TOP PHONE PHREAKS SEARCHED DISTANT AREA
CODES FOR NEW CONFERENCE POSSIBILITIES WITHOUT SUCCESS. FINALLY IN THE EARLY
MORNING OF APRIL 1,THE END CAME.
'I COULD FEEL IT COMING A COUPLE OF HOURS BEFORE MIDNIGHT,' RALPH
REMEMBERS. 'YOU COULD FEEL SOMETHING GOING ON IN THE LINES. SOME STATIC
BEGAN SHOWING UP, THEN SOME WHISTLING WHEEZING SOUND. THEN THERE WERE BREAKS.
SOME PEOPLE GOT CUT OFF AND CALLED RIGHT BACK IN , BUT AFTER A WHILE SOME
PEOPLE WERE FINDING THEY WERE CUT OFF AND COULDN'T GET BACK IN AT ALL. IT
WAS TERRIBLE. I LOST IT ABOUT 1 A.M., BUT MANAGED TO SLIP IN AGAIN AND STAY
ON UNTIL THE THING DIED . . . I THINK IT WAS ABOUT FOUR IN THE MORNING. THERE
WERE FOUR OF US STILL HANGING ON WHEN THE CONFERENCE DISAPPEARED INTO NOWHERE
FOR GOOD. WE ALL TRIED TO M-F UP TO IT AGAIN OF COURSE, BUT WE GOT SILENT
TERMINATION. THERE WAS NOTHING THERE.'"
ALMOST BRINGS TEARS TO YOUR EYES, DON'T IT? NOW A DAYS, CONFERENCES
ARE MAJORLY BUSINESS ORIENTED. THE MAJOR VENDOR, YOU MIGHT SAY, IS A THING
CALLED ALLIENCE TELECONFERENCING. THIS IS A OFFSPRING OF AMERICAN BELL,
WHICH IN TURN WAS BORN OF AT&T. IF YOU WANT TO CALL UP ALLIENCE, THEY HAVE
NUMBERS IN THE CITIES THEY HAVE CONFERENCE LINES IN:
213-481-2388 LISTED AS AMERICAN BELL TELECONFERENCING
312-938-0926 LISTED AS AT&T TELECONFERENCE
914-365-0123 LISTED AS TELECONFERENCE
713-655-2101 LISTED AS AMERICAN BELL TELECONFERENCING
*THESE NUMBERS ARE, OF COURSE, JUST TO THE BUSINESS OFFICE*
HOW TO SET UP A CONFERENCE:
THIS IS FOR THOSE OF YOU WHO DON'T KNOW, NOTHING NEW, SO THOSE OF YOU
WHO DO, YOU MIGHT WANT TO SKIP OVER IT.
FIRST OF ALL YOU NEED TO FIND A NUMBER THROUGH WHICH YOU CAN BOX OUT
OF, IN OTHER WORDS A NUMBER THAT WILL ACCEPT 2600 AND RELEASE YOU ONTO AN
OPERATOR TRUNK. THESE ARE SOME OF THE ONES THAT I KNOW OF:
604-555-1212 B.C. DA
403-555-1212 ALBERTA DA
306-555-1212 SASKATCHEWAN DA
204-555-1212 MANITOBA DA
807-555-1212 ONTARIO DA
705-555-1212 ONTARIO DA
416-555-1212 DA
613-555-1212 DA
819-555-1212 QUEBEC DA
418-555-1212 " "
514-555-1212 " "
709-555-1212 NEW FOUNDLAND DA
506-555-1212 NEW BRUNSWICK DA
902-555-1212 NOVA SCOTIA DA
AS YOU CAN PROBABLY TELL, I HAVE JUST LISTED ALL OF THE DA#'S FOR CANADA AND
ITS SURROUNDING AREAS. *NOTE* NONE OF THE U.S. DA#'S WORK, BUT A PHEW 800'S
WORK FINE.
NOW YOU CALL UP ONE OF THE ABOVE NUMBERS. BEFORE THE TRUNK DROPS
(YOU WILL KNOW THIS BY THE SOUND OF A CACHUNK) THERE IS STATIC WHILE THE CALL
IS BEING PLACED, NOW IS THE TIME TO BLOW 2600. AFTER DOING SO, THE LINE WILL
GO SORT OF AN "EEEE-CACHUNK." ONCE HEARING THIS, YOU CALL UP THE CONFRENCE
LINE OF YOUR CHOICE:
213-080-1050 ALLIENCE L.A.
312-001-1050 ALLIENCE CHICAGO
914-042-1050 ALLIENCE STONY POINT ?
713-033-1050 ALLIENCE HOUSTON
THIS IS DONE BY HITTING KP THEN THE NUMBER OF THE CONFERENCE LINE THEN
ST. IF ALL GOES WELL YOU WILL HEAR A COUPLE OF CACHUNKS THEN M-F IN KP AND ANY
A/C+XXX-XXXX AS THE BILLING LINE. AFTER DOING THIS YOU WILL HEAR A COMPUTER
GENERATED WOMAN'S VOICE THAT SAYS, "WELCOME TO ALLIANCE TELECONFERENCING IN
'X' (X BEING THE CITY WHICH YOU CALLED TO). YOU MAY DIAL DURING ANNOUNCEMENTS
FOR FASTER SET UP. PLEASE ENTER THE NUMBER OF PEOPLE TO BE IN YOUR
CONFERENCE.
DIAL NOW PLEASE." YOU DO THIS WITH YOUR REGULAR TOUCH-TONE FONE. NO MORE
BOXING IS INVOLVED. YOU CAN HAVE ANYWHERE FROM 2 TO 59 PEOPLE ON YOUR
CONFERENCE, ALTHOUGH IT IS A GOOD IDEA TO SET IT UP FOR AROUND 25-30 PEOPLE
SO AS NOT TO DRAW ATTENTION TO YOURSELF BY SETTING UP FOR 59 OR OTHER VAST
AMOUNTS.
THIS IS IF ALL HAS GONE WELL. SOMETIMES YOU GET A BUSY SIGNAL, MEANING
THAT ALL THE CONFERENCE LINES ARE BUSY, BUT SHOULD BE OPEN LATER, WHENEVER WHO
IS USING THEM HANGS UP. OTHER TIMES YOU MAY GET "WE'RE SORRY, BUT YOUR CALL
DID NOT GO THROUGH, WILL YOU TRY YOUR CALL AGAIN PLEASE." I HAVE GOTTEN THAT
RECORDING JUST TRYING TO M-F THROUGH 514(QUEBEC) SO I DON'T KNOW WHAT THE DEAL
IS IF YOU GET IT BEFORE YOU ENTER THE CONFERENCE TRUNK. WHEN YOU GET THE
'WE'RE SORRY' THING OFF OF THE CONFERENCE TRUNK, YOU CAN PRETTY MUCH SAY THAT
THAT CONFERENCE IS DOWN FOR THE WEEKEND OR FOR THE REST OF THE NIGHT AS
ALLIANCE HAS BUSIED IT OUT.
ONCE YOU ARE ON THE CONFERENCE YOU CAN DIAL IN ANYONE YOU WISH
NORMALLY, IE: 1+A/C+NUMBER. ONCE YOU CONNECT YOU CAN EITHER LET THEM IN ON
THE CONFERENCE BY HITTING THE '#' OR HANG THEM UP BY HITTING '*'. (REMEMBER
POUND TO ADD, STAR TO CANCEL (HA!)) YOU CAN ALSO TRANSFER CONTROL TO SOMEONE
ON THE CONFERENCE BY DIALING '6' THEN 1+A/C+NUMBER.
THERE ARE SOME DANGERS THAT COME WITH THIS FUN, OF COURSE. ONE IS
THE FEDERAL LAWS THAT SETTING UP ONE LIKE THIS BREAKS. I AM NOT SURE WHICH
ONE(S) EXACTLY, I JUST KNOW THAT THEY EXIST. THEY ONLY COVER THE ORIGINATOR,
AND THE PERSON(S) HAVING CONTROL OVER THE CONFERENCE, SO YOU DON'T HAVE TO
WORRY THAT IF THE FBI BUSTS THE ORIGINATOR THAT YOU ARE NEXT IF YOU JUST
ANSWERED YOUR PHONE.
THERE IS ALSO THE FACT THAT YOU MAY BE PILING UP TROUBLE CARDS ON YOUR
LINE IF YOU WERE STUPID ENOUGH TO SET IT UP FROM YOUR HOUSE FONE. ONE WAY
AROUND THIS IS TO GO MOBILE WITH TAPES, OR TO SET IT UP THROUGH A CHEESE BOX,
OR THROUGH A PBX. ESPECIALLY STUPID, JUST FLAT OUT BLITHERING WOULD BE THE
PERSON WHO SET UP A CONFERENCE ON AN ESS EXCHANGE, CAUSE, AS FLASH HOSER,
THAT PHREAK FROM THE GREAT WHITE NORTH PUT IT, "ESS IS BAD NEWS!" YOU WILL
BE TRACED WITHIN A MATTER OF SECONDS FROM THE M-F TONES REGISTERING ON YER
TELCO COMP, SO DON'T THINK THEY MIGHT NOT NOTICE IT.
ALSO, NEVER GIVE OUT NUMBERS WHILE ON A CONFERENCE. IF YOU MUST GIVE
OUT A NUMBER, OR EVEN A FIRST NAME, FIRST HANG UP, THEN HAVE THE PERSON IN
CONTROL CALL YOU BACK, AND THEN GIVE HIM-HER THE INFO BEFORE THEY ADD YOU
BACK IN. THE REASON FOR THIS IS THAT THE CONFERENCE OPERATOR COULD VERY WELL
BE LISTENING IN. IF YOU EVER HAPPEN UPON THIS MENACE OF AN OPERATOR, BLOW
2600 TO HER OR SHE WILL KICK YOU OFF THE CONFERENCE LINE.
NEVER CALL FBI AGENTS! AND IF YOU MUST, NEVER DO IT THROUGH THE
CONFERENCE!! ONCE YOU ADD THEM THEY WILL STAY ON UNTIL IT DIES! LET SOMEONE
WITH 3-WAY LET THEM IN THROUGH A SCC OR SOMETHING. IF A FED DOES HAPPEN TO
GET ON YOUR LINE, THEY WILL TRY ALL THEY CAN TO GET ANYTHING! THEY ACCOMPLISH
THIS BY ONE OF THREE MEANS:
1)BEING QUIET WITH A RECORDER GOING, TO GET NUMBERS, NAMES, INFO
DISCLOSED, ETC.
2)A SECTOR TAP PLACED ON THE LINE, YOU WILL HEAR WEIRD BEEPS, BUZZES,
CLICKS EVERY NOW AND THEN. THEY SEEM TO THINK THAT THEY WILL GET SOMETHING
FROM THIS, BUT AS FAR AS I KNOW IT USED TO WORK, BUT NOW DOESN'T, AND BESIDES,
IT IS ILLEGAL FOR THEM TO USE ONE SO IT WOULDN'T HOLD UP IN A COURT ANYWAY.
3)THE THIRD WAY, AND MOST DEADLY, IS SOMETHING FOUND BY AND STILL
UNDER INVESTIGATION BY THE RESEARCHER AND {}MOB RULES{}. IT CONSISTS OF KP
AND TWO OTHER M-F TONES PLAYED INTO THE CONFERENCE LINE. IT CAUSES A PHONE
NUMBER AND ST TO BE SPILLED BACK, IN OTHER WORDS YOU HEAR SOME ONE ON THE
CONFERENCE'S TELEPHONE NUMBER PLAYED BACK FOR YOU IN M-F TONES. IT IS NOT
YET KNOWN WHOSE NUMBER GETS SPILLED BACK, NOR I IT KNOWN FROM WHERE IT IS
SPILLED FROM, ALTHOUGH IT IS PROBABLY FROM ALLIANCE. ALL THAT IS KNOWN IS
THAT A NUMBER DOES GET SPILLED BACK, AND THAT IS ALL THAT THE FEDS NEED, JUST
ONE NUMBER. THE TONES THAT THE FEDS WILL SEND FORTH ARE "KP+ A COMBINATION
OF THE M-F TONES 4&6 AND 7&9" SO IT WOULD BE KP+46+79. EXPERIMENT, AS THIS
COULD REALLY HELP IN KNOWING WHAT THEY CAN DO TO US EXACTLY.
OPERATORS ARE PHUN PEOPLE TO GET ON CONFERENCES, AS THEY ARE SO
PHUCKING STUPID. YOU CAN GO AHEAD AND LET THEM IN ON A CONFERENCE CAUSE THEY
CANNOT DO ANYTHING DESPITE THE FACT THAT THEY WOULD LIKE FOR YOU TO THINK
THEY CAN. GET A BUNCH OF DA'S ON THE LINE AND LET THEM ASK EACH OTHER, "WHAT
CITY PLEASE." ANOTHER THING TO DO TO OPERATORS IS TO GET ONE ON THE LINE AND
MAKE HER THINK THAT YOU ARE ANOTHER OPERATOR, SAY SOMETHING LIKE "TSPS #125,
BOSTON," AND SEE WHAT THEY DO. YOU MIGHT ALSO WANT TO CALL UP WESTERN UNION,
SATELCO, OR LDS OPERATORS AND BUG THEM. OTHER PHUN THINGS TO GET ON THE
CONFERENCES ARE TELEX OFFICES, COMPUTER COMPANIES, STEVE WOZNIAC, WORLD-WIDE
RECORDINGS, MILITARY BASES, AND THE EVER POPULAR # OF MY OWN, THE WHITEHOUSE
SIGNAL!!
HERE ARE COMPANIES YOU MIGHT WANT TO CALL FOR MORE INFORMATION ON
THEIR TELECONFERENCING AND PICTURE PHONE SERVICES:
AT&T 212-393-9800
COLORADO VIDEO 303-444-3972
DAROME CONNECTION 203-797-1300
DAROME INC. 815-943-5481
FTC SERVICES 212-699-9730
HOLIDAY INN HI-NET 901-362-4505
INFOLINK 312-291-2900
MISAR INDUSTRIES 714-540-2477
TELECONCEPTS 212-355-7113
VIDEO STAR CONNECTIONS 404-257-0121
THESE COMPANIES ARE VENDORS OF SERVICES OR PRODUCTS OR ARE SUPPLIERS OF
EQUIPMENT TO TELECONFERENCING SERVICES. IF SOME ARE NO LONGER IN OPERATION,
PLEASE LET ME KNOW.
LASTLY, I HAVE AN ALTERNATIVE TO BOXING THAT I SAW IN A MESSAGE POSTED
BY JOHN DOE. YOU CALL UP A TSPS AND SAY "THIS IS MR. X FROM X, AND I'D LIKE
TO SET UP A TELECONFERENCE. TELL HER THE BILLING LINE AND PARTY, WHICH WOULD
BE A FRIEND ON A LOOP WAITING FOR THE OPERATOR TO CALL UP AND ASK IF THIS WAS
KNOWN TO BE THE BILLING LINE, HE-SHE WILL ACCEPT GLADLY. THEN ONCE SHE PUTS
YOU UP TO THE CONFERENCE LINES, TELL HER TO GO AHEAD AND RELEASE THE LINE, AS
YOU KNOW WHAT TO DO FROM HERE ON. IT SOUNDS GOOD, BUT AS TO WHETHER IT WILL
WORK OR NOT, I AM NOT SURE.
I HOPE THAT THIS LITTLE (HA) TUTORIAL HAS BEEN OF SOME HELP AND HAS
PROVIDED YOU WITH SOME INFORMATION TO HELP FURTHER YOUR CAREERS AND THAT IT
WILL COME IN HANDY AT SOME TIME OR ANOTHER.FURTHER YOUR CAREERS AND THAT IT

View File

@@ -0,0 +1,631 @@
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/ /-/
/-/ PHREAKER'S /-/
/-/ PHUNHOUSE /-/
/-/ /-/
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/ BY: /-/
/-/ THE TRAVELER /-/
/-/ /-/
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
THE LONG AWAITED PREQUIL TO PHREAKER'S GUIDE HAS FINALLY ARRIVED.
CONCEIVED FROM THE BOREDOM AND LONELINESS THAT COULD ONLY BE DERIVED FROM:
THE TRAVELER! BUT NOW, HE HAS RETURNED IN FULL STRENGTH (AFTER A SMALL
VACATION) AND IS HERE TO 'WORLD PREMIERE' THE NEW FILES EVERYWHERE. STAY
COOL. THIS IS THE PREQUIL TO THE FIRST ONE, SO JUST RELAX. THIS IS NOT MADE
TO BE AN EXCLUSIVE ULTRA ELITE FILE, SO KINDA CALM DOWN AND WATCH IN THE
BACKGROUND IF YOU ARE TOO COOL FOR IT.
/-/ PHREAK DICTIONARY /-/
HERE YOU WILL FIND SOME OF THE BASIC BUT NECESSARY TERMS THAT SHOULD BE
KNOWN BY ANY PHREAK WHO WANTS TO BE RESPECTED AT ALL.
PHREAK : 1. THE ACTION OF USING MISCHEVIOUS AND MOSTLY ILLEGAL
WAYS IN ORDER TO NOT PAY FOR SOME SORT OF TELE-
COMMUNICATIONS BILL, ORDER, TRANSFER, OR OTHER SERVICE.
IT OFTEN INVOLVES USAGE OF HIGHLY ILLEGAL BOXES AND
MACHINES IN ORDER TO DEFEAT THE SECURITY THAT IS SET
UP TO AVOID THIS SORT OF HAPPENING. [FR'EAKING]. V.
2. A PERSON WHO USES THE ABOVE METHODS OF DESTRUCTION AND
CHAOS IN ORDER TO MAKE A BETTER LIFE FOR ALL. A TRUE
PHREAKER WILL NOT NOT GO AGAINST HIS FELLOWS OR NARC
ON PEOPLE WHO HAVE RAGGED ON HIM OR DO ANYTHING
TERMED TO BE DISHONORABLE TO PHREAKS. [FR'EEK]. N.
3. A CERTAIN CODE OR DIALUP USEFUL IN THE ACTION OF
BEING A PHREAK. (EXAMPLE: "I HACKED A NEW METRO
PHREAK LAST NIGHT.")
SWITCHING SYSTEM: 1. THERE ARE 3 MAIN SWITCHING SYSTEMS CURRENTLY EMPLOYED
IN THE US, AND A FEW OTHER SYSTEMS WILL BE MENTIONED
AS BACKGROUND.
A) SXS: THIS SYSTEM WAS INVENTED IN 1918 AND WAS
EMPLOYED IN OVER HALF OF THE COUNTRY UNTIL 1978. IT
IS A VERY BASIC SYSTEM THAT IS A GENERAL WASTE OF
ENERGY AND HARD WORK ON THE LINESMAN. A GOOD WAY TO
IDENTIFY THIS IS THAT IT REQUIRES A COIN IN THE PHONE
BOOTH BEFORE IT WILL GIVE YOU A DIAL TONE, OR THAT NO
CALL WAITING, CALL FORWARDING, OR ANY OTHER SUCH
SERVICE IS AVAILABLE. STANDS FOR: STEP BY STEP
B) XB: THIS SWITCHING SYSTEM WAS FIRST EMPLOYED IN 1978
IN ORDER TO TAKE CARE OF MOST OF THE FAULTS OF SXS
SWITCHING. NOT ONLY IS IT MORE EFFICIENT, BUT IT
ALSO CAN SUPPORT DIFFERENT SERVICES IN VARIOUS FORMS.
XB1 IS CROSSBAR VERSION 1. THAT IS VERY LIMITED AND
IS HARD TO DISTINGUISH FROM SXS EXCEPT BY DIRECT VIEW
OF THE WIRING INVOLVED. NEXT UP WAS XB4, CROSSBAR
VERSION 4. WITH THIS SYSTEM, SOME OF THE BASIC THINGS
LIKE DTMF THAT WERE NOT AVAILABLE WITH SXS CAN BE
ACCOMPLISHED. FOR THE FINAL STROKE OF XB, XB5 WAS
CREATED. THIS IS A SERVICE THAT CAN ALLOW DTMF PLUS
MOST 800 TYPE SERVICES (WHICH WERE NOT ALWAYS
AVAILABLE.) STANDS FOR: CROSSBAR.
C) ESS: A NIGHTMARE IN TELECOM. IN VIVID COLOR, ESS IS
A PRETTY BAD THING TO HAVE TO STAND UP TO. IT IS
QUITE SIMPLE TO IDENTIFY. DIALING 911 FOR EMERGENCIES,
AND ANI [SEE ANI BELOW] ARE THE MOST COMMON FACETS OF
THE DREAD SYSTEM. ESS HAS THE CAPABILITY TO LIST IN A
PERSON'S CALLER LOG WHAT NUMBER WAS CALLED, HOW LONG
THE CALL TOOK, AND EVEN THE STATUS OF THE CONVERSATION
(MODEM OR OTHERWISE.) SINCE ESS HAS BEEN EMPLOYED,
WHICH HAS BEEN VERY RECENTLY, IT HAS GONE THROUGH
MANY KINDS OF REVISIONS. THE LATEST SYSTEM TO DATE IS
ESS 11A, THAT IS EMPLOYED IN WASHINGTON D.C. FOR
SECURITY REASONS. ESS IS TRULY TROUBLE FOR ANY
PHREAK, BECAUSE IT IS 'SMARTER' THAN THE OTHER
SYSTEMS. FOR INSTANCE, IF ON YOUR CALLER LOG THEY SAW
50 CALLS TO 1-800-421-9438, THEY WOULD BE ABLE TO DO
A CN/A [SEE LOOPHOLES BELOW] ON YOUR NUMBER AND
DETERMINE WHETHER YOU ARE SUBSCRIBED TO THAT SERVICE
OR NOT. THIS MAKES MOST CALLS A HAZARD, BECAUSE
ALTHOUGH 800 NUMBERS APPEAR TO BE FREE, THEY ARE
RECORDED ON YOUR CALLER LOG AND THEN RIGHT BEFORE YOU
RECEIVE YOUR BILL IT DELETES THE BILLINGS FOR THEM.
BUT BEFORE THAT THE ARE OPEN TO INSPECTION, WHICH IS
ONE REASON WHY EXTENDED USE OF ANY CODE IS DANGEROUS
UNDER ESS. SOME OF THE BOXES [SEE BOXING BELOW] ARE
UNABLE TO FUNCTION IN ESS. IT IS GENERALLY A MENACE
TO THE TRUE PHREAK. STANDS FOR: ELECTRONIC SWITCHING
SYSTEM. BECAUSE THEY COULD APPEAR ON A FILTER
SOMEWHERE OR MAYBE IT IS JUST NICE TO KNOW THEM
ANYWAYS.
A) SSS: STROWGER SWITCHING SYSTEM. FIRST
NON-OPERATOR SYSTEM AVAILABLE.
B) WES: WESTERN ELECTRONICS SWITCHING. USED ABOUT 40
YEARS AGO WITH SOME MINOR PLACES OUT WEST.
BOXING: 1) THE USE OF PERSONALLY DESIGNED BOXES THAT EMIT OR
CANCEL ELECTRONICAL IMPULSES THAT ALLOW SIMPLER
ACTING WHILE PHREAKING. THROUGH THE USE OF SEPARATE
BOXES, YOU CAN ACCOMPLISH MOST FEATS POSSIBLE WITH
OR WITHOUT THE CONTROL OF AN OPERATOR.
2) SOME BOXES AND THEIR FUNCTIONS ARE LISTED BELOW.
ONES MARKED WITH '*' INDICATE THAT THEY ARE NOT
OPERATABLE IN ESS.
*BLACK BOX: MAKES IT SEEM TO THE PHONE COMPANY THAT
THE PHONE WAS NEVER PICKED UP.
BLUE BOX : EMITS A 2600HZ TONE THAT ALLOWS YOU TO DO
SUCH THINGS AS STACK A TRUNK LINE, KICK
THE OPERATOR OFF LINE, AND OTHERS.
RED BOX : SIMULATES THE NOISE OF A QUARTER, NICKEL,
OR DIME BEING DROPPED INTO A PAYPHONE.
CHEESE BOX : TURNS YOUR HOME PHONE INTO A PAY PHONE TO
THROW OFF TRACES (A RED BOX IS USUALLY
NEEDED IN ORDER TO CALL OUT.)
*CLEAR BOX : GIVES YOU A DIAL TONE ON SOME OF THE OLD
SXS PAYPHONES WITHOUT PUTTING IN A COIN.
BEIGE BOX : A SIMPLER PRODUCED LINESMAN'S HANDSET THAT
ALLOWS YOU TO TAP INTO PHONE LINES AND
EXTRACT BY EAVESDROPPING, OR CROSSING
WIRES, ETC.
PURPLE BOX : MAKES ALL CALLS MADE OUT FROM YOUR HOUSE
SEEM TO BE LOCAL CALLS.
ANI [ANI]: 1) AUTOMATIC NUMBER IDENTIFICATION. A SERVICE
AVAILABLE ON ESS THAT ALLOWS A PHONE SERVICE [SEE
DIALUPS BELOW] TO RECORD THE NUMBER THAT ANY CERTAIN
CODE WAS DIALED FROM ALONG WITH THE NUMBER THAT WAS
CALLED AND PRINT BOTH OF THESE ON THE CUSTOMER BILL.
950 DIALUPS [SEE DIALUPS BELOW] ARE ALL DESIGNED
JUST TO USE ANI. SOME OF THE SERVICES DO NOT HAVE
THE PROPER EQUIPMENT TO READ THE ANI IMPULSES YET,
BUT IT IS IMPOSSIBLE TO SEE WHICH IS WHICH WITHOUT
BEING BUSTED OR NOT BUSTED FIRST.
DIALUPS [DY'L'UPS]: 1) ANY LOCAL OR 800 EXTENDED OUTLET THAT ALLOWS INSTANT
ACCESS TO ANY SERVICE SUCH AS MCI, SPRINT, OR AT&T
THAT FROM THERE CAN BE USED BY HANDPICKING OR USING
A PROGRAM TO REVEAL OTHER PEOPLES CODES WHICH CAN
THEN BE USED MODERATELY UNTIL THEY FIND OUT ABOUT
IT AND YOU MUST SWITCH TO ANOTHER CODE (PREFERRABLY
BEFORE THEY FIND OUT ABOUT IT.)
2) DIALUPS ARE EXTREMELY COMMON ON BOTH SENSES. SOME
DIALUPS REVEAL THE COMPANY THAT OPERATES THEM AS
SOON AS YOU HEAR THE TONE. OTHERS ARE MUCH HARDER
AND SOME YOU MAY NEVER BE ABLE TO IDENTIFY. A SMALL
LIST OF DIALUPS:
3) CODES: CODES ARE VERY EASILY ACCESSED PROCEDURES
WHEN YOU CALL A DIALUP. THEY WILL GIVE YOU SOME SORT
OF TONE. IF THE TONE DOES NOT END IN 3 SECONDS,
THEN PUNCH IN THE CODE AND IMMEDIATELY FOLLOWING THE
CODE, THE NUMBER YOU ARE DIALING BUT STRIKE THE
'1' IN THE BEGINNING OUT FIRST. IF THE TONE DOES
END, THEN PUNCH IN THE CODE WHEN THE TONE ENDS.
THEN, IT WILL GIVE YOU ANOTHER TONE. PUNCH IN THE
NUMBER YOU ARE DIALING, OR A '9'. IF YOU PUNCH IN
A '9' AND THE TONE STOPS, THEN YOU MESSED UP A
LITTLE. IF YOU PUNCH IN A TONE AND THE TONE
CONTINUES, THEN SIMPLY DIAL THEN NUMBER YOU ARE
CALLING WITHOUT THE '1'.
4) ALL CODES ARE NOT UNIVERSAL. THE ONLY TYPE THAT I
KNOW OF THAT IS TRULY UNIVERSAL IS METROPHONE.
ALMOST EVERY MAJOR CITY HAS A LOCAL METRO DIALUP
(FOR PHILADELPHIA, (215)351-0100/0126) AND SINCE THE
CODES ARE UNIVERSAL, ALMOST EVERY PHREAK HAS USED
THEM ONCE OR TWICE. THEY DO NOT EMPLOY ANI IN ANY
OUTLETS THAT I KNOW OF, SO FEEL FREE TO CHECK
THROUGH YOUR BOOKS AND CALL 555-1212 OR, AS A MORE
DEVIOUS MANOR, SUBSCRIBE YOURSELF. THEN, NEVER USE
YOUR OWN CODE. THAT WAY, IF THEY CHECK UP ON YOU DUE
TO YOUR CALLER LOG, THEY CAN USUALLY FIND OUT THAT
YOU ARE SUBSCRIBED. NOT ONLY THAT BUT YOU COULD SET
A PHREAK HACKER AROUND THAT AREA AND JUST LET IT
HACK AWAY, SINCE THEY USUALLY GROUP THEM, AND, AS A
BONUS, YOU WILL HAVE THEIR LOCAL DIALUP.
5) 950'S. THEY SEEM LIKE A PERFECTLY COOL PHREAKERS
DREAM. THEY ARE FREE FROM YOUR HOUSE, FROM PAYPHONES,
FROM EVERYWHERE, AND THEY HOST ALL OF THE MAJOR LONG
DISTANCE COMPANIES (950-1044 <MCI>, 950-1077
<SPRINT>, 950-1088 <SKYLINES>, 950-1033 <US
TELECOM>.) WELL, THEY AREN'T. THEY WERE DESIGNED FOR
ANI. THAT IS THE POINT, END OF DISCUSSION.
PHREAKER'S DICTIONARY
^^^^^^^^^^^^^^^^^^^^^
A & A BUREAU--ABUSE AND ANNOYANCE BUREAU. THE PERSONNEL IN THIS
LINE OF WORK SPEND THEIR TIME HELPING CUSTOMERS GET RID OF NUTS,
OBSCENE CALLERS, HARASSING COLLECTORS, ETC.
ACCESS--THE EXISTENCE OF PATHS WITHIN A NETWORK FROM AN INPUT
TERMINAL TO A SET OF OUTPUT TERMINALS IN THE ABSENCE OF TRAFFIC
IS INDICATED BY THE TERM, ACCESS. FULL ACCESS PERMITS CONNECTING
TO ALL OUTPUT TERMINALS BY UNIQUE PATHS; MULTIPLE ACCESS
INDICATES THAT ALL OUTPUT TERMINALS CAN BE REACHED IN MORE THAN
ONE WAY; PARTIAL ACCESS REFERS TO THE ABILITY TO REACH ONLY A
FRACTION OF THE OUTPUT TERMINALS.
ACCESSIBILITY--(AVAILABILITY)--THE NUMBER OF TRUNKS OF THE
REQUIRED ROUTE IN A SWITCHING NETWORK WHICH CAN BE REACHED FROM
AN INLET.
ADAPTOR--A DEVICE DESIGNED TO SWITCH A NUMBER OF VOICE-FREQUENCY
TELEPHONE CHANNELS COMING FROM A NON-TIME-DIVISION SWITCHING
SYSTEM TO A TIME-DIVISION MULTIPLEX HIGHWAY.
ALTERNATE ROUTING--A PROCEDURE BY WHICH SEVERAL ROUTES INVOLVE
DIFFERENT SWITCHING STAGES OR SWITCHING NETWORKS. USUALLY THE
ROUTE HAVING THE FEWEST SWITCHING STAGES IS TESTED FIRST.
ANALOG TRANSMISSION--THE TRANSMISSION OF CONTINUOUSLY VARIABLE
SIGNALS RATHER THAN DESCRETELY VARIABLE SIGNALS. PRIOR TO THE USE
OF DIGITAL ENCODING AND PCM, IT WAS THE ONLY WAY OF TRANSMITTING
VOICE SIGNALS OVER TELEPHONE CHANNELS.
AREA CODE--A THREE-DIGIT PREFIX DIALED AHEAD OF THE NORMAL
SEVEN-DIGIT TELEPHONE NUMBER TO PERMIT DIRECT DISTANCE DIALING.
ASYNCHRONOUS SYSTEM--A SYSTEM IN WHICH THE TRANSMISSION OF EACH
INFORMATION CHARACTER IS INDIVIDUALLY SYNCHRONIZED USUALLY BY THE
USE OF START AND STOP ELEMENTS.
AVERAGE HOLDING TIME--THE AVERAGE DURATION OF A CALL EXPRESSED IN
SECONDS OR MINUTES.
BIT--THE SMALLEST BINARY UNIT OF INFORMATION. A CONTRACTION OF
THE WORDS BINARY DIGIT.
BIT RATE--THE RATE OR SPEED AT WHICH BITS ARE TRANSMITTED. BITS
PER SECOND IS A COMMON MEASURE.
BLOCKING (CONGESTION)--A CONDITION WHERE THE IMMEDIATE
ESTABLISHMENT OF A NEW CONNECTION IS IMPOSSIBLE DUE TO THE LACK
OF AVAILABLE PATHS, OR THE INABILITY TO INTERCONNECT TWO IDLE
NETWORK TERMINALS BECAUSE SOME OF THE APPLICABLE LINKS BETWEEN
THEM ARE USED FOR OTHER CONNECTIONS.
BOOLEAN ALGEBRA--A FORM OF NONQUANTITATIVE ALGEBRA FOR DEALING
WITH LOGIC FUNTIONS, ORIGINALLY EXPRESSED BY BRITISH
MATHEMATICIAN GEORGE BOOLE (1815-1864).
B.O.S.--BUSINESS OFFICE SUPERVISOR. SHE'S THE BOSS TO THE SERVICE
REPS.
BROADBAND EXCHANGE (BEX)--PUBLIC SWITCHED COMMUNICATION SYSTEM
FEATURING FULL DUPLEX (FDX) CONNECTIONS OF VARIOUS BANDWIDTHS. A
WESTERN UNION FACILITY.
B.S.I.--BUSINESS SERVICES INSTRUCTOR. A TRAFFICE EMPLOYEE WHO
WILL COME OUT AND TEACH YOU HOW TO USE YOUR PHONE SYSTEM.
BUSY HOUR--AN UNINTERRUPTED PERIOD OF 60 MINUTES IN WHICH THE
TOTAL TRAFFIC OF A SAMPLE IS A MAXIMUM.
BYTE--A UNIT OF INFORMATION IN ELECTRONIC COMPUTER TERMINOLOGY
CONSISTING OF 8 BITS, REFERRED TO AS EXTENDED BINARY CODED
DECIMAL INFORMATION OF AN EBCDIC CODE.
CALL CONGESTION RATIO--THE RATIO OF THE TIME DURING WHICH
CONGESTION EXISTS TO THE TOTAL TIME CONSIDERED. IT IS AN ESTIMATE
OF THE PROBABILITY THAT AN EXTERNAL OBSERVER WILL FIND A SYSTEM
IN A CONGESTED CONDITION.
CALLING RATE--AVERAGE CALLS PER SUBSCRIBER PER HOUR.
CALL STORE--THE MEMORY SECTION OF A STORED PROGRAM CONTROL
SWITCHING SYSTEM IN WHICH TEMPORARY INFORMATION USED IN THE
PROCESSING OF CALLS THROUGH THE EXCHANGE IS CONTAINED. IT IS ALSO
REFERRED TO AS THE PROCESS STORE.
CENTRAL OFFICE--EXCHANGES WHERE SUBSCRIBER LINES AND PRIVATE
BRANCH EXCHANGE LINES TERMINATE. THERE THEY ARE SWITCHED TO
PROVIDE THE DESIRED CONNECTION WITH OTHER SUBSCRIBERS. SUCH AN
EXCHANGE IS CALLED AN END OFFICE AND IS DESIGNATED AS A CLASS 5
OFFICE IN THE U.S.
CENTRAL PROCESSOR--THE MAIN COMPUTER ELEMENT OF A STORED PROGRAM
CONTROL SWITCHING SYSTEM, WHICH UNDER THE DIRECTION OF THE STORED
PROGRAM ESTABLISHES SWITCHING NETWORK CONNECTIONS AND ALSO
MONITORS AND ANALYZES THE SYSTEM TO INSURE PROPER OPERATION.
ROUTINE PROCESS TESTING, MAINTENANCE AND ADMINISTRATIVE FUNTIONS
ARE ALSO CARRIED OUT.
CENTREX--A PABX SYSTEM IN WHICH THE SWITCHING EQUIPMENT IS
LOCATED CENTRALLY AND AWAY FORM THE LOCATION BEING SERVED. DIRECT
INWARD DIALING (DID) AND DIRECT OUTWARD DIALING (DOD) AS WELL AS
AUTOMATIC NUMBER IDENTIFICATION (ANI) ARE PROVIDED BY SUCH A
SYSTEM.
CHARACTERS--THE ELEMENTS OF A MESSAGE. ONE COMPUTER CHARACTER
CONSISTS OF 8 BITS OR 1 BYTE AND IS KNOWN AS AN EBCDIC CHARACTER.
CIRCUIT SWITCHING--TELECOMMUNICATIONS SWITCHING IN WHICH THE
INCOMING AND OUTGOING LINES ARE CONNECTED BY A PHYSICAL PATH, AS
THROUGH CROSSPOINTS OR SWITCH CONTACTS.
CLASS OF SERVICE--THE SERVICES AND FACILITIES OFFERED TO EACH
INDIVIDUAL TERMINAL CONNECTED TO A SYSTEM. THIS INFORMATION IS
USUALLY STORED WITH THE DIRECTORY OR EQUIPMENT NUMBERS OF THE
ASSOCIATED TERMINAL, AND IS ACCESSED BY THE CALL PROCESSORS WHEN
A CONNECTION IS REQUIRED TO OR FROM THAT TERMINAL.
CLOCK--EQUIPMENT TO PROVIDE A TIME BASE FOR A SWITCHING SYSTEM.
IN TIME-DIVISION SWITCHING IT IS USED TO CONTROL SAMPLING RATES,
DURATION OF SIGNAL DIGITS, ETC.
C.O.A.M.E.--CUSTOMER OWNED AND MAINTAINED EQUIPMENT.
CODEC--THE COMBINATION OF A CODER AND DECODER, AS USED IN
TIME-DIVISION SWITCHING SYSTEMS TO CODE THE INCOMING MESSAGE AND
DECODE THE MESSAGE BEING RETURNED TO THE CALLER. IT IS A
CONTRACTION OF THE WORDS, CODER AND DECODER.
COMMON CONTROL--AN EXCHANGE CONTROL METHOD IN WHICH THE DIALED
SIGNALS ARE RECEIVED AND REGISTERED SEPARATELY FROM THE SWITCHING
ELEMENTS BEFORE THEY ARE USED TO CONTROL THESE SWITCHES. ALSO
DEFINED AS A CONTROL METHOD, WHICH IDENTIFIES THE INPUT AND
OUTPUT TERMINALS OF THE SWITCHING NETWORK AND THEN CAUSES A
CONNECTING PATH TO BE ESTABLISHED BETWEEN THEM. SUCH SYSTEMS ARE
ALSO DESIGNATED AS MARKER SYSTEMS.
CONCENTRATION STAGE--A SWITCHING STAGE IN WHICH A NUMBER OF INPUT
LINES ARE CONNECTED TO A SMALLER NUMBER OF OUTPUT LINES OR
TRUNKS, AS IN THE CONNECTION OF A LARGE NUMBER OF SUBSCRIBER
LINES TO A SMALLER NUMBER OF TRUNKS BASED ON THE GRADE OF SERVICE
DESIRED.
CONGESTION FUNCTION--ANY FUNCTION USED TO RELATE THE DEGREE OF
CONGESTION TO THE TRAFFIC INTENSITY.
CONNECTING ROW--ALL THOSE CROSSPOINTS DIRECTLY ACCESSIBLE FROM AN
INLET. ONLY ONE CONNECTION CAN BE ESTABLISHED VIA A CONNECTING
ROW AT ANY INSTANT.
COUPLER--A DEVICE USED TO PREVENT ELECTRICAL FLASHBACK AND
MAINTAIN NORMAL ELECTRICAL FLOW ON A TELEPHONE LINE. USED AS A
BUFFER BETWEEN C.O.A.M.E. AND TELEPHONE COMPANY EQUIPMENT.
CROSSBAR SWITCH--A SWITCH HAVING A PLURALITY OF VERTICAL PATHS, A
PLURALITY OF HORIZONTAL PATHS AND ELECTROMAGNETICALLY OPERATED
MECHANICAL MEANS FOR CONNECTING ANY OF THE VERTICAL PATHS WITH
THE HORIZONTAL PATHS.
CROSSPOINT--A CROSSPOINT COMPRISES A SET OF CONTACTS THAT
OPERATES TOGETHER AND EXTENDS THE SPEECH AND SIGNAL WIRES OF THE
DESIRED CONNECTION. EACH CONNECTION IN A SPACE-DIVISION SWITCHING
NETWORK IS ESTABLISHED BY CLOSING ONE OR MORE CROSSPOINTS.
CROSSTALK--AN UNWANTED TRANSFER OF SIGNALS FROM ONE CIRCUIT TO
ANOTHER AS MAY OCCUR BETWEEN SWITCHING ELEMENTS OR CIRCUIT
WIRING.
C.W.A.--THE COMMUNICATION WORKERS OF AMERICA. THE C.W.A.
REPRSENTS 90 PERCENT OF THE UNIONIZED TELCO WORK FORCE.
DAY-TO-BUSY HOUR RATIO--THE RATIO OF THE 24 HOUR DAY TRAFFIC
VOLUME TO THE BUSY HOUR TRAFFIC VOLUME. IN SOME COUNTRIES THE
RECIPROCAL OF THIS RATIO IS USED.
D.D.D.--DIRECT DISTANCE DIALING. ALSO KNOWN AS ONE-PLUS DIALING.
DELAY SYSTEM--A SWITCHING SYSTEM IN WHICH A CALL ATTEMPT, WHICH
OCCURS WHEN ALL ACCESSIBLE PATHS FOR THE REQUIRED CONNECTION ARE
BUSY, IS PERMITTED TO WAIT UNTIL A PATH BECOMES AVAILABLE.
DIAL PULSE--THE SIGNALING PULSE WHICH IS FORMED BY THE
INTERRUPTION OF THE CURRENT IN THE DC LOOP OF A CALLING
TELEPHONE. SUCH INTERRUPTIONS ARE PRODUCED BY THE BREAKING OF THE
DIAL PULSE CONTACTS OF THE CALLING TELEPHONE SUBSET DURING THE
DIALING PROCESS.
DIAMOND-RING TRANSLATOR--AN ARRAY OF RING-TYPE INDUCTION COILS
ASSOCIATED WITH CODED WIRING IN SUCH A MANNER THAT THE
TRANSLATION OF DIRECTORY NUMBERS TO EQUIPMENT NUMBER OR VICE
VERSA CAN BE ACCOMPLISHED IN AN EXCHANGE. IT IS NAMED AFTER ITS
ORIGINATOR, T.L.DIMOND OF THE BELL TELEPHONE LABORATORIES.
DIRECT CONTROL--AN EXCHANGE CONTROL METHOD IN WHICH PULSES,
DIALED BY THE SUBSCRIBERS, CONTROL DIRECTLY THE ROUTE SELECTION
SWITCHES OF THE SYSTEM. FOR EACH DIGIT DIALED THE EQUIVALENT OF
ONE SET OF SELECTOR SWITCHES IS REQUIRED WITH THIS CONTROL
METHOD.
DIRECTOR--A CONTROL ELEMENT WHICH PROVIDES A MEASURE OF COMMON
CONTROL IN STEP-BY-STEP OR STROWGER EXCHANGES.
DISTRIBUTING FRAME--A STRUCTURE FOR TERMINATING THE WIRES OF A
TELEPHONE EXCHANGE IN SUCH A MANNER THAT CROSS-CONNECTIONS CAN BE
MADE READILY. EXAMPLES ARE THE MAIN DISTRIBUTION FRAME (MDF) AT
THE ENTRY OF AN EXCHANGE, INTERMEDIATE DISTRIBUTION FRAMES (IDF)
BETWEEN SECTIONS OF AN EXCHANGE, AND POWER DISTRIBUTION FRAMES
(PDF).
DISTRIBUTION STAGE--A SWITCHING STAGE BETWEEN A CONCENTRATION
STAGE AND OUTLETS AND SERVES AS A MEANS OF SELECTING TRUNKS TO
THE DESIRED TERMINATIONS.
DUV--DATA UNDER VOICE (AT&T SYSTEM). ELECTROMECHANICAL SWITCHING
SYSTEM--AN EXCHANGE SYSTEM IN WHICH BOTH THE SPEECH PATHS AND THE
CONTROL EQUIPMENT ARE SWITCHED BY ELECTROMECHANICAL
COMPONENTS--SUCH AS RELAYS, ROTARY SWITCHES, ETC.
ELECTRONIC SWITCHING SYSTEM--AN EXCHANGE SYSTEM IN WHICH AT LEAST
THE CONTROL EQUIPMENT IS COMPOSED OF ELECTRONIC CIRCUITS AND
COMPONENTS, GENERALLY OF A SOLID-STATE TYPE.
EMD SWITCH--THE SPEECH-PATH SWITCHING ELEMENT USED IN A SIEMENS
ROTARY SWITCHING SYSTEM. EMD IS AN ABBREVIATION OF
EDELMETALL-MOTOR-DREHWAHLER, WHICH TRANSLATES IN ENGLISH TO
NOBLE-METAL MOTOR SWITCH.
END OFFICE--A CENTRAL OFFICE OR CLASS 5 OFFICE.
ENTRAIDE--A SWITCHING SYSTEM INPHICH OUTLETS FROM A GIVEN
CONNECTING STAGE ARE CONNECTED TO INLETS OF THE SAME OR A
PREVIOUS STAGE. IN SUCH SYSTEMS CALLS MAY TRAVERSE A STAGE MORE
THAN ONCE. USUALLY THESE REENTERING LINKS ARE USED AS LAST CHOICE
PATHS AND THE RESULTING NETWORK IS HETEROGENEOUS. SUCH AN
ARRANGEMENT IS USED IN ITT'S PENTACONTA CROSSBAR SYSTEM.
ERLANG--THE UNIT OF TRAFFIC INTENSITY, WHICH IS MEASURED IN
CALL-SECONDS PER SECOND OR CALL-MINUTES PER MINUTE. ALSO, ONE
ERLANG EQUALS 3600 CALL-SECONDS PER HOUR. IT IS NAMED AFTER A. K.
ERLANG, THE DANISH ENGINEER AND MATHEMATICIAN WHO FIRST ADOPTED
IT.
ESS--ELECTRONIC SWITCHING SYSTEM.
EXCHANGE--ALL NUMBERS WITHIN A GIVEN THREE-DIGIT PREFIX AREA. CAN
ALSO BE USED TO DESCRIBE A GEOGRAPHICAL AREA THE SIZE OF A CITY.
FX--FOREIGN EXCHANGE CALLS. THE TERM APPLIED TO CALLS MADE TO A
CENTRAL OFFICE OTHER THAN THE ONE LOCATED IN THE CALLING CUSTOMER
AREA.
H.C. INSTRUMENT--AN ORDINARY TELEPHONE WITH NO EXTRAS.
I.D.E.W.--INTERNATIONAL BROTHERHOOD OF ELECTRICAL WORKERS. A
UNION THAT REPRESENTS SEVEN PERCENT OF ALL UNIONIZED TELEPHOE
WORKERS.
INTERSTATE--TELEPHONE SERVICE THAT CROSSES STATE LINES. SUCH
SERVICES COME UNDER THE JURISDICTION OF THE F.C.C.
INTRASTATE--TELEPHONE SERVICES THAT REMAIN WITHIN THE BOUNDARES
OF A STATE. SUCH SERVICES COME UNDER THE JURISDICTION OF THE
P.S.C.
JOINT PRACTICES--AN INTER-COMPANY GUIDE AKIN TO THE GENEVA RULES
OF WAR. THE J.P. COVERS SUCH THINGS AS INTERVALS, OFFERINGS, AND
PROCEDURES.
K.K.6--SIX-BUTTON TELEPHONE. THE STANDARD TELEPHONE FOUND IN MOST
OFFICES. THE K.K.6 CAN HANDLE FIVE LINES. THE SIXTH BUTTON IS
USED FOR HOLD.
LAYOUT CARD--SCHEMATIC DRAWINGS OF THE ELECTRICAL CIRCUITS
REQUIRED FOR A TELEPHONE INSTALLATION.
LINK (TRUNK) THE CONNECTION BETWEEN THE TERMINALS OF ONE SWITCH
AND THE TERMINALS ON A SWITCH OF THE NEXT STAGE CORRESPONDING TO
A SINGLE TRANSMISSION PATH.
LINK (ONE-WAY AND TWO-WAY)--A ONE-WAY LINK IS USED ONLY FOR THE
ESTABLISHMENT OF CONNECTIONS IN ONE DIRECTION, WHILE A TWO-WAY
LINK IS USED FOR THE ESTABLISHMENT OF CONNECTIONS IN EITHER
DIRECTION.
LINK SYSTEM--A SYSTEM IN WHICH: (1) THERE ARE AT LEAST TWO
CONNECTING STAGES; (2) A CONNECTION IS MADE OVER ONE OR MORE
LINKS; (3) THE LINKS ARE CHOSEN IN A SINGLE LOGICAL OPERATION;
AND (4) LINKS ARE SEIZED ONLY WHEN THEY CAN BE USED IN MAKING A
CONNECTION.
LOGIC FUNCTION--THE RELATIONSHIP OF TWO OR MORE BOOLEAN VARIABLES
AS EXPRESSED BY BOOLEAN ALGEBRA.
LOGIC GATES--ELECTRICAL OR ELECTRONIC CIRCUITS WHICH CONTROL THE
TRANSFER OF SIGNALS AND PRODUCE THE REQUIRED OUTPUTS FOR SPECIFIC
INPUT COMBINATIONS TO IMPLEMENT BOOLEAN LOGIC FUNCTIONS.
LOGIC (HARD-WIRED)--CONTROL LOGIC IN AN EXCHANGE, WHICH IS WIRED
IN CIRCUIT FORM.
LOGIC (SOFT-WIRED)--CONTROL LOGIC IN AN EXCHANGE, WHICH IS HELD
IN SOFTWARE COMPUTER PROGRAMS.
LONG DISTANCE--TECHNICALLY, ANY CALL THAT TERMINATES MORE THAN
SEVENTEEN MILES FROM THE SOURCE.
LONG LINES--A DIVISION OF AT&T RESPONSIBLE FOR THE DAY-TO-DAY
OPERATION OF THE LONG DISTANCE NETWORK. WHILE THE LOCAL TELCO
HANDLES ALL MAINTENANCE, LONG LINES DIRECTS OVERALL SUPERVISION.
LOOP DISCONNECT PULSING--SUBSET DIAL PULSING IN WHICH THE
SUBSCRIBER DC LOOP IS INTERRUPTED TO PRODUCE PULSES FOR SIGNALING
AN EXCHANGE.
MARKER--CIRCUITS WHICH INCORPORATE THE FUNCTION OF BUSY TESTING,
LOCATING AND FINALLY CONTROLLING THE ESTABLISHMENT OF A
PARTICULAR PATH THROUGH THE SWITCHING NETWORK.
MARKETING REP--THE SALES PEOPLE OF THE BELL COMPANIES. ALSO KNOWN
AS ACCOUNT EXECUTIVE.
MARKING--THE USE OF ELECTRICAL POTENTIALS AND GROUNDS AT CERTAIN
POINTS IN A SWITCHING NETWORK TO CONTROL ITS OPERATION.
MATRIX--A SIMPLE SWITCHING NETWORK IN WHICH A SPECIFIED INLET
(MATRIX ROW) HAS ACCESS TO A SPECIFIED OUTLET (MATRIX COLUMN) VIA
A CROSSPOINT PLACED AT THE INTERSECTION OF THE ROW AND COLUMN IN
QUESTION. A COMPLETE MATRIX IS ONE IN WHICH EACH INLET HAS ACCESS
TO EACH OUTLET, WHILE AN INCOMPLETE MATRIX IS ONE IN WHICH EACH
INLET MAY HAVE ACCESS TO ONLY SOME OF THE OUTLETS.
MEAN DELAY OF CALLS DELAYED--THE TOTAL WAITING TIME OF ALL CALLS
DIVIDED BY THE NUMBER OF DELAYED CALLS.
MESSAGE SWITCHING--A METHOD OF RECEIVING AND STORING A MESSAGE
FOR A MORE APPROPRIATE TIME OF RETRANSMISSION. WITH SUCH A
METHOD, NO DIRECT CONNECTION IS ESTABLISHED BETWEEN THE INCOMING
AND OUTGOING LINES AS IN THE CASE OF CIRCUIT SWITCHING.
MULTIFREQUENCY SIGNALING--SIGNALING BETWEEN SUBSCRIBERS AND THE
CENTRAL OFFICE THROUGH A COMBINATION OF AUDIO FREQUENCIES, AS
WITH PUSHBUTTON DIALING. ALSO, IN MANY CASES SIGNALING BETWEEN
EXCHANGES IS ACCOMPLISHED BY COMBINATIONS OF FREQUENCIES.
MULTIGROUP--A COMBINATION OF TWO OR MORE PCM MULTIPLEX CHANNELS.
NONLISTED NUMBERS--TELEPHONE NUMBERS THAT DO NOT APPEAR IN THE
DIRECTORY BUT THAT ARE AVAILABLE IF THE INQUIRER CALLS DIRECTORY
ASSISTANCE.
NONPUBLISHED NUMBERS--TELEPHONE NUMBERS NOT MADE AVAILABLE TO THE
PUBLIC. ALSO KNOWN AS SILENT NUMBERS.
OCCUPANCY--THE AVERAGE PROPORTION OF TIME THAT A TRAFFIC CARRYING
FACILITY IS BUSY.
PACKET SWITCHING--ESSENTIALLY THE SAME AS MESSAGE-SWITCHING.
PANEL-SWITCHING SYSTEM--A COMMON CONTROL ELECTROMECHANICAL
SWITCHING SYSTEM, WHICH WAS USED WIDELY IN THE U.S. PRIOR TO ITS
VIRTUAL REPLACEMENT BY CROSSBAR AND OTHER SYSTEMS. THE BANKS OF
SELECTORS TAKE THE FORM OF FLAT VERTICAL PANELS, FROM WHICH THE
NAME OF THE SYSTEM WAS DERIVED. SOME PANEL INSTALLATIONS ARE
STILL IN USE IN THE U.S.
PATH--A SET OF LINKS JOINED IN SERIES TO ESTABLISH A CONNECTION.
PATHS DIFFER IF ONE OR MORE LINKS DIFFER.
P.B.X.--PRIVATE BRANCH EXCHANGE. COMMONLY KNOWN AS A SWITCHBOARD.
MINI-CENTRAL OFFICE EQUIPMENT FOR BUSINESS CUSTOMERS WITH FROM 10
TO 2,000 TELEPHONES.
PRIMARY CENTER--A SWITCHING CENTER CONNECTING TOLL CENTERS, WHICH
CAN ALSO SERVE AS A TOLL CENTER FOR ITS LOCAL END OFFICES. IN THE
U.S. IT IS DEFINED AS A CLASS 3 OFFICE.
PRIVATE AUTOMATIC BRANCH EXCHANGE (PABX)--A PRIVATE AUTOMATIC
TELEPHONE EXCHANGE WHICH PROVIDES FOR THE CONNECTION OF CALLS
GOING TO AND COMING FROM THE PUBLIC TELEPHONE NETWORK (USUALLY A
CENTRAL OFFICE EXCHANGE) AS WELL AS INTRAEXCHANGE CALLS BETWEEN
THE SERVED EXTENSIONS.
PROBABILITY OF DELAY--THE PROBABILITY THAT A CALL ATTEMPT, IF
OFFERED, CANNOT BE COMPLETED IMMEDIATELY.
PROBABILITY OF LOST CALLS (PROBABILITY OF LOSS)--THE PROBABILITY
THAT A CALL ATTEMPT, IF OFFERED, WILL BE LOST.
PROGRAM STORE--THE MEMORY SECTION OF A STORED PROGRAM CONTROL
SWITCHING IN WHICH SEMI-PERMANENT INSTRUCTIONS AND TRANSLATIONS
ARE CONTAINED. THESE ARE FED TO THE CENTRAL PROCESSOR TO PERMIT
IT TO PROVIDE STORED PROGRAM CONTROL.
PUBLIC SWITCHED NETWORK--ANY SWITCHING SYSTEM THAT PROVIDES
CIRCUIT SWITCHING FACILITIES FOR USE BY THE PUBLIC. TELEPHONE,
TELEX, TWX, AND BROADBAND SWITCHED NETWORKS ARE THE PUBLIC
SWITCHED NETWORKS IN THE U.S.
PULSE AMPLITUDE MODULATION (PAM)--A FORM OF PULSE MODULATION IN
WHICH A NUMBER OF CHANNELS ARE MULTIPLEXED BY TIME SAMPLING, BUT
ONE IN WHICH THE PULSE AMPLITUDES VARY IN ACCORDANCE WITH THE
AMPLITUDE OF THE ANALOG SIGNAL LEVELS.
LATA: LOCAL ACCESS TRANSFERENCE AREA. SOME PEOPLE WHO LIVE IN LARGE CITIES
OR AREAS MAY BE PLAGUED BY THIS PROBLEM. FOR INSTANCE, LET'S SAY YOU LIVE IN THE
215 AREA CODE UNDER THE 542 PREFIX (AMBLER, FORT WASHINGTON). IF YOU WENT TO
DIAL IN A BASIC METRO CODE FROM THAT AREA, FOR INSTANCE, 351-0100, THAT MIGHT
NOT BE COUNTED UNDER UNLIMITED LOCAL CALLING BECAUSE IT IS OUT OF YOUR LATA.
FOR SOME LATA'S, YOU HAVE TO DIAL A '1' WITHOUT THE AREA CODE BEFORE YOU CAN
DIAL THE PHONE NUMBER. THAT COULD PROVE A HASSLE FOR US ALL IF YOU DIDN'T
REALIZE YOU WOULD BE BILLED FOR THAT SORT OF CALL. IN THAT WAY, SOMETIMES, IT IS
BETTER TO BE SAFE THAN SORRY AND PHREAK.
THE CALLER LOG: IN ESS REGIONS, FOR EVERY HOUSEHOLD AROUND, THE PHONE
COMPANY HAS SOMETHING ON YOU CALLED A CALLER LOG. THIS SHOWS EVERY SINGLE NUMBER
THAT YOU DIALED, AND THINGS CAN BE ARRANGED SO IT SHOWED EVERY NUMBER THAT WAS
CALLING TO YOU. THAT'S ONE MAIN DISADVANTAGE OF ESS, IT IS MOSTLY COMPUTERIZED
SO A NUMBER SCAN COULD BE DONE LIKE THAT QUITE EASILY. USING A DIALUP IS AN EASY
WAY TO SCREW THAT, AND IS SOMETHING WORTH REMEMBERING. ANYWAYS, WITH THE CALLER
LOG, THEY CHECK UP AND SEE WHAT YOU DIALED. HMM... YOU DIALED 15 DIFFERENT 800
NUMBERS THAT MONTH. SOON THEY FIND THAT YOU ARE SUBSCRIBED TO NONE OF THOSE
COMPANIES. BUT THAT IS NOT THE ONLY THING. MOST PEOPLE WOULD IMAGINE "BUT WAIT!
800 NUMBERS DON'T SHOW UP ON MY PHONE BILL!". TO THOSE PEOPLE, IT IS A NICE
THOUGHT, BUT 800 NUMBERS ARE PICKED UP ON THE CALLER LOG UNTIL RIGHT BEFORE THEY
ARE SENT OFF TO YOU. SO THEY CAN CHECK RIGHT UP ON YOU BEFORE THEY SEND IT AWAY
AND CAN NOTE THE FACT THAT YOU FUCKED UP SLIGHTLY AND CALLED ONE TOO MANY 800
LINES.

View File

@@ -0,0 +1,423 @@
32
---------------------------------------
[CTRL-S PAUSES/SPACE=QUIT]
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/ /-/
/-/ PHREAKER'S /-/
/-/ PHUNHOUSE /-/
/-/ /-/
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/ BY: /-/
/-/ THE TRAVELER /-/
/-/ /-/
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
THE LONG AWAITED PREQUIL TO PHREAKER'S GUIDE HAS FINALLY ARRIVED.
CONCEIVED FROM THE BOREDOM AND LONELINESS THAT COULD ONLY BE DERIVED FROM:
THE TRAVELER! BUT NOW, HE HAS RETURNED IN FULL STRENGTH (AFTER A SMALL
VACATION) AND IS HERE TO 'WORLD PREMIERE' THE NEW FILES EVERYWHERE. STAY
COOL. THIS IS THE PREQUIL TO THE FIRST ONE, SO JUST RELAX. THIS IS NOT MADE
TO BE AN EXCLUSIVE ULTRA ELITE FILE, SO KINDA CALM DOWN AND WATCH IN THE
BACKGROUND IF YOU ARE TOO COOL FOR IT.
/-/ PHREAK DICTIONARY /-/
HERE YOU WILL FIND SOME OF THE BASIC BUT NECESSARY TERMS THAT SHOULD BE
KNOWN BY ANY PHREAK WHO WANTS TO BE RESPECTED AT ALL.
PHREAK : 1. THE ACTION OF USING MISCHEVIOUS AND MOSTLY ILLEGAL
WAYS IN ORDER TO NOT PAY FOR SOME SORT OF TELE-
COMMUNICATIONS BILL, ORDER, TRANSFER, OR OTHER SERVICE.
IT OFTEN INVOLVES USAGE OF HIGHLY ILLEGAL BOXES AND
MACHINES IN ORDER TO DEFEAT THE SECURITY THAT IS SET
UP TO AVOID THIS SORT OF HAPPENING. [FR'EAKING]. V.
2. A PERSON WHO USES THE ABOVE METHODS OF DESTRUCTION AND
CHAOS IN ORDER TO MAKE A BETTER LIFE FOR ALL. A TRUE
PHREAKER WILL NOT NOT GO AGAINST HIS FELLOWS OR NARC
ON PEOPLE WHO HAVE RAGGED ON HIM OR DO ANYTHING
TERMED TO BE DISHONORABLE TO PHREAKS. [FR'EEK]. N.
3. A CERTAIN CODE OR DIALUP USEFUL IN THE ACTION OF
BEING A PHREAK. (EXAMPLE: "I HACKED A NEW METRO
PHREAK LAST NIGHT.")
SWITCHING SYSTEM: 1. THERE ARE 3 MAIN SWITCHING SYSTEMS CURRENTLY EMPLOYED
IN THE US, AND A FEW OTHER SYSTEMS WILL BE MENTIONED
AS BACKGROUND.
A) SXS: THIS SYSTEM WAS INVENTED IN 1918 AND WAS
EMPLOYED IN OVER HALF OF THE COUNTRY UNTIL 1978. IT
IS A VERY BASIC SYSTEM THAT IS A GENERAL WASTE OF
ENERGY AND HARD WORK ON THE LINESMAN. A GOOD WAY TO
IDENTIFY THIS IS THAT IT REQUIRES A COIN IN THE PHONE
BOOTH BEFORE IT WILL GIVE YOU A DIAL TONE, OR THAT NO
CALL WAITING, CALL FORWARDING, OR ANY OTHER SUCH
SERVICE IS AVAILABLE. STANDS FOR: STEP BY STEP
B) XB: THIS SWITCHING SYSTEM WAS FIRST EMPLOYED IN 1978
IN ORDER TO TAKE CARE OF MOST OF THE FAULTS OF SXS
SWITCHING. NOT ONLY IS IT MORE EFFICIENT, BUT IT
ALSO CAN SUPPORT DIFFERENT SERVICES IN VARIOUS FORMS.
XB1 IS CROSSBAR VERSION 1. THAT IS VERY LIMITED AND
IS HARD TO DISTINGUISH FROM SXS EXCEPT BY DIRECT VIEW
OF THE WIRING INVOLVED. NEXT UP WAS XB4, CROSSBAR
VERSION 4. WITH THIS SYSTEM, SOME OF THE BASIC THINGS
LIKE DTMF THAT WERE NOT AVAILABLE WITH SXS CAN BE
ACCOMPLISHED. FOR THE FINAL STROKE OF XB, XB5 WAS
CREATED. THIS IS A SERVICE THAT CAN ALLOW DTMF PLUS
MOST 800 TYPE SERVICES (WHICH WERE NOT ALWAYS
AVAILABLE.) STANDS FOR: CROSSBAR.
C) ESS: A NIGHTMARE IN TELECOM. IN VIVID COLOR, ESS IS
A PRETTY BAD THING TO HAVE TO STAND UP TO. IT IS
QUITE SIMPLE TO IDENTIFY. DIALING 911 FOR EMERGENCIES,
AND ANI [SEE ANI BELOW] ARE THE MOST COMMON FACETS OF
THE DREAD SYSTEM. ESS HAS THE CAPABILITY TO LIST IN A
PERSON'S CALLER LOG WHAT NUMBER WAS CALLED, HOW LONG
THE CALL TOOK, AND EVEN THE STATUS OF THE CONVERSATION
(MODEM OR OTHERWISE.) SINCE ESS HAS BEEN EMPLOYED,
WHICH HAS BEEN VERY RECENTLY, IT HAS GONE THROUGH
MANY KINDS OF REVISIONS. THE LATEST SYSTEM TO DATE IS
ESS 11A, THAT IS EMPLOYED IN WASHINGTON D.C. FOR
SECURITY REASONS. ESS IS TRULY TROUBLE FOR ANY
PHREAK, BECAUSE IT IS 'SMARTER' THAN THE OTHER
SYSTEMS. FOR INSTANCE, IF ON YOUR CALLER LOG THEY SAW
50 CALLS TO 1-800-421-9438, THEY WOULD BE ABLE TO DO
A CN/A [SEE LOOPHOLES BELOW] ON YOUR NUMBER AND
DETERMINE WHETHER YOU ARE SUBSCRIBED TO THAT SERVICE
OR NOT. THIS MAKES MOST CALLS A HAZARD, BECAUSE
ALTHOUGH 800 NUMBERS APPEAR TO BE FREE, THEY ARE
RECORDED ON YOUR CALLER LOG AND THEN RIGHT BEFORE YOU
RECEIVE YOUR BILL IT DELETES THE BILLINGS FOR THEM.
BUT BEFORE THAT THE ARE OPEN TO INSPECTION, WHICH IS
ONE REASON WHY EXTENDED USE OF ANY CODE IS DANGEROUS
UNDER ESS. SOME OF THE BOXES [SEE BOXING BELOW] ARE
UNABLE TO FUNCTION IN ESS. IT IS GENERALLY A MENACE
TO THE TRUE PHREAK. STANDS FOR: ELECTRONIC SWITCHING
SYSTEM. BECAUSE THEY COULD APPEAR ON A FILTER
SOMEWHERE OR MAYBE IT IS JUST NICE TO KNOW THEM
ANYWAYS.
A) SSS: STROWGER SWITCHING SYSTEM. FIRST
NON-OPERATOR SYSTEM AVAILABLE.
B) WES: WESTERN ELECTRONICS SWITCHING. USED ABOUT 40
YEARS AGO WITH SOME MINOR PLACES OUT WEST.
BOXING: 1) THE USE OF PERSONALLY DESIGNED BOXES THAT EMIT OR
CANCEL ELECTRONICAL IMPULSES THAT ALLOW SIMPLER
ACTING WHILE PHREAKING. THROUGH THE USE OF SEPARATE
BOXES, YOU CAN ACCOMPLISH MOST FEATS POSSIBLE WITH
OR WITHOUT THE CONTROL OF AN OPERATOR.
2) SOME BOXES AND THEIR FUNCTIONS ARE LISTED BELOW.
ONES MARKED WITH '*' INDICATE THAT THEY ARE NOT
OPERATABLE IN ESS.
*BLACK BOX: MAKES IT SEEM TO THE PHONE COMPANY THAT
THE PHONE WAS NEVER PICKED UP.
BLUE BOX : EMITS A 2600HZ TONE THAT ALLOWS YOU TO DO
SUCH THINGS AS STACK A TRUNK LINE, KICK
THE OPERATOR OFF LINE, AND OTHERS.
RED BOX : SIMULATES THE NOISE OF A QUARTER, NICKEL,
OR DIME BEING DROPPED INTO A PAYPHONE.
CHEESE BOX : TURNS YOUR HOME PHONE INTO A PAY PHONE TO
THROW OFF TRACES (A RED BOX IS USUALLY
NEEDED IN ORDER TO CALL OUT.)
*CLEAR BOX : GIVES YOU A DIAL TONE ON SOME OF THE OLD
SXS PAYPHONES WITHOUT PUTTING IN A COIN.
BEIGE BOX : A SIMPLER PRODUCED LINESMAN'S HANDSET THAT
ALLOWS YOU TO TAP INTO PHONE LINES AND
EXTRACT BY EAVESDROPPING, OR CROSSING
WIRES, ETC.
PURPLE BOX : MAKES ALL CALLS MADE OUT FROM YOUR HOUSE
SEEM TO BE LOCAL CALLS.
ANI [ANI]: 1) AUTOMATIC NUMBER IDENTIFICATION. A SERVICE
AVAILABLE ON ESS THAT ALLOWS A PHONE SERVICE [SEE
DIALUPS BELOW] TO RECORD THE NUMBER THAT ANY CERTAIN
CODE WAS DIALED FROM ALONG WITH THE NUMBER THAT WAS
CALLED AND PRINT BOTH OF THESE ON THE CUSTOMER BILL.
950 DIALUPS [SEE DIALUPS BELOW] ARE ALL DESIGNED
JUST TO USE ANI. SOME OF THE SERVICES DO NOT HAVE
THE PROPER EQUIPMENT TO READ THE ANI IMPULSES YET,
BUT IT IS IMPOSSIBLE TO SEE WHICH IS WHICH WITHOUT
BEING BUSTED OR NOT BUSTED FIRST.
DIALUPS [DY'L'UPS]: 1) ANY LOCAL OR 800 EXTENDED OUTLET THAT ALLOWS INSTANT
ACCESS TO ANY SERVICE SUCH AS MCI, SPRINT, OR AT&T
THAT FROM THERE CAN BE USED BY HANDPICKING OR USING
A PROGRAM TO REVEAL OTHER PEOPLES CODES WHICH CAN
THEN BE USED MODERATELY UNTIL THEY FIND OUT ABOUT
IT AND YOU MUST SWITCH TO ANOTHER CODE (PREFERRABLY
BEFORE THEY FIND OUT ABOUT IT.)
2) DIALUPS ARE EXTREMELY COMMON ON BOTH SENSES. SOME
DIALUPS REVEAL THE COMPANY THAT OPERATES THEM AS
SOON AS YOU HEAR THE TONE. OTHERS ARE MUCH HARDER
AND SOME YOU MAY NEVER BE ABLE TO IDENTIFY. A SMALL
LIST OF DIALUPS:
1-800-421-9438 (5 DIGIT CODES)
1-800-547-6754 (6 DIGIT CODES)
1-800-345-0008 (6 DIGIT CODES)
1-800-734-3478 (6 DIGIT CODES)
1-800-222-2255 (5 DIGIT CODES)
3) CODES: CODES ARE VERY EASILY ACCESSED PROCEDURES
WHEN YOU CALL A DIALUP. THEY WILL GIVE YOU SOME SORT
OF TONE. IF THE TONE DOES NOT END IN 3 SECONDS,
THEN PUNCH IN THE CODE AND IMMEDIATELY FOLLOWING THE
CODE, THE NUMBER YOU ARE DIALING BUT STRIKE THE
'1' IN THE BEGINNING OUT FIRST. IF THE TONE DOES
END, THEN PUNCH IN THE CODE WHEN THE TONE ENDS.
THEN, IT WILL GIVE YOU ANOTHER TONE. PUNCH IN THE
NUMBER YOU ARE DIALING, OR A '9'. IF YOU PUNCH IN
A '9' AND THE TONE STOPS, THEN YOU MESSED UP A
LITTLE. IF YOU PUNCH IN A TONE AND THE TONE
CONTINUES, THEN SIMPLY DIAL THEN NUMBER YOU ARE
CALLING WITHOUT THE '1'.
4) ALL CODES ARE NOT UNIVERSAL. THE ONLY TYPE THAT I
KNOW OF THAT IS TRULY UNIVERSAL IS METROPHONE.
ALMOST EVERY MAJOR CITY HAS A LOCAL METRO DIALUP
(FOR PHILADELPHIA, (215)351-0100/0126) AND SINCE THE
CODES ARE UNIVERSAL, ALMOST EVERY PHREAK HAS USED
THEM ONCE OR TWICE. THEY DO NOT EMPLOY ANI IN ANY
OUTLETS THAT I KNOW OF, SO FEEL FREE TO CHECK
THROUGH YOUR BOOKS AND CALL 555-1212 OR, AS A MORE
DEVIOUS MANOR, SUBSCRIBE YOURSELF. THEN, NEVER USE
YOUR OWN CODE. THAT WAY, IF THEY CHECK UP ON YOU DUE
TO YOUR CALLER LOG, THEY CAN USUALLY FIND OUT THAT
YOU ARE SUBSCRIBED. NOT ONLY THAT BUT YOU COULD SET
A PHREAK HACKER AROUND THAT AREA AND JUST LET IT
HACK AWAY, SINCE THEY USUALLY GROUP THEM, AND, AS A
BONUS, YOU WILL HAVE THEIR LOCAL DIALUP.
5) 950'S. THEY SEEM LIKE A PERFECTLY COOL PHREAKERS
DREAM. THEY ARE FREE FROM YOUR HOUSE, FROM PAYPHONES,
FROM EVERYWHERE, AND THEY HOST ALL OF THE MAJOR LONG
DISTANCE COMPANIES (950-1044 <MCI>, 950-1077
<SPRINT>, 950-1088 <SKYLINES>, 950-1033 <US
TELECOM>.) WELL, THEY AREN'T. THEY WERE DESIGNED FOR
ANI. THAT IS THE POINT, END OF DISCUSSION.
A PHREAK DICTIONARY. IF YOU REMEMBER ALL OF THE THINGS CONTAINED ON THAT
FILEUP THERE, YOU MAY HAVE A BETTER CHANCE OF DOING WHATEVER IT IS YOU DO. THIS
NEXT SECTION IS MAYBE A LITTLE MORE INTERESTING...
BLUE BOX PLANS:
---------------
THESE ARE SOME BLUE BOX PLANS, BUT FIRST, BE WARNED, THERE HAVE BEEN 2600HZ
TONE DETECTORS OUT ON OPERATOR TRUNK LINES SINCE XB4. THE IDEA BEHIND IT IS TO
USE A 2600HZ TONE FOR A FEW VERY NAUGHTY FUNCTIONS THAT CAN REALLY MAKE YOUR DAY
LIGHTEN UP. BUT FIRST, HERE ARE THE PLANS, OR THE HEART OF THE FILE:
700 : 1 : 2 : 4 : 7 : 11 :
900 : + : 3 : 5 : 8 : 12 :
1100 : + : + : 6 : 9 : KP :
1300 : + : + : + : 10 : KP2 :
1500 : + : + : + : + : ST :
: 700 : 900 :1100 :1300 :1500 :
STOP! BEFORE YOU DIEHARD USERS START PIECING THOSE LITTLE TONE TIDBITS
TOGETHER, THERE IS A SIMPLER METHOD. IF YOU HAVE AN APPLE-CAT WITH A PROGRAM
LIKE CAT'S MEOW IV, THEN YOU CAN GENERATE THE NECESSARY TONES, THE 2600HZ TONE,
THE KP TONE, THE KP2 TONE, AND THE ST TONE THROUGH THE DIAL SECTION. SO IF YOU
HAVE THAT I WILL ASSUME YOU CAN BOOT IT UP AND IT WORKS, AND I'LL DO YOU THE
FAVOR OF TELLING YOU AND THE OTHER USERS WHAT TO DO WITH THE BLUE BOX NOW THAT
YOU HAVE SOMEHOW CONSTRUCTED IT. THE CONNECTION TO AN OPERATOR IS ONE OF THE
MOST WELL KNOWN AND USED WAYS OF HAVING FUN WITH YOUR BLUE BOX. YOU SIMPLY DIAL
A TSPS (TRAFFIC SERVICE POSITIONING STATION, OR THE OPERATOR YOU GET WHEN YOU
DIAL '0') AND BLOW A 2600HZ TONE THROUGH THE LINE. WATCH OUT! DO NOT DIAL THIS
DIRECT! AFTER YOU HAVE DONE THAT, IT IS QUITE SIMPLE TO HAVE FUN WITH IT. BLOW A
KP TONE TO START A CALL, A ST TONE TO STOP IT, AND A 2600HZ TONE TO HANG UP.
ONCE YOU HAVE CONNECTED TO IT, HERE ARE SOME FUN NUMBERS TO CALL WITH IT:
0-700-456-1000 TELECONFERENCE (FREE, BECAUSE YOU ARE THE OPERATOR!)
(AREA CODE)-101 TOLL SWITCHING
(AREA CODE)-121 LOCAL OPERATOR (HEHE)
(AREA CODE)-131 INFORMATION
(AREA CODE)-141 RATE & ROUTE
(AREA CODE)-181 COIN REFUND OPERATOR
(AREA CODE)-11511 CONFERENCE OPERATOR (WHEN YOU DIAL 800-544-6363)
WELL, THOSE WERE THE TONE MATRIX CONTROLLERS FOR THE BLUE BOX AND SOME
OTHER HELPFUL STUFF TO HELP YOU TO START OUT WITH. BUT THOSE ARE ONLY THE
FUNCTIONS WITH THE OPERATOR. THERE ARE OTHER K-FUN THINGS YOU CAN DO WITH IT.
MORE ADVANCED BLUE BOX STUFF:
OOPS. SMALL MISTAKE UP THERE. I FORGOT TONE LENGTHS. UM, YOU BLOW A TONE
PAIR OUT FOR UP TO 1/10 OF A SECOND WITH ANOTHER 1/10 SECOND FOR SILENCE BETWEEN
THE DIGITS. KP TONES SHOULD BE SENT FOR 2/10 OF A SECOND. ONE WAY TO CONFUSE THE
2600HZ TRAPS IS TO SEND PINK NOISE OVER THE CHANNEL (FOR ALL OF YOU THAT HAVE
DECENT BSR EQUALIZERS, THERE IS MAJOR PINK NOISE IN THERE.) USING THE OPERATOR
FUNCTIONS IS THE USE OF THE 'INWARD' TRUNK LINE. THAT IS WORKING IT FROM THE
INSIDE. FROM THE 'OUTWARD' TRUNK, YOU CAN DO SUCH THINGS AS MAKE EMERGENCY
BREAKTHROUGH CALLS, TAP INTO LINES, BUSY ALL OF THE LINES IN ANY TRUNK (CALLED
'STACKING'), ENABLE OR DISABLE THE TSPS'S, AND FOR SOME 4A SYSTEMS YOU CAN EVEN
RE-ROUTE CALLS TO ANYWHERE.
ALL RIGHT. THE ONE THING THAT EVERY COMPLETE PHREAK GUIDE SHOULD BE WITHOUT
IS BLUE BOX PLANS, SINCE THEY WERE ONCE A VITAL PART OF PHREAKING. ANOTHER THING
THAT EVERY COMPLETE FILE NEEDS IS A COMPLETE LISTING OF ALL OF THE 800 NUMBERS
AROUND SO YOU CAN HAVE SOME MORE FUN.
/-/ 800 DIALUP LISTINGS /-/
1-800-345-0008 (6) 1-800-547-6754 (6)
1-800-245-4890 (4) 1-800-327-9136 (4)
1-800-526-5305 (8) 1-800-858-9000 (3)
1-800-437-9895 (7) 1-800-245-7508 (5)
1-800-343-1844 (4) 1-800-322-1415 (6)
1-800-437-3478 (6) 1-800-325-7222 (6)
ALL RIGHT, SET CAT HACKER 1.0 ON THOSE NUMBERS AND HAVE A FUCK OF A DAY.
THAT IS ENOUGH WITH 800 CODES, BY THE TIME THIS GETS AROUND TO YOU I DUNNO WHAT
STATE THOSE CODES WILL BE IN, BUT TRY THEM ALL OUT ANYWAYS AND SEE WHAT YOU GET.
ON SOME 800 SERVICES NOW, THEY HAVE AN OPERATOR WHO WILL ANSWER AND ASK YOU FOR
YOUR CODE, AND THEN YOUR NAME. SOME WILL SWITCH BACK AND FORTH BETWEEN VOICE AND
TONE VERIFICATION, YOU CAN NEVER BE QUITE SURE WHICH YOU WILL BE UP AGAINST.
ARMED WITH THIS KNOWLEDGE YOU SHOULD BE HAVING A PRETTY GOOD TIME PHREAKING
NOW. BUT CLASS ISN'T OVER YET, THERE ARE STILL A COUPLE IMPORTANT RULES THAT YOU
SHOULD KNOW. IF YOU HEAR CONTINUAL CLICKING ON THE LINE, THEN YOU SHOULD ASSUME
THAT AN OPERATOR IS MESSING WITH SOMETHING, MAYBE EVEN LISTENING IN ON YOU. IT
IS A GOOD IDEA TO CALL SOMEONE BACK WHEN THE PHONE STARTS DOING THAT. IF YOU
WERE USING A CODE, USE A DIFFERENT CODE AND/OR SERVICE TO CALL HIM BACK.
A GOOD WAY TO DETECT IF A CODE HAS GONE BAD OR NOT IS TO LISTEN WHEN THE
NUMBER HAS BEEN DIALED. IF THE CODE IS BAD YOU WILL PROBABLY HEAR THE PHONE
RINGING MORE CLEARLY AND MORE QUICKLY THAN IF YOU WERE USING A DIFFERENT CODE.
IF SOMEONE ANSWERS VOICE TO IT THEN YOU CAN IMMEDIATELY ASSUME THAT IT IS AN
OPERATIVE FOR WHATEVER COMPANY YOU ARE USING. THE FAMED '311311' CODE FOR METRO
IS ONE OF THOSE. YOU WOULD HAVE TO BE QUITE STUPID TO ACTUALLY RESPOND, BECAUSE
WHOEVER YOU ASK FOR THE OPERATOR WILL ALWAYS SAY 'HE'S NOT IN RIGHT NOW, CAN I
HAVE HIM CALL YOU BACK?' AND THEN THEY WILL ASK FOR YOUR NAME AND PHONE NUMBER.
SOME OF THE MORE SOPHISTICATED COMPANIES WILL ACTUALLY GIVE YOU A CARRIER ON A
LINE THAT IS SUPPOSED TO GIVE YOU A CARRIER AND THEN JUST HAVE GARBAGE FLOW
ACROSS THE SCREEN LIKE IT WOULD WITH A BAD CONNECTION. THAT IS A FEEBLE EFFORT
TO MAKE YOU THINK THAT THE CODE IS STILL WORKING AND MAYBE GET YOU TO DIAL
SOMEONE'S VOICE, A GOOD TEST FOR THE CARRIER TRICK IS TO DIAL A NUMBER THAT WILL
GIVE YOU A CARRIER THAT YOU HAVE NEVER DIALED WITH THAT CODE BEFORE, THAT WILL
ALLOW YOU TO DETERMINE WHETHER THE CODE IS GOOD OR NOT. FOR OUR NEXT SECTION, A
LIGHTER LOOK AT SOME OF THE THINGS THAT A PHREAK SHOULD NOT BE WITHOUT. A
VOCABULARY. A FEW MONTHS AGO, IT WAS A QUITE STRANGE WORLD FOR THE MODEM PEOPLE
OUT THERE. BUT NOW, A PHREAKER'S VOCABULARY IS ESSENTIAL IF YOU WANNA MAKE A
GOOD IMPRESSION ON PEOPLE WHEN YOU POST WHAT YOU KNOW ABOUT CERTAIN SUBJECTS.
/-/ VOCABULARY /-/
- DO NOT MISSPELL EXCEPT CERTAIN EXCEPTIONS:
PHONE -> FONE
FREAK -> PHREAK
- NEVER SUBSTITUTE 'Z'S FOR 'S'S. (I.E. CODEZ -> CODES)
- NEVER LEAVE MANY CHARACTERS AFTER A POST (I.E. HEY DUDES!#!@#@!#!@)
- NEVER USE THE 'K' PREFIX (K-KOOL, K-RAD, K-WHATEVER)
- DO NOT ABBREVIATE. (I GOT LOTSA WARES W/ DOCS)
- NEVER SUBSTITUTE '0' FOR 'O' (R0DENT, L0ZER).
- FORGET ABOUT YE OLD UPPER CASE, IT LOOKS RUGGYISH.
ALL RIGHT, THAT WAS TO RELIEVE THE TENSION OF WHAT IS BEING DRILLED INTO
YOUR MINDS AT THE MOMENT. NOW, HOWEVER, BACK TO THE TEACHING COURSE. HERE ARE
SOMETHINGS YOU SHOULD KNOW ABOUT PHONES AND BILLINGS FOR PHONES, ETC.
LATA: LOCAL ACCESS TRANSFERENCE AREA. SOME PEOPLE WHO LIVE IN LARGE CITIES
OR AREAS MAY BE PLAGUED BY THIS PROBLEM. FOR INSTANCE, LET'S SAY YOU LIVE IN THE
215 AREA CODE UNDER THE 542 PREFIX (AMBLER, FORT WASHINGTON). IF YOU WENT TO
DIAL IN A BASIC METRO CODE FROM THAT AREA, FOR INSTANCE, 351-0100, THAT MIGHT
NOT BE COUNTED UNDER UNLIMITED LOCAL CALLING BECAUSE IT IS OUT OF YOUR LATA.
FOR SOME LATA'S, YOU HAVE TO DIAL A '1' WITHOUT THE AREA CODE BEFORE YOU CAN
DIAL THE PHONE NUMBER. THAT COULD PROVE A HASSLE FOR US ALL IF YOU DIDN'T
REALIZE YOU WOULD BE BILLED FOR THAT SORT OF CALL. IN THAT WAY, SOMETIMES, IT IS
BETTER TO BE SAFE THAN SORRY AND PHREAK.
THE CALLER LOG: IN ESS REGIONS, FOR EVERY HOUSEHOLD AROUND, THE PHONE
COMPANY HAS SOMETHING ON YOU CALLED A CALLER LOG. THIS SHOWS EVERY SINGLE NUMBER
THAT YOU DIALED, AND THINGS CAN BE ARRANGED SO IT SHOWED EVERY NUMBER THAT WAS
CALLING TO YOU. THAT'S ONE MAIN DISADVANTAGE OF ESS, IT IS MOSTLY COMPUTERIZED
SO A NUMBER SCAN COULD BE DONE LIKE THAT QUITE EASILY. USING A DIALUP IS AN EASY
WAY TO SCREW THAT, AND IS SOMETHING WORTH REMEMBERING. ANYWAYS, WITH THE CALLER
LOG, THEY CHECK UP AND SEE WHAT YOU DIALED. HMM... YOU DIALED 15 DIFFERENT 800
NUMBERS THAT MONTH. SOON THEY FIND THAT YOU ARE SUBSCRIBED TO NONE OF THOSE
COMPANIES. BUT THAT IS NOT THE ONLY THING. MOST PEOPLE WOULD IMAGINE "BUT WAIT!
800 NUMBERS DON'T SHOW UP ON MY PHONE BILL!". TO THOSE PEOPLE, IT IS A NICE
THOUGHT, BUT 800 NUMBERS ARE PICKED UP ON THE CALLER LOG UNTIL RIGHT BEFORE THEY
ARE SENT OFF TO YOU. SO THEY CAN CHECK RIGHT UP ON YOU BEFORE THEY SEND IT AWAY
AND CAN NOTE THE FACT THAT YOU FUCKED UP SLIGHTLY AND CALLED ONE TOO MANY 800
LINES.
RIGHT NOW, AFTER ALL OF THAT, YOU SHOULD HAVE A PRETTY GOOD IDEA OF HOW TO
GROW UP AS A GOOD PHREAK. FOLLOW THESE GUIDELINES, DON'T SHOW OFF, AND DON'T
TAKE UNNECESSARY RISKS WHEN PHREAKING OR HACKING.
/-/ CREDITS /-/
TO THE VIDEOSMITH - FOR SETTING ME STRAIGHT ON SOME SHIT.
TO THE LINESMAN - FOR TELLING ME TO UPLOAD IT TO HIS AE LINE.
TO MODERN MUTANT - FOR MAKING ME INTO A PHREAKING FREAK.
TO JACK THE NIBBLER- FOR THE BASIS OF THE BLUE BOX PLANS.
/---------------------------------\
\ BULLETIN BOARD LIST \
\ --------------------- \
\ SIRIUS CYBERNETIC'S BBSYSTEM \
\ 808-521-3306 40MEGS \
\---------------------------------/
LATER,
THE TRAVELER
---------------------------------------
ENTER (1-47, M=MENU, Q=QUIT) : -*-*--*-*--*-*--*-*--*-*--*-*--*-*--*-*--*-*--*-*--*-*-
-*-*- THIS FILE HAS PASSED THROUGH: -*-*-
-*-*- -*-*-
-*-*- T H E H O U S E -*-*-
-*-*- -*-*-
-*-*- ITALIAN BAD BOYS HQ 210 MEGZ ON LINE -*-*-
-*-*- -*-*-
-*-*- ONLY 0-0 DAYS WAREZ NOT MORE !!!!!! -*-*-
-*-*- -*-*-
-*-*- GIVE US A CALL AT: NODE0 39-409-45542 -*-*-
-*-*- NODE1 39-409-46PRIVATE-*-*-
-*-*--*-*--*-*--*-*--*-*--*-*--*-*--*-*--*-*--*-*--*-*-
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
THIS FILE PASSED THROUGH....
____ _ ____ _
__ / /____ ____ ______ __ __ / /____ __
/ / / // __ \ / __ \ / ____/ / / /\ / //\ / // __ \ /\ / /
/ / / // /_/ // /_/ // / / /_/ / / /_/ // /_/ // /_/ // \/ /
/ /_/ // __ _// __ // / / __ / / __ _// __ // __ // /\ /
/ /// // / / // / / // / / / / / / / / // / / // / / // / / /
\____// / \/ \/ / / \/ / / \/ OF / / \/ \/ / / \/ / / \/ \/
\/ \/ \/ \/ \/ \/
________ __ __ __ _____ __ __ ____
/\ \ ____// / / / / // _ / / /_/ // __ \
/ \ \ _/ / / / / / / \ \\/ / __ // / / /
/ /\ \ \ \ / /___ / /_/ / /\\ \ / / / // /_/ /
/__/\__\ \/ \____/ \____/ /____//_/ /_/ \_____\
609-587-0656
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

View File

@@ -0,0 +1,106 @@
Title: Information On Diverters
Date: 9/13/88
Time: 12:42 am
=======================================
= Using Diverters =
= =
= By =
= =
= Blitzoid ?? & Galactus ** =
= =
= Of =
= =
= The Elite Hackers Guild =
= =
=======================================
What Diverters Are:
-------------------
Diverters, originally knows as "Chesse Boxes" were used in the sixties by
bookies and other illegal businesses to forward their calls. Diverters pre-
date call forwarding and simulate this custom calling feature with one major
advantage. Unlike call forwarding, a diverted call may be intercepted while
the phone rings or during conversation just by picking up the phone at the
diverter location. After diverters became popular in the crime sector, they
became a good way for professionals to recieve night time office calls at
home. For this reason may diverters are only up at night.
Locating Diverters:
-------------------
1 - You can recognize a diverter fairly easily. A diverter will ring usually
one of two times then you may hear a tone, a moment of silence or a voice
saying something like "Please hold you call is being transferred". On some
diverters, there is no time laps before the second symptom. The second symptom
is another ring... sometimes of a different type. Finally and fatally, if you
wait after the person hangs up you will usually hear the diverter dial-tone
within a few seconds.
2 - Diverters are often in step or crossbar office. But this is only a
guideline and not a rule.
3 - Diverters often belong to:
A: Physicians
B: Dentists
C: Real Estate Offices
D: Financial Advisers
E: 24 Hour Air Cond. Repair
F: 24 Hour Exterminators
G: 24 Hour Heater Repair
H: Insurance Agents
I: Wreckers
J: Anyone Else Of A 24 Hour Nature
How A Diverter Works:
---------------------
Simply put, a diverter is a small box connected to two phones. When phone
#1 rings, the diverter picks up phone #2 dials a number on it and patches the
two phones together.
Flaws To A Diverter:
--------------------
The most commonly known flaw is that if you hold on the line after being
hung up on you will usually hear the diverter dial-tone and you can usually
dial off of it. This is because you have not hung up on phone #1 and it is
still connected to phone #2.
Another flaw is even better. If one person rings phone #2, and another
calls phone #1 the two parties will be connected. If either party hangs up,
the other will get a dial-tone belonging to the other phone (usually).
Often you will have to hit your "1" key. This simulates a dial-tone and
fools the diverter into thinking that the phone is hung up.
You can also sit ringing phone #2 and intercept their calls. One diverter I
found belonged to a mail order place and I intercepted calls, obtained credit
card numbers, then placed the orders myself so that noone would know what
happened.
Hope This Phile Has Been Helpfull. Have Phun!
======================================
COURTESY OF PHREAK KLASS 2600 -- 806/799-0016 -- LOGIN: EDUCATE
---------------------------------------
The Alternate Universe BBS - [718] 326-0720
Distributed in part by:
Skeleton Crue 415-376-8060 located out of Moraga, California.
!!Get on the band wagon before it RUNS YOU DOWN!!
The very LAST bastion of Abusive Thought in all of the Suburbian West Coast...
(CH&AOS)

View File

@@ -0,0 +1,92 @@
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ # HOW PHONE PHREAKS ARE CAUGHT #
# from 2600 magazine V4 #7 July 1987 #
# written by NO SEVERANCE #
# typed by G. A. ELLSWORTH #
# #
#()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(#
Until about four months ago, I worked for a large long distance company. I was given the pink slip because some guy in my office found out that I did a little hacking in my spare time. It seems that most companies just aren't into that anymore. I feel I should do all I can to keep phreaks from getting caught by the IC's(Independent Carriers or Interexchange Companies). Remember: a safe phreak is an educated phreak.
When you enter an authorization code to access a long distance company's network there are a few things that happen. The authorization code number you enter is cross referenced in a list of codes. When an unassigned code is received the switch will print a report consisting of the authorization code, the date and time, and the incoming trunk number (if known) along with other miscellaneous information.
When an authorization code is found at the end of a billing cycle to have been "abused" in the switch, one of two things is done. Most of the time the code is removed from the database and a new code is assigned. But there are times when the code is flagged "abused" in the switch. This is very dangerous. Your call goes through, but there is a bad code report printed.(this is similar to an unassigned code report, but it also prints out the number being called.) You have no way to know this is happening but the IC has plenty of time to have the call traced. This just goes to show that you should switch codes on a regular basis and not use one till it dies.
ACCESS
There are several ways to access an IC's network. Some are safe and some can be deadly.
FEATURE GROUP A (FGA). This is a local dial-up to a switch. It is just a regular old telephone number (for example 871-2600). When you dial the number it will ring (briefly) and give a dial tone telling you to proceed. There are NO identifying digits (i.e. your telephone number) sent to a switch. The switchis signaled to give you a dial tone from the ringing voltage alone. The only way you could be caught hacking codes on an FGA would be if Telco (your local telephone company) were to put an incoming trap on the FGA number. This causes the trunk number your call came over to be printed out. From the trunk number Telco could tell which central office (CO) your call was coming from. From there Telco could put an outgoing trap in your CO which would print the number of the person placing the call to that number--that is provided that you are in an ESS or other Electronic Switch. This is how a majority of people are caught hacking codes on a FGA access number.
Next down the line we have Feature Group B (FGB). There are two FGB signalling formats called FGB-T and FGB-D. All FGBs are 950-XXXX numebers and Ihave yet to find one that doesn't use FGB-T format.
When you dial an FGB number your call can take two paths: 1) Large COs havedirect trunks going to the different IC's. This is more common in Electronic offices. 2) Your call gets routed through a large switch called a tandem, whichin turn has trunks to all the ICs.
When you dial an FGB-T number the IC's switch receives: KP+ST
This prompts the switch to give you a dial tone. The IC gets no informationregarding your phone number. The only thing that makes it easier to catch you is that with a direct trunk from your central office when you enter a bad code the IC knows what office your coming from. Then it's just a matter of seeing who is calling that 950 number.
On the other hand, when you dial an FBG-D number the switch receives:
KP+(950-XXXX)+ST followed by
KP+0+NXX-XXXX+ST or KP+0+NPA
NXX-XXXX+ST
The first sequence tells that there is a call coming in, the 950-XXXX (optional) is the same 950 number that you call. The second sequence contains your number (ANI-Automatic Number Identification). If the call comes over the trunk directly from your CO it will not have your NPA (Area Code). If the call is routed through a tandem it will contain your NPA number. FGB-D was originallydeveloped so that when you got the dial tone you could enter just the number youwere calling and your call would go through; thus alleviating authorization codes. FGB-D can also be used as FGB-T, where the customer enters a code but the switch knows where the call is coming from. This could be used to detect hackers, but has not been done, yet at least not to my switch.
FGB-D was the prelude to FEATURE GROUP D (FGD). FGD is the heart of Equal Access. Since FGD can only be provided by electronic offices, equal access is only available under ESS (or any other electronic office). FGD is the signalling used for both 1+ dialing (when you choose an IC over AT&T) and 10XXX dialing. The signalling format for FGD goes as follows:
KP+II+10D(10 digits)+ST followed by
KP+10D+ST
The first sequence is called the identification sequence. This consists of KP. information digits(II), and the calling party's telephone number with NPA (10D ANI) finished up with ST. The second address seqeunce has KP, the called number (10D) followed by ST. There is a third FGD sequence not shown here whichhas to do with international calling--I may deal with this in a future article. When the IC's switch receives an FGD routing it will check the information digits to see if the call is approved and if so put the call through. Obviouslyif the information digits indicate the call is coming from a coin phone, the call will not go through.
This is a list of information digits commonly used by Bell Operating Companies.
Code Sequence Meaning
00 identification Regular line, no special treatment
01 identification ONI(Operator Number Identification) mulitparty lines
02 identification ANI failure
06 identification Hotel or Motel
07 identification Coinless,hospital,inmate etc.
08 identification InterLATA restricted
10 address 10X test call
13 international 011-plus:direct distance dialed
15 international 01-plus:operator assisted
27 identification Coin
68 identification InterLATA-restricted hotel or motel
78 identification InterLATA-restricted hospital, coinless, inmate etc.
95 address 959-XXXX test call
There is a provision with FGD so when you dial 10xxx# you will get a switchdial tone as if you dial a 950. Unfortunately, this is not the same as dialing a 950. The IC would receive:
KP+II+10D(ANI)+ST
KP+ST
The KP+ST gives you the dial tone, but the IC has your number by then.
800 NUMBERS
Now that we have the feature groups down pat we will talk about 800 numbers. Invisible to your eyes, there are two types of 800 numbers. There are those owned by AT&T--which sells WATS service. There are also new 800 exchanges owned by the IC's. So far, I believe only MCI, US SPRINT, and WesternUnion have bought there own 800 exchanges. It is very important not to use codes on 800 numbers in an exchange owned by an IC. But first...
When you dial an AT&T 800 number that goes to an IC's switch the following happens. The AT&T 800 number is translated at the AT&T switch to an equivalent POTS (Plain Old Telephone Service). This number is an FGA number and as stated before does not know where you're calling from. They might know what your general region is since the AT&T 800 numbers can translate to different POTS numbers depending on where you're calling from. This is the beauty of FGA and AT&T WATS but this is also why it's being phased out.
On the other hand, IC-owned 800 numbers are routed as FGD calls--very deadly. The IC receives:
KP+II+10D+ST
KP+800 NXX XXXX+ST
When you call an IC 800 number which goes to an authorization code-based service, you're taking a great risk. The IC's can find out very easily where you're calling from. If you're in an electronic central office your call can godirectly over an FGD trunk. When you dial and IC 800 number from a non-electronic CO your call gets routed through another switch, thus ending up with the same undesirable effect.
MCI is looking into getting an 800 billing service tariffed where a customer's 800 WATS bill shows the number of everyone who has called it. The way the IC's handle billing, if they wanted to find out who made a call to their800 number, that information would be available on billing tapes. The trick is not to use codes on an IC owned 800
The way to find out who owns an 800 exchange is to call 800-NXX-0000 (NXX being the 800 exchange). If this is owned by AT&T you will get a message saying, "You have reached the AT&T Long Distance Network. Thank you for choosing AT&T. This message will not be repeated." When you call an exchange owned by an IC you will usually get a recording telling you that your call cannot be completed as dialed, or else you will get a recording with the name ofthe of the IC. If you call another number in an AT&T 800 exchange (i.e. 800-NXX-0172) the recording you get should always have an area code followed by a number and a letter, for example, "Your call cannot be completed as dialed. Please check the number and dial again. 312 4T." AS of last month, most AT&T recordings are done in the same female voice. An MCI recording will tell you to"Call customer service at 800-444-4444" followed by a switch number ("MCI 20G"). Some companies such as US Sprint, are redesigning their networks. Since the merger of US Telecom and GTE Sprint, US Sprint has had 2 seperate networks. The US Telecom side was Network 1 an dthe GTE side was Network 2. US Sprint will be joining the two, thus forming Network 3. When Network 3 takes effect there will be no more 950-0777 or 10777. All customers will have 14 digit travel cards (referred to as FON cards, or Fiber Optic Network cards) based on their telephone numbers. Customers who don't have equal access will be given seven digit "home codes". These authorization codes may only be used from your home town or city. The access number they will be pushing for travel code service will be 800-877-8000. This cutover was supposed to be completed by June27th, 1987 but the operation has been pushed back.
One last way to tell if the port you dialed is in an IC's 800 exchange is if it doesn't ring before you get the tone. When you dial an FGA number it willring shortly but when you dial 10XXX# you get the tone right away. Last but notleast, I will provide you with a list of 800 exchanges that are owned by IC's. Amajority of them are owned by MCI.
1800-XXX-....
MCI
XXX=234,274,283,284,288,289,333365,444,456,627,666,678,727,759,777,825,876,888,937,950,955,999
US SPRINT
XXX=347,366,699,877
WESTERN UNION XXX=988
And to avoid confusion, these are the AT&T 800 exchanges:
XXX=202,212,221,222,223,225,227,228,231,232,233,235,237,238,241,242,243,245,247,248,251,252,253,255,257,258,262,263,265,267,268,272,282,292,302,213,321,322,323,325,327,328,331,332,334,336,338,341,342,343,344,345,346,348,351,352,354,356,358,361,362,363,367,368,372,382,387,392,402,412,421,422,423,424,426,428,431,432,433,435,437,438,441,442,443,445,446,447,448,451,452,453,457,458,461,462,463,456,468,471,482,492,502,512,521,522,523,524,525,526,527,528,531,532,533,535,537,538,541,542,543,544,545,547,548,551,552,553,554,555,556,558,561,562,563,565,567,572,582,592,602,612,621,622,624,626,628,631,632,633,634,635,637,638,641,642,643,645,647,648,652,654,661,662,663,665,667,672,682,692,702,712,722,732,742,752,762,772,782,792,802,812,821,882,824,826,828,831,832,833,835,841,842,843,845,847,848,851,852,854,855,858,862,872,874,882,892,902,912,922,932,942,952,962,972,982,992
(Other exchanges can be used by local phone companies--New Jersey Bell, MountainBell, etc.)


View File

@@ -0,0 +1,35 @@
We are having fun - Phreakin, hacking, stealing.....
BUT - As we are having most fun - The feeds shows up / Why????
Here's some info on what to take care of:
REGISTRATION OF PHONE CALLS:
By the start of 1994 the Danish phone companies will register ALL national
calls. I don't know if other calls will be registred.
The companies says it will only allow people to get a printout of there
calls destination and duration.
But - As you may know PET (The police Intelligence Service) are tapping
phones in a large scale. So, they will deffenetly use this oppetunity
to monitor YOUR phone traffic.
COPIES OF PHONE CARDS:
Don't try making copies of the phone cards used i pay phones. They may work
once - But the pay phones (This system i active in Denmark) communicate
with a central computer. If it detects two identical cards being used
with different amounts of credit left it will blacklist it.
I guess this kind of system is being used in other countries too. But I'm
not sure.
NOTE: All calls made from payphones using payphone-cards will in Denmark be
registred with: TIME, DATE, LASTING OF THE CALL, PLACE YOU ARE CALLING FROM
AND TO!!!!!
So - Don't use these phones if you're in trouble or don't want anyone to know
about your call - Use normal payphones in stead. They will "only" log the
number ya calling.
NoCopyright 1994 Informer

View File

@@ -0,0 +1,58 @@
How to phreak without fear!
by The Elf
Contact me on Demon Roach Underground.
As far as I know this works only in Southwestern Bell's areas. That should
include Texas, Ok, Arkansas, NM and Louisanna.
Materials needed: Shoes with rubber soles, Wirestrippers/cutters,
3/8in open-end wrench, beige box,
and maybe a cordless phone.
First off, this method is not fool proof and is safer in rural
areas than in big cities. Second, you need to know where the little green
cylinder that connects your house to the network is. If your area's setup
is anything like mine, there'll be a green protrusion every five hundred
feet down a rural road. If you aren't for sure which one is for your house
you can either report line problems and watch for the lineman to work on
your line and note what box he goes to or you can get a good cordless phone
and if the box is in range take it with you to the box, open the box up,
turn on the phone and verify that you have a dial-tone, the box will have
several pairs of wires sticking out of it (blues and oranges) and some of
them (the blues ones) will be connected.
These blue lines are primary lines. If you notice though, the blue
lines go into a insulator with a pair of unhooked orange wires,
secondary lines, that both go to houses. If you already have a legal second
line the orange pair should be hooked up too.
The post has a left set of terminals and a right side of terminals.
You ALWAYS hook up the wire with the white stripe on it to the left side!
Find your line by disconnecting wires and listening to the phone. When you
find yours, trace the blue wire down in to the ground and see it there's
a pair of orange wires that are in the same cable as the blues. Hook them
up by cutting off the capper and striping the wires. Now close up the box
after you make it look like it was inside and pick up any wire strippings
and then go home.
You're now hooked into another line! Now you need to interface
your house with the new line.
Most houses have a telephone network interface box. This is a
black, silver or beige box thats on the outside of the house. The newer
model boxes have two parts, one part for the linemen and another part for
the customers. You need to get in to both. Open up the box.
You should see the blue wires hooked up to the red and green lines
also you should see the orange wires sticking up unused. Strip them and
connect them to the yellow and black wires. The wire with the stripe goes
to the yellow wire. Now your house has a new line.
To access the other line you have two choices. You can either buy a
two line splitter and use both lines in your room, or you can just open up
the wall plate of the room that you'd want to use the new line in and
exchange the red and black and the yellow and green wires.
You're now ready to go. Chances are you'll be tied into an
existing phone line already so be careful in your usage during the night.
THe great thing about this is that you can now call long-distance for free!
No more code hacking!
Enjoy!

View File

@@ -0,0 +1,196 @@
File: A HISTORY OF BRITISH PHREAKING
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$ $
$ The History Of British Phreaking $
$ -=- -=-=-=- -- -=-=-=- -=-=-=-=- $
$ $
$ The second in a series of $
$ THE HISTORY OF.....philes $
$ $
$ Written and Uploaded by: $
$ $
$$$$$$$$$$$$-=>Lex Luthor<=-$$$$$$$$$$$
$ and $
$ The Legion Of Doom! $
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
With thanks to Peter McIvers for the list of frequencies mentioned later in
this phile.
NOTE: the British Post Office, is the U.S. equivelent of Ma Bell.
In Britain, phreaking goes back to the early fifties, when the technique of
'Toll A drop back' was discovered. Toll A was an exchange near St. Pauls which
routed calls between London and nearby non-London exchanges. The trick was to
dial an unallocated number, and then depress the reciever-rest for 1/2 second.
This flashing initiated the 'clear forward' signal, leaving the caller with an
open line into the Toll A exchange. He could thjen dial 018, which forwarded
him to the trunk exchange- at that time, the first long distance exchange in
Britain- and foll ow it with the code for the distant exchange to which he
would be connect ed at no extra charge.
The signals needed to control the UK network today were published in the
"Institution of Post Office Engineers Journal" and reprinted in the Sunday
Times (15 Oct. 1972).
The signalling system they use: signalling system No. 3 uses pairs of
frequencies selected from 6 tones separated by 120Hz. With that info, the
phreaks made "Bleepers" or as they are called here in the U.S. "Blue Box", but
they do utilize different MF tones then the U.S., thus, your U.S. blue box that
you smuggled into the UK will not work, unless you change the frequencies.
In the early seventies, a simpler system based on different numbers of
pulses with the same frequency (2280Hz) was used. For more info on that, try to
get ahold of: Atkinson's "Telephony and Systems Technology".
The following are timing and the frequencies for boxing in the UK and other
foreign countries. Special thanks to Peter McIvers for the phollowing inpho:
British "bleeper" boxes have the vaery same layout as U.S. blue boxes. The
frequencies are different, though. They use two sets of frequencies, forward
and backward. Forward signals are sent out by the bleeper box; the backward
signals may be ignored (it's sort of like using full duplex). The frequencies
are as follows:
U.S.:
US: 700 900 1100 1300 1500 1700
Forward: 1380 1500 1620 1740 1860 1980 Hz
Backward: 1140 1020 900 780 660 540 Hz
for example, change the 900 Hz potentiometers in your box to 1500 Hz. All
numbers 1-0 (10) are in the same order as in an American box. The ones after
this are thier codes for operator 11, operator 12, spare 13, spare 14, and 15.
One of these is KP, one (probably 15) is Star; it won't be too hard to figure
out. The signals should carry -11.5dBm +/- 1dB onto the line; the frequencies
should be within +/- 4Hz (as is the British equipment). Also, the 1VF system is
still in operation in parts of the U.K. This would encode all signals 1 to 16 as binary numbers; for instance, a five is 0101. There are six intervals per
digit, each 50ms long r a total of 300ms. First is a start pulse of 2280 for
50ms. Then, using the example of five (0101), there is a 50ms pause, a 50ms
pulse of 2280, a 50ms pause, and a 50ms pulse of 2280. Finally, there is a
50ms pause that signals the end of the digit. The frequency tolerance on the
2280 Hz is +/- 0.3%; it is sent at -6 +/- 1dBm. An idle line is signaled by
the presence of a 3825Hz tone for more than 650ms. This must be within 4Hz.
France uses the same box codes as the US, with an additional 1900Hz
acknowledgement signal, at -8.7 +/- 1dBm per frequency.
Spain uses a 2 out of 5 mf code (same frequencies as US), with a 1700 Hz
acknowledge signal.
Other places using the 1VF system are:
Australia, 2280Hz +/-6Hz, 35ms/digit at -6dB.
Germany, France: same as Australia; also, some 1VF systems in the UK.
Switzerland: same as Australia, only it uses 3000Hz, not 2280.
Sweeden: same as above, but at 2400Hz.
Spain: some parts use 1VF with 2500Hz.
There is one other major system: the 2VF system. In this system, each digit is
35ms long. The number is encoded in binary as with the 1VF system. Using the
example of five (0101), here's how the American 2VF system was sent:
2400 pulse, pause, 2040 pulse, pause, 2400 pulse, pause, 2040 pulse, pause. The
digits and pauses are all 35ms long, for a total of 280ms per digit. Other
countries are still using a similar high/low pair with the same timings. Some
parts of Italy use the 1VF system with 2040Hz; some use the 2VF system with
2040 and 2400 (same as original US) Hz. The Netherlands uses a 2VF system with
2400 and 2500 Hz pulses. With the 2VF system, all frequencies should be within
2Hz.
Also, here are some specs for American phone equipment:

Binary file not shown.

View File

@@ -0,0 +1,193 @@
Manuscript II
Field Phreaking
-=-=-=-=-=-=-=-=-=-
Introduction: The purpose of this manuscript is to introduce useful phreaking
------------- techniques. These techniques have been developed by the Third
Cartel and have proved to be convenient and reliable.
Field Phreaking Kit:
====================
The Field Phreaking Kit is a neccessity for the serious phreaker. Some
so-called phreaks get all of their information including codes from BBSs and
have an ego big enough to call themselves phreaks. The real phreak acquires
knowledge on his own through perseverence and ingenuity. Following is a list
of useful items for your Phreaking Kit:
o Backpack: Get a nice one to hold all of your materials.
o Test Phone: Very Handy. We'll tell you how to get one or make one.
o Ratchet Set: Usually, you'll only need 7/16 and 3/8" size ratchets.
o Screwdrivers: Get medium and large screwdrivers, and a phillips head.
o Wire Cutters: Just in case you want to wipe out some lines.
o Pliers: For misc. stuff.
o Xacto or Pocket Knife: To strip or cut wires.
o Penlight: Nice and small; very useful for night work.
o Flashlight: If you need lots of light and have enough room in your pack.
o Gloves: Make sure you don't get shocked or leave your fingerprints around.
o Pencil and Paper: Write down locations, notes, numbers, etc.
-------------------------------------------------------------------------------
The Third Cartel carries the following optional materials in their Field Kit:
-------------------------------------------------------------------------------
o Walki-Talkies: For communications when yelling isn't possible or smart.
o Battery Operated Camara Flash: Good for flashing in someone's eyes at night
Will blind a telco guy for a few seconds.
o Mace/Dog Repellant: Spray in someone's eyes if they give you trouble.
o Smoke Bomb: Helpful to divert attention or scare. [drop in telco car]
[Mix 3 parts potassium nitrate with 2 parts sugar and melt]
o Matches: For smoke bomb or anything that is flammable.
o Bandana/Surgical Mask: Manholes are dusty; Wear these for easier breathing.
o Marker: Mark your "territory" on phone boxes.
o Fake Telco ID Card: Will make some people think that you work for telco.
Organize your kit so you know where everything is and can get something quickly
when needed. You don't want to be fumbling for your mace when the gestapo is
about to get you.
Test Phone:
===========
The Test Phone is the most useful piece of equipment for Field Phreaking. You
can try to sneak into a telco Plant Department [truckyard] and get a real test
phone out of a truck like we did. If you'd rather not do this, don't worry;
making your own test phone is ultra-easy.
First, get a telephone for your own purposes. Find the wire coming out of the
phone that is supposed to go to the wall's modular jack. It should be at least
three feet long for convienience. Cut off the modular jack at the end of the
wire. Strip the wire, and there should be two or four small wires inside.
Hook the two middle wires to alligator clips [preferably insulated]. You now
have a test phone! Very easy, indeed. Now let's see if you hooked everything
up ok. First find your phone box. It'll probably be on the outside of your
house. It's farly small, and you might need the ratchet to open it up. Once
you get it open, you should see some screws. These are the terminals for your
phone line. Hook the alligator clips to the two top terminals. If your phone
is ok, you should get a dial tone. Once you know that your phone is working,
a whole new world opens up to you! You can hook the phone up to your
neighbor's terminal and call long distance or yell at the operator on their
line. Be careful, though. You don't want to be talking to Sue in L.A. when
your neighbors are home and awake. If they pick up the phone when you're
already on, you could get into serious trouble. Of course, you could always
listen in on them! If you want, you can hook wires up to your neighbor's
terminal and lead them to your house. In case you didn't know, this is called
Beige Boxing. You can then hack computers on their line, call Dial-A-Prayer,
etc. Make sure to hide the wire well so that it won't be traced to your
house!
Manholes:
=========
One way to get access to an abundance of phone lines is by getting into telco
manholes. You don't want to accidentally get in a sewer manhole, so the first
thing to do is find the differences between sewer and telephone manholes. If
you have trouble with this, here's a few tips that might help:
o Telco manhole covers are usually larger and heavier than other covers.
o Telco manholes are scarce compared to sewer manholes. So if there are
a lot of checkered manhole covers in your area, those are probably sewer
manholes. If there are only a handful of unmarked manhole covers in
your area, those probably contain phone lines.
o Go to your local telco Central Office [CO] and find out what the manhole
covers look like there. Find manhole covers that look the same in other
areas, and pick a convenient/safe manhole to explore.
Getting into a manhole is a different story. Here in the Denver area, it takes
at least three people to get a manhole cover off. Hopefully it'll be easier
to do in your area. To open the manhole, you'll probably need at least two
crowbars [You could try using a pickaxe]. Get a group together to open the
manhole, using 2 or more people with crowbars to slide the cover off. You
might want to get a strong guy to push the manhole cover while the other people
with crowbars support it. If you know of a tool that was made specifically
for opening manholes, we'd appreciate it if you contacted us on some local
Denver boards and told us about it. Likewise, if you have a better system for
opening manholes, we'd be grateful for the information.
Once you get the manhole cover off, shine a flahlight down to see if there's
a ladder going to the bottom. Try a different manhole if there's no ladder.
If you want to go down a manhole, don't forget to wear a bandana or surgical
mask over your mouth so that you don't choke on dust. Also bring a flashlight
so you can see what you're doing. Many times, there'll be a few inches of
water at the bottom, so you might also want to wear boots.
Down in the manhole, you might find some equipment or manuals. Go ahead and
take them if you want; you deserve it! There should be some very large ABS
plastic tubes going across the "room" you're in. The phone lines are inside
these tubes. Attached to this tubing there will be some short, wide plastic
cylinders. There'll be screws holding these cylinders on to the tubing.
You'll need either a screwdriver or a ratchet to open a cylinder. If you
happen to get a cylinder open, congratulations! You now have access to
countless phone lines! We'll leave it to you to figure out what to do with all
of those wires. Surely you'll figure something out! [snip, snip!]
Exploring Telco Building Sites:
===============================
One of the best ways to get information about telco is by going to a Central
Office near you, exploring the trucks in a Plant Department, or "visiting"
other telco buildings. The phone company is careless in many ways. They
leave important, yet unshredded documents and computer printouts in their
open dumpsters. Their cars, vans, and repair vehicles are almost always left
unlocked. Inside their vehicles one can usually find manuals, test phones,
computer cards [usually for mainframes, almost never for personal comuters],
nice tool sets, etc.! It's almost as if they *want* to be ripped off! They
deserve bad treatment just for their negligence. If possible, we like to be
courteous to individual employees of telco. Most employees are fairly amiable
and don't deserve trouble. It's the beuracracy of telco that deserves to be
manhandled. Cheap practices such as monopolizing and the overpricing of
services is the general reason why we phreaks do what we do with such
determination. On with the show.
Exploring Dumpters: Looking inside telco dumpters is probably the easiest way
to acquire useful information. Typycally, dumpters will be found outside a
Central Office. They are usually left open for the world to see. It's a good
idea to check a dumpster near you every day or two. You want to get your
printouts and such before they go to the garbage dump. Make sure that you
aren't pulling stuff out of the dumpster when the employees get out for the
day! If possible, check the dumpster after closing hours just to be safe. But
it's usually ok to get stuff out of it during working hours. You should find a
lot of useful information, including computer numbers, if you consistently
check the dumpsters.
Exploring Plant Departments: Plant Department is just a strange name telco
made for a truckyard. You might need your 'ol wire cutters for this job.
Plan to stay up late for this mission, too. Around here, at least, the Plant
Department doesn't close until 11:30 to 11:45 p.m. If your local Plant
Department isn't bound by barbed-wire fences, you're lucky. If, unfortunately,
it's like ours, you'll have to find a way to get in. First, try to find breaks
in the fence where you might be able to slip through. If this isn't possible,
and you can't climb over the fence because there's barbed-wire at the top, get
out the [gasp!] wire cutters. Cut the barbed-wire and climb over the fence.
Quietly move around the truck yard, opening various trucks, taking whatever you
want. Although it might be hard, try to control yourself. Only take one item
per truck so that the fools don't get suspicious. You don't ever want them to
get suspicious, or you'll never be able to go back without fearing that they
might be watching the truckyard for intruders. Just take a testphone and a few
handy manuals. The testphone is usually in the back behind the passenger's
seat. Manuals should be in the glove compartment or between the two front
seats. The rest of the gadgets in the trucks have little or no practical uses
for phreaks. Too bad. Be cool and don't take anything you don't need.
Correction: Don't take anything you don't *really* want. Have phun with this,
and please let us know if you find any useful gadgets in a telco truck. We'd
like to hear from you! Look for a Field Phreaking II file soon. It should be
Manuscript III.
-------------------------------------------------------------------------------
>>>>*Freddy*<<<< [The Only Living Peabody]
The HORN
. <<Honk!>> .
.:.:.:.:.:.:.:.
If You Want To: ------------------------- |) / |)
Call Bone Cellar Look For More Third Cartel Files Soon! |si-\hotic |)athtub
-------------------------- -_-_-_-_-_-_-_-_-_-
60:60:60:60::':':':'
=:-Distribute-:=
-=-=-1988-=-=-=-=-=-=-=-/-This File-\-=-=-=-=-=-=-=-1988-=-=-
\-Anywhere!-/
[Talk About Gaudy, Eh?]
-------------------------------------------------------------------------------


View File

@@ -0,0 +1,84 @@
"Phreakin' USA!" by John Fowler
When you think "phone phreak," what kind of mental picture do you get? A
teenager holding a sound-making box up to a phone? Or someone who uses false
calling card numbers? The phone companies lose an estimated $80 million each
year on fraudulent phone calls (compared to a total budget of over $27
billion!), but only a minute fraction is attributed to the above cases. So who
is causing all these losses?
A phreak is officially defined as "One who causes information to be passed over
the phone without the phone company receiving due compensation." This applies
to more cases than most people expect. For example, calling a "ring-back"
system long distance just happens to be illegal, because you are passing
information (that you want to use the modem line) without paying the phone
company! This law is, of course, not enforcible, and even if it was, why
take someone to court over a matter of twenty cents lost? It's also illegal to
make a person-to-person call to yourself in order to let your spouse know you
arrived at a destination safely! Likewise, calling someone collect at a pay
phone, calling an operator to say you lost a dollar in a pay phone when you
didn't, and completing a call with another person over "test lines" (test lines
are in all exchanges, and if two people dial consecutive test lines, they may
talk to each other without any charge) are all illegal! Spreading all this out
along the entire phone network, it suddenly becomes a matter of millions of
dollars lost each year, even without those little boxes that simulate operator
tones!
However, the common image of the phreak is someone who plays with red, black,
and blue boxes to somehow gyp the phone company into allowing a free call.
Each of these boxes, named after the color of the originals, has a different
function, and many times the boxes are confused with each other. A red box
is a device meant to be used only at pay phones. It simulates the sounds
of various coins dropping into the phone. When some pay phones hear this
sound, they automatically assume the a coin actually has dropped into the phone
and registers it. A black box is a device which converts any phone jack it is
hooked up to into a toll-free number. If Larry hooked up one, I and everyone
else could call the CPTBBS as if it were an 800 number, yet Larry would not
have to pay the excessive charges that an 800 number demands. With the
sophisticated scanning equipment the phone company has today, however, black
boxes can be detected after a while.
The most infamous of the colored boxes is the blue box, which mimics the
operator tones to allow free calls from any phone. They cost only $25-$50 to
make, but can sell for up to $3000! Here's how it works: a phreak first dials
a no-charge number, such as an 800 number for a large corporation (if he wants
to add a little irony, he'll make it AT&T's 800-number!). The number rings
once, and then the phreak generates a pure 2600-cycle tone. This tells the
phone equipment that the call has dislodged and to be ready for the next call,
though the phreak remains on-line! The phreak then gives another tone telling
the equipment that a toll call is coming through (though in actuality it is
not). The phreak dials the number and is connected, but the billing equipment
never starts! When the phreak eventually hangs up, the records will only show
that he made a toll-free call.
It would cost the phone companies approximately one billion dollars to change
the switching system so that the blue boxes would not work, so instead they
decided to invest in a scanning system that records all questionable calls.
Now that scanning system is so quick that it's almost suicide to use a black
or blue box at home. Phreaks can still get away with using blue boxes at
pay phones if the call is short, but that's about all. If someone is found
using a blue or black box at home now, the box is immediately confiscated, and
the phreak's service may be possibly disconnected.
If someone offers to sell you one of these colored boxes for the standard
ridiculous price, I'd advise against it. You stand to lose much more than you
would gain in the long run.
Reference: Kleinfield, Sonny; "The Biggest Company On Earth";
published by Holt, Rinehart, and Winston; 1981; pp. 247-261.
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
Another file downloaded from: NIRVANAnet(tm)
& the Temple of the Screaming Electron Jeff Hunter 510-935-5845
Burn This Flag Zardoz 408-363-9766
realitycheck Poindexter Fortran 510-527-1662
My Dog Bit Jesus Suzanne d'Fault 510-658-8078
New Dork Sublime Demented Pimiento 415-864-DORK
The Shrine Tom Joseph 408-747-0778
"Raw Data for Raw Nerves"
X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X

View File

@@ -0,0 +1,407 @@
Title: Super Phreak's Hacking and Phreaking Numbers
Date: 9/4/87
Time: 12:09 pm
On this list:
Hacking and Phreaking Numbers
Various Numbers, Terminals, Stores
Telephone Services
Main Frames
Credit Card Validations
Phreaking (the real thing)
Conferance Starters
Super Phreak's
Hacking and Phreaking Numbers
<*-----------------------------*>
EASY LINK............................................. 1-800-325-4112
CITIBANK.............................................. 1-800-223-3312
EXPORT/IMPORT BANK.................................... 1-800-424-5201
ALCOHOL, TOBBACCO & FIREARMS.......................... 1-800-523-0677
FEDERAL INFORMATION CENTER............................ 1-800-532-1556
ARMS & SERVICE ENLISTED MOBL.......................... 1-800-325-4072
COMBAT SUPPORT BRANCH................................. 1-800-325-4095
ROPD USAR COMBAT ARMS DIVISION........................ 1-800-325-4890
WHITE HOUSE PRESS (voice)............................. 1-800-248-0151
SOCIAL SECURITY....................................... 1-800-432-3960
PUGET SOUND NAVAL SHIPYARD............................ 1-800-426-5996
GENERAL MOTORS........................................ 1-800-685-6790
TELE-CONNECT (voice).................................. 1-800-255-2255
FORD.................................................. 1-800-521-4120
AMERICAN NETWORK (voice).............................. 1-800-227-0090
THE SOURCE............................................ 1-800-828-6321
RCA................................................... 1-800-526-3714
IBM DISTRIBUTION...................................... 1-800-426-2222
XEROX................................................. 1-800-828-6321
-r MOTOROLA DITELL....................................... 1-800-323-4w6
PC PURSUIT............................................ 1-800-835-3001
TELCOR................................................ 1-800-231-3158
UNKNOWN............................................... 1-800-521-0013
UNIVERSITY OF LOUSVILLE............................... (502) 588-6020
UNIVERSITY OF FLORIDA................................. (904) 392-5533
644-2261
UNIVERSITY OF MASSACHUSETTS........................... (413) 545-1600
UNIVERSITY OF NEW MEXICO.............................. (505) 227-3351
UNIVERSITY OF PERUE................................... (317) 494-1900
UNIVERSITY OF TEXAS................................... (214) 688-1400
UNIVERSITY OF TEMPLE.................................. (215) 787-1010
UNIVERSITY OF SAN DIEGO............................... (619) 293-4510
UNIVERSITY OF HARTFORD................................ (203) 242-6492
242-6852
UNIVERSITY OF MARYLAND................................ (301) 454-6111
UNIVERSITY OF COLORADO................................ (303) 644-3841
UNIVERSITY OF MINNESOTA............................... (714) 974-4020
UNIVERSITY OF VIRGINIA................................ (703) 328-8086
UNIVERSITY OF MICHIGAN................................ (313) 454-1000
OAKLAND UNIVERSITY.................................... (313) 370-4399 300 B
370-4312 1200 B
370-4300 1200 B
HARVARD UNIVERSITY.................................... (617) 732-1802
732-1251
WAYNE STATE UNIVERSITY................................ (313) 577-2424
LYOLA COLLEGE......................................... (213) 642-2706
PRINCETON UNIVERSITY.................................. (609) 452-6736
NORTHEASTE?+N UNIVERSITY............................... (617) 417-9203
UNIVERSITY OF KY...................................... (313) 964-2500
DARTMOUTH COLLEGE..................................... (603) 643-6310
HONEYWELL UNIVERSITY.................................. (612) 870-6086
POLY TECH UNIVERSITY.................................. (714) 598-4861
AMARILLO UNIVERSITY................................... (806) 741-5951
741-6701
MARSHALL UNIVERSITY WASHINGTON........................ (304) 696-6711
NEW YORK STATE COLLEGE................................ (212) 777-7600
598-7001
FORTWORTH SCHOOL...................................... (817) 332-8491
FAIRFAX SCHOOL SYSTEM................................. (202) 256-9676
OAK-COUNTY SCHOOLS.................................... (857) 950-1313
LIVONIA SCHOOLS....................................... (313) 464-1234
OAKLAND SCHOOLS....................................... (313) 857-9500
ARBOR SCHOOLS......................................... (313) 769-8821
REDFORD SCHOOLS....................................... (313) 494-1921
GROSSE POINTE SCHOOLS................................. (313) 343-2000
GROSSE POINTE SOUTH TIMESHARE (RECORDING)............. (313) 343-2340
GROSSE POINTE NORTH HIGH SCHOOL....................... (313) 343-2350
LOGIN: RS FUNCTIONS: HP1 HP3
LOGIN: HOST HP2 MOIS
ROMULUS............................................... (313) 941-3308
WAYNE COUNTY COMMUNITY COLLEGE........................ (313) 577-0335
MACOMB COLLEGE COMPUTER............................... (313) 445-0260
MACOMB COLLEGE COMPUER ROOM........................... (313) 445-7157
LAWERANCE INSTITUTE................................... (313) 356-4040
LOWELL UNIVERSITY..................................... (617) 459-0159
LOGIN: HELLO ID: 9102002
CONSULTANT FOR WAYNE STATE UNIVERSITY (vioce)......... (313) 577-4778
MERIT COMPUTER NETWORK (WAYNE STATE UNIV.)............ (313) 577-0335
THROUGH THIS YOU CAN CONTACT THE FOLLOWING SERVICES AND COLLEGES FOR NO CHARGE:
MS=MICHIGAN STATE UNIV. OU=OAKLAND UNIV.
UB=UNIV. OF MICHIGAN UM=UNIV. OF MICHIGAN
WM=WESTERN MICHIGAN UNIV. WU=WAYNE STATE UNIV.
Autonet ITI MAGNET MSU IBM
MSUnet MTU OU SECS RPI
Telenet UM CAVAX UM CLINFO UM CVVAX
UM DSC UM Engin Harris UMLIB UMLIB 300
WMU-CAE WMU-Kanga WMU-Pooh WMU-Puff
WSU CSVAX WSU ET ZOOnet p
ZOOnet-KCollege
ZOOnet-KVCC
ABA/NET ADPNS 261 ADPNS 3 ADPNS 446
ADPNS 9 Alberta Automail Boeing
British Columbia BRS Cal Berkeley Calgary
Caltech HEP Carnegie DEC-20 Carnegie MICOM Carnegie 11/45
Compuserve Comshare Cornell Dalhousie
Datapac info Dialcom Dialog Vers 1 Dialog Vers 2
Dow Jones Guelph Illinois Illinois Cyber
LEXIS Manitoba Maryland Unix McGill
Minnesota Cyber Minnesota VAX MIT Multics MIT VM
Montreal Natl Lib Med New Brunswick Newsnet
NJIT EIES NLM Notre Dame NRC
NYTimes OAG Queens Rice
SDC SFU Simon Fraser Source
Source 11 Source 12 Source 13 Stanford
STN Telenet Cust Serv Telenet Mail Telenet Telemail
Toronto TUCC UBC UQV
Victoria Washington Waterloo TSS Waterloo VM
Wilsonline Wisconsin MACC Wisconsin VAX Yale
GROSSE POINTE WOODS (voice)........................... (313) 343-2440
CITY OF HARPER WOODS.................................. (313) 343-2500
URI................................................... (401) 884-5970
ARIZONA STATE......................................... (602) 965-7001
LIBRARY............................................... (301) 528-3922
1st NATIONAL BANK..................................... (408) 248-8818
MICHIGAN NATIONAL BANK................................ (313) 964-5808
GENERAL MOTORS........................................ (313) 685-6709
TELCO................................................. (203) 776-2516
ITT DIALCOM NETWORK................................... (212) 947-7522
LAW OFFICE............................................ (313) 964-5858
AIRLINE............................................... (714) 775-2104
TWA................................................... (213) 417-8987
MA BELL............................................... (313) 651-9743
IN PURSUIT OF - INFO ON PC PURSUIT & REGISTRATION..... (202) 689-2987
TRW................................................... (305) 371-6382
(408) 280-1901
(602) 257-9054
(714) 776-4511
638-3492
956-3370
DOW JONES VIA TYMNET.................................. (313) 962-2870
LOGIN: DOW1;; PW: 94K24W6TAN PW: FUN2KR9381
WHITE HOUSE (voice)................................... (202) 456-1414
RONALD REGAN (voice).................................. (202) 445-4616
F.B.I. NET............................................ (412) 527-8291
PENTAGON TACTICAL..................................... (202) 697-0814
N.A.S.A. H.TEX........................................ (713) 483-4115
N.A.S.A............................................... (806) 353-9901
NUCLEAR COMMISSION (voice)............................ (404) 221-5519
NAVY SHIPS INFORMATION (voice)........................ (213) 547-6801
K.K.K................................................. (619) 723-8996
ATLANTIC CITY CASSINO................................. (215) 564-6572
US BUREAU OF STANDARDS................................ (303) 499-7111
AIR FORCE............................................. (203) 748-3947
PENTAGON.............................................. (202) 545-6706
PENTAGON.............................................. (202) 553-0229
DEFENSE DEPARTMENT.................................... (703) 781-4531, 4522
WAR DEPARTMENT........................................ (401) 841-3436
N.O.R.A.D............................................. (203) 748-3947
N.A.S.A. (FLORIDA).................................... (806) 353-9901
COMPUSERVE............................................ (313) 285-9207
MICHCON............................................... (313) 271-3008
UNINET................................................ (313) 358-5780
(415) 937-2868
APRANET............................................... (415) 327-5220
TELENET............................................... (313) 268-6620
579-9162
965-6005
AUTONET............................................... (313) 271-6950
663-7618
646-2237
1-800-225-8456
1-800-327-6764
TYMNET................................................ (313) 962-2870
965-6005
Various Numbers, Terminals, Stores
<*----------------------------------*>
ABC NEW YORK FEED LINE................................ (212) 799-5017
TELEMAIL.............................................. 1-800-424-9494
NAVY FINANCE CENTER................................... 1-800-321-1082
JOHNSON & JOHNSON..................................... 1-800-253-9892
AT&T STOCK PRICES..................................... 1-800-882-1061
STOCK QUOTES.......................................... (212) 986-1660
(914) 997-1277
(201) 623-0150
(516) 794-1707
STOCK MARKET REPORTS (voice).......................... (213) 541-2462
(312) 939-1600
(505) 883-6828
RADIO SHACK........................................... (313) 964-5538
WIERD EFFECTS!........................................ (213) 935-1111
WIERD RECORDING....................................... (512) 472-4263
INTERNATIONAL GRAPHICS................................ (612) 339-5200
RVS CABLEVISION....................................... (414) 259-1233
EDUCATIONAL RESEARCH.................................. (713) 792-7200
SMITH & HENCHMAN...................................... (313) 964-2064
McDONALDS............................................. (305) 764-4595
REPAIR COMPUTER CENTER................................ (313) 881-0659
PHONE COMPANY TEST LINE............................... (619) 748-0002
SHUTTLE COMMUNICATIONS................................ (900) 410-6272
MICHIGAN BELL NEWSLINE................................ (313) 223-7223
?????????????......................................... (313) 950-0777
(TOUCH TONE CODE: 14730091)
Telephone Services
<*------------------*>
AT&T.................................................. (214) 742-1195
AT&T CALLING CARD OPERATOR............................ 1-800-855-4008
AMERICAN TELEPHONE.................................... (201) 221-6397
BELL, SOUTHWESTERN.................................... (214) 742-1354
'y 742-1637
BELL OF PENNSYLVANIA.................................. (215) 466-6680
CHESAPEAKE TELE....................................... (202) 347-0999
HAWIIAN TELE.......................................... (808) 533-4426
GENERAL TELE.......................................... (213) 829-0111
ILLINOIS BELL......................................... (312) 530-1755
ILLINIOS BELL......................................... (312) 368-8000
INDIANA BELL.......................................... (317) 265-8611
MICHIGAN BELL......................................... (313) 223-7233
881-0659
964-4042
964-0042
924-9977
839-3373
961-8572
892-0060
NEW ENGLAND BELL...................................... (207) 955-1111
NEW JERSEY BELL....................................... (201) 483-3800
NEW YORK TELEPHONE.................................... (212) 395-2200
OHIO BELL............................................. (216) 822-6980
WISCONSIN TELEPHONE................................... (414) 678-3511
U.S. TELEPHONE........................................ (313) 950-1033
UNKNOWN............................................... (800) 327-6713
Mainframes
<*----------*>
AMERICAN EXPRESS...................................... 1-800-228-1111
RSX-11................................................ 1-800-521-8426
HP3000................................................ (303) 232-8555
(415) 857-8193
(215) 563-9213
(512) 385-4170
(301) 881-6156
881-6157
881-6158
COSMOS NY............................................. (212) 370-4304
394-1203
DEPAUL................................................ (312) 939-7950
DEVELCON.............................................. (415) 486-4959
RCA/CMS............................................... (609) 734-3131
NASUA................................................. (713) 483-2700
DIALOG................................................ (212) 947-7522
GIS................................................... (817) 625-6401
RSTS/E................................................ (212) 369-5114
(516) 586-2850
(303) 447-2540
(817) 877-0548
(414) 476-8010
542-4494
543-0789
OVL111................................................ (203) 527-0006
RAPID DATA............................................ (212) 736-3377
MILLERSVILLE UNIVAC................................... (717) 872-0911
MIT................................................... (617) 258-8313
LYRICS TIMESHARING.................................... (516) 567-8013
MERADCOM.............................................. (703) 781-4520
ENGINEERING COM....................................... (313) 964-2064
MENLO PARK CORP....................................... (415) 361-2500
DEC VAX............................................... (414) 445-4050
DEC PDP-11/70......................................... (414) 476-8010
DEC-10................................................ (315) 423-1313
SEMAT COMPUTER........................................ (313) 964-2000
BOND-NET.............................................. (313) 962-1102
H.A.T.S............................................... (714) 962-3365
ISO................................................... (515) 294-9440
TSO................................................... (312) 996-5100
VAX 11/44............................................. (619) 485-9888
VM370................................................. (214) 742-3189
WANG VS/80............................................ (303) 978-2111
W.I.T.S............................................... (313) 769-8803
WYLBUR................................................ (212) 246-7170
WAYNE STATE........................................... (313) 577-0260
UNIX.................................................. (609) 452-0025
(415) 486-7020
486-7015
JOSKES................................................ (214) 742-3999
LAUSD................................................. (213) 742-8000
FTS................................................... (313) 234-5612
(213) 789-2000
F.A.A................................................. (202) 347-3222
COCIS................................................. (303) 447-2540
AUSTIN COMPUTERS...................................... (512) 474-5011
AUTOBAHN IMPORTS...................................... (817) 977-0663
LYRICS TIMESHARE...................................... (516) 567-8013
SLIPPERY ROCK OIL..................................... (412) 794-7601
UNION OIL............................................. (201) 686-2425
SHELL COMa............................................ (713) 795-1200
Credit Card Validation
<*----------------------*>
CHARGE CARD ASSOCIATION............................... (313) 964-2018
JC PENNY CREDIT CARD.................................. (303) 371-1296
NTRCHA................................................ (214) 742-2636
SEARS CREDIT CHECK.................................... (404) 885-3460
VISA MERCHANT ID...................................... (313) 956-9600
CREDIT CHECK.......................................... 1-800-228-1122
MASTERCARD/VISA....................................... 1-800-362-7171
VISA CREDIT CHECK..................................... 1-800-228-1111
MASTERCARD............................................ 1-800-292-2730
CODE: 44360006-R
MICHIGAN BANK CARD.................................... 1-800-462-3420
??????????????........................................ 1-800-321-8067
CODE: 370466 (TOUCH TONE CODE!)
Phreaking
<*---------*>
MCI (5 DIGIT CODE).................................... (313) 978-8100
(313) 237-0603
(313) 950-1022
SPRINT (8 DIGIT CODE)................................. (313) 950-1000
ALLNET................................................ (313) 950-1044
LEXITEL............................................... (313) 950-1066
SKYLINE (6 DIGIT CODE)................................ (313) 950-1088
METROFONE (6 DIGIT CODE).............................. (313) 963-4847
TRAVELNET (8 DIGIT CODE).............................. (313) 268-6620
TRACING TEST (low-high (GOOD), high tone (BAD))....... (617) 494-9900
(617) 890-9900
TRAVELNET............................................. 1-800-521-8400
SAY "YES" FOR VERIFICATION
PBX................................................... 1-800-221-3044
DIAL CODE + 96 + 1 + DEST. (4 DIGIT CODE)
PBX................................................... 1-800-245-0033
CODE: 356172
PBX................................................... 1-800-345-0008
A VERY GOOD PBX....................................... 1-800-446-4462
CODES: 919194, 334447, 520585
SOME DIVERTERS........................................ 1-800-433-5656
1-800-845-0031
1-800-325-9990
1-800-238-2847
(312) 678-9923
678-9952
RCI COMPANY........................................... 1-800-922-0918
AT TONE DIAL: CODE+DEST.
UNKNOWN............................................... 1-800-457-0047
COULD BE CODES BUT THE NUMBER MAY NOT NEED THEM:
272423, 868358, 958818, 762398
METRO CODES.....................188-193....188-342....133-353........
CONSUMER NAME AND ADDRESS (CNA)....................... (313) 223-8690
SPRINT CODE................................................ 666666630
Conferance Starters
<*-------------------*>
0-700-456-1000
0-700-456-1001
0-700-456-1002 4 sites are Chicago,
0-700-456-1003 New York, Dallas and
0-700-456-1004 Los Angeles.
0-700-456-2000
0-700-456-2001
0-700-456-2002
0-700-456-2003
0-700-456-2004
===============================================================================
WRITEN: 03/23/86 UPDATED: 05/15/86
The list seen here is composed of many notes and research conducted
by THE JOYSTICK. I hope that you enjoy this list and please let me know
if you find any errors in the listing or if you have an add
Time remaining = 37
SAT JUN 07 6:57:58 PM
(>ition to it.
I keep this file as up-to-date as possible and I am not
The Joystick Later, screw up it's your fault not
responsible for any abuse and use of this file.

View File

@@ -0,0 +1,155 @@
Hacking
HACK AND PHREAK
=-=-=-=-=-=-=-=
FILE #3
BY: THE HYAENA
PLEASE BE CAREFUL WHO YOU GIVE THIS FILE TOO...
I'M NOW GOING TO DISCUSS HACKING VAX AND UNIX.
TO BEGIN WITH UNIX IS A TRADEMARK OF BELL LABS, AND THAT COULD MEAN TROUBLE
FOR THOSE OF YOU WHO DON'T KNOW WHAT YOU ARE DOING. IF YOU ARE ON ANOTHER
UNIX-TYPE SYSTEM, SOME OF THE COMMANDS MAY VARY, BUT SINCE IT IS LICENSED TO
BELL, THERE CAN'T BE TOO MANY CHANGES. HACKING ONTO A UNIX SYSTEM IS VERY
DIFFICULT, AND IT IS GOOD TO HAVE AN INSIDE SOURCE, IF POSSIBLE. IT'S VERY
DIFFICULT TO HACK A VAX SINCE, AFTER YOU GET A CARRIER FROM A VAX, YOU SEE
"login:" THEY GIVE YOU NO CHANCE TO SEE WHAT THE LOGIN FORMAT IS. ALTHOUGH,
MOST COMMONLY THESE ARE SINGLE WORDS, UNDER 8 CHARACTERS, AND USUALLY THE
USER'S NAME. THERE IS HOWEVER A WAY AROUND THIS. MOST VAX HAVE AN ACCOUNT
CALLED "suggest" FOR PEOPLE TO USE TO MAKE A SUGGESTION TO THE SYSTEM ROOT
TERMINAL. THIS IS USUALLY WATCHED BY THE SYSTEM OPERATOR, BUT LATE AT NIGHT,
HE IS PROBABLY NOT AROUND. SO NOW WE CAN WRITE A PROGRAM TO SEND TO THE VAX,
THIS TYPE OF MESSAGE; A SCREEN FREEZE (CTRL-S), SCREEN CLEAR (SYSTEM
DEPENDANT), ABOUT 255 GARBAGE CHARACTERS, AND THEN A COMMAND TO CREATE A LOGIN
ACCOUNT, AFTER WHICH YOU CLEAR THE SCREEN AGAIN, THEN UNFREEZE THE TERMINAL.
WHAT THIS DOES IS THAT WHEN THE TERMINAL IS FROZEN, IT KEEPS A BUFFER OF WHAT
IS SENT. THE BUFFER IS ABOUT 127 CHARACTERS LONG, SO YOU OVERFLOW IT WITH
TRASH, AND THEN YOU SEND A COMMAND LINE TO CREATE AN ACCOUNT (SYSTEM
DEPENDANT). AFTER THIS YOU CLEAR THE BUFFER AND SCREEN AGAIN, THEN UNFREEZE
THE TERMINAL. THIS IS A BAD WAY TO DO IT, AND IT IS MUCH NICER IF YOU JUST
SEND A COMMAND TO THE TERMINAL TO SHUT THE SYSTEM DOWN, OR WHATEVER YOU ARE
AFTER. THERE IS ALWAYS AN ACCOUNT CALLED "root", WHICH IS THE MOST POWERFUL
ACCOUNT TO BE ON, SINCE IT HAS ALL THE SYSTEM FILES ON IT. IF YOU HACK YOUR
WAY ONTO THIS ONE, THEN EVERYTHING IS EASY FROM HERE ON. THE ABORT KEY ON THE
UNIX SYSTEM IS CRTL-D. WATCH HOW MANY TIMES YOU HIT THIS, SINCE IT IS ALSO
AWAY TO LOG OFF THE SYSTEM. SOME USEFUL THINGS TO KNOW ABOUT THE UNIX
ARCHITECHTURE; THE ROOT DIRECTORY, CALLED "root", IS WHERE THE SYSTEM RESIDES.
AFTER THIS COME A FEW 'SUB' ROOT DIRECTORIES, USUALLY TO GROUP THINGS, SUCH AS
STATS, PRIVATE STUFF, THE USER LOG, ETC. HERE. NEXT COMES THE SUPERUSER (THE
SYSTEM OPERATOR), AND THEN FINALLY THE NORMAL USERS. IN THE UNIX SHELL
EVERYTHING IS TREATED THE SAME. WHAT I MEAN BY THIS IS THAT YOU CAN ACCESS A
PROGRAM THE SAME WAY AS YOU ACCESS A USER DIRECTORY, AND SO ON. THE WAY THAT
THE UNIX SYSTEM WAS WRITTEN, IS THAT EVERYTHING, EVEN THE USERS, ARE JUST
PROGRAMS BELONGING TO THE ROOT DIRECTORY. THOSE OF US THAT CAN HACK ONTO THE
ROOT SMILE, SINCE YOU CAN SCREW EVERYTHING UP. THE MAIN LEVEL (OR EXEC LEVEL)
PROMPT ON THE UNIX SYSTEM IS THE $, AND IF YOU AREON THE ROOT, YOU HAVE A #
(SUPER-USER) PROMPT. NOW AS FOR A FEW BASICS OF THE SYSTEM; TO SEE WHERE YOU
ARE AND WHAT PATHS ARE ACTIVE IN REGUARDS TO YOUR USER ACCOUNT, TYPE "PWD".
THIS SHOWS YOUR ACCOUNT, SPERATED BY A SLASH WITH ANOTHER PATHNAME (ACCOUNT),
POSSIBLE MANY TIMES. TO CONNECT THROUGH TO ANOTHER PATH, OR MANY PATHS, YOU
WOULD TYPE "path1/path2/path3" AND THEN YOU ARE CONNECTED ALL THE WAY FROM
PATH 1 TO PATH 3. YOU CAN RUN THE PROGRAMS ON ALL THE PATHES THAT YOU ARE
CONNECTED TO. IF IT DOES NOT ALLOW YOU TO CONNECT TO A PATH, THEN YOU HAVE
INSUFFICIENT PRIVILEGES, OR THE PATH IS CLOSED AND STORED ON TAPE. YOU CAN
ALSO RUN PROGRAMS BY TYPING "path1/path2/path3/program-name". SINCE UNIX DOES
TREAT EVERYTHING AS A PROGRAM, THERE ARE A FEW COMMAND THAT YOU MAY HAVE TO
LEARN. TO SEE WHAT YOU HAVE ACCESS TO, YOU TYPE "ls" FOR LIST, THIS SHOWS THE
PROGRAMS THAT YOU CAN RUN. YOU CAN CONNECT TO THE ROOT DIRECTORY AND RUN ITS
PROGRAMS BY TYPING "/root". BY THE WAY, MOST UNIX SYSTEMS HAVE THEIR LOG FILE
ON THE ROOT, SO YOU CAN SET UP A WATCH ON THE FILE, WAITING FOR PEOPLE TO LOG
IN AND YOU GET THEIR PASSWORD AS IT PASSES THROUGH THE FILE. TO CONNECT TO A
DIRECTORY USE THE COMMAND "cd pathname". THIS ALLOWS YOU TO DO WHAT YOU WANT
WITH THE DIRECTORY. YOU MAY BE ASKED FOR A PASSWORD, BUT THIS IS A GOOD WAY
OF FINDING OTHER USERS NAMES TO HACK ONTO. THE WILDCARD CHARACTER IN UNIX, IF
YOU WANT TO SEARCH DOWN A PATH FOR A CERTAIN GAME OR PROGRAM, IS THE * SYMBOL.
"ls /*" SHOULD SHOW YOU WHAT YOU CAN ACCESS. THE FILE TYPES ARE THE SAME AS
ON A DEC. TO SEE WHAT IS IN A FILE TYPE "pr filename", STANDING FOR PRINT
FILE. IT'S A GOOD IDEA TO PLAY AROUND WITH THE PATHNAMES SO THAT YOU GET THE
HANG OF IT. THERE IS ALSO ON-LINE HELP AVAILABLE BY TYPE "help" OR HITTING ?.
IT'S A GOOD IDEA TO LOOK THROUGH ALL THE HELP FILES, SINCE IT MAY GIVE YOU
SOME INFO ON PATHNAMES AND THE COMMANDS USED ON THE SYSTEM. AS A USER, YOU
CAN CREATE OR DESTROY DIRECTORIES ON THE TREE BENEATH YOU. THIS MEANS THAT
ROOT CAN KILL EVERYTHING BUT ROOT, AND YOU CAN KILL EVERYTHING THAT IS BELOW
YOU. "mkdir pathname" IF FOR MAKING A DIRECTORY AND "rmdir pathname" IS FOR
KILLING A PATHNAME. REMEMBER THAT YOU ARE NOT ALONE ON THE SYSTEM. TYPE
"who" TO SEE WHO THE OTHER USERS ARE THAT ARE PRESENTLY LOGGED ONTO THE
SYSTEM. IF YOU WANT TO TALK TO THEM TYPE "write username" AND THIS WILL ALLOW
YOU TO CHAT. IF YOU WANT TO SEND MAIL TO ANOTHER USER TYPE "mail" AND THIS
WILL PUT YOU INTO THE MAIL SUB-SYSTEM. TO SEND MAIL TO ALL OF THE USERS ON
THE SYSTEM TYPE "wall" WHICH STANDS FOR WRITE ALL. ON SOME SYSTEMS ALL YOU
HAVE TO DO IS HIT THE RETURN KEY TO END THE MESSAGE, WHERE AS ON OTHERS YOU
WILL HAVE TO HIT CTRL-D. TO SEND A MESSAGE TO A SINGLE USER TYPE "write
username". IF YOU SEND THE SEQUENCE OF CHARACTERS THAT I DISCUSSED AT THE
BEGINNING, YOU CAN HAVE THE SUPER-USER TERMINAL DO TRICKS FOR YOU. IF YOU
WANT SUPER-USER PRIVELEGES, YOU CAN EITHER LOG IN AS ROOT, OR EDIT YOUR
ACCOUNT. IF YOU TYPE "su" THIS WILL GIVE YOU THE # PROMPT, AND THIS WILL
ALLOW YOU TO COMPLETELY BY-PASS THE PROTECTION. THE WONDERFUL SECURITY
CONSCIOUS DEVELOPERS AT BELL MADE IT VERY DIFFICULT TO DO ANYTHING WITHOUT
PRIVELEGES, BUT ONCE YOU HAVE THE PRIVELEGES, THERE IS ABSOLUTELY NOTHING THAT
CAN STOP YOU FROM DOING ANYTHING THAT YOU WANT. TO DOWN A UNIX SYSTEM TYPE
"chdir /bin" THEN "rm *" AND THIS WILL WIPE OUT THE PATHNAME BIN, WHERE ALL
THE SYSTEM MAINTENANCE FILES ARE. OR TRY TYPING "r -r" WHICH WILL RECURSIVELY
REMOVER EVERYTHING FROM THE SYSTEM EXCEPT THE REMOVE COMMAND. OR YOU CAN ALSO
TRY "kill -1,1" THEN "sync" AND THIS WILL WIPE OUT THE SYSTEM DEVICES FROM
OPERATION. NOW WHEN YOU GET BORED OF HACKING AT THE VAX SYSTEM, JUST KEEP
HITTING CTRL-D AND EVENTUALLY YOU WILL BE LOGGED OUT. SINCE BELL HAS 7
LICENSED VERSIONS OF UNIX OUT, I HAVE DESCRIBED THE COMMANDS THAT ARE COMMON
TO ALL OF THEM. LASTLY, I RECOMMEND THAT YOU HACK ONTO THE ROOT OR BIN
DIRECTORY, SINCE THEY HAVE THE HIGHEST LEVELS OF PRIVELEGES, AND BESIDES
THERE IS NOT MUCH THAT YOU CAN DO WITHOUT THEM.
NOW HERE'S A NICE LITTLE THING YOU CAN DO TO MAKE A 3-WAY PHONE, IE. TALK TO
TWO OTHER PEOPLE AT THE SAME TIME, KIND-OF LIKE CONFERENCE CALLING I GUESS.
FIRSTLY, YOU WILL NEED 2 DIFFERENT TELEPHONE LINES IN YOUR HOUSE. NOW TAKE
OFF BOTH OF THE BOXES THAT COVER THE WIRES.
NEXT, TAKE THE GREEN AND RED WIRES FROM EACH BOX AND ATTACH A WIRE TO EACH OF
THESE. 1 WIRE TO GREEN AND 1 WIRE TO RED. DO THE SAME FOR THE OTHER BOX.
FINALLY, AFTER YOU HAVE 4 WIRES, 2 FROM EACH BOX, YOU HAVE TO GET A 2 WAY
SWITCH WITH 2 TERMINALS, AND THEN HOOK UP THE 2 GREEN WIRES TO ONE SIDE AND
THE 2 RED WIRES TO THE OTHER SIDE. NOW WHEN YOU SWITCH THE SWITCH, YOU SHOULD
HERE A DIAL TONE AND THEN YOU CAN DIAL OUT AND YOU WILL BE ABLE TO TALK TO 2
PEOPLE AT THE SAME TIME.
OK HERE'S SOMETHING THAT MOST OF YOU NEVER HEARD OF. I'LL DISCUSS SOME THINGS
THAT I KNOW ABOUT STEP LINES AND SOME INTERESTING THINGS THAT CAN BE DONE.
FIRST, FIND OUT IF YOU HAVE STEP LINES IN YOUR PREFIX. A GOOD WAY OF DOING
THIS IS TO GO TO THE PAY PHONES AROUND YOUR HOME, AND IF THEY ARE ROTARY, THEN
YOU ARE IN LUCK, SINCE YOU HAVE STEP LINES. I USED TO HAVE STEP LINES IN MY
AREA, BUT UNFORTUNATELY NOT ANYMORE. WELL, ANYWAYS FOR THOSE OF YOU WITH STEP
LINES, DIAL '0' FROM YOUR HOME, THIS WILL NOT WORK ON PAY PHONES. YOU WILL
THEN HEAR A FEW SOUNDS LIKE COIN DROPPINGS. NOW IF YOU HIT THE HANG UP BUTTON
WHEN THE SECOND LAST COIN DROP IS HEARD, THEN THE OPERATOR WILL GET ON AND BE
VERY CONFUSED. I'LL TELL YOU WHY SHE IS CONFUSED LATER ON, BUT NOW SAY THAT
YOU ARE TRYING TO COMPLETE A CALL WHEN SHE GOT ON. SHE WILL ASK YOU FOR THE
NUMBER THAT YOU ARE TRYING TO CALL. TELL HER THE NUMBER, LONG DISTANCE OF
COURSE, AND THEN SHE WILL ASK YOU FOR YOUR NUMBER. SO JUST PICK A NUMBER OUT
OF YOUR HEAD, IT MUST BE IN YOUR PREFIX, AND TELL IT TO HER. NOW SHE WILL
BELIEVE YOU AND CONNECT YOU TO YOUR DESIRED NUMBER, WITH THE CHARGES GOING TO
THE FAKE NUMBER THAT YOU GAVE. NOW IF YOU DIDN'T HIT THE HANG UP BUTTON AT
THE RIGHT TIME, JUST TELL THE OPERATOR THAT YOU ARE SORRY AND GIVE SOME
BULLSHIT EXCUSE AND TRY AGAIN.
WHAT YOU DID, WAS SCREW UP THE AUTOMATIC NUMBER FIND THAT WAS BUILT INTO THE
FIRST STEP LINES. THIS IS WHAT WOULD TELL THE OPERATOR YOUR NUMBER, SO THAT
SHE COULD BILL YOU IF SHE HAD TO COMPLETE A CALL FOR YOU. THE OPERATOR WILL
GET SOME GARBAGE ON HER SCREEN THAT IS SUPPOSED TO BE YOUR NUMBER, BUT SINCE
YOU INTERUPTED THAT PROCESS, IT LOOKS REALLY STRANGE.
SOMETHING THAT IS REALLY FUN TO DO IS TO COMPLAIN TO THE OPERATOR THAT THIS IS
THE FOURTH TIME TODAY THAT YOU HAVE NOT BEEN ABLE TO GET THROUGH AN SHE WILL
GIVE YOU SOME STORY LIKE, "WE'RE SORRY BUT WE'VE HAD A COMPUTER MALFUNCTION
AND IT'S BEING FIXED RIGHT NOW."
I DON'T KNOW IF THE PHONE COMPANY KNOWS ABOUT THIS, BUT DON'T WORRY, THE WORST
THAT COULD HAPPEN IS THAT YOU WOULD GET A CALL FROM THE OPERATOR, ASKING WHY
YOU HAVE HUNG UP ON THE OPERATOR SO MANY TIMES. JUST GIVE HERE SOME EXCUSE
LIKE YOU ARE TEACHING YOUR KID SISTER TO USE THE PHONE, OR SOMETHING LIKE
THAT.
END OF FILE #3...
[Time Left 00:39] 1. the_NeoPsychedelic_UnderGround_ Computer Philes:
Command ? MEMBER THAT YOU ARE NOT ALONE ON THE SYSTEM. TYPE
"who" TO SEE WHO THE OTHER USERS AR

View File

@@ -0,0 +1,717 @@
This is a compilation of Texts by Dysphunxion.. Most of it was
actually typed by me.. like the intro.. the boxes explained..
and the VMB Hacking.. the rest are just plans for boxes.. Some
may be on the older side but most still work!!!
Now on with the show...
Xx-x-x-x-x-x-x-x-x-x-x-xX
I Table of Contents I
Xx-x-x-x-x-x-x-x-x-x-x-xX
Introduction to hacking. . . . . . . . . . . . . . . . . . . . 1
Phone Phreaking. . . . . . . . . . . . . . . . . . . . . . . . 2
Basic Boxes Technically Explained . . . . . . . . . . . . 3
(BLUE,3); (BLACK,4); (CHEESE,5)
Voice mail box hacking. . . . . . . . . . . . . . . . . . 6
Blue Box Tones. . . . . . . . . . . . . . . . . . . . . . 9
Scarlet box . . . . . . . . . . . . . . . . . . . . . . . 10
Green Box . . . . . . . . . . . . . . . . . . . . . . . . 11
Blotto Box. . . . . . . . . . . . . . . . . . . . . . . . 12
Potpourri
Lunch Box . . . . . . . . . . . . . . . . . . . . . . . . 13
INTRODUCTION TO HACKING
Most people who have never hacked or are beginners think that
hackers are a small community of very knowledgeable computer
"geniuses" that randomly break into systems for fun and then
create havoc or steal information. I will speak of my own views
on hacking which shouldn't reflect the feelings of the entire
hacking community but I would guess a large amount. First of all
hacking is getting more and more risky everyday. Because of this,
hacking for fun isn't as safe as it used to be (although most of
my hacking is for fun). The reason people (people I know) hack is
because we believe in free information exchange. This means that
I should be able to freely access any information that is
available over the modem that I want. There are obvious reasons
why this can't be achieved, but if people have information that
is that sensitive then it should not be put out over the modem.
Now the second and biggest misconception about hacking is how the
hacker actually "hacks". Most people think that hacking is just
basically getting lucky and guessing a password that lets you
into a system. This is *very* untrue. Let us take an example that
you have just broken into the CIA's computer system. So suddenly
you get a -> prompt. Now what do you do?!? This is the difference
between the hacker and some kid that is good at guessing. The kid
may be able to guess a password, but if he doesn't know what to
do once he's in then he might as well have not even hacked the
password at all. So, the main objective of the hacker is to
concentrate on learning how to use a system. After he has done
that then he can figure out ways to get around certain kinds of
security and get to the stuff he wants. So what you should do is
read all the manual's and text files that you can get your hands
on. Because before you can defeat a system, you must know how it
works (this works for life in general). Ok, now you understand
what hacking is and how you should go about learning it.
Phone Hacking
Basic Boxes Technically Explained
BLUE
The "Blue Box" was so named because of the color of the first
one found. The design and hardware used in the Blue Box is fairly
sophisticated, and its size varies from a large piece of
equipment to the size of a pack of cigarettes. The Blue Box
contains 12 or 13 buttons or switches that emit multi-frequency
tones characteristic of the tones used in the normal operation of
the telephone toll (long distance) switching network. The Blue
Box enables the user to place free long distance calls by
circumventing toll billing equipment. The Blue Box may be
directly connected to a phone line, or it may be acoustically
coupled to a telephone handset by placing the Blue Box's speaker
next to the transmitter or the telephone handset. To understand
the nature of a fraudulent Blue Box call, it is necessary to
understand the basic operation of the Direct Distance Dialing
(DDD) telephone network. When a DDD call is properly originated,
the calling number is identified as an integral part of
establishing the connection. This may be done either
automatically or, in some cases, by an operator asking the
calling party for his telephone number. This information is
entered on a tape in the Automatic Message Accounting (AMA)
office. This tape also contains the number assigned to the trunk
line over which the call is to be sent. The information relating
to the call contained on the tape includes: called number
identification, time of origination of call, and info that the
called number answered the call and time of disconnect at the end
of the call. Although the tape contains info with respect to many
different calls, the various data entries with respect to a
single call are eventually correlated to provide billing info for
use by your Bell's accounting department. The typical Blue Box
user usually dials a number that will route the call into the
telephone network without charge. For example, the user will very
often call a well-known INWATS (toll-free) customer's number. The
Blue Box user, after gaining this access to the network and, in
effect, "seizing" control and complete dominion over the line,
operates a key on the Blue Box which emits a 2600 Hertz (cycles
per second) tone. This tone causes the switching equipment to
release the connection to the INWATS customer's line. The 2600Hz
tone is a signal that the calling party has hung up. The Blue Box
simulates this condition. However, in fact the local trunk on the
calling party's end is still connected to the toll network. The
Blue Box user now operates the "KP" (Key Pulse) key on the Blue
Box to notify the toll switching equipment that switching signals
are about to be emitted. The user then pushes the "number"
buttons on the Blue Box corresponding to the telephone # being
called. After doing so he/she uses the "ST" (Start) key to tell
the switching equipment that signalling is complete. If the call
is completed, only the portion of the original call prior to the
'blast' of 2600Hz tone is recorded on the AMA tape. The tones
emitted by the Blue Box are not recorded on the AMA tape.
Therefore, because the original call to the INWATS # is toll-
free, no billing is rendered in connection with the call.
Although the above is a description of a typical Blue Box call
using a common way of getting into the network, the operation of
a Blue Box may vary in any one or all of the following respects:
The Blue Box may include a rotary dial to apply the 2600Hz tone
and the switching signals. This type of Blue Box is called a
"dial pulser" or "rotary SF" Blue box. Getting into the DDD toll
network may be done by calling any other toll-free # such as
Universal Directory ASSistance (555-1212) or any number in the
INWATS network, either inter-state or intra-state, working or
non-working. Entrance into the DDD toll network may also be in
the form of "short haul" calling. A "short haul" call is a call
to any # which will result in a lesser amount of toll charges
than the charges for the call to be completed by the Blue Box.
For example, a call to Birmingham from Atlanta may cost $.80 for
the first 3 minutes while a call from Atlanta to Los Angeles is
$1.85 for 3 minutes. Thus, a short haul, 3-minute call to
Birmingham from Atlanta, switched by use of a Blue Box to Los
Angeles, would result in a net fraud of $1.05 for a 3 minute
call. A Blue Box may be wired into the telephone line or
acoustically coupled by placing the speaker of the Blue Box near
the transmitter of the phone handset. The Blue Box may even be
built inside a regular Touch-Tone phone, using the phone's push-
buttons for the Blue Box's signalling tones. A magnetic tape
recording may be used to record the Blue Box tones for certain
phone numbers. This way, it's less conspicuous to use since you
just make it look like a walkman or whatever, instead of a box.
All Blue Boxes, except "dial pulse" or "Rotary SF" Blue Boxes,
must have the following 4 common operating capabilities:
It must have signalling capability in the form of a 2600Hz tone.
This tone is used by the toll network to indicate, either by its
presence or its absence, an "on hook" (idle) or "off hook" (busy)
condition of the trunk. The Blue Box must have a "KP" tones that
unlocks or readies the multi-frequency receiver at the called end
to receive the tones corresponding to the called phone #. The
typical Blue Box must be able to emit M tones which are used to
transmit phone #'s over the toll network. Each digit of a phone #
is represented by a combination of 2 tones. For example, the
digit 2 is transmitted by a combination of 700Hz and 1100Hz. The
Blue Box must have an "ST" key which consists of a combination of
2 tones that tell the equipment at the called end that all digits
have been sent and that the equipment should start switching the
call to the called number.
BLACK
This Box was named because of the color of the first one
found. It varies in size and usually has one or two switches or
buttons. Attached to the telephone line of a called party, the
Black Box provides toll-free calling *to* that party's line. A
Black Box user tells other people beforehand that they will not
be charged for any call placed to him. The user then operates the
device causing a "non-charge" condition ("no answer" or
"disconnect") to be recorded on the telephone company's billing
equipment. A Black Box is relatively simple to construct and is
much less sophisticated than a Blue Box. NOTE: This will not work
on any type of Electronic Switching Systems, (ESS, DMS100 etc.)
CHEESE
This Box was named after the container in which the first one was
found. Its design may be crude or very sophisticated. Its size
varies; one was found the size of a half-dollar. A Cheese Box was
used most often by bookmakers or betters to place wagers without
detection from a remote location. The device inter-connects 2
phone lines, each having different #'s but each terminating at
the same location. In effect, there are 2 phones at the same
location which are linked together through a Cheese Box. It is
usually found in an unoccupied apartment connected to a phone
jack or connecting block. The bookmaker, at some remote location,
dials one of the numbers and stays on the line. Various bettors
dial the other number but are automatically connected with the
book maker by means of the Cheese Box interconnection. If, in
addition to a cheese box, a Black Box is included in the
arrangement, the combined equipment would permit toll-free
calling on either line to the other line. If a police raid were
conducted at the terminating point of the conversations -the
location of the Cheese Box- there would be no evidence of
gambling activity. This device is sometimes difficult to
identify. Law enforcement officials have been advised that when
unusual devices are found associated with telephone connections
the phone company security representatives should be contacted to
assist in identification.
(This probably would be good for a BBS, especially with the Black
Box set up. and if you ever decided to take the board down, you
wouldn't have to change your phone #. It also makes it so you
yourself cannot be traced. I am not sure about calling out from
one though.)
VOICE MAIL BOX HACKING
Hello again, and welcome to another <20>egions <20>f <20>ucifer text file!
This text file has to do with hacking and scanning VMBs. The
reason I am writing this file is because I am very good at it,
and have had years of experience. In fact I have been called by
MCI for screwing them over by attacking and taking over a whole
damn system with a few friends of mine. Anyway, hacking VMBs is
very simple and basically safe, and not only that but they are
cool to have around. You can give them to friends, you can trade
them for access on bulletin boards, or you can use it for
yourself. As for this 'Tutorial on Hacking VMBs', we will be
talking about what systems to hack, how you go about hacking
them, default passwords, hints on better scanning, and having
your very own box.
VMB, in case you don't know, stands for 'Voice Mail Box'. Now a
VMB is like an answering machine. You can use it for all sorts of
things. Most VMB systems are dialed though 800 numbers. People
call up the VMB system that you have a box on, and dial in your
box number and then leave you a message. Whenever you want to
check your box, you just call up, enter your password and read
your messages. Inside a VMB you can do whatever, you can leave
messages to others on the system, you can change your 'Out Going'
message, you can have guest boxes (Explained later), you can have
the box call your house when you get an Urgent message, you can
do a lot of things. In fact, on some systems you can even CALL
OUT through them, so they can be used as a code of sorts! They
are cool to have.
You should scan/hack out Virgin Systems, this is another way of
calling a system that hasn't been hack out yet. Also, CINDI
Systems and ASPEN Systems have the best boxes and the most
options that VMB Systems can offer. I will be talking about ASPEN
System today since I know most about those.
Okay once you've found your Virgin VMB System, you start to scan.
Just incase you don't know what scanning is, that means you
search for boxes that are hackable (Explained later on). Now you
dial up the system and when it picks up and the bitch starts to
talk, press the "#" key. It will then ask you for your box
number... now there are two different way the ASPEN System can be
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital
Box Number System". Now lets just say this system is a 3 Digit
System. Okay, when it asks for your Box Number, enter in 999, now
it will say one of three things: [These are known as 'Greeting
Names']
1. John Doe [Box owners name]
2. "Box Number 999 Is Not a Valid Box Number"
3. "Box Number 999"
Now, if it either says 1 or 2, go to box number
998...997...996...995..etc, but if it says 3, then you are lucky,
now it will ask you for your password, now you are probably
saying 'Oh no this is where it gets difficult'... well you are
WRONG! This part is easy. Here is a list of ASPEN Default
Passwords:
* We will use box number 666 as an example box #
[ BN = Box Number ]
List of Default Password: Combination Result
1-BN 1666
BN+1 667
0-BN 0666
BN-0 6660
Most Common <20>į BN 666
Now enter in a those defaults, try JUST the Box Number first,
ASPENs usually use that most. Now, if you try all those Defaults
and still can not get into that Voice Mail Box, then that means
that the box has been already taken, but the owner hasn't changed
his 'Generic Message', if you don't get in, you will just have to
search until you get in.
Okay, once you get your first box, *DO NOT* change anything!!
That will come later. Your first box is, as what is known as a
'Scanning Box'! What you do with your Scanning Box is this: You
enter "3" from the main commands menu, and it will ask you for
the box number. Now that command is the "Check for Receipt"
command, what it does it check Box #xxx for mail from you. This
command is very convenient for us VMB Hackers. To use that
command to your advantage, you enter in box a box number and it
will say 1 of the three 'Greeting Names', like before, if it say
#3, then you write down that Box Number and hack it later. But if
it says 1 or 2, then just keep scanning! All boxes with the
number 3 Greeting Name is known as a 'Hackable Box'. Now you keep
scanning until you have gone all the way down to Box number 000
or whatever is the lowest box it supports. Now, once you have
your list this is when all the fun starts! Now you are ready to
hack!
Hacking Out Your New Found 'Hackable' Boxes:
Okay this is the easy part. After you spent most of your time by
scanning the system you should be used to the system and how it
works, that should make hacking the ASPEN all the easier. Now, if
you had a 'Scanning Box', you should know what the default
password was for your Scanning Box. Well if the password for your
Scanning Box was just the Box Number, then *EVERY* other hackable
box should have the SAME default password. VMB Systems have only
one default password, If one box has the BN for a Default PW, the
all the others will too.
Okay, you call up the VMB System will the list of 'Hackable'
boxes by your side, and when the bitch is talking, press the "#"
key. When it asks you for your box number, enter in the first box
number on your list. When it asks for your password, enter in the
Default Password Sequence. Now if you don't get into that box,
it's not a problem, just keep going down your list. You should
get into a few. But remember, just because a box is marked
'Hackable', it doesn't mean you will definitely get into it.
Okay, now you have a few dozen boxes. You can now use you
Scanning Box to do whatever you please.
ASPEN Guest Boxes:
Once you have a box of your own, you can give out 'Guest Boxes'.
Guest Boxes are like Sub Boxes in your box. In ASPEN you have 4
of them. If you give out Guest Box #1 to John Doe, Mr. Doe can
call in, enter in the password YOU set for him, and leave you
messages, but not only that, you can leave messages to HIM! Which
means, if his is in New York, and you are in California, and
neither of you have codes to call each other, then you can leave
messages thru your 800 VMB. Here is a list and explanation of all
4 of the Guest Boxes:
0. Main Box - Your Voice Mail Box!
1. Guest Box #1 - Can Leave & Receive Messages
2. Guest Box #2 - Can Leave & Receive Messages
3. Home Box - Can Leave & Receive Messages
4. Secretary Box - Can Check How Many Messages You Have & Receive
Messages
Hints On Better Scanning:
A lot of people say hacking and scanning for VMBs is too damn
hard... well that's because they are going at it all wrong, they
probably read some lame piece of text file on Hacking VMBs that
was about 500 bytes long. Well, here is a small list of hints on
better scanning and hacking:
1. Do not use a Voice Mail Box hacking/scanning program (i.e.:
VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..) 2. Do not hack in
random order (i.e.: B#999, 345, 810, etc) Always hack in order:
999, 998, 997, 996, 995...000. 3. Try to find out if it's virgin.
The newer the System, the better.
4. If you have a phone with memory dial, change one entry to the
number of the VMB System. 5. Don't hack the System Managers box
unless you really want to.
Ideas of Things To Do With Your Extra Boxes:
Well since you can have up to 500 extra Voice Mail Boxes, you
might not know what to do with them, here are a few ideas that
can help you out:
1. Give them to friends
2. Sell them to friends
3. Offer them to sysops for better access
4. Trade them for HSTs or whatever
5. Use them as a Voice Verifying line (So you don't have to give
out your real voice number to BBSs when you apply!)
Blue Box Tones
In this short section I will attempt to list some tones that Ma
Bell uses and what they are. Well here goes: Blue box
frequencies: 2600 hz - used to get on/off trunk tone matrix to
use after 2600 hz.
700: 1 : 2 : 4 : 7 : 11 :
900: + : 3 : 5 : 8 : 12 :
1100: + : + : 6 : 9 : KP :
1300: + : + : + : 10 : KP2 :
1500: + : + : + : + : ST :
900 :1100 :1300 :1500 : 1700 :
Use KP to start a call and ST (1500+1700) to stop. Use 2600 HZ to
disconnect. Red box freqs: 1700 hz and 2200 hz mixed together. A
nickel is 66 ms on (1 beep). A dime is 66ms on, 66ms off, 66ms on
(2 beeps) a quarter is 33ms on, 33ms off repeated 5 times. (Ms =
millisecond). For those of you who don't know, a red box
simulates money being put into a pay phone. You must put in some
money first though (the operator can tell if money was put in but
as to how much she lets the computer answer that. (Yeah for the
computer) TASI locking freq: TASI (time assignment speech
interpolation) is used on satellite trunks, and basically allows
more than one person to use a trunk by putting them on while the
other person isn't talking. Of course, you'd never hear the other
person talking on your trunk. When you start to talk, however,
the TASI controller has to find an open trunk for you. Because of
this, some of your speech is lost (because of the delay in
finding a trunk) this is called clipping. Well, if you were
transmitting data over a trunk, clipping would really mess up the
data. So there is something called a TASI locking frequency which
keeps the TASI from putting anyone else on your trunk or you on
anyone else's trunk. In any case the freq. is 1850 hz. (Sent
before the transmission). Have fun!!!
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
:% %:
:% THE GREEN BOX %:
:% %:
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
The Green Box generates useful tonessuch as COIN COLLECT, COIN RETURN, and
RINGBACK. These are the tones that ACTS or the TSPS operator would send to
the CO when appropriate. Unfortunately, the green box cannot be used at a
fortress station, but must be used by the CALLED party. The tones (hz) are:
COIN COLLECT 700 + 1100
COIN RETURN 1100 + 1700
RINGBACK 700 + 1700
Before the called party sends any of these tones, an operator released
signal should be sent to alert the MF detectors at the CO. This can be done
by sending 900 + 1500 Hz or a single 2600 Hz wink (90 ms) followed by a 60 ms
gap and then the appropriate signal for at least 900 ms. Also, do not forget
that the initial rate is collected shortly before the 3 minute period is up.
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-: -:-:-:-:-:-:-:-:
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
:% %:
:% THE BLOTO BOX %:
:% %:
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
HOW TO BUILD A BLOTO BOX
Finally, it is here! What was first conceived as a joke to fool the inncoent
phreakers around America has finally been concieved by the one phreak who is
the expert on lines and voltage: The Traveler. Other boxes by the Traveler
include the White Gold Box, the Aqua Box, The Diverti Box, and the Cold Box.
All of those plans will soon be available in a BBS/AE near you!
Well, for you people who are unenlightened about the Blotto Box, here is a
brief summery of a legend.
--*-=> The Blotto Box <=-*--
For years now every pirate has dreamed of the Blotto Box. It was at first
made as a joke to mock more ignorant people into thinking that the function
of it actually was possible. Well, if you are The Voltage Master, it is
possible. Originally conceived by King Blotto of much fame, the Blotto Box is
finally available to the public.
NOTE: The Traveler can not be responcable for the information disclosed in
the file! This file is strictly for informational purposes and should not be
actually built and used! Usage of this electronical impulse machine could
have the severe results listed below and could result in high federal
prosecution!
Again, The Traveler
TAKES NO RESPONCABILITY!
All right, now that that is cleared up, here is the basis of the box and
it's function.
The Blotto Box is every phreaks dream... you could hold AT&T down on it's
knee's with this device. Because, quite simply, it can turn off the phone
lines everywhere. Nothing. Blotto. No calls will be allowed out of an area
code, and no calls will be allowed in. No calls can be made inside it for
that matter. As long as the switchhing system stays the same, this box will
not stop at a mere area code. It will stop at nothing. The electrical
impulses that emit from this box will open every line. Every line will ring
and ring and ring... the voltage will never be cut off until the box/
generator is stopped. This is no 200 volt job, here. We are talking
GENERATOR. Every phone line will continue to ring, and people close to the
box may be electricuted if they pick up the phone.
But, the Blotto Box can be stopped by merely cutting of the line or
generator. If they are cut off then nothing will emit any longer. It will
take a while for the box to calm back down again, but that is merely a
superficial aftereffect. Once again: Construction and use of this box is not
advised! The Blotto Box will continue as long as there is electricity to
continue with.
OK, that is what it does, now, here are some interesting things for you to
do with it...
--*-=> The Blotto Box Functions and Installation <=-*--
Once you have installed your Blotto, there is no turning back. The
following are the instructions for construction and use of this box. Please
read and heed all warnings in the above section before you attempt to
construct this box.
Materials:
- A Honda portable generator or a main power outlet like in a
stadium or some such place.
- A radio shack cord set for 400 volts that splices a female
plug into a phone line jack.
- A meter of voltage to attach to the box itself.
- A green base (i.e. one of the nice boxes about 3' by 4' that
you see around in your neighborhood. They are the main switch
boards and would be a more effective line to start with.
or: A regular phone jack (not your own, and not in your area code!
- A soudering iron and much souder.
- A remote control or long wooden pole.
Now. You must have guessed the construction from that. If not, here goes,
I will explain in detail. Take the Honda Portable Generator and all of the
other listed equiptment and go out and hunt for a green base. Make sure it is
one on the ground or hanging at head level from a pole, not the huge ones at
the top of telephone poles. Open it up with anything convienent, if you are
two feeble that fuck don't try this. Take a look inside... you are hunting
for color-coordinating lines of green and red. Now, take out your radio shack
cord and rip the meter thing off. Replace it with the voltage meter about. A
good level to set the voltage to is about 1000 volts. Now, attach the voltage
meter to the cord and set the limit for one thousand. Plug the other end of
the cord into the generator. Take the phone jack and splice the jack part
off. Open it up and match the red and green wires with the other red and
green wires. NOTE: If you just had the generator on and have done this in the
correct order, you will be a crispy critter. Keep the generator off until you
plan to start it up. Now, sauder those lines together carefully. Wrap duck
tape or insultation tape around all of the wires. Now, place the remote
control right on to the startup of the generator. If you have the long pole,
make sure it is very long and stand back as far away as you can get and reach
the pole over. NOTICE: If you are going right along with this without reading
the file first, you sill realize now tHat your area code is about to become
null! Then, getting back, twitch the pole/remote control and run for your
damn life. Anywhere, just get away from it. It will be generating so much
electricity that if you stand to close you will kill yourself. The generator
will smoke, etc. but will not stop. You are now killing your area code,
because all of that energy is spreading through all of the phone lines around
you in every direction.
Have a nice day!
<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>
<%> <%>
<%> Making the <%>
<%> <%>
<%> Lunch Box <%>
<%> ===== === <%>
<%> <%>
<%> Written, Typed and Created by: Dr. D-Code <%>
<%> <%>
<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>
Introduction
============
The Lunch Box is a VERY simple transmitter which can be handy for all sorts of
things. It is quite small and can easily be put in a number of places. I have
successfully used it for tapping fones, getting inside info, blackmail and
other such things. The possibilities are endless. I will also include the plans
for an equally small receiver for your newly made toy. Use it for just about
anything. You can also make the transmitter and receiver together in one box
and use it as a walkie talkie.
Materials you will need
=======================
(1) 9 volt battery with battery clip
(1) 25-mfd, 15 volt electrolytic capacitor
(2) .0047 mfd capacitors
(1) .022 mfd capacitor
(1) 51 pf capacitor
(1) 365 pf variable capacitor
(1) Transistor antenna coil
(1) 2N366 transistor
(1) 2N464 transistor
(1) 100k resistor
(1) 5.6k resistor
(1) 10k resistor
(1) 2meg potentiometer with SPST switch
Some good wire, solder, soldering iron, board to put it on, box (optional)
Schematic for The Lunch Box
===========================
This may get a tad confusing but just print it out and pay attention.

!
51 pf
!
---+---- ------------base collector
! )( 2N366 +----+------/\/\/----GND
365 pf () emitter !
! )( ! !
+-------- ---+---- ! !
! ! ! ! !
GND / .022mfd ! !
10k\ ! ! !
/ GND +------------------------emitter
! ! ! 2N464
/ .0047 ! base collector
2meg \----+ ! ! +--------+ !
/ ! GND ! ! !
GND ! ! !
+-------------+.0047+--------------------+ ! !
! +--25mfd-----+
-----------------------------------------+ ! !
microphone +--/\/\/-----+
---------------------------------------------+ 100k !
!
GND---->/<---------------------!+!+!+---------------+
switch Battery
from 2meg pot.
Notes about the schematic
=========================
1. GND means ground
2. The GND near the switch and the GND by the 2meg potentiometer should be
connected.
3. Where you see: )(
()
)( it is the transistor antenna coil with 15 turns of
regular hook-up wire around it.
4. The middle of the loop on the left side (the left of "()") you should run
a wire down to the "+" which has nothing attached to it. There is a .0047
capacitor on the correct piece of wire.
5. For the microphone use a magnetic earphone (1k to 2k).
6. Where you see "[!]" is the antenna. Use about 8 feet of wire to broadcast
approx 300ft. Part 15 of the FCC rules and regulation says you can't
broadcast over 300 feet without a license. (Hahaha). Use more wire for an
antenna for longer distances. (Attach it to the black wire on the fone
line for about a 250 foot antenna!)
Operation of the Lunch Box
==========================
This transmitter will send the signals over the AM radio band. You use the
variable capacitor to adjust what freq. you want to use. Find a good unused
freq. down at the lower end of the scale and you're set. Use the 2 meg pot. to
the 2meg is for turning the Lunch Box on and off. When everything is adjusted,
turn on an AM radio adjust it to where you think the signal is. Have a friend
say some shit thru the Box and tune in to it. That's all there is to it. The
plans for a simple receiver are shown below:
The Lunch Box receiver
======================
(1) 9 volt battery with battery clip
(1) 365 pf variable capacitor
(1) 51 pf capacitor
(1) 1N38B diode
(1) Transistor antenna coil
(1) 2N366 transistor
(1) SPST toggle switch
(1) 1k to 2k magnetic earphone
Schematic for receiver
======================
[!]
!
51 pf
!
+----+----+
! !
) 365 pf
(----+ !
) ! !
+---------+---GND
!
+---*>!----base collector-----
diode 2N366 earphone
emitter +-----
! !
GND !
-
+
- battery
+
GND------>/<------------+
switch
Closing statement
=================
This two devices can be built for under a total of $10.00. Not too bad. Using
these devices in illegal ways is your option. If you get caught, I accept NO
responsibility for your actions. This can be a lot of fun if used correctly.
Hook it up to the red wire (I think) on the fone line and it will send the
conversation over the air waves. If you have any problems or are confused,
leave me mail on:Hi-Times=702/832/7469 Warez House=702/827/9273
______________________________________________________________________________
Sysops of other systems may use the file as long as none of it is altered.
______________________________________________________________________________
This has been a High Mountain Hackers Production- (c) 1985 by HMH Industries
______________________________________________________________________________

View File

@@ -0,0 +1,165 @@
Phreaker Abatement
The Goal
The goal of phreaker abatement is to prevent the intrusion of
uninvited outside parties into the telecommunication systems of
your company.
If you and your company are doing &quot;catch-up&quot;, then proceed
to the IMMEDIATE ACTIONS section of this document. If you and
your company have performed (or have in process) each of the items
in the immediate section, proceed to the really important item
of providing a telecommunications policy. If you and your company
have performed the above items then it is time to really get to
work and eliminate the remaining loop-holes that a phreaker may
enter.
In the short term, this process may mean a great deal of work.
None of the work should cause any outage for the users of your
system.
In the long term, this process will provide a level of security
that cannot be achieved in any other way. You will know your system
and be able to manage it.
Without this or some other similar process, the phreaker will
eventually find your system. There is no gurantee that the phreaker
will be able to enter your system. However, I rather think it
is prudent to act to prevent damage and/or expense.
I do not believe this is the only solution. There are many others,
and if you would like to share those procedures and ideas, drop
me a message. I also will enter credit for ideas, if permission
is granted at the time of submission. If there is not credit permission,
I will sift the information and enter parts in this document with
an anon credit.
Immediate Actions
The following is a list of items that should be done immediately:
Passwords
Change all default passwords
Use the maximum length passwords
Use a password generator to create random, convoluted passwords
Change all maintenance passwords at least each 30 days
Do not use the same passwords at different sites.
Make sure you have control of ALL passwords
Serial Ports
Locate every system serial port (maintenance, admin, etc.)
Trace these to their destination. Make sure there are no connections
you cannot identify. Make sure there is no bridging.
Clearly identify each modem connection.
Protect each sio port with a protection device. Such as a
call back protection device.
DISA
If you can disconnect disa, do it.
If you cannot disconnect disa then do the following:
Change all passwords each month.
Issue individual passwords, if possible.
Change the disa number if it has been compromised.
Never publish the disa number.
The attendant should never give the disa number to anyone.
Set the disa to send no tone as a start signal rather than
a tone.
Voice Mail
Make sure your software will not allow call forwarding.
Make sure there are no voice mail boxes you cannot identify
Make sure the passwords are changed every 30 days
Make sure there is no visitor mail box.
Codes to Deny
Contact your long distance carrier and have them deny service to:
700 prefixes
809 prefix - if you do not do business in the Caribbean deny this area code. More telephone fraud is reported on calls to this area than to all other locations in the world combined.
976 and 976 look alike prefixes.
900 prefixs.
011 (international calls) if you do not normally do international business. My tracks on the pay per call croud indicates that they are moving from the 800 pay per call in favor of the 011 call.
Make sure that you deny access to each of the above in your own machine. Additionally, deny all 800 and 888 pay per call lines.
One of the better ways to do the deny is to use an allow table that will not output the required digits. Looks like it works but don't. May even escape notice if the phreaker has access to the maintenance port.
Telecommunications Policy
To effectively achieve this goal, a long term, strategy must be
developed and the approval of upper management obtained. This
action will give the document the weight of POLICY. The following
are recommendations for policy from Northern Telcom. There is
no hard and fast rule that all elements are required or that these
are the only elements that could be included.
Risk Assessment
Define Responsibilities
Authority
Identify Protection Resources
Procedures
Audit
Enforce Policy
Publish Incidents
Balance
Ownership
This really is not a telecommunications policy but is some kind of security
policy. Truely what is needed is a policy that will meet the needs of the
current company configuration, and adjust for future growth. Readers are
invited to use the above items in the generation of a policy.
If your company has a policy and would share with the readers of this site,
please forward via fax, snail mail or otherwise. No payment for the
document is possible.
Long Term Security items
Now that the items above are achieved or in progress, we need to seek out
any phreakers. Keeping them out was the original goal. But it would have
been useless to get them out and not be able to secure the system.
Activate the SMDR. Make it active both incoming and outgoing. Check any
calls of long duration or high cost. Check any calls that are not within
working hours. Check for any calls to a 900, 976 (or look alike), 800 pay
per call line, or area code 809. Check any 011 calls or calls to other
common carriers.
Note: To make matters far more confusing, the Area Code 809 has split!
The new area codes for Antigua and Barbuda is 268. The old code is also
still in effect. If you block 809, block 268 also. Check your smdr for
area code 268 also.
Question: Can anyone explain why eight prefixes need their very own area
code. This was done with little prior notice.
Check the phone bills. Go over the bills with regularity and question all
items on the bill.
There are a number of items I will leave out at this point to avoid
phreaking. A closing comment:
Give me a call or an eMail if you have a question. I charge for analysis.
I do not charge for questions.

View File

@@ -0,0 +1,38 @@
Some Phreaking Haikus
By The Slipped Disk
For The Sherwood Forest ][
Connection Boxed
A phreak types the access code. The fone begins to ring.
The link is done. The black box lights up.
Nearby, The line is traced. The call does not register.
Raid Looped
The men break in. The fone starts to sing.
Badges are flashed. Another joins in.
The Diskettes are eliminated. The Silent connects the conference.
Rainy Power
The Hacker is working. The surge travels swiftly.
It is raining outside. They are unsuspecting.
The roof is leaking. The lights flicker briefly.
99XX Diet
The numbers are dialed. The time is morning.
A recording is found. The hacker is hungry.
The number is used. The Twinkies are swallowed.
Backup Problem
The time is crucial. a phreaker is in.
The Disk is erased. The files are set off.
Did I copy it before? Soon, a missle launches.


View File

@@ -0,0 +1,294 @@
THE HISTORY OF PHREAKING
------------------------
DID YOU KNOW THAT PHREAKING STARTED FROM THE MOST UNLIKELY SOURCE...... CAP'N
CRUNCH CEREAL!
YES, IN THE 1960'S A TOY WHISTLE WAS PLACED IN THE FAMOUS CEREAL.
UNFORTUNATELY (NOT FOR US), THE WHISTLE GENERATED 2,600 CYCLE-TONE, DUDE! A
YOUNG MAN WHO HAD JUST ENTERED THE USAF AS A RADIO TECH., WAS FASCINATED WHEN
HE DISCOVERED THAT BY BLOWING THE WHISTLE INTO THE FONE AFTER DIALING ANY
LONG-DISTANCE # AND HEARING THE DIS-CONNECT SIGNAL, THE TRUNK WOULD REMAIN
OPEN WITHOUT TOLL CHARGES ACCOUNTING, AND FROM THEN ON, ANY NUMBER COULD BE
DIALED REPEATEDLY. 800 #'S (INWATS) , WERE LATER USED AS THE STARTER CALL TO
AVOID ANY CHARGES. HE USED THIS TO CALL HOME WHILE STATIONED IN ENGLAND.
THE CAP'N PRACTICED FOR YEARS. HE REPORTEDLY WOULD PLACE CALLS AROUND THE
WORLD TO HIMSELF. HE WOULD THEN TALK AND HERE HIMSELF 20 SEC. LATER. HE WENT
ON TO DISCOVER THE OPERATOR CODES INCLUDING AUTO-RELAY (OPERATOR INTERRUPT, OR
VERIFY BUSY). THUS, EAVESDROPPING INTO CONVERSATIONS. HE CLAIMED TO LISTEN IN
ON THE FOLLOWING:
1. PRES. OF THE USA
2. FBI WHEN IT WAS AFTER PATTY HEARST
3. THE SECT. OF DEFENSE
AUTOVON. (EXPLAINED IN ANOTHER VOL.)
CAP'N CRUNCH WAS THRUST INTO THE SPOTLIGHT WITH AN ARTICLE IN ESQUIRE.
THE TERM "BLUE BOX" CAME ABOUT BECAUSE THE FIRST ONE THAT WAS CAPTURED WAS
THAT COLOR. THE CAP'N SOON WENT BEYOND THE SIMPLE WHISTLE TO MORE COMPLICATED
DEVICES.
THOUSANDS OF PHREAKS CHANCED UPON AN UNUSED TELEX TEST BOARD TRUNK LINE IN A
4A SWITCHING MACHINE IN VANCOUVER. DIALING AREA CODE 604 FOLLOWED BY 2111
PLACED YOU IN AN INTERNATIONAL PARTY LINE.
SOON MORE SOPHISTICATED BOXES FOLLOWED. IN '77, THE PHONE COMP. INSTALLED THE
FIRST OF THEIR MORE SOPH. EQUIP. IT HAS INCREASED THE RISK, BUT BY NO MEANS
STOPPED IT. BELL NOW HAS A SYSTEM THAT WILL PRODUCE A RECORDED VOICE TELLIN YA
TO STOP, RECORDS PART OF CONVERSATION, AND BILLS THE CALL TO THE NUMBER.
THOSE NUMBERS ARE THEN PRINTED OUT WITH THE TIME AND DATE.
BELL NOW HAS 74 CENTRALIZED TICKET INVESTIGATION (CTI). ONE OF THESE ALONE
PERFORMS 7000 INVESTIGATIONS A DAY.
CRUNCH WAS CAUGHT A NUMBER OF TIMES, INCLUDING A TOP SECRET MANUAL IN HIS
CLOSET DESCRIBING THE NCIC. (NATIONAL CRIME INFORMATION CENTER: COVERED
LATER). AFTER 3 CONVICTIONS AND A FEW YEARS IN JAIL, HE PACKED IT UP FOR A JOB
IN A SOFTWARE COMPANY OR SOMETHING LIKE THAT. BUT DO YOU BELIEVE THAT?
SOMEWHERE, SOMETIME, I HAVE AN EERIE FEELING THAT HE IS OUT THERE.
(Ed. note. Captain Crunch went to work for Apple Computer.)
IN FRONT, AND I'M SURE HE'S STILL THERE.
SO NEXT TIME YOU BLUE BOX OR PHREAK, THINK OF THAT GUY LIVING NEXT DOOR, WHO
KNOWS.
*************************************** TRIVIA ******************************
JOE THE WHISTLER, BLIND SINCE BIRTH, WAS ABLE TO WHISTLE THE PERFECT TONES
WITHIN THE 2% ERROR RANGE ESTABLISHED. REPORTEDLY PHREAKS WOULD CALL HIM UP TO
TUNE THEIR BOXES. NOW WORKS FOR THE FONE COMPANY AFTER A, SHALL WE SAY, AN
ILLUSTRIOUS CAREER.
********************************** RECORD PHREAK ****************************
UNKNOWN PHREAK CALLED:
1. PRESIDENT
2. ARMY COMMANDANT IN RUSSIA
3. USAF SAC SQUADRON ALMOST CAUSING AN AIR ALERT.
BIGGEST CALL I KNOW OF WAS EXECUTED BY
HIM: $19,000 12 HOUR CALL TO....
[A PHREAK HISTORY..BY THE ROGUE]
[from the book Out of the Inner]
[Circle by Bill Landreth, also ]
[known as "The Cracker". Phun! ]
Our home computers can contact computers thousands of miles away because
they can use devices called modems that enable them to "hear" and translate
sounds sent over the nation's [and the world's] telephone communication
system. Like all giant networks, however, the telephone system has it's
weak points, and one lies in the fact that a computer-to-computer hookup
can occur without the knowledge of either the phone company or the invade
machine. This is the weakness that makes the telephone system and most
computer systems vulnerable to hackers.
In the 1970s, before personal computers became as common as they are now,
the telephone system itself was explored by a group of hackers who called
themselves phone phreaks. The ethical and technical predecessors of
today's hackers, the phone phreaks were anarchic "musicians" who delighted
in using flutes, whistles and any other sound generators that worked to
enter and explore the worldwide telephone network.
The phone phreaks were far less organized and widespread than today's
hackers are, and, in the beginning, none of them even knew of each other's
existence. The cult itself came into being in the late 1960s, partly
because of "phone hackers" at MIT and Stanford, where there were large
computer centers and nests of hackers, and partly because of a brilliant
young man in Tennessee named Joe Engressia.
Joe was the first phone phreak to achieve media notoriety, when a 1971
Esquire magazine article told the world about him and his co-horts. Like
many other early phone phreaks, Joe is blind. He was only twenty-two when
the article was published, but he had been tweaking the phone system since
the age of eight. Telephones had always fascinated him, and Joe also
happens to be one of those rare individuals who are born with perfect
pitch. One day, by accident, he discovered how this gift could help him
manipulate some of the most sophisticated and widespread technology in the
world.
He was dialing recorded messages, partly because it was the only way he
knew of to call around the world for free, and partly because it was a
favorite pastime. He was whistling while listening to a recorded
announcement when suddenly the recording clicked off. Someone with less
curiosity might have assumed it was just one of those weird things the
telephone company does to you, but Joe had an idea. He fooled around with
some of their numbers and discovered that he could switch off any recorded
message by whistling a certain tone.
He called the local telephone company and asked why tape recorders stopped
working when he whistled into the telephone. He didn't fully understand
the explanation that was given to him at the time [remember, he was only
eight years old], but it sounded as though he had stumbled into a whole new
world of things to do and explore. And to a bright eight-year-old, an
easily explored world, no farther away than his telephone, was, indeed, and
intriguing discovery.
Joe was able to control some of the telephone company's global switching
network--which is what he stumbled upon with his whistling--because of a
decision American Telephone & Telegraph (AT&T) made sometime in the 1950's.
Their long-term, irreversible, multibillion-dollar decision was to base
their long-distance switching on a series of specific, audible tones called
a multifreqency system (known to phreaks as "MF") is a way for numbers that
designate switching paths to be transmitted as tones similar to the sounds
touch-tone phones make. Certain frequencies are used to find open lines, to
switch from local to long distance trunks, and, essentially, to do most of
the jobs a human operator is able to do.
Undoubtedly, the decision-makers at AT&T did not give a moment's thought to
the possibility that the system might someday fall before a blind eight-
year old with perfect pitch, but Joe found that he could maneuver his way
through the system by whistling that one specific tone at the right time.
His motivation was not to steal free telephone calls, but to find his way
around the network and to learn how to extend his control over it.
Joe explored for years, but he never thought of himself as an enemy of the
phone system. He loved the system. His dream was to work for the telephone
company someday, and he often tried to tell the company about bugs he
discovered in the system. But he finally ran a foul of his intended
employer when he was caught whistling up phone calls for fellow college
students.
The publicity surrounding Joe's case had an unfortunate [for the telephone
company] side effect: it led to the creation of the phone-phreak network.
Soon after the story hit the papers, Joe began to get calls from all over
the country. Some of the callers were blind, most were young, and all of
them had one thing in common: and enormous curiosity about the telephone
system. Joe put his callers in touch with one another, and these scattered
experimenters soon found that they had stumbled upon several different ways
to use the MF system as the ticket to a world of electronic globe-trotting.
Joe Engressia may have been the "phounding phather" of the phone phreaks,
but just as one discovery often leads to another and another, it soon
happened that someone else discovered a very large error made by the Bell
Telephone System in 1954. The Bell System's technical journal had
published a complete description of the multi-freqency system, including
the specific frequencies and descriptions of how the frequencies were used.
Once the frequencies became public knowledge, phreaks began to use pipe
organs, flutes, and tape recorders to create the tones that gave them
control over the telecommunications network. And then came the ultimate
irony: The news spread that a simple toy whistle included as a giveaway in
boxes of Cap'n Crunch cereal produced a pure 2600-cycle tone of one of the
holes in the whistle was taped shut. Using the whistle at just the right
point in the process of making a connection, phreaks could call each other
whenever and wherever they wanted without having to pay the phone company.
One of the more curious and inventive phreaks using the Cap'n Crunch
whistle was John draper, a young Air Force technician stationed overseas.
Draper used the whistle for free calls to his friends in the United States.
He was interested in the way this bizarre tool worked, so he began
experimenting with the system and found that he could use the whistle and
his knowledge of the switching network to route his calls in peculiar ways.
He began by calling people who worked inside the telephone system. They
weren't aware that he was and outsider, so he was able to start gathering
"intelligence." Soon, he was calling Peking and Paris, and routing calls
to himself around the world. He set up massive clandestine conference
calls that phreaks around around the world could join and drop out of at
will. Soon, he became known to the phreak underground as Cap'n Crunch.
Cap'n Crunch soon found out from other electronically minded phreaks that
it was possible to build specially tuned electronic-tone generators that
could reproduce the MF frequencies. A few electronic wizards began to
circulate the generators, which were first known as "MF boxes" because the
reproduced the multifreqency tones, and later came to be called "Blue
Boxes," as they are today.
The number of phreaks grew, and as they added their own discoveries to the
collection of phreak knowledge, the cult's power to manipulate the system
steadily increased. Then, in October 1971, the whole underground scene,
from Joe Engressia to Cap'n Crunch, became well know to the outside world.
Esquire magazine published "Secrets of the Little Blue Box" by Ron
Rosenbaum, a journalist who had encountered the top phreaks of the time.
Cap'n Crunch was characterized somewhat romantically in Rosenbaum's piece
as a roving prankster who drove the author around in his specially equipped
van, pausing frequently at public telephones to phone locations around the
world: the American embassy in Moscow, a group of blind teen-age phreaks in
Canada, a public telephone in Trafalgar Square.
After the article was published [though not as a direct result], Crunch was
arrested twice, convicted, and ended up spending four months at the federal
prison in Lompoc, California in 1976, and two at Northampton State Prison
in Pennsylvania in 1977. While he was in prison, several mob-connected
inmates tried to enlist him in a commercial blue-box venture. Draper/Crunch
declined. The convicts broke his back and knocked out his front teeth.
After he left prison, Draper quit phreaking and decided to start
programming. An old friend by the name of Steve Wizniak seemed to be doing
pretty well with a piece of hardware he called the Apple and Draper started
writing software for Apple Computer. He developed a word-processing
program known as EasyWriter and gained another niche in the technological
Hall of Fame in 1981, when EasyWriter was selected as the first word-
processing program available for the IBM PC. Now, Cap'n Crunch makes a
legitimate living under a new handle, Cap'n Software.
[TAP]
During his trial, John Draper claimed [and still claims] that his interest
in phreaking was strictly devoted to learning about the workings of complex,
worldwide communication-switching networks. There were other phreaks,
thought, of a more political mind, who saw this method of technological
trespassing as a tool for spreading anarchy, and one radical branch of the
phreak fraternity grew out of the political group of the late sixties and
early seventies known as the Yippees.
On May Day, 1971, the founding Yippee, Abbie Hoffman, and a phone phreak
who used the handle Al Bell started a subversive publication, called the
Youth International Party Line, which focused on information about cracking
the phone network. A few years later, its name was changed to
Technological Acetones Program [TAP], when the technological phreaks
separated from their more politically oriented counterparts. TAP was
purely anarchist. Through it phreaks learned how to make plastic
explosive, how to obtain phony birth certificates and illicit airline
tickets, and how to abuse credit cards. It published circuit diagrams of
blue boxes, and it's members specialized in gaining and trading hard-to-get
phone numbers--the Vatican, for example, or the Kremlin. TAP even secured
the phone number of the American Embassy in Teheran after it was seized by
students during the "hostage crisis" of 1980, posted the number, and
invited phreaks to call the Embassy in tehran and "tell off" the
revolutionary guards...
In the late 1970s the phreak who had been most closely associated with TAP
also became a well-known hacker with the aliases Richard Cheshire and
Cheshire Catalyst. Often employed as a computer consultant by large
corporations who are unaware of his secret identity, Cheshire has a
widespread, carefully cultivated network of cohorts inside the telephone
company and other institutions. Avoiding what he calls "dark-side hacking"
that results in damage to data, Cheshire claims that there are some kinds
of information that even TAP will not publish. For example, Cheshire once
told a friend of mine: "A few years ago, before the Progressive magazine
actually published the plans for making a hydrogen bomb, we were approached
by someone who had similar plans. I decided that anything like the
hydrogen bomb, which has the capability of destroying the phone network, is
not in our interests."
Cheshire also mentioned an incident in which a hacker he knew stumbled upon
the data-processing facilities of a sop-secret American seismic station in
Iceland, a facility for monitoring Soviet nuclear testing. The hacker got
out as soon as he realized where he was--"We try to stay away from that
stuff," Cheshire said. He also remarked, "I once Invited the CIA to attend
a public lecture of mine, and there were a couple of guys at the talk,
seated toward the back who definitely turned a couple of shades of green
when I told about the Icelandic station."
YOU CAN SUBSCRIBE TO T.A.P. NEWSLETTER BY SENDING $8.00 TO:
TAP
ROOM 603
147 WEST 42ND STREET
NEW YORK, NY 10036
NOTE: that address above is the old one. I have heard various rumors that
TAP went down and is soon coming back up. If you can steal $8.00 dollars
to stuff in an envelope, it's worth a try... I'll try to get the new
address if I can... Later on, The Rogue.

View File

@@ -0,0 +1,72 @@
55
_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_
_- -_
_- -_
_- PHREAKING -_
_- -_
_- BY: -_
_- THE VKR & OTALP YCRAZY PLATO -_
_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_-_
THE HISTORY OF PHREAKING
------------------------
DID YOU KNOW THAT PHREAKING STARTED FROM THE MOST UNLIKELY SOURCE......
CAP'N CRUNCH CEREAL!
YES, IN THE 1960'S A TOY WHISTLE WAS PLACED IN THE FAMOUS CEREAL. UNFORTUNATELY (
NOT FOR US), THE WHISTLE GENERATED 2,600 CYCLE-TONE, DUDE! A YOUNG MAN WHO HAD JU
ST ENTERED THE USAF AS A RADIO TECH., WAS FASCINATED WHEN HE DISCOVERED THAT BY B
LOWING THE WHISTLE INTO THE FONE AFTER DIALING ANY LONG-DISTANCE # AND HEARING TH
E DISCONNECT SIGNAL, THE TRUNK WOULD REMAINOPEN WITHOUT TOLL CHARGES ACCOUNTING,
AND FROM THEN ON, ANY NUMBER COULD BE DIALED REPEATEDLY. 800 #'S (INWATS) ,WERE L
ATER USED AS THE STARTER CALL TO AVOID ANY CHARGES. HE USED THIS TO CALL HOME WHI
LE STATIONED IN ENGLAND.
THE CAP'N PRACTICED FOR YEARS. HE REPORTEDLY WOULD PLACE CALLS AROUND THE WORLD T
O HIMSELF. HE WOULD THEN TALK AND HERE HIMSELF 20 SEC. LATER. HE WENT ON TO DISCO
VER THE OPERATOR CODES INCLUDING AUTO-RELAY (OPERATOR INTERUPT, OR VERIFY BUSY).
THUS, EAVESDROPPING INTO CONVERSATIONS. HE CLAIMED TO LISTEN IN ON THE FOLLOWING
:
1. PRES. OF THE USA
2. FBI WHEN IT WAS AFTER PATTY HEARST
3. THE SECT. OF DEFENSE
AUTOVON. (EXPLAINED IN ANOTHER VOL.)
CAP'N CRUNCH WAS THRUST INTO THE SPOTLITE WITH AN ARTICLE IN ESQUIRE.
THOUSANDS OF PHREAKS CHANCED UPON AN UNUSED TELEX TEST BOARD TRUNK LINE IN A 4A S
WITCHING MACHINE IN VANCOUVER. DIALING AREA CODE 604 FOLLOWED BY 2111 PLACED YOU
IN AN INTERNATIONAL PARTY LINE.
SOON MORE SOPHISTICATED BOXES FOLLOWED. IN '77, THE PHONE COMP. INSTALLED THE FIR
ST OF THEIR MORE SOPH. EQUIP. IT HAS INCREASED THE RISK, BUT BY NO MEANS STOPPED
IT. BELL NOW HAS A SYSTEM THAT WILL PRODUCE A RECORDED VOICE TELLIN YA TO STOP, R
ECORDS PART OF CONVERSATION, AND BILLS THE CALL TO THE NUMBER. THOSE NUMBERS ARE
THEN PRINTED OUT WITH THE TIME AND DATE.
BELL NOW HAS 74 CENTRALIZED TICKET INVESTIGATION (CTI). ONE OF THESE ALONE PERFOR
MS 7000 INVESTIGATIONS A DAY.
CRUNCH WAS CAUGHT A NUMBER OF TIMES, INCLUDING A TOP SECRET MANUAL IN HIS CLOSET
DESCRIBING THE NCIC. (NATIONAL CRIME INFORMATION CENTER: COVERED LATER). AFTER 3
CONVICTIONS AND A FEW YEARS IN JAIL, HE PACKED IT UP FOR A JOB IN A SOFTWARE CO
MPANY OR SOMETHING LIKE THAT. BUT DO YOU BELIEVE THAT? SOMEWHERE, SOMETIME, I HAV
E AN EERIE FEELING THAT HE IS OUT THERE.
IN FRONT, AND I'M SURE HE'S STILL THERE.
SO NEXT TIME YOU BLUE BOX OR PHREAK, THINK OF THAT GUY LIVING NEXT DOOR, WHO KNOW
S.
***************************************
TRIVIA
***************************************
JOE THE WHISTLER, BLIND SINCE BIRTH, WAS ABLE TO WHISTLE THE PERFECT TONES
WITHIN THE 2% ERROR RANGE ESTABLISHED. REPORTEDLY PHREAKS WOULD CALL HIM UP TO TU
NE THEIR BOXES. NOW WORKS FOR THE FONE COMPANY AFTER A, SHALL WE SAY, AN ILLUSTRI
OUS CAREER.
Which file (L=List):

File diff suppressed because one or more lines are too long

View File

@@ -0,0 +1,837 @@
View Files...
[ Select File, or ? ]: 13
..The Liberator- 914/353-4256..
<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>
<*> Joe Cosmo Presents..... <*>
<*> <*>
<*> Methods of Phreaking and Telco Security Measures <*>
<*> <*>
<*> June 16, 1988 1:30 am <*>
<*> <*>
<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>
(formatted to 80 Columns)
Dedication: This phile is dedicated to all those great phreakers who
taught me all of this, and to all of the newcomers being born to the phreak
world. For the legends, it is here as their legacy, and for the newcomers, I
hope they will use it as their guide in times of trouble, and may there
always be phreakers in the world.
TABLE OF CONTENTS
CHAPTER
I. Introduction: What Telephone Fraud Is
II. Who Does It and Why
III. The Systems That Are Fooled
IV. Electronic Toll Fraud
How Boxes Work
The Blue Box
Operation of a Blue Box
Pink Noise
The Black Box
The Red Box
The Cheese Box
V. Divertors
VI. Private Branch Exchanges
VII. Specialized Common Carriers
SCC Extenders List
VIII. PC Pursuit
How to Originate a PC Pursuit Call
IX. Cellular Phone Fraud
ESN Tampering
Obtaining ESN's
X. CN/A's
CN/A List
XI. Loops
XII. Alliance Teleconferencing
Billing an Alliance Conference
Starting a Conference
XIII. Telephone System Security Measure
ESS Detection Devices
Automatic Number Identification and Centralized
Automatic Message Accounting Tapes
Dialed Number Recorders
Trap Codes
Stopping an FBI Trace
Common Channel Inter-office Signaling
XIV. Laws Governing the Rights of Phreakers
XV. Conclusion
I. Introduction: What Telephone Fraud Is
Telephone fraud is illegally using the communication facilities of
telephone companies. This is commonly known as "phreaking." The writer's
purpose is to explore the methods of phreaking, and the various security
measures of telephone companies.
II. Who Does It and Why
The majority of people who phreak are owners of modems (MOdulators
DEModulators, devices which allow computers to communicate over telephone
lines) and are usually between the ages of twelve and seventeen. When the
person reaches age eighteen, he or she usually stops, since after that age,
if the person in caught, the penalty can become very serious, such as time in
prison, and fines starting at $8000.
Scattered throughout the country are many different computer bulletin
board systems, or BBS's. These are computer systems established by private
users or large organizations for the exchange of public and private messages
and software. Most are not a local call, though. Since the normal user calls
about ten different BBS's, with even the lowest long-distance rates, the
phone bill each month can range from $100 to $1000. The solution is to
phreak. When these people learn how to phreak, they also realize that besides
making free long-distance calls from their home, they can also make free
calls from payphones. They also find that there are many other facilities
that they can used without paying.
III. The Systems That Are Fooled
Their are three types of telephone operating systems in the U.S., Step
by Step (SxS), Crossbar (XB), and Electronic Switching System (ESS). They are
described in detail in the following paragraphs.
Step by Step
Step by Step (SxS) was the first switching system used in America,
adopted in 1918 and until 1978 Bell had over 53% of all exchanges using Step
by Step. A long, and confusing train of switches is used for SxS switching.
Disadvantages
A. The switch train may become jammed, blocking calls.
B. No DTMF (Dual-Tone Multi-Frequency), to be discussed later.
C. Much maintenance and much electricity.
D. No "Touch-Tone" dialing.
Identification
A. No pulsing digits after dialing or "Touch Tone".
B. Much static in the connections.
C. No Speed calling, Call forwarding, and other services.
D. Pay-phone wants money first before dial-tone.
Crossbar
Crossbar has been Bell's primary switcher after 1960. Three types of
Crossbar switchings exist, Number 1 Crossbar (1XB), Number 4 Crossbar (4XB),
and Number 5 Crossbar (5XB). A switching matrix is used for all of the phones
in an area. When someone calls, the route is determined and is connected with
the other phone. The matrix is positioned in horizontal and vertical paths,
organizing the train of switches more effectively, and therefore, stopping
the equipment from jamming. There are no definite distinguishing features of
Crossbar switchings from Step by Step.
Electronic Switching System
ESS is the most advanced system employed, and has gone through many
kinds of revisions. The latest system to date is ESS 11a, which is used in
Washington D.C. for security reasons. ESS is the country's most advanced
switching system, and has the highest security system of all. With its many
special features, it is truly the phreaker's nightmare.
Identification
A. Dialing 911 for emergencies.
B. Dial-tone first for pay-phones.
C. Calling services, including Call forwarding, Speed dialing, and Call
waiting.
D. Automatic Number Identification for long-distance calls (ANI), to be
discussed later.
E. "Touch Tone"
IV. Electronic Toll Fraud
The ETF's are electrical devices used to get free long-distance calls.
The devices are more commonly known as colored boxes, and using them is known
as "boxing." Boxing is one of the oldest way to phreak, and therefore, it is
also the most dangerous, since the telephone companies are very much aware of
their existence. Colored boxes are not used only for phreaking. There are
many types which have other uses (such as the Tron Box, which lowers your
electric bill), so only those used in telephone fraud will be discussed.
How Boxes Work
In the beginning, all long distance calls were connected manually by
operators who passed on the called number verbally to other operators in
series. This is because pulse (rotary) digits are created by causing breaks
in the DC current. Since long distance calls call for routing through
various switching equipment and AC voice amplifiers, pulse dialing cannot be
used to send the destination number to the end local office (CO).
Eventually, the demand for faster and more efficient long distance
service caused Bell to make a multi-billion dollar decision. They had to
create a signaling system that could be used on the LD Network. They had two
options:
[1] To send all the signaling and supervisory information (eg., ON and OFF
HOOK) over separate data links. This type of signaling is referred to as
out-of-band signaling.
[2] To send all the signaling information along with the conversation using
tones to represent digits. This type of signaling is called in-band
signaling.
The second seemed to be the most economical choice, and so, it was
incorporated in ESS.
Then, in the 1960's, when the first ESS systems were employed, a toy
whistle was put in each box of Captain Crunch Cereal as a premium. A young
radio technician in the United States Air Force became fascinated with the
whistle when he discovered that by blowing it into the telephone after
dialing any long distance number, the trunk line would remain open without
toll charges accounting. From then on, any number could be dialed for free.
The truth was that the whistle produced a perfect-pitch 2600 Hz tone, the one
used to signify a disconnect in ESS switching equipment. To overcome the
initial charge for the for the long distance call, he later used toll-free
800 numbers.
Being a skilled technician, Captain Crunch (he began to use the name as
an alias) soon went beyond the simple whistle and experimented with other
frequencies, creating many of the boxes discussed in the following
paragraphs.
The Blue Box
The "Blue Box" was so named because of the color of the first one
discovered by the authorities. The design and hardware used in the Blue Box
is very sophisticated, and its size varies from a large piece of apparatus to
a miniaturized unit that is approximately the size of a "king size" package
of cigarettes.
The Blue Box contains 12 or 13 buttons or switches that emit the
multi-frequency tones used in the normal operation of the telephone toll
(long distance) switching network. In effect, the the Blue Box can let a
person become the operator of a phone line. The Blue Box enables its user to
originate fraudulent toll calls by circumventing (fooling) toll billing
equipment. The Blue Box may be directly connected to a phone line, or it may
be acoustically coupled to a telephone handset by placing the Blue Box's
speaker next to the transmitter, or the telephone handset.
Operation of a Blue Box
To understand the steps of a fraudulent Blue Box call, it is necessary
to understand the basic operation of the Direct Distance Dialing (DDD)
telephone network. When a DDD call is originated, the calling number is
identified as an integral part of establishing the connection. This may be
done either automatically by ANI in ESS, or in some cases, by an operator
asking the calling party for his telephone number. This information is
entered on a tape in the Centralized Automatic Message Accounting (CAMA)
office. This tape also contains the number assigned to the trunk line over
which the call is to be made. The information relating to the call contained
on the tape includes the called number's identification, time of origination
of the call, and if the called number answered the call. The time of
disconnect is also recorded. The various data entries with of the call are
correlated to provide billing information for use by the caller's telephone
company's accounting department.
The typical Blue Box user usually dials a number that will route the
call into the telephone network without charge. For example, the user will
very often call a well-known INWATS (toll-free) number. The Blue Box user,
after gaining this access to the network when somebody picks up and in
effect, "seizing" control of the line, operates a key on the Blue Box which
emits a 2600 Hertz (cycles per second, abbreviated as Hz) tone. This tone
causes the switching equipment to release the connection to the INWATS
customer's line. The 2600 Hz tone is the signal to the switching system that
the calling party has hung up. In fact though, the local trunk on the calling
party's end is still connected to the toll network. The Blue Box user now
operates the "KP" (Key Pulse) key on the Blue Box to notify the toll
switching equipment that switching signals are about to be emitted. The user
then pushes the "number" buttons on the Blue Box corresponding to the
telephone number being called. After doing so, he/she operates the "ST"
(Start) key to tell the switching equipment that signaling is complete. If
the call is completed, only the portion of the original call prior to the
operation of the 2600 Hz tone is recorded on the CAMA tape. The tones emitted
by the Blue Box are not recorded on the CAMA tape. Therefore, because the
original call to the INWATS number is toll-free, no billing is rendered in
connection with the call.
The above are the steps in a normal operation of a Blue Box, but they
may vary in any one of the following ways:
A. The Blue Box may include a rotary dial to apply the 2600Hz tone and the
switching signals. This type of Blue Box is called a "dial pulser" or "rotary
SF" Blue box.
B. A magnetic tape recording may be used to record the Blue Box tones. Such a
tape recording could be used in lieu of a Blue Box to fraudulently place
calls to the phone numbers recorded on the magnetic tape.
All Blue Boxes, except "dial pulse" or "Rotary SF" Blue Boxes,
must have the following four common operating capabilities:
A. It be able to emit the 2600 Hz tone. This tone is used by the toll network
to indicate, either by its presence or its absence, an "on hook" (idle) or
"off hook" (busy) condition of a trunk line.
B. The Blue Box must have a "KP" tones that unlocks or readies
the multi-frequency receiver at the called end to receive the
tones corresponding to the called phone number.
C. The Blue Box must be able to emit DTMF, tones used to transmit phone
numbers over the toll network. Each digit of a phone number is represented by
a combination of two tones. For example, the 2 is 700 Hz and 900 Hz.
D. The Blue Box must have an "ST" key which consists of a combination of two
tones that tell the equipment at the called end that all digits have been
sent and that the equipment should start connecting the call to the called
number.
The following is a chart of the multi-frequency (MF) tones produced by
the normal Blue Box.
700 : 1 : 2 : 4 : 7 : 11 : 2600 X
900 : + : 3 : 5 : 8 : 12 :
1100 : + : + : 6 : 9 : KP :
1300 : + : + : + : 10 : KP2 :
1500 : + : + : + : + : ST :
: 700 : 900 :1100 :1300 :1500 :
The "Dial Pulser" or "Rotary SF" Blue Box requires only a dial
with a signalling capability to produce a 2600 Hz tone.
Pink Noise
Since telephone companies have such advanced equipment to detect Blue
Boxes, to help avoid detection "pink noise" is sometimes added to the 2600 Hz
tone.
Since 2600 Hz tones can be simulated in speech, the detection equipment
of the switching system must be attentive not to misinterpret speech as a
disconnect signal. Thus, a virtually
pure 2600 Hz tone is required for disconnect. This is also the reason why the
2600 Hz tone must be sent rapidly; sometimes, it will not work when the
person called is speaking. It is feasible, though, to send some "pink noise"
along with the 2600 Hz. Most of this energy should be above 3000 Hz. The
pink noise will not reach the toll network, where we want our pure 2600 Hz to
hit, but it will go through the local CO and thus, the fraud detectors.
The Black Box
The Black Box is the easiest type to build. The box stops a call from
being charged to some one only if it is hooked to the line of the person
being called.
In the normal telephone cable, there are four wires: a red, a green, a
black, and a yellow. The red & green wires are often referred to as tip (T)
and ring (R).
When a telephone is on-hook (hung up) there is approximately 48 volts of
DC current (VDC) flowing through the tip and ring. When the handset of a
phone is lifted, switches close, causing a loop to be connected (which is
known as the "local loop,") between the telephone and the CO. Once this
happens DC current is able to flow through the telephone with less
resistance. This causes a relay to energize and signal to other CO equipment
that service is being requested. Eventually, a dial tone is emitted. This
also causes the 48 VDC to drop down into the vicinity of 13 volts. The
resistance of the loop also drops below the 2500 ohm level. Considering that
this voltage and resistance drop is how the CO detects that a telephone was
taken off hook, how a Black Box works is by allowing the voltage to drop
enough to allow talking, but not enough to signal to the CO equipment to
start billing. To do this, a 10,000 Ohm, .5 Watt resistor is incorporated in
the local loop on the called party's line.
The Red Box
A Red Box is a device that simulates the sound of a coin being accepted
by a payphone. When a coin is put in the slot of a payphone, the first
obstacle is the magnetic trap. This will stop any light-weight magnetic
slugs. If it passes this, the coin is then classed as a nickel, dime, or
quarter. Each coin is then checked for appropriate size and weight. If these
tests are passed, it will then travel through a nickel, dime, or quarter
magnet as proper. These magnets start an eddy current effect which causes
coins of the appropriate characteristics to slow down so they will follow the
correct trajectory.
If all goes well, the coin will follow the correct path, striking the
appropriate totalizer arm, causing a ratchet wheel to rotate once for every
5-cent increment (eg, a quarter will cause it to rotate 5 times). The
totalizer then causes the coin signal oscillator to readout a dual-frequency
signal indicating the value deposited to the Automated Coin Toll Service
computer (ACTS) or the Traffic Service Position System (TSPS) operator. These
are the tones emitted by the Red Box.
For a quarter, five beep tones are outpulsed for 66 milliseconds (ms). A
dime causes two beep tones for 33 ms, while a nickel causes one beep tone at
also 33 ms. A beep consists of two frequencies, 2200 Hz and 1700 Hz. As with
a Blue Box, Red Box tones can be recorded on a magnetic tape.
Since any call from a payphone is originated with a "ground test," in
which the TSPS operator or the ACTS computer checks for the presence of the
first coin inserted into the phone, by verifying use of the magnetic, weight,
and size traps, when using a Red Box, it is necessary to put in at least one
coin.
The Cheese Box
A Cheese Box lets a normal telephone emulate a payphone. By emulating a
payphone, using a blue box now becomes safe, because if the CO equipment
recognizes the call as one from a payphone, it does not record it on a CAMA
tape. Since a normal telephone does not have a slot to enter coins, a Red Box
is needed to generate the sound of a coin dropping.
V. Divertors
A divertor is a special service that allows businesses to "divert" calls
if no one answers after a certain number of rings. For example, a person
calls a company, and nobody answers. After about three rings, a few clicks
are heard, then a few fainter rings are heard. The building receiving the
call has changed from the company to another building, usually somebody's
house. What has happened is that the call has been re-routed from building A
to building B. In effect, the number called is not really changed, but
instead, building A has answered the call, called building B, and connected
the two lines together. If the person in building B disconnects, the caller
is still connected to building A. With the way the divertor equipment works
in the telephone company, the phone line of building A will then emit a dial
tone and the caller has total control of the line, and can originate another
call, charging it to building A.
VI. Private Branch Exchanges
A Private Branch Exchange (PBX) is a system of out-WATS (Wide Area
Telephone Service) lines and in-WATS lines. An out-WATS line allows a
business to make as long-distance calls each month for a flat rate. An
in-WATS line is a toll-free number (800 number) that is also leased to
businesses for flat rates. PBX's save corporations much money when their
salesmen, distributors, and franchisees must make many calls from different
parts of the country. It works much like specialized common carriers (to be
discussed later).
First, the employee calls the company on the in-WATS line. The switching
equipment picks up the phone, and send a tone to the employee indicating for
him to enter the access code of the PBX. If the access code is correct, then
the line is connected to the out-WATS line, and the employee can make a call.
To use PBX's, phreakers must find the access code of the PBX. This can
be done very easily, since the code is usually only a few digits. One way is
to dial different combinations manually on the telephone keypad. The other
way is of the phreaker is the owner of a modem. A simple program can be
easily written to continuously dial digit combinations randomly or
sequentially.
VII. Specialized Common Carriers
Ever since the break up of AT&T's monopoly on long-distance service,
there have been many other corporations that compete with AT&T in the
long-distance market, including Sprint, MCI, All-net, ITT, and Metrophone.
These all boast opportunities for large savings on long-distance calls. These
companies are called specialized common carriers (SCC's).
SCC's cost less because they do not use the AT&T's cable-based systems,
but instead use microwave links. Some have also added fiber-optic lines to
their networks.
Another way they can save consumers money is by using AT&T's lines.
Instead of connecting calls by the shortest route, the carrier will use a
different route, so the call goes through places where the long-distance
traffic is heavy, and the rate is lower. The companies that do this are known
as "resellers."
Most SCC's work nearly the same as PBX's. The 800 number is called, a
tone is heard, the private identification number (PIN) is entered, and then
the call can be made. The length of the PIN number can range from four digit
to fourteen digits.
Besides 800 toll free numbers, in some areas, a 950 can be used. A 950
works exactly the same as an 800 number, the only difference is that the
consumer must enter only seven digits before dialing his PIN number instead
of ten with a toll-free number. 950's are free of charge and can be used both
at home and at pay phones.
The PIN numbers can be found the same way as PBX access codes. Since the
number of digits in a PIN is so great, using a computer is much more common
practice than manual dialing.
The following pages are lists of SCC's and their dialups, formats, and
special points. Note that some have many different dialups.
=============================================================================
[ SCC Extenders List ]
[ 0-9 - Number of digits in code ]
[ [ ] - Dial that exact number ]
[ # - Area code + Prefix + Suffix ]
[ : - Dial tone ]
[ + - ontinue dialing ]
=============================================================================
| Extender | Dialing Format | Company | Comments |
-----------------------------------------------------------------------------
| 800-223-0548 | 8+[1]+# | TDX | |
| 800-241-1129 | 8+[1]+# | TDX | |
| 800-248-6248 | 6+[1]+# | SumNet Systems | (800)824-3000 |
| 800-288-8845 | 7:[1]+# | TMC Watts | (800)999-3339 |
| 800-325-0192 | [1]+#+6 | MCI | 950-1986 |
| 800-325-1337 | 7:[1]+# | TMC Watts | |
| 800-325-7222 | 6+[1]+# | Max | (800)982-4422 |
| 800-325-7970 | 6+[1]+# | Max | (800)982-4422 |
| 800-327-4532 | 8+# | All-TelCo | |
| 800-327-9488 | #:13 | ITT | 950-0488 |
| 800-334-0193 | [9]+# | Piedmont | |
| 800-345-0008 | [0]+#:14 | US Sprint FON Cards |950-1033 also 9+#|
| 800-368-4222 | 8+# | Congress Watts Lines | |
| 800-437-7010 | 13 | GCI | |
| 800-448-8989 | 14+[1]+# | Call US | |
| 800-521-8400 | 8:# | TravelNet | 950-1088 (voice)|
| 800-541-2255 | 10 | MicroTel | |
| 800-547-1784 | 13 | AmericaNet | |
| 800-621-5640 | 6+[1]+# | ExpressTel | |
| 800-637-4663 | 5+[1]+# | TeleSave | |
| 800-821-6511 | 5+[1]+# | American Pioneer | (800)852-4154 |
| 800-821-6629 | 6+[1]+# | Max | (800)982-4422 |
| 800-821-7961 | 6+[1]+# | Max | (800)982-4422 |
| 800-826-7397 | 6:[1]+# | Call U.S. | |
| 800-858-4009 | 6+[1]+# | NTS | Voice |
| 800-862-2345 | 7:[1]+# | TMC | |
| 800-877-8000 | [0]+#:14 | US Sprint Calling Card|950-1033 also 9+#|
| 800-882-2255 | 6:[1]+# | AmeriCall | False Carrier |
| 800-950-1022 | [0]+#:14 | MCI Calling Card | |
| 800-992-1444 | 9+# | AllNet | 950-1444 |
=============================================================================
VIII. PC Pursuit
Many modem users know Telenet as a packet-switching network through
which they can connect to different telecommunication services throughout the
country for an hourly rate of $2. With PC Pursuit, Telenet uses the same
method as SCC's, but instead of using microwave links, the call is routed
through computers. Since it is routed through computers, the service can be
used by only owners of modems. Instead of paying the hourly rate, the
consumer needs only to pay a flat monthly rate of $25.
Using PC Pursuit is a little more difficult than using SCC's, because
now instead of combinations of only ten different characters (0-9), the whole
alphabet can be used in the access code. The following is a chart showing the
steps to originate a typical PC Pursuit call.
How to Originate a PC Pursuit Call
First, the users dials the local Telenet Access Center, which can be
found by dialing Telenet customer service at 1-800-336-0437.
Then:
Note: (cr) signifies the carriage return on a computer keyboard.
Network Shows | User Types | Explanation
__________________|____________________________|_____________________________
| (cr) (cr) |
__________________|____________________________|_____________________________
TELENET | | Telenet network called and
XXX XXX | | your network address.
__________________|____________________________|_____________________________
TERMINAL= | "D1" (cr) | Enter "D1" or press (cr)
__________________|____________________________|_____________________________
@ | For 300 bps: | CONNECT command. To access
| "C(sp)DIALXXX/3,XXXX(cr)" | a PC Pursuit city type a PC
| | Pursuit access code and
| For 1200 bps: | your user ID.
| "C(sp)DIALXXX/12,XXXX(cr)" |
__________________|____________________________|_____________________________
PASSWORD= | "XXXXXX" (cr) | Type the password
__________________|____________________________|_____________________________
DIALXXX/X | "ATZ" (cr) | You are now connected to the
CONNECTED | | PCP city. Type ATZ (upper).
__________________|____________________________|____________________________
OK | "ATDTXXXXXXX" (cr) | Dials a number in PCP city
__________________|____________________________|____________________________
CONNECT | | Your are now connected to
| | your destination computer.
__________________|____________________________|____________________________
If the number dialed is busy, the user will see BUSY. To call another
number in the same city, the user types "ATZ." The network will answer OK.
The user then types "ATDTXXXXXXX" (cr) to dial the next number.
To connect to a different PC Pursuit City, when the user sees BUSY, he
types "@" (cr). When a @ appears, "D" (cr) is entered. This disconnects the
user from the previous city. The user then follows the above procedures to
dial another city.
IX. Cellular Phone Fraud
Cellular phones have evolved considerably from previous systems.
Signaling between mobile and base stations uses high-speed digital techniques
and involves many different types of digital messages. The cellular phone
contains its own Mobile Identification Number (MIN), which is programmed by
the seller or service shop and can be changed when, for example, the phone is
sold to a new user. In addition, the U.S. cellular standard incorporates a
second number, the Electronic Serial Number (ESN), which is intended to
uniquely and permanently identify the mobile unit.
According to the Electronic Industries Association (EIA) Interim
Standard IS-3-B, Cellular System Mobile Station Land Station Compatibility
Specification, the serial number is a 32-bit binary number that uniquely
identifies a mobile station to any cellular system. It must be factory-set
and not readily alterable in the field. The circuitry that provides the
serial number must be isolated from fraudulent contact and tampering.
Attempts to change the serial number circuitry should render the mobile
station inoperative.
The ESN was intended to solve two problems the industry observed with
its older systems. First, the number of subscribers that older systems could
support fell far short of the demand in some areas, leading groups of users
to share a single mobile number (fraudulently) by setting several phones to
send the same identification. Carriers lost individual user accountability
and their means of predicting and controlling traffic on their systems.
Second, systems had no way of automatically detecting use of stolen
equipment because thieves could easily change the transmitted identification.
In theory, the required properties of the ESN allow cellular systems to
check to ensure that only the correctly registered unit uses a particular
MIN, and the ESNs of stolen units can be permanently denied service
("hot-listed"). This measure is an improvement over the older systems, but
vulnerabilities remain.
ESN Tampering
Although the concept of the unalterable ESN is laudable in theory,
weaknesses are apparent in practice. Many cellular phones are not
constructed so that attempts to change the serial number circuitry renders
the mobile station inoperative. Contrary to this statement, swapping of one
ESN chip for another in a unit that has been found to functione flawlessly
after the switch was made.
Obtaining ESN's
Since most manufacturers are using industry standard Read-Only Memory
(ROM) chips for their ESNs, the chips are easily bought and programmed or
copied. In programming the ESN with a valid code is another matter.
Remembering that to obtain service from a system, a cellular unit must
transmit a valid MIN (telephone number) and (usually) the corresponding
serial number stored in the cellular switch's database. With the right
equipment, the ESN/MIN pair can be read right off the air because the mobile
transmits it each time it originates a call. Service shops can capture this
information using test gear that automatically receives and decodes the
reverse, or mobile-to-base, channels.
Another way to obtain the numbers is from service shops. Service shops
keep ESN/MIN records on file for units they have sold or serviced, and the
carriers also have these data on all of their subscribers. Unscrupulous
employees could compromise the security of their customers' telephones by
obtaining these records.
In many ways, trade in illegally obtained ESN/MIN pairs could, in the
future, resemble what currently transpires in the long distance telephone
business with AT&T credit card numbers and alternate long-distance carrier
(such as MCI, Sprint and Alltel) account codes. Code numbers are swapped
among friends, published on computer bulletin boards and trafficked by career
criminal enterprises.
X. CN/A's
CN/A's, which stands for Customer Names and Addresses, are bureaus that
exist so that authorized Bell employees can find out the name and address of
any customer in the Bell System. All phone numbers are maintained on file
including unlisted numbers.
To find the owner of any number, the person first must call the local
CN/A during business hours. Then he must pretend to be from a registered
business, and ask for the owner of the number. In some states, though, the
operator will ask for an ID number. In these cases, one must be guessed at.
There is also a type of reverse CN/A bureau, which is usually called a
NON PUB DA or TOLL LIB. With these numbers, somebody can find unpublished
numbers if the caller gives the operator the name and locality. These are
considerably harder to use, since the operator will then request the caller's
name, supervisors name, etc.
The following is a list of current CN/A's.
_____________________________________________________________________________
1988 CN/A List (subject to change)
_____________________________________________________________________________
Area: CN/A Area: CN/A Area: CN/A
201: Classified 202: 304-343-7016 203: 203-789-6815
204: 204-949-0900 206: 206-345-4082 207: 617-787-5300
208: 303-293-8777 209: 415-781-5271 212: 518-471-8111
213: 415-781-5271 214: 214-464-7400 215: 412-633-5600
216: 614-464-0519 217: 217-789-8290 218: 402-221-7199
219: 317-265-4834 301: 304-343-1401 302: 412-633-5600
303: 303-293-8777 304: 304-344-8041 305: 912-752-2000
307: 303-293-8777 308: 402-221-7199 312: 312-796-9600
313: 313-424-0900 314: 816-275-8460 316: 913-276-6708
317: 317-265-4834 318: 504-245-5330 319: 402-221-7199
401: 617-787-5300 402: 402-221-7199 404: 912-752-2000
405: 405-236-6121 406: 303-293-8777 412: 412-633-5600
413: 617-787-5300 414: 608-252-6932 415: 415-781-5271
416: 416-443-0542 417: 816-275-8460 418: 614-464-0123
419: 614-464-0519 501: 405-236-6121 502: 502-583-2861
503: 206-345-4082 504: 504-245-5330 505: 303-293-8777
509: 206-345-4082 512: 512-828-2501 513: 614-464-0519
514: 514-394-7440 515: 402-221-7199 517: 313-424-0900
518: 518-471-8111 519: 416-443-0542 601: 601-961-8139
602: 303-293-8777 603: 617-787-5300 605: 402-221-7199
606: 502-583-2861 607: 518-471-8111 608: 608-252-6932
609: Classified 612: 402-221-7199 613: 416-443-0542
614: 614-464-0519 615: 615-373-5791 616: 313-424-0900
617: 617-787-5300 619: 415-781-5271 701: 402-221-7199
702: 415-543-2861 703: 304-344-7935 704: 912-752-2000
705: 416-443-0542 707: 415-781-5271 712: 402-221-7199
713: 713-961-2397 715: 608-252-6932 716: 518-471-8111
717: 412-633-5600 718: 518-471-8111 801: 303-293-8777
802: 617-787-5300 804: 304-344-7935 805: 415-781-5271
806: 512-828-2501 809: 404-751-8871 812: 317-265-4834
813: 813-228-7871 814: 412-633-5600 815: 217-789-8290
816: 816-275-8460 817: 214-464-7400 901: 615-373-5791
904: 912-752-2000 906: 313-424-0900 912: 912-752-2000
914: 518-471-8111 916: 415-781-5271
918: 405-236-6121 912: 912-752-2000
_____________________________________________________________________________
XI. Loops
The loop is an alternative communication medium that has many
potential uses. Loops are phone lines that are connected when they are called
simultaneously. One use is when somebody wants another person to call them
back but is reluctant to give out their home phone number (eg., if they were
on a party line).
Loops are found in pairs that are usually close to each other (eg.,
718-492-9996 and 718-492-9997). On a loop, one line is the high end, and the
other is the low end. The high end is always silent. The tone disappears on
the low end when somebody calls the high end.
It is truly only safe to use a loop during non-business hours. During
business, loops are used to test equipment by various telephone companies and
local CO's.
XII. Alliance Teleconferencing
Alliance Teleconferencing is an independent company which allows the
general public to access and use its conferencing equipment.
Billing an Alliance Conference
Alliance Teleconferencing is accessed by dialing 0-700-456-1000 in most
states. In some states, the first and last digits of the suffix vary. There
are four main ways to use Alliance illegally. The first is through a PBX.
Some allow use of the 700 exchange, but many do not.
The second way is with a Blue Box. After seizing the line,
KP-0-700-456-1000-ST is dialed. The equipment now thinks that Alliance has
been dialed from a switchboard and bills the conference to it.
The third way is to a loop. After being connected to Alliance, the
caller contacts the operator by pressing 0. The caller then can ask for the
conference to billed to another number, giving the operator the number of the
high-end of a loop. The operator will then call the loop. A friend of the
phreaker must be prepared to answer the call by calling the low-end. When the
friend answers and accepts the billing, the conference will be billed to the
loop.
The fourth way is from a divertor. Since the divertor is a normal,
home-type line, the phreaker should not have any problems starting a
conference.
Starting a Conference
When Alliance answers, a two-tone combination is emitted. The caller
then types a two digit combination to tell the equipment how many people will
be in the conference, including the originator. Then either # is pressed to
continue or * is pressed to cancel the conference. To dial a each conferee,
the phreaker simply answers each prompt with the phone number of the
corresponding person.
To join the conference, the originator enters #, and to return to
control mode, he enters # again. To transfer control of the conference,
#+6+1+ the phone number of the person you wish to transfer the control to. To
end the conference, the phreaker presses the * button.
XIII. Telephone System Security Measures
To stop telephone fraud, there are many measures which telephone
companies can apply to identify and convict the phone phreaker.
ESS Detection Devices
Telephone companies have had twenty years to work on detection devices;
therefore, they are well refined. Basically, the detection devices will look
for the presence of 2600 Hz where it does not belong, which is in the local
CO. It then records the calling number and all activity after the 2600 Hz.
Automatic Number Identification and the Centralized Automatic Message
Accounting Tapes
Automatic Number Identification (ANI) is an implement in ESS that can
instantly identify the calling party. For every call that is made,
information including the numbers of the calling and receiving parties, the
time of origination of the call, if the called party answered the call, and
the time when the caller has hung-up is recorded on a tape in the Centralized
Automatic Message Accounting (CAMA) office. This includes wrong numbers,
toll-free numbers, and local calls. This tape is then processed for billing
purposes.
Normally, all free calls are ignored, but the billing equipment has been
programmed to recognize many different types of unusual activity. One checks
if a certain 800 number is called excessively. If the number is an SCC, the
equipment can instantly check if the caller is a subscriber of the SCC. If it
is not, it will alert the company of the illegal activity. Another is if
there is a call where the calling party has stayed off-hook for a large
amount of time, but the called party never answers. The equipment recognizes
this as possible use of a Black Box.
Dialed Number Recorders
Placing a Dialed Number Recorders (DNR) on a telephone line is standard
procedure when telephone fraud is suspected. The most common DNR's can do the
following: print all touch tone digits sent (in suspected illegal use of an
SCC), print out all MF and record the presence of 2600hz on the line (in
suspected use of a Blue Box), and activate a tape recorder for a specific
amount of time.
Trap Codes
Trap codes are decoy PIN numbers. If a telephone company find that a
certain PIN number is being used illegally, it will call the real owner and
notify him of the change in his account number. The company will then contact
the FBI to bring their telephone "lock in" trace equipment.
A lock in trace is a device used by the FBI to lock into the phone
user's location. Since all phone connections are held open by a certain
voltage of electricity,
the lock in trace works by patching into the line and generate the same
voltage into the lines. If the caller tries to hang up, voltage is retained.
The phone will continue to ring as if someone was calling even after the call
is disconnected. The trunk then remains open and the call can be traced. The
FBI sets its equipment so that the next time the PIN number is illegally
used, the call goes through, but while
the communication is proceeding, the
FBI traces the call.
Stopping an FBI Trace.
Stopping a trace is quite simple. If the voltage in the line could be
lowered, the trace could not function, since lowering the voltage would also
probably short out the FBI voltage generator. Therefore, any appliance which
uses many volt can be connected to the red and green wires in a wall jack,
and the trace should be removed.
Common Channel Inter-office Signaling
Besides detection devices, Bell has begun to gradually redesign the
network using out-of-band signaling. This is known as Common Channel
Inter-office Signaling (CCIS). Since this signaling method sends all the
signaling information over separate data lines, and does not use any form of
DTMF, all colored boxes do not work under it. Of course, until this
multi-million dollar project is totally complete, boxing will still be
possible. It will become progressively harder to find places to "box" off of,
though.
XIV. Laws Governing the Rights of Phreakers
Since phreaking is one-hundred percent illegal, once discovered, there
are not many laws protecting the phreaker. There are, however some laws
governing steps government agents may take to convict him.
The first law is the Section 605 of Title 47 of the United States Code.
This section forbids interception of communications, except by persons
outlined in Chapter 119, Title 18, which is a portion of the Omnibus Crime
Control and Safe Streets Act of 1968.
In this chapter, Section 2511 (2) (a) (i) says "It shall not be unlawful
under this chapter for an operator of a switchboard, or an officer, employee,
or agent of any communications carrier, whose facilities are used in the
transmission of a wire communication, to intercept, disclose, or use that
communication in the normal course of his employment, while engaged in any
activity which is a necessary incident to the rendition of his service of the
protection of the rights or property of the carrier of such communication."
This means that agents of telephone companies are allowed not only allowed to
tap lines without a warrant, but also allowed to disclose the recording of a
communication.
In the case United States vs. Sugden, the following ruling was made:
"For an unreasonable search and seizure to result from the interception of
the defendant's communication, he must have exhibited a reasonable
expectation of privacy. Where, as here, one uses a communication facility
illegally, no such expectation is required." This simply means that when you
make an illegal call, you have waved your right to privacy.
[SuperTac/42]:View Files...
[ Select File, or ? ]: 14
..The Liberator- 914/353-4256..
The only limit on tapping lines is that it must not be excessive. For
example, in the case Bubis vs. United States, the telephone company monitored
all of the defendant's phone calls for a period of four months. The court
acknowledged the phone company's right of the "protection of the rights and
property of the carrier of such communication," but ordered the evidence
suppressed because the extent of the monitoring was excessive.
Lastly, the limit of the monitoring was set. In the case United States
vs. Bubis, the court ruled, "Thus, it would appear that the tape recordings
of the defendant's conversation had been limited by the phone company to
establish that the calls were in
violation of the subscription agreement (were illegal), and to the
identification of the person using the phone, and for those purposes only,
then the tapes would have been admissible against the defendant." This means
that the telephone company cannot monitor more than the first five minutes of
the communication.
XV. Conclusion
With the advent of many new security features, in the near future, we
may see the end of phreaking. Incorporating CCIS has already begun to
eliminate the use of boxes. The use of longer codes may one day bring illegal
use of SCC's and PBX's to a minimum. Improvement in divertor and loop
equipment will ultimately bring an end to their abuse. Even though telephone
fraud could very well become a memory, in every teenage telecommunicator's
mind, there will always be a Captain Crunch, thinking of a way to "beat" the
system. Such legends as the Captain and Joe the Whistler (the blind phreaker
with perfect pitch), will be remembered forever.
[SuperTac/42]:

View File

@@ -0,0 +1,33 @@
Msg. :343
About :WHEN I WAS YOUNG...
From :ROGER OLSON
To :ALL CALLS
Date :3/19/83
When I was young, and in my prime, I used to phreak all the time For the
beneifit of <<some>> users on this BBS, the phone company did not go into
business yesterday! Some of us were phreaking i n the days of manual service.
Chicago, Illinois had manual service through the early fifties in a few
exchanges. As a twelve year old kid, my buddies and I <<loved>> to use the
payphone at the corner drugstore to phart around. The payphones were easy to
fool. "Area codes" and "direct dialing" of long distance calls did not start
anywhere until 1962...did <you> know that? You called the operator for long
distance and she would say put x amount of coins in the box. We would put in
the first couple of quarters, and out would come the coat hanger which went up
the return slot (no traps on the doors then, like now) and the coat hanger
would trip the little metal catch box inside and return the quarters.."...just
a minute operator! I am looking for more change!!...." and the same quarters
would be used over and over until the two or three dollars desired had been
"deposited". Then, be quick and get the quarters out again before the operator
had a chance to collect them. The operator would grow impatient waiting for
you to get all the money "deposited", but as I got experienced with that bent
peice of wire I could get two bucks in the phone and out of the phone in record
time. The switchboards used for operating the coin phones had two special keys
- one to press for collecting the coins and one to press for returning the
coins. Sometimes the operator would also screw up and hit the return key by
accident after you were finished speaking on the call. Other times she would
screw up and collect on an incomplete call. They were so <trusting> in those
days all you had to do was use a phone and say, "operator I have a credit
coming". They belived you!
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


Binary file not shown.

View File

@@ -0,0 +1,211 @@
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ŀ
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD>ܳ
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD>۳
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD>۳
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>۳
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>۳
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20>
<20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>
<20> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>Ĵ
<20> <20><><EFBFBD> <20>
<20> <20><><EFBFBD><EFBFBD><EFBFBD> <20>
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20>
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>۳
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>۳
<20><><EFBFBD><EFBFBD><EFBFBD> <20> <20><><EFBFBD><EFBFBD> <20><><EFBFBD> <20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>۳
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD>۳
<20><><EFBFBD><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD><EFBFBD> <20><><EFBFBD>߳
<20><><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>
*Phreakers Of The World*
*Men In Anarchy*
* Never Pay 29 Cents Again *
*Written by .\\<5C>s<EFBFBD><73>r*
*October 10,1993*
----------
Disclaimer
----------
By reading this file you agree to take full responsibility for your
actions and that no blame shall be placed on either Phreakers Of The World/
Men In Anarchy, or .\\aster for your actions. PoW/MiA denounces fraud, and
all other forms of criminal activity. This file is intended for Information and entertainment
purposes only.
------------
Introduction
------------
If you've ever paid 29 Cents to mail a letter, you've been wasting your
money. In a recession year such as this one, especially, it's important not
to let your hard earned dollars (and cents) go to another beauracracy.
Twenty Nine Cents is not an aweful lot to save, but if you send ten
letters a week, you could save up to $150. If you send only 8 (The national
average) You could save $120, and so on. This file will describe the four
methods I know of for avoiding or greatly reducing postage fees. Be counted
and count your savings!
۲- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<2D><>
All us Americans know that sometimes blind people can be discriminated
against. The government understands this too, and since mailing packages can
be expensive, the government has decided to allow blind people to send their
mail for free. "How Generous of Them!" You think. Wrong! They're paying
for it with your tax money! You pay your taxes, why shouldn't you be able
to send your packages free too? Well, now you can. Here's how to do it.
Address your envelope like you normally would, but in the corner where
you would normally put the stamp, write in neat print "FREE MATTER FOR THE
BLIND." Now drop your package in one of those blue mailboxes you'll find
on any street corner. It really works.
The government isn't being that nice, though. Packages stamped "FREE
MATTER FOR THE BLIND" are sent at library rate, which is below Third Class!
To send a letter locally will take anywhere from two to five days, national-
ly will take considerably longer.
This is what your letter should look like:
_____________________________________________________________________________
| The BeLL'S iNC BBS FREE MATTER FOR |
| PoW/Mia WoRLD HQ THE BLIND |
| [4o7.Need.ReFS], Il. |
| |
| |
| .\\<5C>gg<67><67> PoW/Mia FouNDeR |
| PoW/Mia FouNDeRSHiP |
| [7o8.PRi.VATe], Il. |
| |
| |
| |
_____________________________________________________________________________
۲- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<2D><>
This method is kind of obvious, but in my experience, it has worked.
However, it won't work if you're trying to send letters nationally, it'll
only work if the two addresses share the same post office. Write your
letter, and put it in the envelope. Now, instead of writing your name in
the return address spot, write your name in the addressee spot, on the
center of the page. Write the addressee's name in the return address spot.
Now drop it in the mailbox without any postage. Guess what's going
to happen. The letter will be returned to the sender who, in this case,
seems to be the addressee.
Here's what your letter should look like:
_____________________________________________________________________________
| .\\<5C>gg<67><67> PoW/Mia FouNDeR [Addressee] [No Stamps Here]|
| PoW/Mia FouNDeRSHiP |
| [708.PRi.VaTe], Il. |
| |
| |
| <20><>ll's I<><49>. <20><>S [Sender] |
| PoW/Mia WoRLD HQ |
| [4o7.NeeD.ReFs], Il. |
| |
| |
| |
_____________________________________________________________________________
۲- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<2D><>
Both of the above methods are slow, but if you'd like to send your mail
at normal first class rates, here's a way to do it. This way doesn't save
you money, though, unless the recipient agrees to give.
Before sending your letter, coat the front side of the stamps with glue
(Elmer's works fine.) It's best to use a stiff bristled brush dipped in the
glue to coat the stamps with. It will take about twenty minutes to dry.
Once the stamps have dried, stick them on your letter and mail it. The glue
has created a coating that can not be seen by the eye, but will protect the
stamps from being destroyed by the cancellation mark. When the letter
arrives at it's destination, the recipient can remove the coating with water,
take the stamps off the envelope, and reuse the stamps.
This is a diagram of what your letter should look like. It'd look just like
a normal letter, you can see.. But the 29 Cent stamp must be coated with
glue.
_____________________________________________________________________________
| <20><>ll's I<><49>. <20><>S | 29 |
| PoW/Mia WoRLD HQ | Cent |
| [4o7.NeeD.ReFs], Il. | Stamp|
| |______|
| |
| .\\<5C>gg<67><67> PoW/Mia FouNDer |
| PoW/Mia FouNDeRSHiP |
| [7o8.PRi.VATe], Il. |
| |
| |
| |
_____________________________________________________________________________
۲- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<2D><>
The US Postal Service, as you may or may not be aware, is a private
corporation. Congress has the power to set postal rates, not the Post
Office. This is stated in Section 8 of the US Constitution. Last time
congress set postal rates, they set them at two cents. So two cents
is all you legally have to pay for mailing your letters. Try it out,
this really works!
Get some a set of those stamp letters with the alphabet on them, or
get the rubber stamps specially made up by your local printer. Use Red
ink to stamp "FIRST CLASS MAIL" and "NON-DOMESTIC" on the top or left
hand side of your envelope, and black or blue ink to stamp:
"TWO CENT POSTAGE
12 STATUTES AT LARGE
CHAPTER 71, SECTION 23
LOCAL/DROP LETTER
81 U.S. STATUTE 613"
One of the keys to making this work is that it seem official looking. It
works for me, but if you drop twenty letters in the same mailbox all like
this, it's less likely to work.
Your envelope should look like this:
_____________________________________________________________________________
| <20><>ll's I<><49>. <20><>S |2 Cent|
| PoW/Mia WoRLD HQ |Stamp |
| [4o8.NeeD.ReFs], Il. |______|
| Two Cent Postage|
| 12 Statutes at Large|
| FIRST CLASS MAIL MeGaDeTH PoW/Mia #2 Chapter 71, Section 23|
| NON-DOMESTIC PoW/Mia Site #2 Local/Drop Letter|
| [7o8.PRi.VATe], Il. 81 U.S. Statute 613|
| |
| |
| |
_____________________________________________________________________________
۲- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<2D><>
Thank you for reading this PoW/Mia file, I hope it saves you many a 29 Cents.
Look out for other PoW/Mia files, coming to a bbs near you, but until then,
check out 7o8 Code aNaRCHy, Mia Anarchy, The PoW T-Files, and PoW
Viruses 1-6. Look out for the Official PoW/Mia Mag, coming to you sometime
This Year.
.\\<5C>s<EFBFBD><73>r
PoW/Mia <20><><EFBFBD>r<EFBFBD>h<EFBFBD>s<EFBFBD>/Phr<68><72>k<EFBFBD>r/P<>R<EFBFBD>M<EFBFBD><4D><EFBFBD><EFBFBD>/<2F><><EFBFBD>h<EFBFBD>r
S<>s<EFBFBD>p: <20><>ll's I<><49>. <20><>S
/\/\<5C>gg<67><67>
PoW/Mia F뗤d<EB97A4>r/<2F><><EFBFBD>r<EFBFBD>h<EFBFBD>s<EFBFBD>/P<>R<EFBFBD>M<EFBFBD><4D><EFBFBD><EFBFBD>/<2F><><EFBFBD>h<EFBFBD>r
۲- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<2D><>
[Pow/Mia]... Phreakers Of The World/Men In Anarchy [tm]
(C) Copyright 1993. All rights reserved.
۲- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -<2D><>


File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,48 @@
File: HACKER MORALITY
Read 33 times
A lesson in phreaking and hacking morality:
I find it truly discouraging when people, intelligent people seeking
intellectual challenges, must revert to becoming common criminals. The
fine arts of hacking and boxing have all but died out. Though you newcomers,
you who have appeared on the scene in the last year or two, may not realize it,
we had it much better. People didn't recognize our potential for destruction
and damage because we never flaunted it, nor did we exercise it.
For hacking, it was the intellectual challenge which drove us to do it.
The thrill of bypassing or breaking through someone's computer security was
tremendous. It wasn't a case of getting a password from a friend, logging on,
and destroying an entire database. We broke in for the challenge of getting in
and snooping around WITHOUT detection. We loved the potential for destruction
that we gave ourselves, but never used.
Today, after so much publicity, the fun has turned to true criminality.
Publicity we have received is abhorring. From WarGames to the headlined October
Raids, to the 414's, the Inner Circle, Fargo 4a, and the recent NASA
breakins--not to mention all the local incidents that never made the big
newspapers, like breakins at school computers or newspaper computers. TRW
credit information services claims hackers used the three stolen accounts to
aid them in abusing stolen credit cards. The thrill of entering and looking
around has shifted to criminal practicality--how can I make my bank account
fatter--how may I use this stolen credit card to its fullest--how could I take
revenge upon my enemies.
And then there is the world of Phone Phreaking. The number of phreaks has
grown from an elite few, perhaps ten or twenty, to well over a thousand.
Still, there remain only about 10 or 20 good, longlasting phreaks. The rest
receive information and abuse its uses until the information is no longer valid
.
Even worse, they seek publicity! They WANT to be caught! Many even use their
real names on bulletin board systems to promote publicity. Meanwhile, the REAL
phone phreaks have been resting in the shadow of the rest, waiting for
phreaking to become so dangerous as to become a challenge once again. Once
security tightens and only the strong survive (phreak Darwinism?), phreaking
will be restored as a way to 'beat the system' without costing anyone anything.
Hacking may soon be dead, but may phone phreaking live on!
Big Brother
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open

View File

@@ -0,0 +1,47 @@
File: HACKER MORALITY
Read 33 times
A lesson in phreaking and hacking morality:
I find it truly discouraging when people, intelligent people seeking
intellectual challenges, must revert to becoming common criminals. The
fine arts of hacking and boxing have all but died out. Though you newcomers,
you who have appeared on the scene in the last year or two, may not realize it,
we had it much better. People didn't recognize our potential for destruction
and damage because we never flaunted it, nor did we exercise it.
For hacking, it was the intellectual challenge which drove us to do it.
The thrill of bypassing or breaking through someone's computer security was
tremendous. It wasn't a case of getting a password from a friend, logging on,
and destroying an entire database. We broke in for the challenge of getting in
and snooping around WITHOUT detection. We loved the potential for destruction
that we gave ourselves, but never used.
Today, after so much publicity, the fun has turned to true criminality.
Publicity we have received is abhorring. From WarGames to the headlined October
Raids, to the 414's, the Inner Circle, Fargo 4a, and the recent NASA
breakins--not to mention all the local incidents that never made the big
newspapers, like breakins at school computers or newspaper computers. TRW
credit information services claims hackers used the three stolen accounts to
aid them in abusing stolen credit cards. The thrill of entering and looking
around has shifted to criminal practicality--how can I make my bank account
fatter--how may I use this stolen credit card to its fullest--how could I take
revenge upon my enemies.
And then there is the world of Phone Phreaking. The number of phreaks has
grown from an elite few, perhaps ten or twenty, to well over a thousand.
Still, there remain only about 10 or 20 good, longlasting phreaks. The rest
receive information and abuse its uses until the information is no longer valid
.
Even worse, they seek publicity! They WANT to be caught! Many even use their
real names on bulletin board systems to promote publicity. Meanwhile, the REAL
phone phreaks have been resting in the shadow of the rest, waiting for
phreaking to become so dangerous as to become a challenge once again. Once
security tightens and only the strong survive (phreak Darwinism?), phreaking
will be restored as a way to 'beat the system' without costing anyone anything.
Hacking may soon be dead, but may phone phreaking live on!
Big Brother


View File

@@ -0,0 +1,36 @@
A NEWBIES GUIDE TO PHREAKING IN THE '90s
volume I
I hate to do this part but as usuall...it's a must. Our Disclaimer: We in no way are responsible for any actions you take with the knowledge gained from this manual. It is intended for informational purposes only. Yadda, yadda yadda...just get to the manual.
When I started phreaking I noticed how out of date and complicated many of the phreaking texts i read were. This is intended to be a new guide to phreaking in the '90s. It will include several other things besides just how to phreak, alhthough many sections will be devoted to that topic from before the phreak, during the phreak, and after the phreak. This guide will also concentrate on phreaker ethics, and several other related issues.
I. Explanation of what makes us do what we do and why we do it.
A.Intro
II. Before the phreak.
A. Tools
B. Location
III. During the phreak
A. What to do and how to do it
B. Novices exercises
C.Dozens of other things to do with fones
IV. After the phreak
A. Clean up and other assorted misc.
V. Conclusions
If you are anything like I was when I started to learn, you just got internet access right? One of the first things you typed into your browser was hacking wasn't it? So at night and when your parents were away you poured over hacking text files and web pages. You understood less than half of what you read but it was interesting you wanted more of it. It led you to other areas of the electronic black arts didn't it? You saw words you've never seen before, things like phreaking or warez or carding or virii. You guessed at how to pronounce them, you guessed at what they ment. Then you started finding out more about them. Phreaking turned out to be telephone hacking in a sense. You read and read more and more about all of it. You read about different things about phones that you never knew before, the mere posibillity of which made you tingle. This is all in the spirit of hacking and phreaking, learning and the intense desire to know more, to know how things work. If you are anything like I was when I startd to learn, you wanted and needed an up to date, easy to understand text file. Well here it is.
Phreaks have ethics, contrary to the belief of many a phone company. You've probably seen and read several different versions of the phreaks ethics and the 10 commandments of the phone phreak and other files. They are all good and all say the same thing more or less and I'm not going to rewrite them here. I have my own code of ethics, which is just a variation of the foundation rules set in place. NEVER cause intentional damage to a phone or phone system. If you insist on causing damage or it is unavoidable to attain your goal don't cause permenant or expensive damage. This kind of damage is never neccessary and should be avoided at all costs. As for the rest of the ethics it's up to you to decide how to procede, i can't force (nor would i try to) you to follow any code of ethics, however a phreak without ethics is just a jackass who knows something about phones. I can garuntee you that if you don't have a code of ethics, you will be black balled from the phreaking/hacking community.
What do you need in the way of tools? For starters go to garage sales...find a phone that has the key pad on the reciever (the end of the phone you talk into and listen from). Now get yourself some phone cord. Cut off the modular plug (the phone jack. the little plastic thing the wires go into) on ONE end. You will see 4 different colors of wires red, green, yellow, and black. For the most part the important ones are the green and the red. Strip the casing from the four wires, now strip the insulation from the red and green wires...yellow and black too if you're bored. Get yourself some aligator clips...I prefer the color coded/insulated kind. Now attach the alligator clips to the wires..if you have color coded clips like I reccommend then put them on the corresponding color wire. Plug the cord into the phone you got at the garage sale. You now have the basic version of what is known as a beige box or a linemans handset. This is a neccessary tool for any phreak. Other tools I reccommend (as you progress in your training you'll figure out why) are: a 7/16 hex wrench, a phone cord stripping device (it's a bitch to strip those wires isn't it) wide assorment of phone connecters, and an assortment of small tools like pliers and wire clippers and screwdreivers. These are the BASIC tools. As you become more advanced you'll want more and more tools to build boxes (more on this later) and other things. But for your first phreak you'll only need the beige box you've built and a screw driver.
First you need to find a secluded spot...this wasn't hard for me because I lived in a rural community, but it may be harder if you live in the city. The spot you choose for your first phreak should have access to a phone box (I used the one on the side of a house). If you're dealing with this kind of set up good, it's eaisier for the first phreak. Where I was the boxes on the houses where grey or green. As you become more advanced you'll move on to the big green or grey boxes you see along the road and other more complicated things.
Now that you have the right tools and the location for your first phreak you're ready. This is how to proced. Open the box by unscrewing the screw labled open. Now you'll see a jumble of wires...no problem...find the red and green wires...if there is more than one set on these pick a set..any set. Now look at where the wires are attached...they are attached to some screw terminals right? good. Look at them closely see how the wire is stripped to fit around the terminal...see how the end of the wire is available to you. Attach your red aligator clip to the end of the red wire in the box...and the green to the green. Listen to your phone..hear the dial tone...if not make sure your clips are making good contact and are not touching each other. Now call a number...not your own house of course...and not a friend. CONGRATULATIONS you've just completed your first phreak. I know it wasn't much but it got you started didn't it.
Now disconnect from the box and close it up...just the way you found it. If you haven't called any unusuall numbers like the 900 variety or the long distance kind the person you just phreaked off of will never know. However if you need to make long distance calls or anything of the like you now know how to do it at no cost to you. A word of caution is...don't always use the same house to phreak off of.
This is the simplist form of phreaking. But it gives you a base to build off of. Think about the possibilities. You could get longer cords and connect them permentaely to a neighbor's house and barry the cord so you have instant access to their phone...or set up a recording device and every time they have a phone conversation you will know exactly what goes on in their lives...trust me it gets old after awhile unless you have very interesting neighbors. Pay phones offer dozens of opportunities to the phreak. You can make free calls with the right tones, get coins back, or turn it into your personal bank, and any other number of things. There are endless possibilities of things to do on phones. read the other text files out there and you will find out what they are.
What the hell are boxes? I asked myself this question a lot. Boxes are devices the phreaks build to do litterally hundereds of different things. Boxes are identified by colors such as red and green and blue. They all serve a different purpose. Some boxes don't have anything to do with phreaking such as the chrome box...but they are usefull and provide great entertainment. Over the course of your learning you will find out about the different colors of boxes and their functions. Most boxes are easy and cheap to make and you'll learn to build them and use them effectively.
This is the first in what we hope to be a series of texts for the newbie phreak in the '90s. We hope you enjoyed this file and you read the next one to be released soon. We would like to take this opportunity to welcome our newest writer Jester, we hope he can provide the underground with lots of great files. This has been another great file by Dial-Tone, and the rest of us here at ILS (Information Liberation Specialists).

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,745 @@
***************************************************************
* *
* *
* Phreaks *
* *
* Long Distance Phone Thieves *
* *
* OR *
* *
* The Phreaker's Handbook *
* *
***************************************************************
MCI
MCI is the Queen Mother of the long distance companys. There are
only a handful of companys that are "networked". This means
they've built their system to a point where travelers (or phreaks
can call into a local phone number and be in the "network" even
if they're three thousand miles from home. The exception is when
you're in an area that isn't serviced. Most LD services utilize
800 numbers so that you can connect even if you're out in the
boonies.
Here we have two different code formats, one for the so called
"executive" user, primarily business , the other for the average
person. Executive class entails using the 950-1022 dialup. To
make a call you need to enter no less than thirty two digits. You
dial zero plus the area code and phone number that you want, then
the area code and phone number with a four digit "security code"
at the end. It'll look like this, 9501022 (the dialup)
02125551212 (zero plus the area code and phone number ) then
7045551212xxxx (your area code,phone number and security code).
Many years ago I saw a piece of graffiti on the bathroom wall of
the Cotton Bowl. It went like this, "I've shit in England - I've
shit in France - But before I shit here again - I'll shit in my
pants." I feel the same way about this format. As a businessman,
I wouldn't waste my time trying to dial all this garbage. A real
pain in the ass. Hackers, don't find the format that tough. With
the exception of the user's telephone number and code the rest
are known quantities. You're left with fourteen numbers to hack
out. This can be reduced even further. MCI's 950 codes are good
anywhere in the country. Experienced phreaks pick an area that is
known to have an extremely high population density. New York City
is a case in points, area code 212. The number of digits has just
been reduced to eleven. The phreak will choose a prefix that is
occupied predominantly by business and cut the number down to
eight digits, which is one less than Sprint's code. I've seen
425,943,344,964,269,422,820,227,635,747,486,668,686,233,248,532,
732,306,938,255,925,678,and 564 posted on hacker boards. It seems
that Wall Street is a juicy target. The interesting thing about
hacking MCI's 950 numbers is that the phreak also gets the number
<EFBFBD>j܌of the person who's going to be getting the bill. It's not
unusual for the hacker to call the victim on some pretense just
to find out who it is. If it's a large company who might not
notice a few additional phone calls, he'll use the code sparingly
so as not to attract attention. The end result will be years of
free long distance.
MCI's second format is pretty standard. A local dialup and a five
digit code followed by the area code and number you wish to speak
with. They've recently instituted a new "security measure". One
phreak hacked out eight codes in about an hour. He let them sit a
day before he got around to using one of them, some phreaks let
them sit as long as a month. In that twenty four hour period all
but one of them went bad. It isn't unusual to see codes go bad. A
few of them fall by the wayside due to natural attrition, people
not paying their bills or cancelling service. To see seven fall
with one blow is mathematically improbable. It means they've
been reprogramming the computers to scan the dialups and check
for activity. If a node has an activity average of fifty calls
an hour and the hacker pumps the actual amount over that
average, it'll trigger a feature in the programming that'll
generate an activity report for a system operator to read.
Furthermore, the computer will list all the phone numbers called
and the codes that connected them to the system. If the phone
numbers are identical it can safely be assumed they're being
telephucked. The report will also show a time lag of about
fifteen seconds between calls. Isn't technology wonderful?
The hacker's solution to their solution is obvious. Don't keep
dialing the same phone number over and over. The first generation
of hacker programs did (and still do) use a one number
destination. Consequently, they've set a pattern that, after
four or five years, the phone companies have finally noticed. It
takes about twenty minutes of reprogramming to beat it. Hacks
have now started using large files dialups similar to the one in
the appendix. It's not too difficult to blitz the call counter
feature either. MCI doesn't publish their dialup numbers except
to their customers and then they only give them one at a time.
Their ratio seems to be figured at around one dialup for two
hundred thousand of population. To find other dialups all one
needs to do is scan the prefix surrounding a known node. Hacks
are now rewriting their software to spread their hacks out over a
wider area. Fifty to one hundred hacks on one node and then they
move to another. The five digit code hacked on a local dialup is
good only on that node. A New York code won't be good in
Cleveland. It took MCI several years and a ton of money in losses
and programming time to come up with this little security wonder.
It'll take a fifteen year old phreak twenty minutes of
reprogramming at a cost of zero bucks to bust it. Kinda makes you
wonder doesn't it?
What of the one code that was still good? The hacker didn't touch
it. He realized the system had detected him. It wouldn't be hard
recognize his pattern of calling. He knew the good code might be <20>j܌"trapped". Any activity on it would have been traced (illegally).
If he stayed on the code long enough for the security department
to process the necessary paperwork he would undoubtedly be
busted. He decided that it was wiser to protect himself and those
that he called by not using it. He noted the number just in case
he should hack it out again at a later date.
Some psychologists say that names can affect the development of a
child. I knew two kids when I was in school who's names are
etched in my memory forever, Jock Strap and Harry Balls. Their
parents should have been shot. The president of MCI is Orville
Wright. Orville has his work cut out for him.
GTE SPRINT
Sprint is owned by General Telephone. If you've ever lived in a
GTE area you can attest to the absolute crapola you've received
as service. Sprint has advertised good connections and rightly
so. Their international access is equal to AT&T. Like MCI and all
the other LD services, they don't go everywhere. They've
concentrated building their network in the metropolitan areas
where the money is so you country bumpkins are going to have to
wait a little longer.
I recently spoke with Sprint's security department. They have a
service oriented philosophy. They don't want any restrictions on
data line users. A study indicated a respectable percentage of
Sprint customers were computer operators. Sprint maintains a
considerable number of dialup ports. I estimate the ratio is one
port for each forty thousand of population. As of this writing,
Sprint has not completed it's national 950-0777 setup.
Consequently, she still has a large number of local dialups in
the system. Scanning to either side of a local non 950 dialup
will yield a wealth of unpublished nodes.
Sprint's code format runs 9 digits in length and also uses
prefix qualifiers . In this case a three digit coding identifies
the physical area of the country the code has been assigned to.
The next 4 digits are presumably it's record place within their
computer system. Therefore, xxxXXXXxx would translate to a three
digit prefix, followed by a four digit record number, with the
remaining two digits being what used to be a travel code.
Hackers report success rates of one per 300 hacks using the
random number approach, a bit on the shabby side. Success ratios
on MCI are around seven percent, or seven per hundred
hacks,actually pretty good. On Metro three to four percent is
about right. Essentially, Sprint is spreading their valid
accounts out over a wider area, keeping the density low, thus
making them harder to find. The hacker can increase his return
ratios by using the prefix and suffix technique. His first time
on the system he'll use a random hack, searching for a nine digit
code. Then use the first three digits of the code as a prefix,
and the last to digits as a suffix. All he needs then to hack is
the four digits in between. The return rate is currently one per <20>j܌two hundred hacks using this approach, a 33% increase in
efficiency.
Sprint has achieved a reputation for vigorously prosecuting
phreaks. Yet, they are as limited as all the other companies.
They rely mainly on fear. Occasionally, they'll snare some kid
who overstayed his welcome. They make a big deal giving the
impression they're busting thousands a day. This just isn't so.
Phreaks only get caught when they get stupid or lazy. You can't
blame Sprint for capitalizing on some phreak's lack of brains.
Conversely, you can't blame the phreak for cashing in on Sprint's
lack of smarts.
As an update, Sprints 950 dialups require 9 digits. Local nodes
used to come in at 7 and 8 digits. As the local dialups disappear
the 9 will become the norm. Sprint still has no specialized
security systems. The rumors of profound phreak snaring abilities
are basically untrue.
They win a few and lose a few, although it appears they lose more
than they win.
Allnet Communications
Allnet is a run of the mill telecom company. They utilize the
standard 6 digit format and can be found at 950-1044. They appear
to have developed or purchased software for analyzing their data
much the same way Mci has. Furthermore, they seem to have
established a customer profile with which to compare current
hacking activities against the record of past calling habits.
A hacked code will remain valid for three days. It seems to take
that long to run the programming.
Additionally, a code that connects for only a few seconds will be
invalidated within 24 hours. The obvious solution is stay
connected for several minutes. It works. On the user profile
strategy, there is no means of defeating it except to rape the
hell out of the code from the minute one lays hands on it. Those
that adhere to the I C's Rules of Phreaking wouldn't care since
they don't stay on a code more than three days any way.
Itt is Internation Telephone and Telegraph and operates out of
Seacacus New Jersy. They've been the the telcomunications
business for many years and have specialized in telix type
services.
Itt's connections aren't particularly terrific for data
transmissions. Phreaks have complained of excessive line loss
over relatively short distances. The company's strong point is
and will continue to be their telix activities.
The code format for this service is different. In an obvious
attempt to deter phreaking, they've departed from the usual node,
<EFBFBD>j܌code, number arrangement. Instead they utilize a reverse
arrangement, node, area code and number, then the code. From a
practical point of view there is little difference. From an
operational viewpoint the phreak must chain together his dialing
sting instead of using just one. I others words, instead of
punching one macro to output his call, two are required.
The coding uses a prefix and suffix as area qualifiers. The first
two digits of the code refer to the area of the country the code
has been assigned. Consequently, most phreaks prefer to use the
prefix in their hack attempts. The object is, of course, to
improve effieciency.
Itt has no special security considerations as far as traces and
traps go. They have instead emphasized getting the phreak
disconnected as quickly as possible. Most Itt's will go bad in
three days (See Chapter on Updates). Hense it is impossible for a
phreak to be on the system long enough to require concern about
traps and traces.
Itt is expanding it's overseas network and is offering services
to Singapore as well as the regular European countries.
ITT LOCAL DIALUPS
201-463-0900 305-545-8895 513-228-6506 717-234-0718
201-589-6343 305-764-4522 513-651-1823 717-299-4796
202-565-4110 312-364-6020 515-284-5040 717-347-9135
203-324-1172 312-922-1013 518-462-2068 717-825-2761
203-333-2722 313-662-2041 602-257-8200 803-233-1351
203-527-7389 313-964-2843 608-258-8900 803-256-3060
203-787-0170 314-656-0800 609-338-0340 803-573-7639
203-794-1085 315-471-2900 609-989-1631 803-577-6728
203-866-8411 316-267-1088 612-375-0690 804-355-1433
209-445-9300 317-637-5223 614-224-0024 804-380-9038
212-248-0151 401-273-8263 615-327-2511 804-627-3596
214-651-0609 404-525-0714 615-521-7600 805-395-0123
215-376-4864 405-525-7731 615-697-7000 813-223-5380
215-433-2166 408-280-1301 616-458-2472 817-338-4749
215-563-3256 412-261-4930 617-357-5562 904-358-8522
216-375-9040 414-933-5680 702-323-7191 913-371-1300
216-621-0490 415-495-2816 704-375-4311 916-448-6606
219-237-1700 415-858-2750 713-862-5067 918-585-5001
302-654-2809 502-589-9360 714-973-8032 919-378-9489
303-861-4411 504-566-8300 716-325-1180 919-725-3532
305-425-7791 512-474-4397 716-845-5150 919-832-9438
<EFBFBD>`<60>
Listing of Cities Serviced by ITT
Allentown Anaheim Annapolis
Athens Atlanta Baltimore
Boston Brooklyn Cambridge
Camden Charlotte Chicago
Compton Dallas El Monte
Elk Grove Fort Worth Fort Lauderdale
Gainesville Galveston Garden City
Gardena Gary Glendale
Greensboro Greensville Hackensack
Houston Inglewood Jacksonville
Joliet Kankakee La Plata
Long Beach Los Angeles Lynchburg
Miami Morristown New Brunswick
New York Newark Newport News
Norfolk Norristown Northbrook
Oak Brook Oakland Orlando
Palo Alto Philadelphia Reading
Richmond Rochester Rome
Rosenberg Sacramento San Jose
Santa Monica Santa Ana Scranton
Sherman Oaks Spartanburg St. Petersburg
Tampa Thousand Oaks Trenton
Van Nuys Washington West Palm Beach
White Plains Wilkes-Barre Wilmington
Winston-Salem
Western Union Metrophone
Metro was everyone's whore. Metro never said no. Any too bit
phreak could bang a metro code. The system was of interest to
business primarily due to there method of billing breakdowns.
Metro has been raped to the tune of tens of millions in phreak
related losses.
Metro is currently, for phreaking purposes, offline. It's unknown
whether she has changed her code format or has simply closed
shop. Her previous code format was a standard 6 digit affair. The
equipment used was old and had very poor line quality. This was
apparent in 1200 baud data communications but would not
necessarily have been noticed on voice transmissions. The listing
for her networked dialups is included below.
201-427-1100
201-487-3155
201-531-7900
201-643-2227
201-825-8852
201-828-8660
202-737-2051 <20>
203-222-1148
203-323-1468
203-522-0003
203-748-0770
206-382-0910
212-732-7430
212-950-0220
213-202-6117
213-404-4100
213-618-0231
213-624-8884
213-629-1026
214-595-4282
214-742-4500
215-351-0100
215-770-8940
216-374-1001
216-861-5163
219-237-4805
219-420-0011
219-882-8901
301-659-7700
302-429-9439
303-623-5356
305-326-3300
305-462-3530
312-356-4480
312-396-2550
312-450-5875
312-480-8901
312-496-2431
312-578-3900
312-679-8120
312-844-6981
312-853-4700
312-888-5580
312-891-8083
312-981-8870
312-986-0566
313-963-4847
313-996-8900
314-342-1130
315-474-3911
317-635-6284
401-272-0356
402-422-1120
404-223-1000
405-232-9011
408-947-7606
409-833-9331
412-261-5720
414-277-1805
414-633-3636 <20>j܌415-499-8086
415-579-6001
415-676-1062
415-724-3170
415-794-4800
415-833-9200
415-836-6900
415-852-0900
415-956-0162
419-243-1046
502-561-0900
504-566-8500
512-224-9600
512-474-6057
513-228-1576
513-241-1747
516-933-9700
516-950-0220
518-436-6200
602-254-2930
602-323-0502
606-231-8961
608-251-9596
609-338-0100
609-641-0004
609-989-1900
612-370-9000
614-224-0577
616-242-9580
617-950-1020
618-235-8870
619-233-0327
702-329-1025
707-584-4931
713-224-9417
714-527-7055
714-591-9351
714-594-9311
714-877-6641
714-972-9515
716-852-9200
716-950-1020
717-238-4731
717-348-4300
717-846-6304
718-950-0220
804-225-1920
804-623-9004
805-968-0700
806-379-8271
806-762-0004
815-966-2401
816-471-1999 <20>j܌817-322-1422
817-338-1639
817-565-9202
817-757-2002
818-350-1028
818-954-8699
818-992-8282
913-621-3186
914-684-0268
915-532-0025
915-561-5481
915-658-2943
915-676-0078
916-443-6921
918-587-6770
Thrifty Telephone Exchange
TTE is an example of a mom and pop telephone company. It services
a very small area and utilizes 800 as its sole source of out of
the area access for its customers. The 800's are also more
expensive for the customer.
TTE offers two dialups in the 818 area, 902-0950 and 908-0951.
These are located in Van Nuys, California, a part of the City of
Los Angeles. She utilizes the standard 6 digit format.
TTE is a good example of a company hackers just won't mess with.
Not because of any great security measure or because of some
ultra sophisticated phreak catching ability, but simply for the
reason they don't have enough customers (valid codes) to make the
effort worthwhile. TTE has a rough road to hoe. It seems too
small to be of interest for a larger company to gobble up and is
unable to compete on the grander scales of Mci or Sprint. She's
bound to belly up sooner or later. This situation is not unique
in the industry.
Access Communications
Access is a company in the genre of TTE with the major exception
it appears to have the benefit of more capitalization. There
operate out of the 801 area and offer a local dialup at 801-359-
3900 as well as national access at 800-548-0003. The code length
is identical to ITT, 7 digits. The prefix may safely assume the
use of prefix qualifiers.
Access' format is standard with one minor exception. Node + code
+ 1 + area code and destination number. Like ITT's reverse
format, the minor deviation from the norm is bound to save the
telco money. The problem all these companies have is they must
make the format easy enough for an idiot to operate and the MUST <20>j܌make the dialups and formats public knowledge. In doing both they
make their systems vulnerable.
U.S. Telecom
U.S. Telecom was known as the "Metro" of the 950's. Codes were
easily hacked and density varyed in direct proportion to the
population of the area serviced. The Director of "Code Abuse" is
a fellow named "Frank Porko". It seems one of the prerequisites
of being in telecommunications is you have an odd name. Frank
was recently promoted to this exaulted position. U.S. Tel isn't
making money, so the company has been swallowed up by a bigger
fish, Sprint. Frank didn't strike me as overly bright on the
subject of phreaking. The company has tried the "Carrier Blast"
only to find it worked for a couple of days and the phreaks by
passed it. It can still be found at the end of the dialing
sequence for their 950. Their latest security gizzy is to limit a
caller to four tries before it routes him to a dummy line. Sound
familiar? Sprint does it with two tries and it doesn't work for
them either. Ironically, phreaks in the military are hurting
USTel much worse than the civilian poplulation. It appears
government computers are being put to uses other than those
intended. U.S. Tel's 950-1033 dialup is already famous among
phreaks. They've placed qualifiers on the codes, even so the
return rate runs around five per hundred hacks. Five percent -
not bad. The node uses the standard six digit format. I spoke
with one of their chief programmers who was trying to hack out
codes. He complained the only code he could find was his own.
This explains why the company's response time is so pathetic.
Phreaks and computer engineers thinking at different levels. This
supports the old saying of "Set a Theif to Catch a Thief".
U.S. Tel sports two 800 numbers, 800-345-0008 and 800-245-0033.
These babies are infamous. The 345 number used to have codes
packed like sardines, every tenth (fifteenth at the most) number
was a good code. How could you lose? After several years of
getting their asses kicked they finally changed the format and
wised up a bit and went to a 14 digit code, ie. AT&T format. The
format is constructed of two sets of three digits followed by two
sets of four digits, XXX-XXX-XXXX-XXXX. We can assume the first
sets of three are area qualifiers, actually area codes. USTel
doesn't use the actual area code as do AT&T and MCI. Area codes
818 and 714 return as 527 and 662 respectively. Additionally, the
three digit prefix and suffix are also bastardized. Hackers have
deduced this is the product of a mathematical formula indexed
from the users area code and phone number. The four digit
"security code" is obtained by the same formula. A group of
hackers who call themselves the IC (Inner Core) are working on
cracking this coding. There are fifty of them. This translates to
fifty intellegent people, fifty computers all dedicated to
breaking the MCI/Ustel code. It would seem it is only a matter
of time before they succeed. It's their belief they will also
reap the AT&T formula in the bargain. This stems primarily from <20>j܌the fact MCI "borrowed" AT&T's format.
<EFBFBD><02>
Hackers love a challenge and will rise to one almost at the
dropping of a pin. Code cracking is what they love best. I have
no doubt that the IC will succeed.
Update
The 14 digit format is being used for new accounts. Older
customers still have their 6 digit codes. US Tel has never had
terrific connections and under Sprint this has not improved.
Two digit prefix qualifers are used. The calling areas are very
small. Sprint is still the best bet for away from home phreaking.
SBS SKYLINE
Each long distance company tries to promote itself in different
ways. Skyline's approach is two fold, first price (so what's
new), and secondly the fact they use satellites to get their
calls to their destinations. This isn't terribly impressive.
Never the less, they obviously feel enough people will be
impressed it's worth mentioning. Point in fact, most of the LD's
use satellites. It would be impractical, not to mention
expensive, to use AT&T's network for 100% of their traffic.
Skyline has a well established dialup at 950-1088. Her format is
the standard 6 digits. Hacks report it is a fairly easy system.
It appears she has divided the country in areas which are rather
large geographically. A code that originates in one area will be
workable two to three hundred miles from its point of origin. The
six digit code will also work on her 800-446-4462 dialup. There
are reports she also uses a seven digit format collateral to the
six.
Skyline has a reputation for vigorously calling the destination
numbers after more than ten calls have been placed. This is the
most they can realistically do. One must assume they will score
a certain percentage of people who are willing to give them
information about the origin of the calls. Yet, as far as
experienced hacks and phreaks go, you can be equally sure the
trail will stop there and the possibility of back tracking is
nil, if not impossible. This problem is not unique to Skyline.
She appears to be your run of the mill long distance carrier
without much to make it especially noteworthy. Like all other
services, she isn't making money and is playing the merger game.
I predict by 1988 you will have three majors in the business,
AT&T, MCI, and Sprint. The rest are fish bait waiting to be
gobbled up by the larger fish. See Updates for further
information. <20>j܌
Alliance Teleconferencing
Alliance is a service of At&t. It provides people, usually
business with what is essentially a party line; several people
can join in the same conversation at the same time. It's an
outstanding tool for business. The phreak approaches Alliance
essentially from the same perspective, except that phreakery is
the business.
As a service of At&t, Alliance is approached indirectly through a
PBX or a diverter. The origination phone number of all calls
place to Alliance is supplied by the ANI - Automatic Number
Identifier. Placing the call through a PBX insures the ANI, and
the people receiving the bill, will be someone other than the
phreak.
AT&T offers two basic conference services, Alliance 1000 and
Alliance 2000. The former is your basic voice communication and
the later has special graphic abilities. The service operates in
all fifty states, Mexico, Canada, Puerto Rico, Bermuda and the
Virgin Islands.
To make a conference call the phreak will need to have the phone
numbers of all the parties. Since this is not always desireable,
the controller can route the call through a number of loops, thus
insuring the location of the phreak remains unknown (See Loops).
The controller will then call 0+700+456-1000 for an audio
conference. He'll then dial in the phone numbers as you would any
At&t call. When the party answers, he'll tell him to hold on
while he connects the rest of the group. He'll hit the # button
to continue adding people or the * to cancel his input. He can
resume adding callers at any time by hitting the # button. Ending
a conference is easy, everyone hangs up.
A national conference was held after the 415 bust to discuss
added security measures to counteract the sting techniques used
by the Fremont Police Department. Elite phreaks from coast to
coast were dialed in. The phreaks saw the need for immediate
discussion to plan their future actions and to discuss the
details of the bust. One of the parties to the conference had
actually seen the hacker known as Trask as he was being arrested.
Trask's down fall held vital concern to many on that conference
as he held many personal phone numbers and names in his data
base. The police did not obtain that information nor did Trask
make a deal with them. Needless to say he was prosecuted. Other
hackers involved in the 415 bust did make bargains with law
enforcement which resulted in wide spread arrests. The Fremont
Sting has successfully been used in Texas and there is every
indication it will be used elsewhere.
<20>
Alliance provided the means for these hacks to meet and discuss
their vital concerns. Some company with a PBX was billed for the
calls. It would be accurate to say that while the 415 conference
was called under "emergency" conditions, most conferences are
little more than bullshit sessions. Some pranksters like to play
games like dialing six or seven operators and listening to the
say, "Operator", "Operator", "No I'm the operator can I help
you?". This can go on for five or six minutes before they realize
they've been cross connected. Others like to call their favorite
software company and taunt them as to how they've cracked their
latest security measures. These applications are rather juvenile.
At&t Security is a feared aspect of the phreak's existence. With
the exception of the PBX and the Diverter, Ma Bell holds all the
cards. Tracing is a snap. Even so, At&t doesn't appear to be a
mean mother in the tracking down of her Alliance phreaks. The
company with the PBX is going to be stuck with the bill and it
appears the phone company has little incentive to follow the
scent.
Phreaks of fifteen to twenty years pass used to place calls and
have them billed to phone booths. ESS has made that game
obsolete. However, Ma Bell didn't sit still for the theft. They
dropped the billing on the party who received the call. If then
didn't pay, they lost their phone service. The obvious option was
to give them the name and location of the person that really was
responsible for the call. There are no reports that this
collection device is still being used. From the phreak's vantage
point, Alliance is pretty safe.
Another old method of phreaking from payphones, and purported to
have dome from Abby Hoffman, was to place a call from a payphone
and to reverse the handset of an adjacent payphone to signal the
operator that money was being dropped. As the phreak dropped the
coins into the phone he wasn't placing the call from, the clinks
and cur-chunks would signal her the correct amount had been
deposited. This was corrected by simply making the telephone
cords shorter.
Cur-chunks are out and tones are in. So the technique now has a
new twist called the Red Box. the box is a simple, handheld,
battery operated tone generator that duplicates the tones used to
signal the operator the money has actually been placed into the
payphone. Utilizing 1700 hz and 2200 hz (Duel Multi Frequency
Tones), the box signals that a nickel has been dropped by pulsing
the frequencies at 66ms one time. A dime is recognized by 66ms on
once, off once, and on again. This produces two "beeps". The
quarter is shown at 33 ms off and on five times.
The newest phone technology also brinks greater phreaking
opportunities. The Cordless telephone is one example. These units<74>j<EFBFBD>
use two frequencies, one to send and the other to receive. the
FCC restricts the number of frequencies available so that a trial
and error approach in hacking is feasible. Most people don't
realize a cordless signal can carry for miles enabling others to
hear every word of their conversations. A properly equipped
techno-phreak can zero in on the signal, locate the source, and
screw around until he find the correct "in" level. The result is
a Godzilla of a phone bill for the unsuspecting owner of the
cordless phone. Most phreaks wouldn't go to this kind of trouble.
Your technoelectrical wiz kids will.
Ess, while being the scourge of phreakdom, has also enabled him
some benefits. The payphone games and 950 phreaking are just two
examples. ESS has, however, completely obliterated the use of the
infamous Blue Box. Phone company computers are programmed to be
sensitive to the 2600 hz tone needed to seize a trunk line. And
818 system operator (an adult) boxed one call on ESS. He was
detected and traced but not arrested. The second time he box, he
had a knock on the door and was arrested by the local police who
had been accompanied by telco security. It's estimated by the mid
1990's the entire country will be on ESS. Today, only the major
metropolitan areas utilize the service. Crossbar is still the
norm for the boonies.
Ess is a technological marvel, a logical step in the ever
evolving future of the phone industry. Yet, it has some very
scary aspects. The ability for abuse is tremendous. In the movies
you see the cop saying "We didn't have enough time for the
trace." Not any longer. Traces, wire taps and much more can be
programmed to be automatic. An operator at a console can push a
few buttons and Zap, no civil rights. I knew a woman who's
brother was a highly placed official in Pac Tel. Her boyfriend
had broken up with her and she was livid. The boyfriend's
communications were traced and tapped as a "courtesy" by the
brother. There is a history of past abuse which spawned the few
laws designed to protect the consumer. However, just as there are
laws against wire fraud, there are plenty of phreaks breaking
those laws. The phreak can hide behind the technology of the
computer and use it to break the law. So can your phone company.
Murphy's law is applicable here, if it can happen it will.
Government has a philosophy of regulating and controlling the
hell out of small and medium sized business. Large politically
powerful corporations are afforded the convenience of policing
themselves. A classic case of the fox watching the hen house. If
the public were even remotely aware of the capabilities of ESS
the uproar would shatter Washington. Phone services have been
taken for granted. The combination of ESS and the Data Services
who sell their information over the network makes it impossible
for anyone to have true privacy. TRW is a prime target of the
hacking community. Hacks abuse that data service and others for
their own informational needs. It logically follows that any <20>
agency with the inclination could use those services to create
non existent people or to kill the electronic lives of real ones.
The computer gives spying an entirely new dimension. Believe it,
Big Brother really is Watching!
with the bill and it
appears the phone company has little incentive to follow the
scent.

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,631 @@
The THC Hack/Phreak Archives: PH08.TXT (779 lines)
Note: I did not write any of these textfiles. They are being posted from
the archive as a public service only - any copyrights belong to the
authors. See the footer for important information.
==========================================================================
<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>
<*> Joe Cosmo Presents..... <*>
<*> <*>
<*> Methods of Phreaking and Telco Security Measures <*>
<*> <*>
<*> June 16, 1988 1:30 am <*>
<*> <*>
<*> (updated 7/3/88 for CN/A list & Plus One Service) <*>
<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>
(formatted to 80 Columns)
Dedication: This phile is dedicated to all those great phreakers who taught
me all of this, and to all of the newcomers being born to the phreak world. For
the legends, it is here as their legacy, and for the newcomers, I hope they
will
use it as their guide in times of trouble, and may there always be phreakers in
the world.
TABLE OF CONTENTS
CHAPTER
I. Introduction: What Telephone Fraud Is
II. Who Does It and Why
III. The Systems That Are Fooled
IV. Electronic Toll Fraud
How Boxes Work
The Blue Box
Operation of a Blue Box
Pink Noise
The Black Box
The Red Box
The Cheese Box
V. Divertors
VI. Private Branch Exchanges
VII. Specialized Common Carriers
SCC Extenders List
VIII. PC Pursuit
How to Originate a PC Pursuit Call
IX. Cellular Phone Fraud
ESN Tampering
Obtaining ESN's
X. CN/A's
CN/A List (updated 7/3/88)
XI. Loops
XII. Alliance Teleconferencing
Billing an Alliance Conference
Starting a Conference
XIII. Telephone System Security Measure
ESS Detection Devices
Automatic Number Identification and Centralized
Automatic Message Accounting Tapes
Dialed Number Recorders
Trap Codes
The Lock In Trace
Stopping a Lock In Trace
4Tel (Updated 6/24/88 Thanx to Touch Tone of BC, Canada)
Evading 4Tel
Plus One Service (updated 7/3/88)
Common Channel Inter-office Signaling
XIV. Laws Governing the Rights of Phreakers
XV. Conclusion
I. Introduction: What Telephone Fraud Is
Telephone fraud is illegally using the communication facilities of
telephone companies. This is commonly known as "phreaking." The writer's
purpose
is to explore the methods of phreaking, and the various security measures of
telephone companies.
II. Who Does It and Why
The majority of people who phreak are owners of modems (MOdulators
DEModulators, devices which allow computers to communicate over telephone
lines)
and are usually between the ages of twelve and seventeen. When the person
reaches age eighteen, he or she usually stops, since after that age, if the
person in caught, the penalty can become very serious. Phreaking is the
violation of the law on Fraud In Connection With Access Devices, which carries
maximum penalties of 15 years imprisonment and a fine of $50,000, or twice the
value of the fraudulent activity.
Scattered throughout the country are many different computer bulletin
board
systems, or BBS's. These are computer systems established by private users or
large organizations for the exchange of public and private messages and
software. Most are not a local call, though. Since the normal user calls about
ten different BBS's, with even the lowest long-distance rates, the phone bill
each month can range from $100 to $1000. The solution is to phreak. When these
people learn how to phreak, they also realize that besides making free
long-distance calls from their home, they can also make free calls from
payphones. They also find that there are many other facilities that they can
used without paying.
III. The Systems That Are Fooled
Their are three types of telephone operating systems in the U.S., Step by
Step (SxS), Crossbar (XB), and Electronic Switching System (ESS). They are
described in detail in the following paragraphs.
Step by Step
Step by Step (SxS) was the first switching system used in America, adopted
in 1918 and until 1978 Bell had over 53% of all exchanges using Step by Step.
A
long, and confusing train of switches is used for SxS switching.
Disadvantages
A. The switch train may become jammed, blocking calls.
B. No DTMF (Dual-Tone Multi-Frequency), to be discussed later.
C. Much maintenance and much electricity.
D. No "Touch-Tone" dialing.
Identification
A. No pulsing digits after dialing or "Touch Tone".
B. Much static in the connections.
C. No Speed calling, Call forwarding, and other services.
D. Pay-phone wants money first before dial-tone.
Crossbar
Crossbar has been Bell's primary switcher after 1960. Three types of
Crossbar switchings exist, Number 1 Crossbar (1XB), Number 4 Crossbar (4XB),
and
Number 5 Crossbar (5XB). A switching matrix is used for all of the phones in an
area. When someone calls, the route is determined and is connected with the
other phone. The matrix is positioned in horizontal and vertical paths,
organizing the train of switches more effectively, and therefore, stopping the
equipment from jamming. There are no definite distinguishing features of
Crossbar switchings from Step by Step.
Electronic Switching System
ESS is the most advanced system employed, and has gone through many kinds
of revisions. The latest system to date is ESS 11a, which is used in Washington
D.C. for security reasons. ESS is the country's most advanced switching system,
and has the highest security system of all. With its many special features, it
is truly the phreaker's nightmare.
Identification
A. Dialing 911 for emergencies.
B. Dial-tone first for pay-phones.
C. Calling services, including Call forwarding, Speed dialing, and Call
waiting.
D. Automatic Number Identification for long-distance calls (ANI), to be
discussed later.
E. "Touch Tone"
IV. Electronic Toll Fraud
The ETF's are electrical devices used to get free long-distance calls. The
devices are more commonly known as colored boxes, and using them is known as
"boxing." Boxing is one of the oldest way to phreak, and therefore, it is also
the most dangerous, since the telephone companies are very much aware of their
existence. Colored boxes are not used only for phreaking. There are many types
which have other uses (such as the Tron Box, which lowers your electric bill),
so only those used in telephone fraud will be discussed.
How Boxes Work
In the beginning, all long distance calls were connected manually by
operators who passed on the called number verbally to other operators in
series.
This is because pulse (rotary) digits are created by causing breaks in the DC
current. Since long distance calls call for routing through various switching
equipment and AC voice amplifiers, pulse dialing cannot be used to send the
destination number to the end local office (CO).
Eventually, the demand for faster and more efficient long distance service
caused Bell to make a multi-billion dollar decision. They had to create a
signaling system that could be used on the LD Network. They had two options:
{1} To send all the signaling and supervisory information (eg., ON and OFF
HOOK)
over separate data links. This type of signaling is referred to as out-of-band
signaling.
{2} To send all the signaling information along with the conversation using
tones to represent digits. This type of signaling is called in-band signaling.
The second seemed to be the most economical choice, and so, it was incorporated
in ESS.
Then, in the 1960's, when the first ESS systems were employed, a toy
whistle was put in each box of Captain Crunch Cereal as a premium. A young
radio
technician in the United States Air Force became fascinated with the whistle
when he discovered that by blowing it into the telephone after dialing any long
distance number, the trunk line would remain open without toll charges
accounting. From then on, any number could be dialed for free. The truth was
that the whistle produced a perfect-pitch 2600 Hz tone, the one used to signify
a disconnect in ESS switching equipment. To overcome the initial charge for the
for the long distance call, he later used toll-free 800 numbers.
Being a skilled technician, Captain Crunch (he began to use the name as an
alias) soon went beyond the simple whistle and experimented with other
frequencies, creating many of the boxes discussed in the following paragraphs.
The Blue Box
The "Blue Box" was so named because of the color of the first one
discovered by the authorities. The design and hardware used in the Blue Box is
very sophisticated, and its size varies from a large piece of apparatus to a
miniaturized unit that is approximately the size of a "king size" package of
cigarettes.
The Blue Box contains 12 or 13 buttons or switches that emit the
multi-frequency tones used in the normal operation of the telephone toll (long
distance) switching network. In effect, the the Blue Box can let a person
become
the operator of a phone line. The Blue Box enables its user to originate
fraudulent toll calls by circumventing (fooling) toll billing equipment. The
Blue Box may be directly connected to a phone line, or it may be acoustically
coupled to a telephone handset by placing the Blue Box's speaker next to the
transmitter, or the telephone handset.
Operation of a Blue Box
To understand the steps of a fraudulent Blue Box call, it is necessary to
understand the basic operation of the Direct Distance Dialing (DDD) telephone
network. When a DDD call is originated, the calling number is identified as an
integral part of establishing the connection. This may be done either
automatically by ANI in ESS, or in some cases, by an operator asking the
calling
party for his telephone number. This information is entered on a tape in the
Centralized Automatic Message Accounting (CAMA) office. This tape also contains
the number assigned to the trunk line over which the call is to be made. The
information relating to the call contained on the tape includes the called
number's identification, time of origination of the call, and if the called
number answered the call. The time of disconnect is also recorded. The various
data entries with of the call are correlated to provide billing information for
use by the caller's telephone company's accounting department.
The typical Blue Box user usually dials a number that will route the call
into the telephone network without charge. For example, the user will very
often
call a well-known INWATS (toll-free) number. The Blue Box user, after gaining
this access to the network when somebody picks up and in effect, "seizing"
control of the line, operates a key on the Blue Box which emits a 2600 Hertz
(cycles per second, abbreviated as Hz) tone. This tone causes the switching
equipment to release the connection to the INWATS customer's line. The 2600 Hz
tone is the signal to the switching system that the calling party has hung up.
In fact though, the local trunk on the calling party's end is still connected
to
the toll network. The Blue Box user now operates the "KP" (Key Pulse) key on
the
Blue Box to notify the toll switching equipment that switching signals are
about
to be emitted. The user then pushes the "number" buttons on the Blue Box
corresponding to the telephone number being called. After doing so, he/she
operates the "ST" (Start) key to tell the switching equipment that signaling is
complete. If the call is completed, only the portion of the original call prior
to the operation of the 2600 Hz tone is recorded on the CAMA tape. The tones
emitted by the Blue Box are not recorded on the CAMA tape. Therefore, because
the original call to the INWATS number is toll-free, no billing is rendered in
connection with the call.
The above are the steps in a normal operation of a Blue Box, but they may
vary in any one of the following ways:
A. The Blue Box may include a rotary dial to apply the 2600Hz tone and the
switching signals. This type of Blue Box is called a "dial pulser" or "rotary
SF" Blue box.
B. A magnetic tape recording may be used to record the Blue Box tones. Such a
tape recording could be used in lieu of a Blue Box to fraudulently place calls
to the phone numbers recorded on the magnetic tape.
All Blue Boxes, except "dial pulse" or "Rotary SF" Blue Boxes,
must have the following four common operating capabilities:
A. It be able to emit the 2600 Hz tone. This tone is used by the toll network
to
indicate, either by its presence or its absence, an "on hook" (idle) or "off
hook" (busy) condition of a trunk line.
B. The Blue Box must have a "KP" tones that unlocks or readies
the multi-frequency receiver at the called end to receive the
tones corresponding to the called phone number.
C. The Blue Box must be able to emit DTMF, tones used to transmit phone numbers
over the toll network. Each digit of a phone number is represented by a
combination of two tones. For example, the 2 is 700 Hz and 900 Hz.
D. The Blue Box must have an "ST" key which consists of a combination of two
tones that tell the equipment at the called end that all digits have been sent
and that the equipment should start connecting the call to the called number.
The following is a chart of the multi-frequency (MF) tones produced by the
normal Blue Box.
700 : 1 : 2 : 4 : 7 : 11 : 2600 X
900 : + : 3 : 5 : 8 : 12 :
1100 : + : + : 6 : 9 : KP :
1300 : + : + : + : 10 : KP2 :
1500 : + : + : + : + : ST :
: 700 : 900 :1100 :1300 :1500 :
The "Dial Pulser" or "Rotary SF" Blue Box requires only a dial
with a signalling capability to produce a 2600 Hz tone.
Pink Noise
Since telephone companies have such advanced equipment to detect Blue
Boxes, to help avoid detection "pink noise" is sometimes added to the 2600 Hz
tone.
Since 2600 Hz tones can be simulated in speech, the detection equipment of
the switching system must be attentive not to misinterpret speech as a
disconnect signal. Thus, a virtually
pure 2600 Hz tone is required for disconnect. This is also the reason why the
2600 Hz tone must be sent rapidly; sometimes, it will not work when the person
called is speaking. It is feasible, though, to send some "pink noise" along
with
the 2600 Hz. Most of this energy should be above 3000 Hz. The pink noise will
not reach the toll network, where we want our pure 2600 Hz to hit, but it will
go through the local CO and thus, the fraud detectors.
The Black Box
The Black Box is the easiest type to build. The box stops a call from
being
charged to some one only if it is hooked to the line of the person being
called.
In the normal telephone cable, there are four wires: a red, a green, a
black, and a yellow. The red & green wires are often referred to as tip (T) and
ring (R).
When a telephone is on-hook (hung up) there is approximately 48 volts of
DC
current (VDC) flowing through the tip and ring. When the handset of a phone is
lifted, switches close, causing a loop to be connected (which is known as the
"local loop,") between the telephone and the CO. Once this happens DC current
is able to flow through the telephone with less resistance. This causes a
relay
to energize and signal to other CO equipment that service is being requested.
Eventually, a dial tone is emitted. This also causes the 48 VDC to drop down
into the vicinity of 13 volts. The resistance of the loop also drops below the
2500 ohm level. Considering that this voltage and resistance drop is how the CO
detects that a telephone was taken off hook, how a Black Box works is by
allowing the voltage to drop enough to allow talking, but not enough to signal
to the CO equipment to start billing. To do this, a 10,000 Ohm, .5 Watt
resistor
is incorporated in t{.b=
1.loop on the called party's line.
The Red Box
A Red Box is a device that simulates the sound of a coin being accepted by
a payphone. When a coin is put in the slot of a payphone, the first obstacle is
the magnetic trap. This will stop any light-weight magnetic slugs. If it passes
this, the coin is then classed as a nickel, dime, or quarter. Each coin is then
checked for appropriate size and weight. If these tests are passed, it will
then
travel through a nickel, dime, or quarter magnet as proper. These magnets start
an eddy current effect which causes coins of the appropriate characteristics to
slow down so they will follow the correct trajectory.
If all goes well, the coin will follow the correct path, striking the
appropriate totalizer arm, causing a ratchet wheel to rotate once for every
5-cent increment (eg, a quarter will cause it to rotate 5 times). The totalizer
then causes the coin signal oscillator to readout a dual-frequency signal
indicating the value deposited to the Automated Coin Toll Service computer
(ACTS) or the Traffic Service Position System (TSPS) operator. These are the
tones emitted by the Red Box.
For a quarter, five beep tones are outpulsed for 66 milliseconds (ms). A
dime causes two beep tones for 33 ms, while a nickel causes one beep tone at
also 33 ms. A beep consists of two frequencies, 2200 Hz and 1700 Hz. As with a
Blue Box, Red Box tones can be recorded on a magnetic tape.
Since any call from a payphone is originated with a "ground test," in
which
the TSPS operator or the ACTS computer checks for the presence of the first
coin
inserted into the phone, by verifying use of the magnetic, weight, and size
traps, when using a Red Box, it is necessary to put in at least one coin.
The Cheese Box
A Cheese Box lets a normal telephone emulate a payphone. By emulating a
payphone, using a blue box now becomes safe, because if the CO equipment
recognizes the call as one from a payphone, it does not record it on a CAMA
tape. Since a normal telephone does not have a slot to enter coins, a Red Box
is
needed to generate the sound of a coin dropping.
V. Divertors
A divertor is a special service that allows businesses to "divert" calls
if
no one answers after a certain number of rings. For example, a person calls a
company, and nobody answers. After about three rings, a few clicks are heard,
then a few fainter rings are heard. The building receiving the call has changed
from the company to another building, usually somebody's house. What has
happened is that the call has been re-routed from building A to building B. In
effect, the number called is not really changed, but instead, building A has
answered the call, called building B, and connected the two lines together. If
the person in building B disconnects, the caller is still connected to building
A. With the way the divertor equipment works in the telephone company, the
phone
line of building A will then emit a dial tone and the caller has total control
of the line, and can originate another call, charging it to building A.
VI. Private Branch Exchange
A Private Branch Exchange (PBX) is a system of out-WATS (Wide Area
Telephone Service) lines and in-WATS lines. An out-WATS line allows a business
to make as long-distance calls each month for a flat rate. An in-WATS line is a
toll-free number (800 number) that is also leased to businesses for flat rates.
PBX's save corporations much money when their salesmen, distributors, and
franchisees must make many calls from different parts of the country. It works
much like specialized common carriers (to be discussed later).
First, the employee calls the company on the in-WATS line. The switching
equipment picks up the phone, and send a tone to the employee indicating for
him
to enter the access code of the PBX. If the access code is correct, then the
line is connected to the out-WATS line, and the employee can make a call.
To use PBX's, phreakers must find the access code of the PBX. This can be
done very easily, since the code is usually only a few digits. One way is to
dial different combinations manually on the telephone keypad. The other way is
of the phreaker is the owner of a modem. A simple program can be easily written
to continuously dial digit combinations randomly or sequentially.
VII. Specialized Common Carriers
Ever since the break up of AT&T's monopoly on long-distance service, there
have been many other corporations that compete with AT&T in the long-distance
market, including Sprint, MCI, All-net, ITT, and Metrophone. These all boast
opportunities for large savings on long-distance calls. These companies are
called specialized common carriers (SCC's).
SCC's cost less because they do not use the AT&T's cable-based systems,
but
instead use microwave links. Some have also added fiber-optic lines to their
networks.
Another way they can save consumers money is by using AT&T's lines.
Instead
of connecting calls by the shortest route, the carrier will use a different
route, so the call goes through places where the long-distance traffic is
heavy,
and the rate is lower. The companies that do this are known as "resellers."
Most SCC's work nearly the same as PBX's. The 800 number is called, a tone
is hearl, the private identification number (PIN) is entered, and then the call
can be made. The length of the PIN number can range from four digit to fourteen
digits.
Besides 800 toll free numbers, in some areas, a 950 can be used. A 950
works exactly the same as an 800 number, the only difference is that the
consumer must enter only seven digits before dialing his PIN number instead of
ten with a toll-free number. 950's are free of charge and can be used both at
home and at pay phones.
The PIN numbers can be found the same way as PBX access codes. Since the
number of digits in a PIN is so great, using a computer is much more common
practice than manual dialing.
The following pages are lists of SCC's and their dialups, formats, and
special points. Note that some have many different dialups.
=============================================================================
{ SCC Extenders List }
{ 0-9 - Number of digits in code }
{ { } - Dial that exact number }
{ # - Area code + Prefix + Suffix }
{ : - Dial tone }
{ + - Continue dialing }
=============================================================================
\ Extender \ Dialing Format \ Company \ Comments \
-----------------------------------------------------------------------------
\ 800-223-0548 \ 8+{1}+# \ TDX \ \
\ 800-241-1129 \ 8+{1}+# \ TDX \ \
\ 800-248-6248 \ 6+{1}+# \ SumNet Systems \ (800)824-3000 \
\ 800-288-8845 \ 7:{1}+# \ TMC Watts \ (800)999-3339 \
\ 800-325-0192 \ {1}+#+6 \ MCI \ 950-1986 \
\ 800-325-1337 \ 7:{1}+# \ TMC Watts \ \
\ 800-325-7222 \ 6+{1}+# \ Max \ (800)982-4422 \
\ 800-325-7970 \ 6+{1}+# \ Max \ (800)982-4422 \
\ 800-327-4532 \ 8+# \ All-TelCo \ \
\ 800-327-9488 \ #:13 \ ITT \ 950-0488 \
\ 800-334-0193 \ {9}+# \ Piedmont \ \
\ 800-345-0008 \ {0}+#:14 \ US Sprint FON Cards \950-1033 also 9+#\
\ 800-368-4222 \ 8+# \ Congress Watts Lines \ \
\ 800-437-7010 \ 13 \ GCI \ \
\ 800-448-8989 \ 14+{1}+# \ Call US \ \
\ 800-521-8400 \ 8:# \ TravelNet \ 950-1088 (voice)\
\ 800-541-2255 \ 10 \ MicroTel \ \
\ 800-547-1784 \ 13 \ AmericaNet \ \
\ 800-621-5640 \ 6+{1}+# \ ExpressTel \ \
\ 800-637-4663 \ 5+{1}+# \ TeleSave \ \
\ 800-821-6511 \ 5+{1}+# \ American Pioneer \ (800)852-4154 \
\ 800-821-6629 \ 6+{1}+# \ Max \ (800)982-4422 \
\ 800-821-7961 \ 6+{1}+# \ Max \ (800)982-4422 \
\ 800-826-7397 \ 6:{1}+# \ Call U.S. \ \
\ 800-858-4009 \ 6+{1}+# \ NTS \ Voice \
\ 800-862-2345 \ 7:{1}+# \ TMC \ \
\ 800-877-8000 \ {0}+#:14 \ US Sprint Calling Card\950-1033 also 9+#\
\ 800-882-2255 \ 6:{1}+# \ AmeriCall \ False Carrier \
\ 800-950-1022 \ {0}+#:14 \ MCI Calling Card \ \
\ 800-992-1444 \ 9+# \ AllNet \ 950-1444 \
=============================================================================
VIII. PC Pursuit
Many modem users know Telenet as a packet-switching network through which
they can connect to different telecommunication services throughout the country
for an hourly rate of $2. With PC Pursuit, Telenet uses the same method as
SCC's, but instead of using microwave links, the call is routed through
computers. Since it is routed through computers, the service can be used by
only
owners of modems. Instead of paying the hourly rate, the consumer needs only to
pay a flat monthly rate of $25.
Using PC Pursuit is a little more difficult than using SCC's, because now
instead of combinations of only ten different characters (0-9), the whole
alphabet can be used in the access code. The following is a chart showing the
steps to originate a typical PC Pursuit call.
How to Originate a PC Pursuit Call
First, the users dials the local Telenet Access Center, which can be found
by dialing Telenet customer service at 1-800-336-0437.
Then:
Note: (cr) signifies the carriage return on a computY.Z+e =I9
Network Shows \ User Types \ Explanation
uuuuuuuuuuuuumuuE[]]]]]]][]]]]]][]]]]]]][]]]]q]][]]]]]]][]]]][]]]]]]][]]]]]k
\ (cr) (cr) \
\\
TELENET \ \ Telenet network called and
XXX XXX \ \ your network address.
\\
TERMINAL= \ "D1" (cr) \ Enter "D1" or press (cr)
\\
@ \ For 300 bps: \ CONNECT command. To access
\ "C(sp)DIALXXX/3,XXXX(cr)" \ a PC Pursuit city type a PC
\ \ Pursuit access code and
\ For 1200 bps: \ your user ID.
\ "C(sp)DIALXXX/12,XXXX(cr)" \
\\
PASSWORD= \ "XXXXXX" (cr) \ Type the password
\\
DIALXXX/X \ "ATZ" (cr) \ You are now connected to the
CONNECTED \ \ PCP city. Type ATZ (upper).
\\
OK \ "ATDTXXXXXXX" (cr) \ Dials a number in PCP city
\\
CONNECT \ \ Your are now connected to
\ \ your destination computer.
\\
If the number dialed is busy, the user will see BUSY. To call another
number in the same city, the user types "ATZ." The network will answer OK. The
user then types "ATDTXXXXXXX" (cr) to dial the next number.
To connect to a different PC Pursuit City, when the user sees BUSY, he
types "@" (cr). When a @ appears, you are in business, and ask for the owner of
the number. In some states, though, the operator will
ask for an ID number. In these cases, one must be guessed at.
There is also a type of reverse CN/A bureau, which is usually called a NON
PUB DA or TOLL LIB. With these numbers, somebody can find unpublished numbers
if
the caller gives the operator the name and locality. These are considerably
harder to use, since the operator will then request the caller's name,
supervisors name, etc.
The following is a list of current CN/A's.

1988 CN/A List (subject to change)

Area: CN/A Area: CN/A Area: CN/A
201: 201-676-7070 202: 304-343-7016 203: 203-789-6815
204: 204-949-0900 205: 205-988-7000 206: 206-345-4082
207: 617-787-5300 208: 303-293-8777 209: 415-781-5271
212: 518-471-8111 213: 415-781-5271 214: 214-464-7400
215: 412-633-5600 216: 614-464-0519 217: 217-789-8290
218: 402-221-7199 219: 317-265-4834 301: 304-343-1401
302: 412-633-5600 303: 303-293-8777 304: 304-344-8041
305: 912-752-2000 307: 303-293-8777 308: 402-221-7199
309: 217-525-7000 312: 312-796-9600 313: 313-424-0900
314: 816-275-8460 315: 518-471-8111 316: 913-276-6708
317: 317-265-4834 318: 504-245-5330 319: 402-221-7199
401: 617-787-5300 402: 402-221-7199 403: 403-425-2652
404: 912-752-2000 405: 405-236-6121 406: 303-293-8777
408: 415-546-1341 412: 412-633-5600 413: 617-787-5300
414: 608-252-6932 415: 415-781-5271 416: 416-443-0542
417: 816-275-8460 418: 614-464-0123 419: 614-464-0519
501: 405-236-6121 502: 502-583-2861 503: 206-345-4082
504: 504-245-5330 505: 303-293-8777 506: 506-657-3855
507: 402-380-2255 509: 206-345-4082 512: 512-828-2501
513: 614-464-0519 514: 514-394-7440 515: 402-221-7199
516: 518-471-8111 517: 313-424-0900 518: 518-471-8111
519: 416-443-0542 601: 601-961-8139 602: 303-293-8777
603: 617-787-5300 604: 604-432-2996 605: 402-221-7199
606: 502-583-2861 607: 518-471-8111 608: 608-252-6932
609: 201-676-7070 612: 402-221-7199 613: 416-443-0542
614: 614-464-0519 615: 615-373-5791 616: 313-424-0900
617: 617-787-5300 618: 217-525-7000 619: 415-781-5271
701: 402-221-7199 702: 415-543-2861 703: 304-344-7935
704: 912-752-2000 705: 416-443-0542 707: 415-781-5271
712: 402-221-7199 713: 713-961-2397 714: 213-995-0221
715: 608-252-6932 716: 518-471-8111 717: 412-633-5600
718: 518-471-8111 801: 303-293-8777 802: 617-787-5300
803: 912-784-9111 804: 304-344-7935 805: 415-781-5271
806: 512-828-2501 808: 212-226-5487 809: 404-751-8871
812: 317-265-4834 813: 813-228-7871 814: 412-633-5600
815: 217-789-8290 816: 816-275-8460 817: 214-464-7400
819: 514-861-6391 901: 615-373-5791 902: 902-421-4110
904: 912-752-2000 906: 313-424-0900 912: 912-752-2000
914: 518-471-8111 916: 415-781-5271
918: 405-236-6121 912: 912-752-2000
XI. Loops
The {k..is an alternative communication medium that has many potential
uses. Loops are phone lines that are connected when they are called
simultaneously. One use is when somebody wants another person to call them back
but is reluctant to give out their home phone number (eg., if they were on a
party line).
Loops are found in pairs that are usually close to each other (eg.,
718-492-9996 and 718-492-9997). On a loop, one line is the high end, and the
other is the low end. The high end is always silent. The tone disappears on
the
low end when somebody calls the high end.
It is truly only safe to use a loop during non-business hours. During
business, loops are used to test equipment by various telephone companies and
local CO's.
XII. Alliance Teleconferencing
Alliance Teleconferencing is an independent company which allows the
general public to access and use its conferencing equipment.

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,660 @@
WRITTEN BY::DOCTOR DISSECTOR
HTML & GRAPHICS BY: THE DIGITAL SNIPER
**** An Official Phortune 500 Product ****
----------------------------------------------
a useful source for the phreaker covering both
the basics and advances of phreaking
----------------------------------------------
GENERAL NOTE
------------
The purpose of this newsletter is purely educational. It has been released in order to teach
and advance the knowledge of today's declining phreaks. However, the author does not
take any responsibility over the misuse of the herein contained information, and the
newsletter itself does not encourage or support the above type of activity. Also, any wrong
or old information in this document is not to the responsibility of the author, and the reader
accepts any consequences due to information that may be mistaken in this manner.
NOTE TO ABUSERS
---------------
All information contained within this document was intended towards educational purposes.
Any misuse or illegal use of the information contained in this document is strictly at the
misuser's risk. The author assumes NO responsibility of the reader's actions following the
release this document (in otherwords, you're on your own if you get nailed!)
TPH #1 Table Of Contents:
=========================
Title Page & Disclaimer Notes
Table Of Contents & Introduction
The Phreak's Vitals
True Definition Of The Phreaker
The Phone Phreak's Ten Commandments
The Phreaker's Glossary
Other Fone Information
Voltages & Technical Stuff
Scanning Phun Fone Stuff
References & Suggested Reading
Introduction To TPH #1
======================
This phile was written for beginning as well as those uninformed
"advanced" phreaks who need something as a reference when reading
or writing philes concerning phreaking or fone phraud. Of course, you
could be a beginning phreak and use this phile to B.S. your way into a
big group by acting like you know a lot, or something, but that is up
to you. Anyway, I compiled this listing phrom various sources, the
majority is listed as references at the end of this phile.
This phile's only goal is to educate and inform. Any illegal or
fraudulent activity is neither encouraged nor supported by the author
of this phile, not by the majority of the >TRUE< phreaking community.
The author assumes NO responsibility for the actions of the reader.
Also, I know that some of the stuff covered in this release of TPH
will be old and outdated; however, I will try to clean that up by the
next release of TPH, and will notify you, the reader, of the changes
due to these revisions.
The Phreak's Vitals:
====================
True Definition Of The Phreaker
-------------------------------
"Many people think of phone phreaks as slime, out to rip off Bell for
all she is worth. Nothing could be further from the truth! Granted,
there are some who get their kicks by making free calls; however,
they are not true phone phreaks. Real phone phreaks are
'telecommunications hobbyists' who experiment, play with, and learn
from the phone system. Occasionally, this experimenting and a need
to communicate with other phreaks, without going broke, leads to free
calls. The free calls are but a small subset of a >TRUE< phone phreak's
activities."
- Wise Words Of The Magician
The Phone Phreak's Ten Commandments
-----------------------------------
I. Box thou not over thine home telephone wires, for those who doest
will surely bring the wrath of the Chief Special Agent down upon
thy head.
II. Speakest thou not of important matters over thine home telephone
wires, for to do so is to risk thine right of freedom.
III. Use not thine own name when speaking to other phreaks, for that
every third phreak is an FBI agent is well known.
IV. Let not overly many people know that thy be a phreak, as to do so
is to use thine own self as a sacrificial lamb.
V. If thou be in school, strive to get thine self good grades, for the
authorities well know that scholars never break the law.
VI. If thou workest, try to be an employee and impressest thine boss
with thine enthusiasm, for important employees are often saved by
their own bosses.
VII. Storest thou not thine stolen goodes in thine own home, for those
who do are surely non-believers in the Bell System Security Forces,
and are not long for this world.
VIII. Attractest thou not the attention of the authorities, as the
less noticeable thou art, the better.
IX. Makest sure thine friends are instant amnesiacs and willst not
remember thou hast called illegally, for their cooperation with the
authorities willst surely lessen thine time for freedom on this
earth.
X. Supportest thou TAP, as it is thine newsletter, and without it, thy
work would be far more limited.
The Phreaker's Glossary
=======================
1XB - No.1 Crossbar system. See XBAR for more information.
2600 - A hack/phreak oriented newsletter that periodically was
released and still is being released. See Phile 1.6 for more
information on the magazine and ordering.
4XB - No.4 Crossbar system. See XBAR for more information.
5XB - No.5 Crossbar system. The primary end office switch of Bell
since the 60's and still in wide use. See XBAR for more detail.
700 Services - These services are reserved as an advanced forwarding
system, where the forwarding is advanced to a user-programed
location which could be changed by the user.
800 Exceptional Calling Report - System set up by ESS that will log
any caller that excessively dials 800 numbers or directory
assistance. See ESS for more information.
800 Services - Also known as WATS. These services often contain WATS
extenders which, when used with a code, may be used to call
LD. Many LD companies use these services because they are
toll-free to customers. Most 800 extenders are considered dangerous
because most have the ability to trace.
900 Services - Numbers in the 900 SAC usually are used as special
services, such as TV polls and such. These usually are $.50 for the
first minute and $.35 for each additional minute. Dial (900)555-1212
to find out what the 900 services currently have to offer.
950 - A nationwide access exchange in most areas. Many LD companies
have extenders located somewhere on this exchange; however, all
services on this exchange are considered dangerous due to the fact
that they ALL have the ability to trace. Most 950 services have
crystal clear connections.
ACCS - Automated Calling Card Service. The typical 0+NPA+Nxx+xxxx
method of inputting calling cards and then you input the calling
card via touch tones. This would not be possible without ACTS.
ACD - Automatic Call Distributor.
ACD Testing Mode - Automatic Call Distributor Test Mode. This level of
phreaking can be obtained by pressing the "D" key down after
calling DA. This can only be done in areas that have the ACD. The
ACD Testing Mode is characterized by a pulsing dial tone. From here,
you can get one side of a loop by dialing 6, the other side is 7.
You may also be able to REMOB a line. All possibilities of the ACD
Test have not been experimented with. See silver box for more details.
ACTS - Automated Coin Toll Service. This is a computer system that
automates phortress fone service by listening for red box tones and
takes appropriate action. It is this service that is commonly heard
saying, "Two dollars please. Please deposit two dollars for the next
three minutes." Also, if you talk for more than three minutes and
then hang up, ACTS will call back and demand your money. ACTS is
also responsible for ACCS.
Alliance - A teleconferencing system that is apart from AT&T which
allows the general public to access and use its conferencing
equipment. The equipment allows group conversations with members
participating from throughout the United States. The fone number to
Alliance generally follows the format of 0-700-456-x00x depending on
the location the call originates from and is not accessible direct
by all cities/states.
AMA - Automated Message Accounting. Similar to the CAMA system; see
CAMA for more info.
analog - As used for a word or data transmission, a continuously
varying electrical signal in the shape of a wave.
ANI - Automatic Number Identification - This is the system you can
call, usually a three digit number or one in the 99xx's of
your exchange, and have the originating number you are calling
from read to you by a computer. This is useful if you don't know
the number you are calling from, for finding diverters, and when
you are playing around with other fone equipment like cans or beige
boxes. The ANI system is often incorporated into other fone companies
such as Sprint and MCI in order to trace those big bad phreaks that
abuze codez.
ANIF - Automatic Number Identification Failure. When the ANI system of
a particular office fails.
APF - All PINs Fail. This is a security measure which is designed to
frustrate attempts at discovering valid PINs by a hacking method.
aqua box - A box designed to drain the voltage of the FBI lock-in-
trace/trap-trace so you can hang up your fone in an emergency and
phrustrate the Pheds some more. The apparatus is simple, just
connect the two middle wires of a phone wire and plug, which would
be the red and green wires if in the jack, to the cord of some
electrical appliance; ie, light bulb or radio. KEEP THE APPLIANCE
OFF. Then, get one of those line splitters that will let you hook
two phone plugs into one jack. Plug the end of the modified cord
into one jack and your fone into the other. THE APPLIANCE MUST BE
OFF! Then, when the Pheds turn their lame tracer on and you find
that you can't hang up, remove your fone from the jack and turn
the appliance ON and keep it ON until you feel safe; it may be
awhile. Then turn it off, plug your fone back in, and start
phreaking again.
Invented by: Captain Xerox and The Traveler.
BAUDOT - 45.5 baud. Also known as the Apple Cat Can.
BEF - Band Elimination Filter. A muting system that will mute the 2600
Hz tone which signals hang-up when you hang up.
beige box - An apparatus that is a home-made lineman's handset. It is
a regular fone that has clips where the red and green wires normally
connect to in a fone jack. These clips will attach to the rings
and tips found in many of MA's output devices. These are highly
portable and VERY useful when messing around with cans and other
output devices the fone company has around.
Invented by: The Exterminator and The Terminal Man.
BITNET - Nationwide system for colleges and schools which accesses a
large base of education-oriented information. Access ports are
always via mainframe.
bit stream - Refers to a continuous series of bits, binary digits,
being transmitted on a transmission line.
black box - The infamous box that allows the calling party to not be
billed for the call placed. We won't go in depth right now, most
plans can be found on many phreak oriented BBS's. The telco can
detect black boxes if they suspect one on the line. Also, these
will not work under ESS.
bleeper boxes - The United Kingdom's own version of the blue box,
modified to work with the UK's fone system. Based on the same
principles. However, they use two sets of frequencies, foreword
and backwards.
Blotto box - This box supposedly shorts every fone out in the immediate
area, and I don't doubt it. It should kill every fone in the
immediate area, until the voltage reaches the fone company, and the
fone company filters it. I won't cover this one in this issue, cuz
it is dangerous, and phreaks shouldn't destroy MA's equipment, just
phuck it up. Look for this on your phavorite BBS or ask your
phavorite phreak for info if you really are serious about seriously
phucking some fones in some area.
blue box - An old piece of equipment that emulated a true operator
placing calls, and operators get calls for free. The blue box seizes
an open trunk by blasting a 2600 Hz tone through the line after
dialing a party that is local or in the 800 NPA so calls will be
local or free for the blue boxer. Then, when the blue boxer has
seized a trunk, the boxer may then, within the next 10-15 seconds,
dial another fone number via MF tones. These MF tones must be
preceded by a KP tone and followed with a ST tone. All of these
tones are standardized by Bell. The tones as well as the inter-digit
intervals are around 75ms. It may vary with the equipment used since
ESS can handle higher speeds and doesn't need inter-digit intervals.
There are many uses to a blue box, and we will not cover any more
here. See your local phreak or phreak oriented BBS for in depth info
concerning blue boxes and blue boxing. Incidentally, blue boxes are
not considered safe anymore because ESS detects "foreign" tones, such
as the 2600 Hz tone, but this detection may be delayed by mixing pink
noise of above 3000 Hz with the 2600 Hz tone. To hang up, the 2600 Hz
tone is played again. Also, all blue boxes are green boxes because MF
"2" corresponds to the Coin Collect tone on the green box, and the
"KP" tone corresponds to the Coin Return tone on the green box. See
green box for more information. Blue boxing is IMPOSSIBLE under the
new CCIS system slowly being integrated into the Bell system.
blue box tones - The MF tones generated by the blue box in order to
place calls, emulating a true operator. These dual tones must be
entered during the 10-15 second period after you have seized a
trunk with the 2600 Hz tone.
700: 1 : 2 : 4 : 7 : 11 : KP= Key Pulse
Parallel Frequencies 900: ** : 3 : 5 : 8 : 12 : ST= STop
2= Coin Collect 1100: ** : ** : 6 : 9 : KP : KP2= Key Pulse 2
KP= Coin Return 1300: ** : ** : ** : 10 :KP2 : **= None
(green box tones) 1500: ** : ** : ** : ** : ST :
: 900:1100:1300:1500:1700: 75ms pulse/pause
BLV - Busy Line Verification. Allows a TSPS operator to process a
customer's request for a confirmation of a repeatedly busy line.
This service is used in conjunction with emergency break-ins.
BNS - Billed Number Screening.
break period - Time when the circuit during pulse dialing is left
open. In the US, this period is 40ms; foreign nations may use 33ms
break periods.
break ratio - The interval pulse dialing breaks and makes the loop
when dialing. The US standard is 10 pulses per second. When the
circuit is opened, it is called the break interval. When the circuit
is closed, it is called the make interval. In the US, there is a
60ms make period and a 40ms break period. This is often referred to
as a 60% make interval. Many foreign nations have a 67% make interval.
bridge - I don't really understand this one, but these are important
phreak toys. I'll cover them more in the next issue of TPH.
British Post Office - The United Kingdom's equivalent to Ma Bell.
busy box - Box that will cause the fone to be busy, without taking it
OFF-HOOK. Just get a piece of fone wire with a plug on the end,
cut it off so there is a plug and about two inches of fone line.
Then, strip the wire so the two middle wires, the tip and the ring,
are exposed. Then, wrap the ring and the tip together, tape with
electrical tape, and plug into the fone jack. The fone will be busy
until the box is removed.
cans - Cans are those big silver boxes on top of or around the telephone
poles. When opened, the lines can be manipulated with a beige box
or whatever phun you have in mind.
calling card - Another form of the LD service used by many major LD
companies that composes of the customers fone number and a PIN
number. The most important thing to know when questioned about
calling cards are the area code and the city where the calling card
customer originated from.
CAMA - Centralized Automatic Message Accounting. System that records
the numbers called by fones and other LD systems. The recording can
be used as evidence in court.
CC - Calling Card.
CC - Credit Card.
CCIS - Common Channel Inter-office Signaling. New method being incorporated
under Bell that will send all the signaling information over separate
data lines. Blue boxing is IMPOSSIBLE under this system.
CCITT - The initials of the name in French of the International Telegraph
and Telephone Consultative Committee. At CCITT representatives of
telecommunications authorities, operators of public networks and
other interested bodies meet to agree on standards needed for
international intermarrying of telecommunications services.
CCS - Calling Card Service.
CCSS - Common Channel Signalling System. A system whereby all signalling
for a number of voice paths are carried over one common channel,
instead of within each individual channel.
CDA - Coin Detection and Announcement.
CF - Coin First. A type of fortress fone that wants your money before
you receive a dial tone.
Channel - A means of one-way transmission or a UCA path for electrical
transmission between two or more points without common carrier,
provided terminal equipment. Also called a circuit, line, link,
path, or facility.
cheese box - Another type of box which, when coupled with call forwarding
services, will allow one to place free fone calls. The safety of
this box is unknown. See references for information concerning text
philes on this box.
clear box - Piece of equipment that compromises of a telephone pickup
coil and a small amp. This works on the principal that all receivers
are also weak transmitters. So, you amplify your signal on PP
fortress fones and spare yourself some change.
CN/A - Customer Name And Address. Systems where authorized Bell employees
can find out the name and address of any customer in the Bell
System. All fone numbers are listed on file, including unlisted
numbers. Some CN/A services ask for ID#'s when you make a request.
To use, call the CN/A office during normal business hours, and say
that you are so and so from a certain business or office, related to
customers or something like that, and you need the customer's name
and address at (NPA)Nxx-xxxx. That should work. The operators to
these services usually know more than DA operators do and are also
susceptible to "social engineering." It is possible to bullshit a
CN/A operator for the NON PUB DA number and policy changes in the
CN/A system.
CO Code - Central Office code which is also the Nxx code. See Nxx for
more details. Sometimes known as the local end office.
conference calls - To have multiple lines inter-connected in order to
have many people talking in the same conversation on the fone at
once. See Alliance and switch crashing for more information.
credit operator - Same as TSPS operator. The operator you get when you
dial "0" on your fone and phortress fones. See TSPS for more
information.
CSDC - Circuit Switched Digital Capability. Another USDN service that
has no ISDN counterpart.
DA - Directory Assistance. See directory assistance.
DAO - Directory Assistance Operator. See directory assistance.
data communications - In telefone company terminology, data communications
refers to an end-to-end transmission of any kind of information
other than sound, including voice, or video. Data sources may be
either digital or analog.
data rate - The rate at which a channel carries data, measured in bits
per second, bit/s, also known as "data signalling rate."
data signalling rate - Same as "data rate." See data rate.
DCO-CS - Digital Central Office-Carrier Switch.
DDD - Direct Distance Dialed.
Dial-It Services - See 900 Services.
digital - A method to represent information to be discrete or individually
distinct signals, such as bits, as opposed to a continuously
variable analog signal.
digital transmission - A mode of transmission in which all information
to be transmitted is first converted to digital form and then
transmitted as a serial stream of pulses. Any signal, voice, data,
television, can be converted to digital form.
Dimension 2000 - Another LD service located at (800)848-9000.
directory assistance - Operator that you get when you call 411 or
NPA-555-1212. This call will cost $.50 per call. These won't know
where you are calling from, unless you annoy them, and do not have
access to unlisted numbers. There are also directory assistance
operators for the deaf that transfer BAUDOT. You can call these and
have interesting conversations. The fone number is 800-855-1155, are
free, and use standard Telex abbreviations such as GA for Go Ahead.
These are nicer than normal operators, and are often subject to
"social engineering" skills (bullshitting). Other operators also
have access to their own directory assistance at KP+NPA+131+ST.
diverter - This is a nice phreak tool. What a diverter is is a type of
call forwarding system done externally, apart from the fone company,
which is a piece of hardware that will foreword the call to
somewhere else. These can be found on many 24 hour plumbers, doctors,
etc. When you call, you will often hear a click and then ringing, or
a ring, then a click, then another ring, the second ring often sounds
different from the first. Then, the other side picks the fone up and
you ask about their company or something stupid, but DO NOT ANNOY
them. Then eventually, let them hang up, DO NOT HANG UP YOURSELF.
Wait for the dial tone, then dial ANI. If the number ANI reads is
different from the one you are calling from, then you have a
diverter. Call anywhere you want, for all calls will be billed to
the diverter. Also, if someone uses a tracer on you, then they trace
the diverter and you are safe. Diverters can, however, hang up on you
after a period of time; some companies make diverters that can be
set to clear the line after a set period of time, or click every once
in a while, which is super annoying, but it will still work.
Diverters are usually safer than LD extenders, but there are no
guarantees. Diverters can also be accessed via phortress fones. Dial
the credit operator and ask for the AT&T CREDIT OPERATOR. They will
put on some lame recording that is pretty long. Don't say anything
and the recording will hang up. LET IT HANG UP, DO NOT HANG UP. Then
the line will clear and you will get a dial tone. Place any call you
want with the following format: 9+1+NPA+Nxx+xxxx, or for local calls,
just 9+Nxx+xxxx. I'd advise that you call ANI first as a local call
to make sure you have a diverter.
DLS - Dial Line Service.
DNR - Also known as pen register. See pen register.
DOV - Data-Over-Voice.
DSI - Data Subscriber Interface. Unit in the LADT system that will
concentrate data from 123 subscribers to a 56k or a 9.6k
bit-per-second trunk to a packet network.
DT - Dial tone.
DTF - Dial Tone First. This is a type of fortress fone that gives you
a dial tone first.
DTI - Digital Trunk Interface.
DTMF - Dual-Tone-Multi-Frequency, the generic term for the touch tone.
These include 0,1,2,3,4,5,6,7,8,9 as well as A,B,C,D. See silver
box for more details.
DVM - Data Voice Multiplexor. A system that squeezes more out of a
transmission medium and allows a customer to transmit voice and data
simultaneously to more than one receiver over the existing telefone
line.
emergency break-in - Name given to the art of "breaking" into a busy
number which will usually result in becoming a third party in the
call taking place.
end office - Any class 5 switching office in North America.
end-to-end signalling - A mode of network operation in which the
originating central office, or station, retains control and signals
directly to each successive central office, or PBX, as trunks are
added to the connection.
ESS - Electronic Switching System. "The phreak's nightmare come true."
With ESS, EVERY SINGLE digit you dial is recorded, even mistakes.
The system records who you call, when you call, how long you
talked, and, in some cases, what you talked about. ESS is programed
to make a list of people who make excessive 800 calls or directory
assistance. This is called the "800 Exceptional Calling Report." ESS
can be programed to print out logs of who called certain numbers,
such as a bookie, a known communist, a BBS, etc. ESS is a series of
programs working together; these programs can be very easily changed
to do whatever the fone company wants ESS to do. With ESS, tracing
is done in MILLISECONDS and will pick up any "foreign" tones on the
line, such as 2600 Hz. Bell predicts the whole country will be on
ESS by 1990! You can identify an ESS office by the functions, such
as dialing 911 for help, fortress fones with DT first, special
services such as call forwarding, speed dialing, call waiting, etc.,
and ANI on LD calls. Also, black boxes and Infinity transmitters
will NOT work under ESS.
extender - A fone line that serves as a middleman for a fone call, such
as the 800 or 950 extenders. These systems usually require a multi-
digit code and have some sort of ANI to trace suspicious calls with.
facsimile - A system for the transmission of images. The image is scanned
at the transmitter, reconstructed at the receiving station, and
duplicated on some form of paper. Also known as a FAX.
FAX - See facsimile for details.
FiRM - A large cracking group who is slowly taking the place of PTL and
the endangered cracking groups at the time of this writing.
fortress phone - Today's modern, armor plated, pay fone. These may be
the older, 3 coin/coin first fones or the newer, 1 coin/DT first
fones. There are also others, see CF, DTF, and PP. Most phortresses
can be found in the 9xxx or 98xx series of your local Nxx.
gateway city - See ISC.
Gestapo - The telefone company's security force. These nasties are the
ones that stake out misused phortresses as well as go after those
bad phreaks that might be phucking with the fone system.
green base - A type of output device used by the fone company. Usually
light green in color and stick up a few feet from the ground. See
output device for more information.
green box - Equipment that will emulate the Coin Collect, Coin Return,
and Ringback tones. This means that if you call someone with a
fortress fone and they have a green box, by activating it, your
money will be returned. The tones are, in hertz, Coin Collect=700+
1100, Coin Return=1100+1700, and Ringback=700+1700. However, before
these tones are sent, the MF detectors at the CO must be alerted,
this can be done by sending a 900+1500 Hz or single 2600 Hz wink
of 90ms followed by a 60ms gap, and then the appropriate signal for
at least 900ms.
gold box - This box will trace calls, tell if the call is being traced,
and can change a trace.
grey box - Also known as a silver box. See silver box.
group chief - The name of the highest ranking official in any fone
office. Ask to speak to these if an operator is giving you trouble.
high-speed data - A rate of data transfer ranging upward from 10,000
bits per second.
H/M - Hotel/Motel.
ICH - International Call Handling. Used for overseas calls.
ICVT - InComing Verification Trunk.
IDA - Integrated Digital Access. The United Kingdom's equivalent of
ISDN.
IDDD - International Direct Distance Dialing - The ability to place
international calls direct without processing through a station.
Usually, one would have to place the call through a 011, station, or
a 01, operator assisted, type of setup.
IDN - Integrated Digital Networks. Networks which provide digital
access and transmission, in both circuit switched and packet modes.
in-band - The method of sending signaling information along with the
conversion using tones to represent digits.
INS - Information Network System. Japan's equivalent of ISDN.
Intercept - The intercept operator is the one you get connected to when
there are not enough recordings available to tell you that the
number has been disconnected or changed. These usually ask what
number you are calling and are the lowest form of the operator.
intermediate point - Any class 4X switching office in North America.
Also known as an RSU.
international dialing - In order to call across country borders, one must
use the format PREFIX + COUNTRY CODE + NATION #. The prefix in
North America is usually 011 for station-to-station calls or 01 for
operator-assisted calls. If you have IDDD, you don't need to place
this prefix in.
INTT - Incoming No Test Trunks.
INWARD - An operator that assists your local TSPS '0' operator in
connecting calls. These won't question you as long as the call is
within their service area. The operator can ONLY be reached by other
operators or a blue box. The blue box number is KP+NPA+121+ST for
the INWARD operator that will help you connect to any calls in that
area ONLY.
INWATS - Inward Wide Area Telecommunications Service. These are the 800

View File

@@ -0,0 +1,409 @@
Hitchhikers guide to the phone system.. Phreaking in the nineties
(By Billsf)
Introduction
------------
In this article I will try to introduce you to the most complex machine on
earth: the phone system. It's a guide to having fun with the technology, and
I hope it will help you on your travels through the network. It is by no
means a definitive manual: If you really want to get into this, there are lots
of additional things you must learn and read.
This article assumes you know a little bit about the history of phreaking.
It is meant as an update for the sometimes very outdated documents that can
be downloaded from BBS's. In here I'll tell you which of the old tricks might
still work today, and what new tricks you may discover as you become a phone
phreak.
As you learn to phreak you will (hopefully) find ways to make calls that
you could not make in any other way. Calls to test numbers that you cannot
reach from normal network, calls to ships (unaffordable otherwise), and much
more. As you tell others about the hidden world you have discovered, you will
run into people who have been brainwashed into thinking that all exploration
into the inner workings of the phone system is theft or fraud. Convincing
these people of your right to explore is probably a waste of time, and does
not advance your technical knowledge.
Phreaking is like magic in more than one way. Those people who are really
good share their tricks with each other, but usually don't give out these
tricks to anyone walking by. This will be somewhat annoying at first, but
once you're really good you'll understand that it's very unpleasant if the
trick you just discovered is wasted the very next day. I could tell you at
least twenty new tricks in this article but I prefer to teach you how to find
your own.
Having said this, the best way to get into phreaking is to hook up with
other phreaks. Unlike any other sub-culture, phreaks are not bound by any
geographical restrictions. You can find other phreaks by looking for
hacker/phreak BBS's in your region. Having made contact there you may en-
counter these same people in teleconferences that are regularly set up. These
conferences usually have people from all over the planet. Most phreaks from
other contries outside the United States speak Englisch, so language is not
as much of a barrier as you might think.
If you live in a currently repressed area, such as the United States, you
should beware that even the things that you consider "harmless exploring"
could get you into lots of trouble (confiscation of computer, fines, probation
jail, loss of job, etc.). Use your own judgement and find your protection.
Getting Started
---------------
The human voice contains components as low as 70Hz, and as high as 8000Hz.
Most energy however is between 700 and 900Hz. If you cut off the part under
200 and above 3000, all useful information is still there. This is exactly
what phone companies do on long distance circuits.
If you think all you have to do is blow 2600Hz and use a set of twelve MF
combinations, you have a lot of catching up to do. One of the first multi-
frequency systems was R1 with 2600Hz as the line signalling frequency, but for
obvious reasons it is rarely used anymore, except for some very small remote
communities. In this case its use is restricted, meaning it will not give you
access to all the world in most cases.
To begin with, all experimenting starts at home. As you use your phone,
take careful note as what it does on a variety of calls. Do you hear "dialing"
in the background of certain calls as they are set up? Do you hear any high
pitched beeps while a call is setting up, as it's answered or at hangup of
the called party?
Can you make your CO fial to complete a call either by playing with the
switchhook or dialing strange numbers? If you are in the United States, did
you ever do something that will produce a recording:"We're sorry, your call
did not go through..." after about 15 seconds of nothing?
If you can do the last item, you are "in" for sure! Any beeps on answer or
hang-up of the called party also means a sure way in. Hearing the actual MF
tones produced by the telco may also be your way in. While it would be nice
to find this behavior on a toll-free circuit, you may consider using a
national toll circuit to get an overseas call or even a local circuit for a
bigger discount. Every phone in the world has a way in. All you have to do
is find one!
An overview of Systems
----------------------
First we must start with numbering plans. The world is divided up into
eight separate zones. Zone 1 is the United States, Canada and some Caribbean
nations having NPA 809. Zone 2 is Africa. Greenland (299) and Faroe Islands
(298) do not like their Zone 2 assignment, but Zones 3 and 4 (Europe) are
all taken up. Since the DDR is now unified with BRD (Germany) the code 37 is
up for grabs and will probably be subdivided into ten new country codes to
allow the new nations of Europe, including the Baltics, to have their own
codes. Greenland and the Faroe Islands should each get a 37x country code.
Zone 5 is Latin America, including Mexico (52) and Cuba (53). Zone 6 is the
south Pacific and includes Australia (61), New Zealand (64) and Malaysia (60).
Zone 7 is now called CIS (formerly the Soviet Union), but may become a third
European Code. Zone 8 is Asia and includes Japan (81), Korea (82), Vietnam
(84), China (86), and many others. Zone 9 is the sub-continent of India (91)
and surrounding regions. A special sub-zone is 87, which is the maritime
satellite service (Inmarsat). Country code 99 is reserved as a test code for
international and national purposes and may contain many interesting numbers.
In zone 1, a ten digit number follows with a fixed format, severely limiting
the total number of phones. NPA's like 310 and 510 attest to that. The new
plan (beginning in 1995) will allow the middle digit to be other than 1 or 0,
allowing up to five times more phones. This is predicted to last into the
21st century. After that Zone 1 must move to the fully extensible system used
in the rest of the world.
The "rest of the world" uses a system where "0" precedes the area code for
numbers dialed within the country code. France and Denmark are notable ex-
ceptions, where there are no area codes or just one as in France (1 for Paris
and just eight digits for the rest). This system has proven to be a total
mess - worse than the Zone 1 plan!
In the usual numbering system, the area code can be of any length, but at
this time between one and five digits are used. The phone number can be any
length too, the only requirement being that the whole number, including the
country code but not the zero before the area code, must not exceed fourteen
digits. Second dialtones are used in some systems to tell customers they are
connected to the area they are calling and are to proceed with the number.
With step-by-step, you would literally connect to the distant city and then
actually signal it with your pulses. Today, if second dialtones are used it's
only because they were used in the past. They have no meaning today, much
like the second dialtones in the custom calling features common in the United
States. The advantages of the above "linked" system is that it allows ex-
pansion where needed without affecting other numbers. Very small villages may
only have a three digit number while big cities may have eight digit numbers.
Variations of this basic theme are common. In Germany, a large company in
Hamburg may have a basic five digit number for the reception and eight digit
numbers for the employee extensions. In another case in this same town,
analog lines have seven digits and ISDN lines have eight digits. In many
places it common to have different length numbers coming to the same place.
As confusing as it sounds, it really is easier to deal with than the fixed
number plan!
International Signalling Systems
--------------------------------
CCITT number four (C4) is an early system that linked Europe together and
connected to other systems for overseas calls. C4 uses two tones: 2040 and
2400. Both are played together for 150mS (P) to get the attention of the
distant end, followed by a "long" (XX or YY = 350mS) or a "short" (X or Y =
100mS) of either 2040 (x or X) or 2400 (y or Y) to indicate status of the
call buildup. Address data (x=1 or y=0, 35 ms) is sent in bursts of four bits
as hex digits, allowing 16 different codes. One hundred milliseconds of
silence was placed between each digit in automatic working. Each digit there-
fore took 240mS to send. This silence interval was non-critical and often had
no timeout, allowing for manual working. C4 is no longer in wide use, but it
was, due to its extreme simplicity a phreak favorite.
CCITT number five (C5) is still the world's number one overseas signalling
method; over 80 percent of all overseas trunks use it. The "plieks" and tones
on Pink Floyd's "The Wall" are C5, but the producer edited it, revealing an
incomplete number with the old code for Londen. He also botched the cadance
of the address signalling very badly, yet it really sounds OK to the ear as
perhaps the only example most Americans have of what an overseas call sounds
like!
In actual overseas working, one-half second of 2400 and 2600Hz, compound,
is sent (clear forward) followed by just the 2400Hz (seize), which readies
the trunk for the address signalling. All address signals are preceded with
KP1 (code 13) for terminal traffic, plus a discriminating digit for the class
of call and the number. The last digit is ST (code 15) to tell the system
signalling is over. For international transit working, KP2 (code 14) is used
to tell the system a country code follows, after which the procedure is
identical to the terminal procedure.
CCITT six and seven (C6 and C7) are not directly accessible from the
customer's line, yet many "inband" systems interface to both of thes. C6 is
also called Common Channel Interoffice Signalling (CCIS) and as its name
implies, a dedicated line carries all the setup information for a group of
trunks. Modems (usually 1200 Bps) are used at each end of the circuit. CCIS
is cheaper, and as an added benefit, killed all the child's play blue boxing
that was common in the states in the 60's and early 70's. In the early 80's
fiber and other digital transmission became commonplace, and a new signalling
standard was required. C7 places all line, address, and result (backward)
signalling on a Time Division Multiplexed Circuit (TDM and TDMC) along with
everything else like data and voice. All ISDN systems require the use of SS7
to communicate on all levels from local to worldwide.
The ITU/CCITT has developed a signalling system for very wide and general
use. One called "The European System", R2 has become a very widespread inter-
national system used on all continents. R2 is the most versatile end-to-end
system ever developed. It is a two-way system like C7 and comes in two forms,
analog and digital, both fully compatible with each other. R2 has completely
replaced C4, with the possible exception of a few very remote areas where it
works into R2 using using registers. Two groups of fifteen, two of six MF
tones are used for each direction, the high frequency group forward and the
low group backward. Line signalling can be digital with two channels or out-
of-band at 3825Hz, DC, or in cases of limited bandwidth on trunks, can use the
C4 line signals, just the 2040 + 2400Hz or 3000Hz or even backward signals
sent in a forward direction. The signals can be digitally quantised using the
A-law or u-law codec standards, resulting in compatible signals for analog
lines. In international working, only a small part of the standard is man-
datory with a massive number of options available. For national working, an
ample number of MF combinations are "reserved for national use", providing
an expandable system with virtually limitless capabilities. R2 is the "system
of the nineties" and mastering this, for the first time, allows the phone
phreak "to hold the whole world in his hands" in a manner that the person who
coined this phrase could have only dreamed of in the early seventies!
With the exception of bilateral agreements between neighboring countries to
make each other's national systems compatible, especially in border regions,
all international systems in use are: C5, C6, C7, and R2. R2 is limited to a
single numbering region by policy and must use one of the three remaining
systems for overseas working. There are few technical limitations to prevent
R2 from working with satellites, TASI, or other analog/digital underseas
cables. The spec is flexible enough to allow overseas working, but is not
done at the present time. R2 is likely to displace C5 on the remaining analog
trunks in the near future.
DTMF is on a 4x4 matrix, one tone from a row and one from a column.
1=697+1209, etc.
1209 1336 1477 1633
697 1 2 3 A
770 4 5 6 B
852 7 8 9 C
941 * 0 # D
MF signalling, often used to signal between pionts, uses a 2 of 6 matrix.
Each tone has a weighting which adds up to an unique number. The three
standard sets of tones use this system.
Digit Weighting
1 0+1
2 0+2
3 1+2
4 0+4
5 1+4
6 2+4
7 0+7
8 1+7
9 2+7
0 (Code 10) 4+7
11 (Code 11) 0+12
12 (Code 12) 1+12
KP1 (Code 13) 2+12
KP2 (Code 14) 3+12
ST (Code 15) 7+12
For C5, either KP is 100mS and each digit lasts 50mS. A 50mS off time is used
between each digit. For older R1 systems, the KP is 100mS and each digit is
68mS on and 68mS off. Modern systems are C5 compatible and use the C5 timing.
In North America, an additional 50 or 68mS pause is inserted before the last
digit.
Example: KP18(pause)2ST.....KP03120600148(pause)0ST. This pattern was added
about 15 years ago and appears to be unnecessary, except to give an audible
indication of false (blue box) signalling. Its is is HIGHLY recommended for
phreaks where it is normally used by the telco! R2 is a COMPELLED system
where reception of the forward signal produces a backward signal, which at
its reception, stops the forward signal. The stopping of the forward signal
stops the backward signal, and when the stopping of the backward signal is
detected, a new forward signal is generated. This goes back and forth until
all the information is transmitted. The backward signal (usually "1", send
next digit) tells the sendig end what to send next. See the CCITT Red Book
or Welch for complete information on both systems.
Weight MFC R2 forward R2 Backward
0 700 1380 1140
1 900 1500 1020
2 1100 1620 900
4 1300 1740 780
7 1500 1860 660
12 1700 1980 540
C4 is the old European signalling system. The address signals have 35mS pause
between each beep and 100mS pause (minimum) between each digit. Minimum time
to send a digit (including pause) is 345mS. This system is limited use today,
if at all.
x: 2040 35mS (binary "1")
y: 2400 35mS (binary "0")
X: 2040 100mS
Y: 2400 100mS
XX: 2040 350mS
YY: 2400 350mS
P: 2040+2400 150mS
Clear Forward: PXX
Transit Seizure: PX
Forward Transfer: PYY
Terminal Seizure: PY
1: yyyx
2: yyxy
3: yyxx
...
14: xxxy
15: xxxx
16: yyyy
Place Event Freq Cadance
=========================================================================
N. America dialtone 350+440 Continuous
ring 440+480 2s on 4s off
busy 480+620 0.5s on 0.5s off
fast busy 480+620 0.25 on 0.25 off
England ring 450+500 0.25 on 0.5 off
(Australia,New Zealand, 0.25 on 2.0 off
etc.)
Japan ring 450+500 1.0 on 2.0 off
Holland dialtone 150+450 Continuous
(450 at -8dB)
most of world all 400 or 440 (See text)
SIT 950, 1400, 1800 (See text)
Most of the world's phone systems use only one low pitched tone to represent
all calling status. The most common tones in use are 400Hz, 440Hz and 450Hz.
In some cases the tones are modulated, usually AM, at 25 or 50Hz at variable
depths. In some old switches, the ring modulates the tone, or it is just the
harmonics of the ring frequency, which is usually 25Hz, but can be other
frequencies, producing the "fart ring". Cadances for the busy are either the
fast at 0.25 on and 0.25 off, or the slow at 0.5 on and 0.5 off. Ring signals
are usually on one second and off for two, but can vary. In Iraq, the ring is
continuous! The SIT (Subscriber Information Tone) is 950 then 1400 and then
1800Hz. The total length is about one second. The lengths of the individual
tones are sometimes variable to impart different meanings for automatic
detection.
National Signalling Systems
---------------------------
CCITT 1, 2 and 3 are early international standards for signalling the
distant end. C1 is just a 500Hz line signalling tone, and was used to alert
the operator at a distant switchboard that there was traffic and no DC path,
due to amplifiers or repeaters on a relatively long circuit. C1 has only one
line signalling function (forward transfer) and no address signalling. It is
probably used nowhere.
CCITT 2 was the first international standard that used address signalling,
allowing automatic completion of calls. Two frequencies, 600Hz and 750Hz,
were used for line signalling and by pulsing between the two frequencies,
representing make and break, of the loop current at the distant end during
signalling, calls were automatically pulse dialable. You may actually find
this system in limited use in very remote parts of Australia or South Africa.
Fairly high signalling levels are required and may very well make customer
signalling impossible, unless you are right there. Travel to both the above
countries should be fascinating however for both phone play and cultural
experience!
CCITT 3 is an improved pulse system. Onhook is represented by the presence
of 2280Hz and offhook by the absence of 2280Hz. This exact system is still
used in a surprising number of places. Pulse-dial PBX's often use C3 to signal
distant branches of a company over leased lines. Signalling for this system
is generally at a much lower level than C2: The tones will propagate over any
phone line.
A system from the early 50's is called R1. Many people remember R1 as the
Blue boxes of the 60's and 70's . R1 is still in wide use in the United
States, Canada and Japan. The use of 2600Hz for line signalling is quite rare
in the 90's, but can be found in all of the above countries. Address signal-
ling uses the MFC standard which is a combination of two of six tones
between 700Hz and 1700Hz as in CCITT 5. Alsmost all R1 used either "out of
band" signalling at 3825Hz or 3350Hz or some form of digital or DC line
signalling. To use this system from home one must find an indirect method of
using the "out of band" signalling. In North America, most signalling from
your central office to your long distance carrier is R1, as is most OSPS/
TSPS/TOPS operator traffic.
Pulse systems like CCITT 2 and 3 are still used in national systems. In
North America, the C3 standard using 2600Hz in place of 2280 for national
working was commonplace through the 70's and still has limited end-to-end use
today. "End-to-end" use refers to sending just the last few digits (usually
five) to complete the call at the distant end. The only use this may have to
the phreak would be to make several calls to a single locality on one quarter.
It may be possible that a certain code would drop you into an R1, but you
just have to experiment! This type of system is referred to as 1VF, meaning
"one Voice Frequency". The other standard frequency, for use outside North
America, is 2400Hz. A national system using two voice frequencies (2VF) may
still be used in remote areas of Sweden and Norway. The two frequencies are
2400Hz and 2600Hz. Playing these two systems in Europe predates the cracking
of the R1 and C5 systems in the late 50's and early 60's respectively. The
first phone phreak was probably in Sweden.
Common Channel Interoffice Signalling (CCIS) is CCITT 6 developed for
national use and employing features that are of interest to national admini-
strations. R1 often plays into a gateway being converted to CCIS and CCIS
will play into a gateway that converts to C5, C6 or C7 for international
working. The bulk of the ATT net is CCIS in North America, while R1 is often
used by your CO talk to it and the lessel networks. CCITT 7 is the digital
system and is the same nationally as internationally. C7 allows the greatest
efficiency of all systems and will in time be the world system. C7 has much
more speed and versatility than R2, but is a digital only system. All fiber
optic systems employ SS7 (C7).
No discussion of systems is complete without mentioning Socotel. Socotel is
a general system developed by the French. It is a hodgepodge of many systems,
using MFC, pulse tone, pulse AC and pulse DC system. Most (all?) line
signalling tones can be used. An inband system can use 2500Hz as a clear
forward and 1700 or 1900Hz for seize or, in Socotel terms, "confirm". Most
line signalling today is "out of band", but unlike normal outband signalling,
it is below band: DC, 50Hz or 100Hz. It is a "brute force" system using 100V
levels, insuring no customer has a chance of getting it directly! Call setup
on the AC systems often has a very characteristic sound of of short bursts of
50Hz or 100Hz buzz, followed by the characteristic French series of 500 Hz
beeps to alert the customer that the call has been received from the Socotel
by the end office and is now being (pulse) dialed. Calls often don't make it
through all the gateways of a Socotel system, sometimes giving the French
phreak a surprise access where it stuck!
On a national level there are even more systems and some are very bizarre.
Some use backward R2 tones in the forward direction for line signalling,
giving analog lines the versatility of digital line signalling. There have
been some interlocal trunks that actually used DTMF in place of MF! The
"Silicon Valley" was once served by DTMF trunks for instance. When I visited
my local toll office and was told this and pressed for an answer as to why,
I was told "We had extra (expensive then) DTMF receivers and used them!" As
a phreak, be ready for anything as you travel the world.
Stuff to read
-------------
Signalling in Telecommunications Networks, S. Welch, 1979
ISBN 0 906048 044
The Institution of Electrical Engineers, Londen & New York
CCITT Red Book, Blue Book, Green Book and whatever other colors of books
they have, Concentrate on the Q norms.
Telecommunications Engineering, Roger L. Freeman
- EOF -

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,54 @@
The Autodial
Proudly Presents
"Phone Hackers take their toll"
A network of computer hackers obtained a Campbell man's Sprint telephone
service access number used it to make around $60,000 worth of calls, a company
spkesman said Tuesday.
Tom Bestor, a spokesman from the Burlingame long-distance firm, said the
incident is one of the largest telephone fraud cases of its kind.
"We have found a lot of people (involved) in three major cities and we are
pursuing prosecution right now. I think this is going to be a good-sized
investigation," Bestor said.
He said hackers - computer enthusiasts - in Atlanta, New York, and Baltimore
as well as many other cities around the country used Robert Bocek's Sprint
number to make hundreds of calls in November and December.
Bestor said it appears that the hackers used so-called "computer bulletin
boards" to pass the number form person to person.
Such boards are actually computers equipped to answer the phone, distribute
information, and store messages. Their phone numbers are often listed in
publications for computer hobbyists.
Bocek, an engineer who works for an electronics firm, said he knew something
was wrong when his November Sprint bill came in at around $4,800 when "our
normal bill is around $70 to $80."
At the same time, Sprint notified Bocek and his wife that the company's
security personnel had discovered that their access code was being abused.
Bestor said the firm told Bocek not to worry about the bill and changed his
access code.
But in the 10 days that it took to change the number, Bestor said the hackers
were able to run amok,and Sprint warnings to Bocek to expect a large bill for
the period of time proved correct.
In mid-December Bocek recieved a 722 page phone bill from Sprint that listed
17,311 calls. The total charges were $55,562.27 not counting an $8,197 "volume
discount"
(article from the San Jose Mercury News..Written by Karen Klinger)
Phootnote by The Autodial.
Well it looks like this "damaging" publicity is going to do just that, Damage,
not the Phreak kingdom but Sprint.. Well if your parents do subscribe to Sprint
advise them to change to AT&T... They're not only cheaper but they're better.
It looks like Sprint is going to have to change its ways.. Thank you Nick
Halflinger.


View File

@@ -0,0 +1,116 @@
a phreindly
phile
----------------------------------------
index
----------------------------------------
* = 2600hz k = key pulse
p = prefix x = sufix
ac= area code rc= routing code
+ = 121 s = start
----------------------------------------
*k141s = rate & route
*k+s = local inward
*kacrc+s= long distance inwards
*k131s = local information
*kac131s= long distance information
----------------------------------------
definitions and procedures
----------------------------------------
rate & route - the price rate for long distance calling. also routes for long
distance inwards.
procedure - call r&r say,"yes, i need the operator routing fo thank you."(if
you don't say thank you they get suspicious, that is correct operator
procedure.)
inward - the operator in the area specified. the pupose is mainly for verify
and interrupt.
procedure - call the inward say,"yes, operator i need an emergency
interupt on (ac-p-x). when she/he replies say,"thank you operator."
for verify rather than anemergency interrupt say varification only on (ac-p-x).
information - if you don't know it forget phreaking!!!
----------------------------------------
the six-way loop!!!
----------------------------------------
1-213-206-6053
call until it rings and let it continue ringing until someone else calls in.
it will then connect you and alow you to converse with that person and any
others who call in. (ideal for joint confrences.)
the best time to call unless you know it is in use is aprox. 5:45 eastern time.
school is then out nationwide. the loop population is booming then.
----------------------------------------
confrencing phreinds
----------------------------------------
the confrence call is nothing new but it is still really popular and
probably will stay that way for a long time.
the conference gives you a 15 line split and allows you to call upto 14 other
people. if you know of a few conferences going on it proves ultimate fun to
join them on the loop.
the controls
when you dial the conference enter 15 wait for a voice then enter # after
which you may dial out using the (1-ac-p-x) format. when you reach someone
enter # to add them to your conference. hit ### to then join and talk to that
person. enter # to goto control-mode then dial another number. for
international dial (011-countrycode-citycode-p-x). add them the same way as
the first. join and talk to both or call another location. when in control
mode you may terminate the conference by hitting * then hanging up,
or just hangup but it is really correct procedure to hit * first so that the
conference computer resets immedeatly. if you are talking in control mode *
hangs up on the person with whom you are conversing in control mode. you may
then dial another confree.
when a person hangs up if you wish to call them right back then goto control
mode and hit #.
to start a conference you can dial a devertor then
0700-456-1000:0700-456-2002. or you can call 1-800-050-1000:1-800-050-2002.
the 800 numbers drop a loop you then enter k0000000000s.
your conference is ready for setup.
the 0700 numbers go directly to setup.
----------------------------------------
phreindly phones!!!
----------------------------------------
***-***-**** rocky racoon
***-***-**** the canadian
***-***-**** hackin' hank
feel free to call these people for help.the 813 numbers are bb users.
the 607 is extenders and watts
outlines only.
these are the big three of phreinds phorever!!!
----------------------------------------
phun numbers
----------------------------------------
1-800-521-8400-6978-5492 travelnet
1-813-584-1494-39843 mci
1-301-792-2505 watts outline
1-301-953-0125&6 devertor
this has been brought to you by:
*>rocky racoon<*
via seq. philes!
on behalf of the
phreinds phorever!
phun club
p. p. p. p. !!!!
phreaking phor phun & phreinds!!!!!!!!!!
contact one of the big three for an
aplication or print out the seqential
that accompanies this phile!
phill it out and send to:
the true dude
10598 106th ave. n.
largo fl.,
33543
thanx and look for our updates to this, phreindly phile v1.0.
later daze,
*>rocky racoon<*

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,362 @@
<><><><><><><><><><><><><><><><><><><>
<> OLIVER JONES' GUIDE TO PHREAKING <>
<> <>
<> VOLUME I...<OTHERS WILL INCLUDE <>
<> MORE WIERD SHIT!>.... <>
<> <>
<> <I'M DOING THIS BECUZ I'M BORED> <>
<><><><><><><><><><><><><><><><><><><>
First off: This is not meant for a
good phreak, such as, Chris Chronos.
This file is meant for people who are
interested in getting into phreaking.
This is not so much my own work, as it
is a compilation of a bunch of others.
So, don't get uptight if you reconize
stuff.
=-]BASICS
A phreak is either:
(1) Someone who just uses mci, etc...
or:
(2) Someone who is into boxing, etc...
--------------------------------------
=-]TRASHING
becuz i am saying what comes to mind
i'll start with this. this is the
*BEST* way for phreaks to get info.
now it was recently brought to my
atention, that some peopl don't know
what trashing is, so, here is a basic
definetion; Trashing is the art of
raiding your local c.o. (central
office, where all calls are connected)
dumpster, getting printouts, invoices,
maybe discarded parts, but anything
of interest. Now the way (best) to
do it is, to wait until nite, with
a raincoat, flashlite, something to
carry your goodies home in, go to
you c.o.'s dumpster, climb in, and
get what you will...
This is a *FEDERAL OFFENSE* (big
deal!), bell has busted a lot of
people for doing dis, so be fucking
careful, if you get anything, post the
results on the boards at the end of
this phile.
-=]CALLING PHREE
Now this is all the 1st type of phreak
does, #2 phreaks do this also (unless
they're millionares...), so, i'll
explain the basic principle. You 1st
get an extender/port, what they're is
what mci, sprint, allnet, etc... use.
the basic principle is, you call,
mci picks up, gives a tone, key in your
code (mci=5 digits), and then the
npa <area code>, and the exchange/#
so, if you wanted to dial say, gse,
you'd go...
123-4567, it'd ring, pick up, type:
517312037756392
^^^^^||||||||||
code phone # to call
it's really quite simple.
---------------------------------------
-=]INTERESTING NOTE
becuz of a law passed in '82 <i think>,
any phone numbers that are used on
t.v./radio, and occasionaly movies,
the exchange *MUST* be 555, why,
you might ask...well that is bell's
special exchange, for instance, if
you wanted to get the number for a
place in San Fransisco, but lived in
Flordia, you'd dial: 415-555-1212
415 sends your call to Ca, 555 alerts
the computer to route it with bell's
special calls, and the 1212 tells it
it's an information call (411)...
just thought you'd be interested in
that.
---------------------------------------
-=]BOXING
Boxing ('specially blue), is the best
way for a phreak to interact with the
phone system, in a future phile i'll
go more into it, but for now, i'll
just give you a basic idea of what
it tis...boxes are electronic
creations which somehow interact with
the phone system, the famous ones are:
blue: allows you to become an operator
red: simulates coins in a pay (fortress
) phone, allowing phree calls.
and now there is a whold new slew of
'em...such as
mirror: rumored to trace
brown: connects to lines, wierd!
silver: creates 4 new keys for dtmf
(touch tone) pad...
white: portable dtmf pad
cheese:used with call forwarding,
basically red
black: now defunct, but would work
on bells system of billing.
====================================
the above are just a few of the many
boxes...some have multiple names, such
as, beige or bud..they are basically
lineman's handsets...
------------------------------------
-=]LINEMAN'S HANDSETS
a lineman's handset (lh) is what
the telephone repairmen use to
help aid in fixing a phone. recently,
when my line was on the fritz, the
repairman came to fix it. i was in
the middle if a phone conversation,
when i hear a bunch of static, and
someone's voice boom out: "is this
555-4980?" my answer was yes, and he
said he was here to repair the line.
what he did was climb up the
telephone pole, where there was a
silver box (rectanglish), he opened
it and there were a bunch of pairs
of terminals, each one was a phone line
for that block. The reason for a phreak
to build an lh is to tap into people's
lines to:
(A) make free calls
(B) run it back to his house as a tap
(C) using a,b to call up traced #'s
such as cosmos (bell's computer), and
not worry 'bout getting caught.
(D) this reason is the most fun, to
harass the operator...
--------------------------------------
-=]COSMOS
Okay, becuz this is just a primer, i
won't bother with what to do when you
<and how to> get on a cosmos system,
they will come later in life (err, this
series), but here is what cosmos
basically consists of:
COSMOS is:
the computer(s) which operators,
information, the cn/a operator, use.
it is used to keep track of bills.
it can be used to:
trace calls, disconnect phone lines,
order new parts for c.o., set up
loops, establish credit, establish
a new frame (in the computer's mind),
stack calls (make all the lines (trunks
) from here to say tokyo busy! and it
has many more capabilities, as you
can see though, Cosmos is *POWER*,
so it is a vital phreak tool. Now
here is where some ambugitity (howeva
ya spell the shit) forms. Becuz a
phreak isn't a hacker, how can they use
cosmos, simple, becuz Cosmos is part
of bell, and it is what keeps Bell
running these days, to play hell with
it, is to Phreak, by defintion.
Now while *ALL* hackers are leech
phreaks, some are also true phreaks,
so, there is really no problem, but if
a cloud of doubt had formed in your
mind, this was meant to dis-spell it.
So in a later volume, i will have it
all Cosmos...
--------------------------------------
-=]Switching Systems
a switch system (ss) is what connects,
complete your calls. there are four
main ones (a fifth is being testedin
some hicktown in Pa.), they are:
SxS, the 1st switching system, was
invented by an undertaker, becuz
he felt that a biased switchboard
operator was routing all calls for
a undertaker to the operator's husband.
In 1979 53% of the bell network was
SxS (or step by step), and by 1990
only 'bout 10 sxs offices will remain
in the u.s. <wah!, it is the best to
phreak on, even though they do have
penregisters, etc...>
also, with sxs, there is no dtmf
(Dual Tone Multi-Frequency, aka touch-
tone) on sxs, what you might have is a
converter, but then the call goes thru,
just as slowly. So that's sxs now onto:
Crossbar;
Crossbar is the next step up in the
ss hierarchy, crossbar is slightly more
advanced than sxs, and dtmf is real on
it, but it is just 'bout as safe (as
of 11/1/85) as sxs, but remember, just
'bout anything is safe at a fortress
(pay) phone, 'cept if you repeatdly box
there, becuz the s.s. (bell security),
has been known to stake out f.f.
now onto the world's worst nightmare...
---------------------------------------
-=]ESS
I gave ess it's own section, becuz i
have so much to write 'bout it. ess
stands for: Electronic Switching
System, and thatis just what it is.
by using computers, calls are processed
by copmuter, are connected instantly
after the last digit is dialed, and
can be traced in a mille-second <some
short amount of time, that's approx.
it>, so, ess is quite dangerous (if
you're reckless, i mean i'm on it,
and i haven't been caught yet, course,
i use mci, so bell doesn't give a shit!
), now then back to ess...
ess also can do the following:
call waiting <if somebody else calls
while you are already online, they
hear a ring, while your hear a slight
tone, you hang-up/pick-up all in 1
second, the orginal party is put on
hold, while you talk to the 2nd party,
you can switch back and forth>
speed dialing <kinda stupid, just like
auto-dial memory phones, only it's
stored in the c.o.>
call forwarding <key ingredient to a
cheese box, and very useful, if you
were going to be at an orgie say, but
you needed to get your calls, you'd
type: *, then the number you'd be at.
very cool!>
three way calling <also cool, allows
you to call someone (a), then using
the same procedure as with call waiting
only instead of someone being on the
other line, you get a dial tone, dial
out, then when party b answers, press
the hung-up switch down for a second,
release it, and presto, you have a
three way connection (mini-conference).
those are the main "home" features
offered by ess, besides that, if you
don't pay your bill, it takes one
minute to disconnect your line (see
cosmos section above)
well, there is more info on ess, but
i don't remember it off hand....
-=}Digital
related to ess, only totaly electronic,
whereas with ess there were still
some switches, this is all solid
(altered, haha) states, which reminds
me, with ess/digital, it is
very easy for the phone co. to tap your
line <it is a little harder in other
ss's>, of course with the advent of
remobs, it is now east in any ss...
______________________________________
Special Note Related to Above:
ciss, don't know what it stands
for, but it incorparates every
thing that digital/ess does plus
a couple of other things, the main one
is auto-tracing from the house, what
happenes, is when somebody calls you,
you press a button on your phone, and
a thermal printer prints out the number
of the person who is calling you. This
probally won't catch on (thank you god!
) though becuz it requires leasing a
phone with a printer attached for 'bout
$30 a month, tres expensive!
=======================================
-=]REMOBS
a remobs, whilei don't have any at
the moment, they are incredibly cool.
can tap into somebody's line by:
dialing up the remob, dialing in
the access code, then the #, without
npa, becuz these can't cover a whole
npa, just a part of it, then you are
tapped into the line, you can listen
in, but your mouthpeice is cut-off
(if noone's using the phone, you hear
silence, but calls can still be
recived/initaited), plus there
is some other shit it can do...
=====================================
Well, I tink I'll end the first volume
with a bunch of phone numbers, these
have all been tested within the last
week, so they should work...here ya'
go:
212-976-
5050-ARIES HOROSCOPE
5151-TAURUS
5252-GEMINI
5353-CANCER
5454-LEO
5656-VIRGO
5757-LIBRA
5858-SCORPIO
5959-SAGITTARIUS
6060-CAPRICORN
6161-AQUARIUS
6262-PISCES
3737-PORNO
2626-PORNO
2727-PORNO
2828-PORNO
1-415-976
6969-PORNO
3636-PORNO
PREP (7737)-PORNO
212-799-5017-ABC FEED LINE, WIERD!
{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}
{} BOARDS TO CALL TO CONTACT ME OR {}
{} TO ASK ME QUESTION ABOUT MY FILE {}
{} {}
{} AMERICAN BBS:303-457-0976 {}
{} THE K.G.B. :303-499-7801 {}
{} THE F.W.S.O.:303-755-8263 {}
{} THE GSE :203-775-6392 {}
{} SWAP SHOP :409-244-5154 {}
{} {}
{} IN ALL CASES LEAVE MAIL TO: {}
{}---------->OLIVER JONES<----------{}
{} "O.J." {}
{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}
DISCLAIMER:
THIS PHILE WAS INTEDED FOR INFORMATION
PURPOSES ONLY, ANY USE THEROF IS NOT
THE RESPONSIBILITY OF THE AUTHOR, AND
THEREFORE, HE CAN NOT BE PROSECUTED
BECUZ, SOMEBODY GOT BUSTED USING THIS
INFORMATION, IT WAS INTENDED FOR
ENTERTAINMENT PURPOSES ONLY.
<><><><><><><><><><><><><><><><><><><>
WRITTEN ON: JANUARY 1, 1986
HAPPY NEW YEAR!!!!!!!!!!!!!
[][][]THIS PHILE IS NOW TERMINATED[][][]

View File

@@ -0,0 +1,84 @@
=======================================
HELPFUL PHREAKING INFORMATION
=======================================
BY ZANDAR ZAN
================================================
AN UNDERGROUND ALLIANCE PRESENTATION
================================================
MORDOR AE 201-528-6467 PW:ZANDAR
THE BASEMENT 201-223-6404
LIZARD PALACE 201-528-6964
SIRIUS CYBERNETICS 808-521-3306
AGENT AE 201-925-2728 PW:CIAE
=======================================
THIS FILE MAINLY DEALS W/PHREAKING
THROUGH 800 EXTENDERS
=======================================
1> NEVER, NEVER, EVER, EVER, EVER KEEP A CODE COMPLETELY TO YOURSELF!
CONSIDER THIS: IF YOU ARE THE ONLY ONE TO USE A PHREAK, THEN YOU AND ONLY
YOU CAN BE PROSECUTED.
2> THE SAFEST PHREAK IS A KNOWN PHREAK
3> NEVER USE A CODE TO ABUSIVENESS. IF POSSIBLE, IF YOU ARE A GOOD PHREAK
THEN IT IS,ONLY USE A CODE ONCE OR TWICE. THEN DISCARD IT.
4> HAVE MORE THAN ONE WORKING CODE HANDY AT ALL TIMES.
5> HAVE MORE THAN ONE 800 EXTENDER AT YOUR DISPOSAL (WITH CODES OF COURSE).
6> BE <<< VERY >>> CAREFUL ABOUT GIVING OUT CODES AND WHO YOU GIVE THEM
TO (OBVIOUSLY). IT IS GOOD TO HAVE OTHERS (AND I STRESS NOT LOCAL TO
YOU) HAVING A CODE, BUT BETTER TO GIVE OUT THAT CODE WITH OTHERS NOT
KNOWING WHO YOU ARE (EVEN YOUR USUAL HANDLE).
7> DON'T WRITE FILES ABOUT PHREAKING!! THERE'S ENOUGH OF US DOING IT AS IT
IS!
LET ME CLEAR A FEW THINGS UP
THE PHONE COMPANY HAS A COMPLETE RECORD OF EVERY CALL THAT HAS EVER
BEEN MADE FROM YOUR HOUSE. YOUR "PHONE HISTORY" INCLUDES ALL CALLS
EXCEPT 800 CALLS. WHY THEN DON'T 800 #'S SHOW UP ON YOUR FONE BILL?
OBVIOUSLY BECAUSE THEY DON'T COST YOU ANYTHING. NOW, THE TELCO DOES NOT,
HOWEVER, CHECK EVERYONE'S RECORD TO SEE IF THEY HAVE BEEN MAKING EXCESSIVE
AMOUNTS OF 800 CALLS. THAT WOULD BE NEARLY IMPOSSIBLE (THINK OF HOW MANY
PEOPLE ARE AT&T SUBSCRIBERS)!
ANYHOW, WHAT HAPPENS WHEN THE AMOUNT OF 800 PHONE CALLS YOU MAKE
GREATLY INCREASES IS THIS . . .
A TROUBLE CARD SHOWS UP ON THE COMPUTER WITH YOUR NAME ON IT (YOUR
FAMILY'S THAT IS). A TROUBLE CARD IS NOT JUST FOR THINGS LIKE THAT THOUGH.
A TROUBLE CARD IS MERELY A WARNING THAT SOMETHING IS FUCKED UP SOMEWHERE. BE
IT A DOWNED LINE, AN UNPAID BILL, OR JUST ABOUT ANY "TROUBLE" IE. THE NAME
"TROUBLE CARD".
A TROUBLE CARD WILL NOT POP UP IF ONE MONTH YOU MAKE A FEW 800 FONE
CALLS, TROUBLE CARDS WORK ON A PERCENTAGE BASIS OVER AN EXTENDED PERIOD OF
TIME, ONE MONTH USUALLY. FOR INSTANCE, IF YOU INCREASE THE NUMBER OF 800
CALLS YOU MAKE EACH MONTH BY BUT A FRACTION, THEN CHANCES ARE A TROUBLE CARD
WILL NEVER SHOW UP IF, HOWEVER, YOU GO FROM MAKING TWO 800 CALLS A MONTH
TO MAKING 200 CALLS A MONTH YOU ARE NOT ONLY IN TROUBLE, YOU ARE VERY
STUPID.
IF YOU NORMALLY MAKE ONE THOUSAND 800 EXTENDER FONE CALLS A MONTH, BE
IT FOR YOUR COMPANY ETC., THEN A TROUBLE CARD WILL NOT SHOW UP BECAUSE THAT
IS WHAT YOU HAVE ALWAYS BEEN DOING.
I HOPE THIS FILE HAS CLEARED A FEW MISUNDERSTANDINGS ABOUT JUST WHAT
THE FONE COMPANY KNOWS ABOUT 800 EXTENDERS AND HOW THEY KNOW YOU USE THEM.
I WOULD HAVE MADE THIS FILE LONGER, BUT I JUST DIDN'T HAVE THE TIME
JUST THEN!

View File

@@ -0,0 +1,201 @@
THE FOLLOWING PHILE IS FORMATTED
FOR 80-COLUMN UPPER/LOWERCASE
TEXT.
11/13/88
Note: if this phile is totally outdated,
DON'T USE IT!!!!!!
Nother Note: Why don't anyone write any more philes?
Yet Nother Note: SysOp of The Farthest Shore, call Toxic Waste and leave mail
to The Xenocide and state who you are. We need to get in touch.
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)
(_) Toxic Waste Phreaking C T W N (_)
(_) (707) 252-1413 by a o a o (_)
(_) 300-9600 HST ____________ l x s w (_)
(_) SysOp: !The Xenocide! l i t ! (_)
(_) The Xenocide ~~~~~~~~~~~~ - c e ! (_)
(_) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ (_)
(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)
Disclamer: This file is written under the first ammendment to the constitution.
It is for informational purposes only. The author is not responsible for any
damages, be they intentional, direct, indirect, or consiquential. 'Nuff said!
Note from author: This phile was written to MAXIMIZE your safety. You can do
the things that I say you probly shouldn't do, but don't say I didn't tell you
so!
This Phile is an attempt to instruct people on the delicate art of
Phreaking. It will probably not tell any old timer's anything, but may be of
use to those who are just learning the art.
What is Phreaking? Phreaking (pronounced Freaking, as Phone Phreaks all
substitute Ph phor an "F") is getting free calls. How do you do this? There are
many ways. The first and (I think) the easiest are Diverters.
Diverters are those boxes the gestapo (Phreakese for phone company)
puts in that after so many rings, re-routs the call to a different number. Just
like call forwarding! Only these are MUCH better phor us phreakers! You will
know you have a diverter if when you call, it rings phor about 3 rings, and
then you hear a "CA-THUD" (yes, it really sounds like that!) and then some
fainter ringing. Then some one will answer and you ask if "Guido Sanchez the
Third" is there, and *most* of the time, they will say you've gotten a wrong
number. You must somehow make a click on the line, ((A privacy or mute button
on most phones does this most beutifully!) as most of these answering services
are trained not to hangup untill you do) and then they hang up. You'll hear all
kinds of different clicking and clunking, and then a dial tone. You now are
into the safest way to phreak! You can now dial normally. All the calls will be
traced and billed to that number! Hey! Pretty Phun eh? Just be sure and don't
use the same number too much otherwise you'll get some gestapo at the door in a
week or two!
Well, it's time for a little talk on how the phone company routes
calles. There is a few different ways, but it all really boils down to crossbar
or ESS.
If you have crossbar, I wish I lived where you do! The way you can tell
if you have ESS or not is call yourself. If it is loud and electronic sounding,
you have ESS. If it is mechanical and low, it is Crossbar.
If you have ESS, don't phret, it's phine to phreak, 'just you gotta B
more careful, B cuz any CIA or whatever guy can punch up on his terminal the
time and number of the call, and for about 1 outta every 100 calls, what it was
about! If your in an ESS area, they listen to calls randomly. ESS can trace
calls back to you even before you dial. And it keeps records of everything you
dial, even the mistakes you make and wrong #'s! Where went our freedom??? If
you have ESS also, don't call 800 #'s too much or 950's. (If you don't know
what an 800 is, STOP READING. A 950-xxxx number is a different phone service,
more on those later) If you do, you'll be placed on an alert list and have
about 1 outta 3 calls intercepted!!!!!(Addendium: I got from a semi-reliable
source that if you got pacific Bell, unless you piss the shit outta some
operator or somethin, they won't help the other companys track you down. Sorta
like getting rid of compition. I guess it's true B cuz this guy just called
about 80 800 numberz. Nothin happen'd, YET)
If you got crossbar, they can't do shit. It costs something like 500
dollars to run a trace, and listening to a call!!! Forget it! Your home free in
this type of system, except you don't get goodies such as call forwarding or
call waiting. (IE, can't make a cheeze box (more on that later))
What is another way to get phree phone calls? Well, the second easiest
was is by calling US Sprint, MCI, etc. You can access these numbers by calling
either the local number(if in a major-type city), or by calling a 1-800 number
or a 950 number. A 950 number is when you simply dial "950-xxxx" where xxxx is
the number. 950 numbers are like 800 numbes, free, but are not supported by all
areas. These are just different carriers that you can use to supposedly lower
your phone bill. They run on a magic number type system, which you can get
fairly easily. What is a great machine for dialing the phone and saving the
results? Yep, your old modem and your computer. There are many different
programs around that you can use, and all work pretty well.
To do this, you call a carrier, and try an access code. If it is bad,
the stupid machine recording will say "Invalid Code" or some such BS. Just
hangup and call back. Eventually you'll get a good code. Write it down. Now,
don't use the same code more than twice a week, and use more than one carrier.
Also use more than one code, otherwise the gestapo might get wize. Now, use
this code when your calling Phriends Long Distance, or even just calling BBS's.
PC Pursuit is a service run by telenet or tymnet that allows you to
access any city that it services. It only does 1200 baud, or 2400 in some
areas, but it's pretty good. Modem only tho. There are several bugz in it, and
some sites let you dial anywhere world-wide. Them BBS's in germany are pretty
wild! Xcept buch O queers stop by all the time. Most everyone over there is an
asshole tho... Still pretty neat. To find a node that allows unlimited dialing,
just try dialing them all. At the tyme of this writing, there were 3 or so, 1
2400 baud and 2 1200. I'm not naming them just in case any PCP gestapo read

View File

@@ -0,0 +1,366 @@
---------------------------------------
[CTRL-S PAUSES/SPACE=QUIT]
R.A.G. T.I.M.E.
THANX TO PIRATES TREK
HOW TO BE A REAL PHREAK
THE WORLD OF CRYTON
[414] 246-3965
IN THE PHONE PHREAK SOCIETY THERE ARE CERTAIN VALUES THAT EXIST IN ORDER TO BE
A TRUE PHREAK, THESE ARE BEST SUMMED UP BY THE MAGICIAN: "MANY PEOPLE THINK OF
PHONE PHREAKS AS SLIME, OUT TO RIP OFF BELL FOR ALL SHE IS WORTH. NOTHING
COULD BE FURTHER FROM THE TRUTH! GRANTED, THERE ARE SOME WHO GET THEIR KICKS
BY MAKING FREE CALLS; HOWEVER, THEY ARE NOT TRUE PHONE PHREAKS. REAL PHONE
PHREAKS ARE 'TELECOMMUNICATIONS HOBBYISTS' WHO EXPERIMENT, PLAY WITH AND LEARN
FROM THE PHONE SYSTEM. OCCASIONALY THIS EXPERIMENTING, AND A NEED TO
COMMUNICATE WITH OTHER PHREAKS ( WITH- OUT GOING BROKE), LEADS TO FREE CALLS.
THE FREE CALLS ARE BUT A SMALL SUBSET OF A >TRUE< PHONE PHREAKS ACTIVITIES.
THE TEN COMMANDMENTS
REPRINTED FROM TAP ISSUE #86. (TAP, ROOM 603, 147 W 42 STREET, NEW YORK, NY
10036. SEND A SASE FOR THEIR INFO SHEET "WHAT THE HELL IS TAP?" AND TELL THEM
THAT BIOC AGENT 003 TOLD YOU ABOUT IT.)
THE PHONE PHREAK'S TEN COMMANDMENTS
I. BOX THOU NOT OVER THINE HOME TELEPHONE WIRES, FOR THOSE WHO DOEST MUST
SURELY BRING THE WRATH OF THE CHIEF SPECIAL AGENT DOWN UPON THY HEADS.
II. SPEAKEST THOU NOT OF IMPORTANT MATTERS OVER THINE HOME TEL- EPHONE
WIRES, FOR TO DO SO IS TO RISK THINE RIGHT OF FREEDOM.
III. USE NOT THINE OWN NAME WHEN SPEAKING TO OTHER PHREAKS, FOR THAT EVERY
THIRD PHREAK IS AN FBI AGENT IS WELL KNOWN.
IV. LET NOT OVERLY MANY PEOPLE KNOW THAT THY BE A PHREAK, AS TO DO SO IS TO
USE THINE OWN SELF AS A SACRIFICIAL LAMB.
V. IF THOU BE IN SCHOOL, STRIVE TO GET THIN SELF GOOD GRADES, FOR THE
AUTHORITIES WELL KNOW THAT SCHOLARS NEVER BREAK THE LAW.
VI. IF THOU WORKEST, TRY TO BE A EMPLOYEE, AND IMPRESSEST THINE BOSS WITH
THINE ENTHUSIASM, FOR IMPORTANT EMPLOYEES ARE OFTEN SAVED BY THEIR OWN
BOSSES.
VII. STOREST THOU NOT THINE STOLEN GOODES IN THINE OWN HOME, FOR THOSE WHO DO
ARE SURELY NON-BELIEVERS IN THE BELL SYSTEM SECURITY FORCES, AND ARE NOT
LONG FOR THIS WORLD.
VIII. ATTRACTEST THOU NOT THE ATT- ENTION OF THE AUTHORITIES, AS THE LESS
NOTICABLE THOU ART, THE BETTER.
IX. MAKEST SURE THINE FRIENDS ARE INSTANT AMNESIACS AND WILL NOT REMEMBER
THAT THOU HAVE CALLED ILLEGALLY, FOR THEIR COOPERATION WITH THE
AUTHORITIES WILL SURELY LESSEN THINE TIME FOR FREEDOM ON THIS EARTH.
X. SUPPORTEST THOU TAP, AS IT IS THINE NEWSLETTER, AND WITHOUT IT, THY WORK
WILL BE FAR MORE LIMITED.
CN/A NUMBERS
CUSTOMER NAME & ADDRESS BUREAUS EXIST SO THAT AUTHORIZED BELL EMPLOYEES MAY
OBTAIN THE NAME & ADDRESS OF ANY CUSTOMER IN THE BELL SYSTEM BY GIVING THE CN/A
OPERATOR THE CUSTOMER'S TEL. # ALL CUSTOMERS ARE MAINTAINED ON FILE INCLUDING
UNLISTED #'S. THESE BUREAUS HAVE MANY USES FOR PHREAKS.
HERE IS HOW AN EMPLOYEE MIGHT GO ABOUT CALLING CN/A:
"HI, THIS IS JOHN DOE FROM THE MIAMI RESIDENTAL SERVICE CENTER, CAN I HAVE THE
CUSTOMERS NAME AT (123) 555-1212." THE EMPLOYEES USUALLY USE THESE FOR CHECKING
WHO BELONGS TO A # THAT SOMEONE CLAIMED THEY DIDN'T CALL.
IF YOU SOUND CHEERY AND NATURAL THE OPERATOR WILL NEVER ASK ANY QUESTIONS. IF
YOU DON'T SOUND LIKE A MATURE ADULT, DON'T USE IT! ALWAYS PRACTICE FIRST & SO
YOU DON'T SCREW UP AND MAKE THE OPERATOR SUSPICIOUS. USE NAME THAT SOUNDS
REAL, NOT YOUR PIRATE NAME EITHER! ALSO SAY THAT YOU ARE FRO A CITY THAT IS
FAR AWAY FROM THE ONE THAT YOU ARE CALLING.
THE CN/A NUMBER FOR THE NY AREA & VICINITY (212, 315, 516, 518, 607, 716, &
914) IS>>>>>>>>>(518) 471-8111<<<<<< AND IS OPEN DURING BUSINESS HOURS.
[DON'T ABUSE IT!]
AT&T NEWSLINES
AT&T NEWSLINES ARE NUMBERS AT AREA PHONE OFFICES THAT TELCO EMPLOYEES CALL TO
FIND OUT THE LATEST INFO ON NEW TECHNOLOGY, STOCKS, ETC. THE RECORDED REPORTS
RANGE FROM VERY BORING TO VERY INTERESTING.
HERE ARE A FEW OF THE NUMBERS:
*(201) 483-3800 NJ (518) 471-2272 NY
(203) 771-4920 CN (717) 255-5555 PA
(212) 393-2151 NY (717) 787-1031 PA
(516) 234-9941 NY *(914) 948-8100 NY
SOME OF THESE NUMBERS ARE TOLL-FREE, BUT YOU CAN'T ALWAYS COUNT ON IT.
* THESE NUMBERS ARE NOT ALWAYS UP!
NUMBERS FROM OTHER AREAS ARE AVAILABLE BY REQUEST FROM F)BIOC L)AGENT 003.
ANI NUMBERS
ANI NUMBERS IDENTIFY THE PHONE NUMBER THAT YOU ARE CALLING FROM. IT IS USEFUL
WHEN PLAYING IN CANS (THOSE BIG SILVER BOXES ON TELEPHONE POLES) TO FIND OUT
THE # OF THE LINE. IT IS ALSO GOOD TO FIND OUT THE # OF A PHONE THAT DOESN'T
HAVE IT PRINTED ON IT. IN THE 914 AREA CODE THE ANI # IS 990. IF YOU JUST
HAVE TO DIAL THE LAST 4 DIGITS FOR A LOCAL #, IE CONGERS (268), DIAL
1-990-1111, WHERE 1111 ARE DUMMY DIGITS THERE IS ALSO A LESS USEFUL TYPE OF ANI
# WHICH WILL IDENTIFY THE AREA CODE & EXCHANGE. IT IS NXX-9901, W<>ERE NXX IS
THE EXCHANGE. IN THE 212 & 516 AREA CODES THE ANI # <20>S 958.
PHREAK NEWSLETTER
TAP IS THE "OFFICIAL" PHONE PHREAK NEWSLETTER, AND HAS EXISTED SINCE 1971.
EACH 4 PAGE ISSUE IS CRAMMED FULL OF INFORMATION ON PHONE PHREAKING, COMPUTER
PHREAKING, FREE GAS, FREE ELECTRICITY, FREE POSTAGE, BREAKING & ENTERING INFO,
ETC. IT IS LARGELY PHONE PHREAK ORIENTED, HOWEVER.
A 10 ISSUE SUBSCRIPTION COSTS $8.00, IF YOU GET A BULK RATE SEALED ENVELOPE
SUBSCRIPTION. I WOULD RECOMMEND THE FIRST CLASS SUBSCRIPTION, WHICH IS $10.
AS OF THIS WRITING (7-16-83), THE CURRENT ISSUE IS #86, AND ISSUE #50 IS 8
PAGES INSTEAD OF THE USUAL 4. BACK ISSUES ARE $0.75 EACH, AND ISSUE #50 IS
$1.50. A BRIEF INDEX TO THE FIRST 80 ISSUES IS AVAILABLE FOR A SASE, OR FREE
WITH A SUBSCRIPTION ORDER. TAP IS NON-PROFIT, AND IN DESPERATE NEED OF
MATERIAL (ARTICLES), MONEY, AND VOLUNTEERS.
TAP
ROOM 603
147 WEST 42ND STREET
NEW YORK, NY 10036
BELIEVE ME: IT WILL BE THE BEST $10 YOU WILL EVER SPEND...
BLACK BOX
THE BLACK BOX IS A DEVICE THAT ATTACHED TO A CALLED PARTIES PHONE THAT
ALLOWS HIM/HER TO RECEIVE FREE LONG DISTANCE CALLS FROM FRIENDS WHO CALL.
YOU ONLY NEED 2 PARTS: A SPST TOGGLE SWITCH AND A 10,000 OHM (10 K),
1/2 WATT, 10% RESISTOR. ANY ELECTRONICS PLACE SHOULD HAVE THESE.
NOW, CUT TWO PIECES OF WIRE, ABOUT 6 INCHES, AND ATTACH THESE TO THE
TWO SCREWS ON THE SWITCH. TURN YOUR NORMAL DDSIDE DOWN AND UNSCREW THE 2
SCREWS. LOCATE THE "F" AND "RR" SCREWS ON THE NETWORK BOX. WRAP THE
RESISTOR BETWEEN THESE 2 SCREWS AND MAKE SURE THAT THE WIRES TOUCH ONLY THE
PROPER TERMINALS! NOW CONNECT ONE WIRE FROM THE SWITCH TO THE RR TERMINAL.
FINALLY, ATTACH THE REMAINING WIRE TO THE GREEN WIRE (DISCONNECT IT FROM ITS
TERMINAL). NOW BRING THE SWITCH OUT THE REAR OF THE PHONE AND CLOSE IT UP.
PUT THE SWITCH IN A POSIT<49>ON WHERE YOU GET A DIAL TONE, MARK THIS NORMAL.
MARK THE OTHE<48> SIDE FREE.
WHEN YOUR FRIENDS CALL (AT A PREARRANGED TIME), QUICKLY LIFT & DROP THE
RECEIVER AS FAST AS POSSIBLE. THIS WILL STOP THE RINGING, IF NOT TRY AGAIN. IT
IS VERY IMPORTANT THAT YOU DO IT FAST! NOW PUT THE SWITCH IN THE FREE POSITION
AND PICK UP THE PHONE. KEEP ALL CALLS SHORT & UNDER 15 MINUTES. WHEN SOMEONE
CALLS YOU LONG-DISTANCE, THEY ARE BILLED FROM THE MOMENT YOU ANSWER. THE TELCO
KNOWS WHEN YOU ANSWER DUE TO A CERTAIN AMOUNT OF VOLTAGE THAT FLOWS WHEN YOU
PICK UP THE PHONE. HOWEVER, THE RESISTOR CUTS DOWN ON THE VOLTAGE SO IT IS
BELOW THE BILLING RANGE BUT SUFFICIENT ENOUGH TO OPERATE THE MOUTHPIECE.
ANSWERING THE PHONE FOR A FRACTION OF A SECOND STOPS THE RING BUT IT IS NOT
ENOUGH FOR BILLING TO START. IF THE PHONE IS ANSWERED FOR EVEN ONE FULL SECOND,
BILLING WILL START AND YOU WILL BE CUT OFF WHEN YOU HANG UP AND SWITCH TO FREE.
WARNING: BELL CAN RANDOMLY LOOK FOR BLACK BOXES SO BE CAREFUL!
---------------------------------------
: :
***BLUE WIRE**>>F< :
: * * :
**WHITE WIRE**** * :
: * :
: RESISTOR :
: * :
: * :
: >RR<*******SWITCH*** :
: * :
****GREEN WIRE********************* :
: :
---------------------------------------
DIAL LOCKS
HAVE YOU EVER BEEN IN AN OFFICE OR SOMEWHERE AND WANTED TO MAKE A FREE FONE
CALL BUT SOME ASSHOLE PUT A LOCK ON THE FONE TO PREVENT OUT-GOING CALLS?
FRET NO MORE PHELLOW PHREAKS, FOR EVERY SYSTEM CAN BE BEATEN WITH A LITTLE
KNOWLEDGE!
THERE ARE TWO WAYS TO BEAT THIS OBSTACLE, FIRST PICK THE LOCK, I DON'T HAVE THE
TIME TO TEACH LOCKSMITHING SO WE GO TO THE SECOND METHOD WHICH TAKES ADVANTAGE
OF TELEPHONE ELECTRONICS.
TO BE AS SIMPLE AS POSSIBLE, WHEN YOU PICK UP THE FONE YOU COMPLETE A CIRCUIT
KNOW AS A LOCAL LOOP. WHEN YOU HANG-UP YOU BREAK THE CIRCUIT. WHEN YOU DIAL
(PULSE) IT ALSO BREAKS THE CIRCUT BUT NOT LONG ENOUGH TO HANG UP! SO YOU CAN
"PUSH-DIAL." TO DO THIS YOU >RAPIDLY< DEPRESS THE SWITCHHOOK. FOR EXAMPLE, TO
DIAL AN OPERATOR (AND THEN GIVE HER THE NUMBER YOU WANT CALLED) >RAPIDLY< &
>EVENLY< DEPRESS THE SWITCHHOOK 10 TIMES. TO DIAL 634-1268, DEPRESS 6 X'S
PAUSE, THEN 3 X'S, PAUSE, THEN 4 X'S, ETC. IT TAKES A LITTLE <20>RACTICE BUT
YOU'LL GET THE HANG OF IT. TRY PRACTICING WITH YOUR OWN # SO YOU'LL GET A BUSY
TONE WH<57>N RIGHT. IT'LL ALSO WORK ON TOUCH-TONE(TM) SINCE A DTMF LINE WILL ALSO
ACCEPT PULSE. ALSO, NEVER DEPRESS THE SWITCHHOOK FOR MORE THAN A SECOND OR
IT'LL HANG-UP!
FINALLY, REMEMBER THAT YOU HAVE JUST AS MUCH RIGHT TO THAT FONE AS THE ASSHOLE
WHO PUT THE LOCK ON IT!
EXCHANGE SCANNING
ALMOST EVERY EXCHANGE IN THE BELL SYSTEM HAS TEST #'S AND OTHER "GOODIES" SUCH
AS LOOPS WITH DIAL-UPS.
THESE "GOODIES" ARE USUALLY FOUND BETWEEN 9900 AND 9999 IN YOUR LOCAL EXCHANGE.
IF YOU HAVE THE TIME AND INITIATIVE, SCAN Y<>UR EXCHANGE AND YOU MAY BECOME
LUCKY!
HERE A<>E MY FINDINGS IN THE 914-268 EXCHANGE:
9900 - ANI (SEE SEPARATE BULLETIN)
9901 - ANI (SEE SEPARATE BULLETIN)
9927 - OSC. TONE (POSSIBLE TONE SIDE OF A LOOP)
9936 - VOICE # TO THE TELCO CENTRAL OFFICE
9937 - VOICE # TO THE TELCO CENTRAL OFFICE
9941 - COMPUTER (DIGITAL VOICE TRANSMISSION?)
9960 - OSC. TONE (TONE SIDE LOOP) -- MAY ALSO BE A COMPUTER IN SOME EXCHANGES
9961 - NO RESPONSE (OTHER END OF LOOP?)
9962 - NO RESPONSE (OTHER END OF LOOP?)
9963 - NO RESPONSE (OTHER END OF LOOP?)
9966 - COMPUTER (SEE 9941)
9968 - TONE THAT DISAPPEARS--RESPONDS TO CERTAIN TOUCH-TONE KEYS
MOST OF THE NUMBERS BETWEEN 9900 & 9999 WILL RING OR GO TO A "WHAT #, PLEASE?"
OPERATOR.
HAVE PHUN AND REMEMBER IT'S ONLY A LOCAL CALL!
TOUCH-TONE & FREE CALLS
THERE ARE SEVERAL WAYS TO MAKE FREE CALLS (SPRINT, MCI, ETC.) USING A ROTARY
PHONE. THEY ARE:
1. USE A NUMBER THAT ACCEPTS VOICE AS WELL AS DTMF. SUCH A # IS (800)
521-8400. AS OF WRITING THIS, A CODE WAS 57617895.
A) IF USING VOICE, WAIT FOR THE COMPUTER TO SAY, "AUTHORIZATION #,
PLEASE." THEN SAY EACH DIGIT SLOWLY, IT WILL BEEP AFTER EACH DIGIT IS
SAID. AFTER EVERY GROUP OF DIGITS, IT WILL REPEAT WHAT YOU HAVE SAID,
THEN SAY YES IF IT IS CORRECT, OTHERWISE SAY NO. IF THE ACCESS CODE IS
CORRECT, IT WILL THANK YOU AND ASK FOR THE DESTINATION #, THEN SAY THE
AREA CODE + NUMBER AS ABOVE. ANOTHER SUCH # IS (800) 245- 8173, WHICH
HAS A 6 DIGIT ACCESS CODE. (NOTE: IF USING TOUCH-TONE ON THIS #, ENTER
THE CODE IMMEDIATELY AFTER THE TONE STOPS.)
2. HOOK UP A TOUCH-TONE FONE INTO YOUR ROTARY FONE. ATTACH THE RED WIRE FROM
THE TOUCH-TONE FONE TO THE "R" TERMINAL INSIDE THE FONE ON THE NETWORK
BOX. THEN HOOK THE GREEN WIRE TO THE "B" TERMINAL. TO USE THIS DIAL THE #
USING ROTARY & THEN USE THE TOUCH-TONE FOR THE CODES. (DON'T HANG UP THE
ROTARY FONE WHILE DOING THIS THOUGH!) IF THIS DOESN'T WORK THEN REVERSE
THE 2 WIRES. (NOTE: IF YOUR LINE CAN ACCEPT TOUCH-TONE BUT YOU HAVE A
ROTARY FONE THEN YOU CAN HOOK UP A TONE FONE DIRECTLY FOR ALL CALLS BUT
THIS USUALLY ISN'T THE CASE.) SUCH AS RADIO SHACK'S 43-138.
OTHER ALTERNATIVES
4. USE A <20>HARGE-A-CALL FONE. (THESE ALSO MAKE GREAT EXTENTIONS IF YOU REMOVE
IT USING <20> HEX WRENCH WITH A HOLE IN THE MIDDLE ON THE CENTER SCREW!
THESE FONES FOR THE BENEFIT OF THOSE WHO DON'T KNOW ARE BLUE WITH NO COIN
SLOTS)
5. USE A PAY FONE THAT WANTS YOUR MONEY BEFORE THE DIAL TONE. PUT IN YOUR
DIME, DIAL THE #; IF IT'S AN 800 # THEN YOUR DIME WILL COME BACK,
IMMEDIATELY PUT A DIME BACK IN (IT'LL COME BACK WHEN YOU HANG UP!) IF IT
IS A TONE FIRST FONE AND IT DISCONNECTS THE KEYPAD (SOME DON'T) THEN FIND
ANOTHER FONE.
TELCO TRACING
THE GOOD 'OL DAYS:
------------------
WAY BACK BEFORE I WAS A PHREAK, MA BELL WOULD HAVE TO MANUALLY TRACE A CALL IF
THEY THOUGH SOMETHING WAS FUCKED UP. FIRST THEY WOULD SEND A 2000 HZ TRACING
TONE, THE WOULD BE FOLLOWED B ALOT OF NOISE AND CLICKS. IT TOOK ABOUT 2-3
MINUTES TO TRACE A CALL AND ALOT OF PEOPLE WERE INVOLVED IN THE PROCESS. SO AT
1 IN THE MORNING THEY WOULD HAVE TO WAKE UP PEOPLE FOT THE TRACEES (PHREAK
JARGON FOR A PAY FONE). BUT NEVER USE THE SAME ONE MORE THAN ONCE OR TWICE
BECAUSE THE GESTAPO(ER..EXCUSE ME MEAN BELL SECURITY) HAS BEEN KNOW FOR STAKING
OUT TROUBLED FORTRESSES. IT'S ALSO POSSIBLE FOR TRAVELNET OR SP TO ASK FOR A
TROUBLE # BUT THE TELCO IS SLOW IN PROCESSING STUFF--ESPECIALLY FOR THE
COMPETITION--SO DON'T FRET PHELLOW PHREAKS.
MODERN TECHNOLOGY:
------------------
THIS CAN BE ATTRIBUTED TO ESS + CCIS WHICH CAN BE TRACED IN 1 SECOND.
MISCELLANEOUS STUFF
HERE ARE A PHEW (PUSHING IT ON THAT WORD) BITS OF INFO ON TELEPHONE ELEC-
TRONICS. IF YOU DON'T APPRECIATE IT THEN I SAY PHUCK U.
VOLTAGES:
WHEN YOUR FONE IS ON-HOOK (IE-HUNG UP) THERE IS A 48 VOLT DC CURRENT FLOWING
THROUGH THE LINE ( I HAVE A GREAT IDEA ABOUT HOOKING A BATTERY CHARGER UP TO MY
FONE ). WHEN THE FONE IS OFF-HOOK THE VOLTAGE DROPS DOWN TO AROUND 15VDC. THE
BLACK BOX (SEE SEPARATE ARTICLES) EXPLOITS THIS FOR FREE CALLS SINCE BELL USES
THIS VOLTAGE DROP WHEN THE CALLED PARTY PICKS UP TO START BILLING. BELL MAY
ALSO REVERSE THE POLARITY OF THE LINE TO START BILLING--IF YOU HAVE A TONE FONE
THE KEYPAD WON'T WORK IF THE POLARITY IS REVERSED. USUALLY, THE RED WIRE IS
CALLED THE TIP SINCE IT IS THE MORE (+) OF THE 2 WIRES + THE GREEN WIRE IS
CALLED THE RING (-).
RING TRIP:
WHEN SOMEONE CALLS YOU BELL HAS TO SEND 90 VOLTS AC DOWN YOUR LINE AT ABOUT 60
HZ TO ACTIVATE YOUR BGLL (THIS IS WHY DEAF PEOPLE CAN HAVE LIGHT BULBS FANS GO
OFF INSTEAD OF A BELL). THE DEVICE THAT DOES THE RINGING IS CALLED A RINGING
GENERATOR ANDTH PROCESS OF RINGING IS CALLED A RING TRIP. THIS COSTS BELL
MONEY AND THEY DON'T LIKE USING ALL THAT ELECTRICITY FROM THE LOCAL RIP-OFF
POWER COMPANY- SO LET IT RING. THIS IS ALSO, HOW BELL CAN CHECK FOR EXTRA
FONES FROM THEIR CENTRAL OFFICE BY SEEING HOW MUCH VOLTAGE THE LINE TAKES WHILE
RINGING AND THEY CAN TELL HOW MANY FONES YOUR NOT SUPPOSE TO HAVE. SOLUTION:
DISCONNECT THE BELL.
MODERN TECHNOLOGY:
------------------
THE 2 WORST ENEMIES TO THE PHREAK BESIDES THE FBI + BELL SECURITY,ARE: ESS +
CCIS. ESS STANDS FOR ELECTRONIC SWITHCING SYSTEM AND IT CAN TRACE A CALL IN
SECONDS, IT ALSO RECORDS ALL CALLS AND CAN EVEN TAP INTO LINES (ER.. I MEAN
CHECK FOR LINE QUALITY) AND RECORD CALLS. CCIS STANDS FOR COMMON CHANNEL
INTER-OFFICE SIGNALING AND IT ALLOWS FOR CONTROL SIGNALS TO BE SENT VIA
SEPARATE DATA LINKS INSTEAD OF TONES OVER THE VOICE CHANNEL--START KISSING YOUR
BLUE BOX GOODBYE.
SOURCES:
--------
FOR THOSE OF YOU WHO WANT TO GO MORE IN-DEPTH ON THE SUBJECT OF SHIT, I
RECOMMEND THE FOLLOWING READIN<49> MATERIAL:
1) ELECTRONICS COURCES A-B, TAP, ROO<4F> 603, 147 W. 42 ST., NY, NY 10036. @ 75
CENTS EA.
2) UNDERSTANDING TELEPHONE ELECT.'S, TEXAS INSTRUMENTS, RADIO SHACK MAY HAVE
IT.
3) A MULTITESTER + YOUR FONE FOR YOUR OWN EXPERIMENTING.
4) MISC. INFO FROM SEVERAL SOURCES MAKE FRIENDS + GET YOUR OWN CONNECTIONS.
*****BIOC AGENT 003
*****PHREAK ADVISOR OF PIRATE TREK
*914-634-1268
THANKS TO PIRATES TREK !!
---------------------------------------
ENTER (1-31, M=MENU, Q=QUIT) :

View File

@@ -0,0 +1,336 @@
R.A.G. T.I.M.E.
THANX TO PIRATES TREK
HOW TO BE A REAL PHREAK
THE WORLD OF CRYTON [414] 246-3965
IN THE PHONE PHREAK SOCIETY THERE ARE CERTAIN VALUES THAT EXIST IN ORDER TO BE
A TRUE PHREAK, THESE ARE BEST SUMMED UP BY THE MAGICIAN: "MANY PEOPLE THINK OF
PHONE PHREAKS AS SLIME, OUT TO RIP OFF BELL FOR ALL SHE IS WORTH. NOTHING
COULD BE FURTHER FROM THE TRUTH! GRANTED, THERE ARE SOME WHO GET THEIR KICKS
BY MAKING FREE CALLS; HOWEVER, THEY ARE NOT TRUE PHONE PHREAKS. REAL PHONE
PHREAKS ARE 'TELECOMMUNICATIONS HOBBYISTS' WHO EXPERIMENT, PLAY WITH AND LEARN
FROM THE PHONE SYSTEM. OCCASIONALY THIS EXPERIMENTING, AND A NEED TO
COMMUNICATE WITH OTHER PHREAKS ( WITHOUT GOING BROKE), LEADS TO FREE CALLS.
THE FREE CALLS ARE BUT A SMALL SUBSET OF A >TRUE< PHONE PHREAKS ACTIVITIES.
THE TEN COMMANDMENTS
THE PHONE PHREAK'S TEN COMMANDMENTS
I. BOX THOU NOT OVER THINE HOME TELEPHONE WIRES, FOR THOSE WHO DOEST MUST
SURELY BRING THE WRATH OF THE CHIEF SPECIAL AGENT DOWN UPON THY HEADS.
II. SPEAKEST THOU NOT OF IMPORTANT MATTERS OVER THINE HOME TELEPHONE WIRES,
FOR TO DO SO IS TO RISK THINE RIGHT OF FREEDOM.
III. USE NOT THINE OWN NAME WHEN SPEAKING TO OTHER PHREAKS, FOR THAT EVERY
THIRD PHREAK IS AN FBI AGENT IS WELL KNOWN.
IV. LET NOT OVERLY MANY PEOPLE KNOW THAT THY BE A PHREAK, AS TO DO SO IS TO
USE THINE OWN SELF AS A SACRIFICIAL LAMB.
V. IF THOU BE IN SCHOOL, STRIVE TO GET THIN SELF GOOD GRADES, FOR THE
AUTHORITIES WELL KNOW THAT SCHOLARS NEVER BREAK THE LAW.
VI. IF THOU WORKEST, TRY TO BE A EMPLOYEE, AND IMPRESSEST THINE BOSS WITH
THINE ENTHUSIASM, FOR IMPORTANT EMPLOYEES ARE OFTEN SAVED BY THEIR OWN BOSSES.
VII. STOREST THOU NOT THINE STOLEN GOODES IN THINE OWN HOME, FOR THOSE WHO DO
ARE SURELY NON-BELIEVERS IN THE BELL SYSTEM SECURITY FORCES, AND ARE NOT LONG
FOR THIS WORLD.
VIII. ATTRACTEST THOU NOT THE ATTENTION OF THE AUTHORITIES, AS THE LESS
NOTICABLE THOU ART, THE BETTER.
IX. MAKEST SURE THINE FRIENDS ARE IN STANT AMNESIACS AND WILL NOT REMEMBER
THAT THOU HAVE CALLED (ILLEGALLY), FOR THEIR COOPERATION WITH THE AUTHORITIES
WILL SURELY LESSEN THINE TIME FOR FREEDOM ON THIS EARTH.
X. SUPPORTEST THOU TAP, AS IT IS TH INE NEWSLETTER, AND WITHOUT IT, THY WORK
WILL BE FAR MORE LIMITED.
CN/A NUMBERS
CUSTOMER NAME & ADDRESS BUREAUS EXIST SO THAT AUTHORIZED BELL EMPLOYEES MAY
OBTAIN THE NAME & ADDRESS OF ANY CUSTOMER IN THE BELL SYSTEM BY GIVING THE
CN/A OPERATOR THE CUSTOMER'S TEL. # ALL CUSTOMERS ARE MAINTAINED ON FILE
INCLUDING UNLISTED #'S. THESE BUREAUS HAVE MANY USES FOR PHREAKS.
HERE IS HOW AN EMPLOYEE MIGHT GO ABOUT CALLING CN/A: "HI, THIS IS JOHN DOE
FROM THE MIAMI RESIDENTAL SERVICE CENTER, CAN I HAVE THE CUSTOMERS NAME AT
(123) 555-1212." THE EMPLOYEES USUALLY USE THESE FOR CHECKING WHO BELONGS TO A
# THAT SOMEONE CLAIMED THEY DIDN'T CALL.
IF YOU SOUND CHEERY AND NATURAL THE OPERATOR WILL NEVER ASK ANY QUESTIONS. IF
YOU DON'T SOUND LIKE A MATURE ADULT, DON'T USE IT! ALWAYS PRACTICE FIRST & SO
YOU DON'T SCREW UP AND MAKE THE OPERATOR SUSPICIOUS. USE NAME THAT SOUNDS
REAL, NOT YOUR PIRATE NAME EITHER! ALSO SAY THAT YOU ARE FRO A CITY THAT IS
FAR AWAY FROM THE ONE THAT YOU ARE CALLING.
THE CN/A NUMBER FOR THE NY AREA & VICINTY (212, 315, 516, 518, 607, 716, &
914) IS>>>>>>>>>(518) 471-8111<<<<<< AND IS OPEN DURING BUSINESS HOURS.
[DON'T A BUSE IT!]
AT&T NEWSLINES
AT&T NEWSLINES ARE NUMBERS AT AREA PHONE OFFICES THAT TELCO EMPLOYEES CALL TO
FIND OUT THE LATEST INFO ON NEW TECHNOLOGY, STOCKS, ETC. THE RECORDED REPORTS
RANGE FROM VERY BORING TO VERY INTERESTING.
HERE ARE A FEW OF THE NUMBERS:
*(201) 483-3800 NJ (518) 471-2272 NY (203) 771-4920 CN (717) 255-5555 PA
(212) 393-2151 NY (717) 787-1031 PA (516) 234-9941 NY *(914) 948-8100 NY
SOME OF THESE NUMBERS ARE TOLL-FREE, BUT YOU CAN'T ALWAYS COUNT ON IT.
* THESE NUMBERS ARE NOT ALWAYS UP!
NUMBERS FROM OTHER AREAS ARE AVAILABLE BY REQUEST FROM F)BIOC L)AGENT 003.
ANI NUMBERS
ANI NUMBERS IDENTIFY THE PHONE NUMBER THAT YOU ARE CALLING FROM. IT IS USEFUL
WHEN PLAYING IN CANS (THOSE BIG SILVER BOXES ON TELEPHONE POLES) TO FIND OUT
THE # OF THE LINE. IT IS ALSO GOOD TO FIND OUT THE # OF A PHONE THAT DOESN'T
HAVE IT PRINTED ON IT. IN THE 914 AREA CODE THE ANI # IS 990. IF YOU JUST
HAVE TO DIAL THE LAST 4 DIGITS FOR A LOCAL #, IE CONGERS (268), DIAL
1-990-1111, WHERE 1111 ARE DUMMY DIGITS THERE IS ALSO A LESS USEFUL TYPE OF ANI
# WHICH WILL IDENTIFY THE AREA CODE & EXCHANGE. IT IS NXX-9901, WHERE NXX IS
THE EXCHANGE. IN THE 212 & 516 AREA CODES THE ANI # IS 958.
BLACK BOXING
THE BLACK BOX IS A DEVICE THAT ATTACHED TO A CALLED PARTIES PHONE THAT ALLOWS
HIM/HER TO RECEIVE FREE LONG DISTANCE CALLS FROM FRIENDS WHO CALL.
YOU ONLY NEED 2 PARTS: A SPST TOGGLE SWITCH AND A 10,000 OHM (10 K), 1/2
WATT, 10% RESISTOR. ANY ELECTRONICS PLACE SHOULD HAVE THESE.
NOW, CUT TWO PIECES OF WIRE, ABOUT 6 INCHES, AND ATTACH THESE TO THE TWO SCREWS
ON THE SWITCH. TURN YOUR NORMAL DDSIDE DOWN AND UNSCREW THE 2 SCREWS. LOCATE
THE "F" AND "RR" SCREWS ON THE NETWORK BOX. WRAP THE RESISTOR BETWEEN THESE 2
SCREWS AND MAKE SURE THAT THE WIRES TOUCH ONLY THE PROPER TERMINALS! NOW
CONNECT ONE WIRE FROM THE SWITCH TO THE RR TERMINAL. FINALLY, ATTACH THE
REMAINING WIRE TO THE GREEN WIRE (DISCONNECT IT FROM ITS TERMINAL). NOW BRING
THE SWITCH OUT THE REAR OF THE PHONE AND CLOSE IT UP. PUT THE SWITCH IN A
POSITION WHERE YOU GET A DIAL TONE, MARK THIS NORMAL. MARK THE OTHER SIDE
FREE.
WHEN YOUR FRIENDS CALL (AT A PREARRANGED TIME), QUICKLY LIFT & DROP THE
RECEIVER AS FAST AS POSSIBLE. THIS WILL STOP THE RINGING, IF NOT TRY AGAIN.
IT IS VERY IMPORTANT THAT YOU DO IT FAST! NOW PUT THE SWITCH IN THE FREE
POSITION AND PICK UP THE PHONE. KEEP ALL CALLS SHORT & UNDER 15 MINUTES.
WHEN SOMEONE CALLS YOU LONG-DISTANCE, THEY ARE BILLED FROM THE MOMENT YOU
ANSWER. THE TELCO KNOWS WHEN YOU ANSWER DUE TO A CERTAIN AMOUNT OF VOLTAGE
THAT FLOWS WHEN YOU PICK UP THE PHONE. HOWEVER, THE RESISTOR CUTS DOWN ON THE
VOLTAGE SO IT IS BELOW THE BILLING RANGE BUT SUFFICIENT ENOUGH TO OPERATE THE
MOUTHPIECE. ANSWERING THE PHONE FOR A FRACTION OF A SECOND STOPS THE RING BUT
IT IS NOT ENOUGH FOR BILLING TO START. IF THE PHONE IS ANSWERED FOR EVEN ONE
FULL SECOND, BILLING WILL START AND YOU WILL BE CUT OFF WHEN YOU HANG UP AND
SWITCH TO FREE.
WARNING: BELL CAN RANDOMLY LOOK FOR BLACK BOXES SO BE CAREFUL!
---------------------------------------
: :
***BLUE WIRE**>>F< :
: * * :
**WHITE WIRE**** * :
: * :
: RESISTOR :
: * :
: * :
: >RR<*******SWITCH*** :
: * :
****GREEN WIRE********************* :
: :
---------------------------------------
DIAL LOCKS
HAVE YOU EVER BEEN IN AN OFFICE OR SOMEWHERE AND WANTED TO MAKE A FREE FONE
CALL BUT SOME ASSHOLE PUT A LOCK ON THE FONE TO PREVENT OUT-GOING CALLS?
FRET NO MORE PHELLOW PHREAKS, FOR EVERY SYSTEM CAN BE BEATEN WITH A LITTLE
KNOWLEDGE!
THERE ARE TWO WAYS TO BEAT THIS OBSTACLE, FIRST PICK THE LOCK, I DON'T HAVE
THE TIME TO TEACH LOCKSMITHING SO WE GOTO THE SECOND METHOD WHICH TAKES
ADVANTAGE OF TELEPHONE ELECTRONICS.
TO BE AS SIMPLE AS POSSIBLE, WHEN YOU PICK UP THE FONE YOU COMPLETE A CIRCUIT
KNOW AS A LOCAL LOOP. WHEN YOU HANG-UP YOU BREAK THE CIRCUIT. WHEN YOU DIAL
(PULSE) IT ALSO BREAKS THE CIRCUT BUT NOT LONG ENOUGH TO HANG UP! SO YOU CAN
"PUSH-DIAL." TO DO THIS YOU >RAPIDLY< DEPRESS THE SWITCHHOOK. FOR EXAMPLE, TO
DIAL AN OPERATOR (AND THEN GIVE HER THE NUMBER YOU WANT CALLED) >RAPIDLY< &
>EVENLY< DEPRESS THE SWITCHHOOK 10 TIMES. TO DIAL 634-1268, DEPRESS 6 X'S
PAUSE, THEN 3 X'S, PAUSE, THEN 4 X'S, ETC. IT TAKES A LITTLE PRACTICE BUT
YOU'LL GET THE HANG OF IT. TRY PRACTICING WITH YOUR OWN # SO YOU'LL GET A BUSY
TONE WHEN RIGHT. IT'LL ALSO WORK ON TOUCH-TONE(TM) SINCE A DTMF LINE WILL ALSO
ACCEPT PULSE. ALSO, NEVER DEPRESS THE SWITCHHOOK FOR MORE THAN A SECOND OR
IT'LL HANG-UP!
FINALLY, REMEMBER THAT YOU HAVE JUST AS MUCH RIGHT TO THAT FONE AS THE ASSHOLE
WHO PUT THE LOCK ON IT!
EXCHANGE SCANNING
ALMOST EVERY EXCHANGE IN THE BELL SYSTEM HAS TEST #'S AND OTHER "GOODIES" SUCH
AS LOOPS WITH DIAL-UPS.
THESE "GOODIES" ARE USUALLY FOUND BETWEEN 9900 AND 9999 IN YOUR LOCAL
EXCHANGE. IF YOU HAVE THE TIME AND INITIATIVE, SC AN YOUR EXCHANGE AND YOU MAY
BECOME LUCKY!
HERE ARE MY FINDINGS IN THE 914-268 EXCHANGE:
9900 - ANI (SEE SEPARATE BULLETIN)
9901 - ANI (SEE SEPARATE BULLETIN)
9927 - OSC. TONE (POSSIBLE TONE SIDE OF A LOOP)
9936 - VOICE # TO THE TELCO CENTRAL OFFICE
9937 - VOICE # TO THE TELCO CENTRAL OFFICE
9941 - COMPUTER (DIGITAL VOICE TRANSMISSION?)
9960 - OSC. TONE (TONE SIDE LOOP) -- MAY ALSO BE A COMPUTER IN SOME EXCHANGES
9961 - NO RESPONSE (OTHER END OF LOOP?)
9962 - NO RESPONSE (OTHER END OF LOOP?)
9963 - NO RESPONSE (OTHER END OF LOOP?)
9966 - COMPUTER (SEE 9941)
9968 - TONE THAT DISAPPEARS--RESPONDS TO CERTAIN TOUCH-TONE KEYS
MOST OF THE NUMBERS BETWEEN 9900 & 9999 WILL RING OR GO TO A "WHAT #, PLEASE?"
OPERATOR.
HAVE PHUN AND REMEMBER IT'S ONLY A LOCAL CALL!
TOUCH-TONE & FREE CALLS
THERE ARE SEVERAL WAYS TO MAKE FREE CALLS (SPRINT, MCI, ETC.) USING A ROTARY
PHONE. THEY ARE:
1. USE A NUMBER THAT ACCEPTS VOICE AS WELL AS DTMF. SUCH A # IS (800)
521-8400. AS OF WRITING THIS, A CODE WAS 57617895. A) IF USING VOICE, WAIT
FOR THE COMPUTER TO SAY, "AUTHORIZATION #, PLEASE." THEN SAY EACH DIGITS
LOWLY, IT WILL BEEP AFTER EACH DIGIT IS SAID. AFTER EVERY GROUP OF DIGITS, IT
WILL REPEAT WHAT YOU HAVE SAID, THEN SAY YES IF IT IS CORRECT, OTHERWISE SAY
NO. IF THE ACCESS CODE IS CORRECT, IT WILL THANK YOU AND ASK FOR THE
DESTINATION #, THEN SAY THE AREA CODE + NUMBER AS ABOVE. AN OTHER SUCH # IS
(800) 245- 8173, WHICH HAS A 6 DIGIT ACCESS CODE. (NOT E: IF USING TOUCH-TONE
ON THIS #, ENTER THE CODE IMMEDIATELY AFTER THE TONE STOPS.)
2. HOOK UP A TOUCH-TONE FONE INTO YOUR ROTARY FONE. ATTACH THE RED WIRE FROM
THE TOUCH-TONE FONE TO THE "R" TERMINAL INSIDE THE FONE ON THE NETWORK BOX.
THEN HOOK THE GREEN WIRE TO THE "B" TERMINAL. TO USE THIS DIAL THE # USING
ROTARY & THEN USE THE TOUCH-TONE FOR THE CODES. (DON'T HANG UP THE ROTARY
FONE WHILE DOING THIS THOUG H!) IF THIS DOESN'T WORK THEN REVERSE THE 2 WIRES.
(NOTE: IF YOUR LINE CAN ACCEPT TOUCH-TONE BUT YOU HAVE A ROTARY FONE THEN YOU
CAN HOOK UP A TONE FONE DIRECTLY FOR ALL CALLS BUT THIS USUALLY ISN'T THE
CASE.) SUCH AS RADIO SHACK'S 43-138.
OTHER ALTERNATIVES
4. USE A CHARGE-A-CALL FONE. (THESE ALSO MAKE GREAT EXTENTIONS IF YOU REMOVE
IT USING A HEX WRENCH WITH A HOLE IN THE MIDDLE ON THE CENTER SCREW! THESE
FONES FOR THE BENEFIT OF THOSE WHO DON'T KNOW ARE BLUE WITH NO COIN SLOTS)
5. USE A PAY FONE THAT WANTS YOUR MONEY BEFORE THE DIAL TONE. PUT IN YOUR
DIME, DIAL THE #; IF IT'S AN 800 # THEN YOUR DIME WILL COME BACK, IMMEDIATELY
PUT A DIME BACK IN (IT 'LL COME BACK WHEN YOU HANG UP!) IF IT IS A TONE FIRST
FONE AND IT DISCON NECTS THE KEYPAD (SOME DON'T) THEN FIND ANOTHER FONE.
TELCO TRACING
THE GOOD 'OL DAYS:
------------------
WAY BACK BEFORE I WAS A PHREAK, MA BELL WOULD HAVE TO MANUALLY TRACE A CALL IF
THEY THOUGH SOMETHING WAS FUCKED UP. FIRST THEY WOULD SEND A 2000 HZ TRACING
TONE, THE WOULD BE FOLLOWED BY ALOT OF NOISE AND CLICKS. IT TOOK ABOUT 2-3
MINUTES TO TRACE A CALL AND ALOT OF PEOPLE WERE INVOLVED IN THE PROCESS. SO
AT 1 IN THE MORNING THEY WOULD HAVE TO WAKE UP PEOPLE FOT THE TRACEES (PHREAK
JARGON FOR A PAY FONE). BUT NEVER USE THE SAME ONE MORE THAN ONCE OR TWICE
BECAUSE THE GESTAPO(ER..EXCUSE ME I MEAN BELL SECURITY) HAS BEEN KNOW FOR
STAKING OUT TROUBLED FORTRESSES. IT'S ALSO POS SIBLE FOR TRAVELNET OR SP TO
ASK FOR A TROUBLE # BUT THE TELCO IS SLOW IN PROCESSING STUFF--ESPECIALLY FOR
THE COMPETITION--SO DON'T FRET PHELLOW PHREAKS.
MODERN TECHNOLOGY:
------------------
THIS CAN BE ATTRIBUTED TO ESS + CCIS WHICH CAN BE TRACED IN 1 SECOND.
MISCELLANEOUS STUFF
HERE ARE A PHEW (PUSHING IT ON THAT WORD) BITS OF INFO ON TELEPHONE ELEC-
TRONICS. IF YOU DON'T APPRECIATE IT THEN I SAY PHUCK U.
VOLTAGES:
WHEN YOUR FONE IS ON-HOOK (IE-HUNG UP) THERE IS A 48 VOLT DC CURRENT FLOWING
THROUGH THE LINE ( I HAVE A GREAT IDEA ABOUT HOOKING A BATTERY CHARGER UP TO MY
FONE ). WHEN THE FONE IS OFF-HOOK THE VOLTAGE DROPS DOWN TO AROUND 15VDC. THE
BLACK BOX (SEE SEPARATE ARTICLES) EXPLOITS THIS FOR FREE CALLS SINCE BELL USES
THIS VOLTAGE DROP WHEN THE CALLED PARTY PICKS UP TO START BILLING. BELL MAY
ALSO REVERSE THE POLARITY OF THE LINE TO START BILLING--IF YOU HAVE A TONE
FONE THE KEYPAD WON'T WORK IF THE POLARITY IS REVERSED. USUALLY, THE RED WIRE
IS CALLED THE TIP SINCE IT IS THE MORE (+) OF THE 2 WIRES + THE GREEN WIRE IS
CALLED THE RING (-).
RING TRIP:
WHEN SOMEONE CALLS YOU BELL HAS TO SEND 90 VOLTS AC DOWN YOUR LINE AT ABOUT 60
HZ TO ACTIVATE YOUR BGLL (THIS IS WHY DEAF PEOPLE CAN HAVE LIGHT BULBS FANS GO
OFF INSTEAD OF A BELL). THE DEVICE THAT DOES THE RINGING IS CALLED A RINGING
GENERATOR ANDTH PROCESS OF RINGING IS CALLED A RING TRIP. THIS COSTS BELL
MONEY AND THEY DON'T LIKE USING ALL THAT ELECTRICITY FROM THE LOCAL RIP-OFF
POWER COMPANY- SO LET IT RING. THIS IS ALSO, HOW BELL CAN CHECK FOR EXTRA
FONES FROM THEIR CENTRAL OFFICE BY SEEING HOW MUCH VOLTAGE THE LINE TAKES
WHILE RINGING AND THEY CAN TELL HOW MANY FONES YOUR NOT SUPPOSE TO HAVE.
SOLUTION: DISCONNECT THE BELL.
MODERN TECHNOLOGY:
------------------
THE 2 WORST ENEMIES TO THE PHREAK BESIDES THE FBI + BELL SECURITY,ARE: ESS +
CCIS. ESS STANDS FOR ELECTRONIC SWITHCING SYSTEM AND IT CAN TRACE A CALL IN
SECONDS, IT ALSO RECORDS ALL CALLS AND CAN EVEN TAP INTO LINES (ER.. I MEAN
CHECK FOR LINE QUALITY) AND RECORD CALLS. CCIS STANDS FOR COMMON CHANNEL
INTER-OFFICE SIGNALING AND IT ALLOWS FOR CONTROL SIGNALS TO BE SENT VIA
SEPARATE DATA LINKS INSTEAD OF TONES OVER THE VOICE CHANNEL--START KISSING
YOUR BLUE BOX GOODBYE.
SOURCES:
--------
FOR THOSE OF YOU WHO WANT TO GO MORE IN-DEPTH ON THE SUBJECT OF SHIT, I
RECOMMEND THE FOLLOWING READING MATERIA L:
1) ELECTRONICS COURCES A-B, TAP, ROOM 603, 147 W. 42 ST., NY, NY 10036. @ 75
CENTS EA.
2) UNDERSTANDING TELEPHONE ELECT.'S, TEXAS INSTRUMENTS, RADIO SHACK MAY HAVE
IT.
3) A MULTITESTER + YOUR FONE FOR YOUR OWN EXPERIMENTING.
4) MISC. INFO FROM SEVERAL SOURCES MAKE FRIENDS + GET YOUR OWN CONNECTIONS.
*****BIOC AGENT 003
*****PHREAK ADVISOR OF PIRATE TREK
*914-634-1268


View File

@@ -0,0 +1,236 @@
=============================================
INTRODUCTION TO PHONE-PHREAKING by The Wizard
=============================================
Preface
=======
LEGAL REQUIREMENTS: I have done, won't do, don't actually know anything about
anything in this document (this message and those following it). I have
absolutely no intention of doing so and all that is here is completely
fictional - Any resemblance to reality is coincidental or guesswork or public
knowledge. I in no way do I advice the reading let alone following of the
information below and it is not in any way to be construed as instructions -
simply a literary excercise in the fiction of intellectual guesswork.
DESCRIPTION: This in an introduction to what is called 'Phreaking'. It has
interested many people, and may be illegal (perhaps stealing electricity or
breach of BT licence). I DO NOT BY ANY MEANS CLAIM ALL THE INFO BELOW TO BE MY
OWN AND THUS TAKE NO RESPONSIBILITY FOR INACURACY! However I must send my
thanks to everyone / anyone who has contributed - They will know who they are.
About 1/3 to 1/2 the info came to my knowledge through TowerNet:- There are
some pretty good brains out there so SUPPORT THE SYSTEM! I would be most
grateful for any corrections / criticisms / updates or even compliments.
SOURCE & DISTRIBUTION: This file was written by 'The Wizard' of 'The Wizard's
Tower' Bulletin Board. Permission is granted to distribute this file on the
following conditions:
1) The actual text remains unammended. Any additions are added at the
end with notes describing their source and date in a readable. The
only possible exception to this is where a portion of the text is
refered to a note at the end where the line <See note XXXX> may be
added.
2) It is understood that the Legal Requirements above are abided by by
both the distributors, any intermediate distributors and 'The Wizard'
The Wizard's Tower is a TowerNet BBS and can be accessed as follows:
Number (UK) : 0295 721532 (thats +44 295 721532 internationally).
Baud rates : V21,22,22bis,23
Protocol : 8n1, configurable, ARQ available if wanted.
Times : 6pm to 9am, Local Time.
What is Phreaking
=================
Phreaking is the process by which free or reduced rate calls, or other
interesting effects may be obtained from phone companies. Ofcourse dialling
numbers that aren't ones you know is in breach of contract with BT, which is
probably breaking the law, as is (ofcourse) attaching naughty circuits to your
phone, so thats why ofcourse I have never done any of it myself as breaking the
law is very naughty and if you deprive monopolies of thier profits you deserve
to have your botty spanked.
There are 2 kinds of phreaking (basically speaking) - one involves
actually intercepting the phone-line with devices to fool the charging
equiptment, and the other confusing BT and other things with exchanges by
dialling wierd and wonderful numbers or making devices to sing merrilly down
the line.
The trouble with 'black-boxes' (devices to fool the charging equipment) is
though it is actually illegal for BT to trace any calls without a license etc.,
and they can't tell you are phreaking, most if not all black boxes light up a
fault light on older exchanges (which all true blooded BT engineers ignore!).
This lights status could I suppose be used as evidence against you if they ever
felt like suing you. The other major problem, is by their very nature, the way
most black-boxes work is they tell the charging equipment that you have not yet
picked up the phone, thus incoming calls are free (to those who ring you), but
not out-going calls, which is not particularly helpful for some purposes (e.g.
hacking remote systems). Thus their use is limitted, but they do come in
useful. For legal reasons and the fact this is a public-ish 'place' I can't
really give any ciruits away that do this directly.
Use of circuits attached directly to the telephone lines not approoved by
BT is in breach of your license agreement. This has not bothered many people
before, but as honest citizens you really ought not use them....
Line Signals
============
Noises (like engaged, ringing tones etc. and voices) are on the line as
A.C., say down to about 200Hz officially speaking. The peak to peak voltage
signal is smallish, about 1/2 a volt-ish, so in DC terms you can ignore this.
For dialling and charging purposes DC is used. DC voltages are listed below.
There is no set polarity on your line (as BT often swap Line A and Line B -
even when they repair the lines! Thus it is a good idea to have a change over
switch mounted in any circuitry you might make), so set the imaginary meter in
your brain to think of the polarity as 'postive' (+ve) when you pick the phone
up to dial outwards.
How a call works
================
Normally on a phone line there is 50V accross the line. When you pick the
phone up for the first time to make an outward going call, the line polarity is
+ve about 12V-ish. Normally (i.e. if the phone wasn't connected) there'd be
about 50V-ish accross the line, but because the phone has a lowish resistance
compared to the series resistance in the exchange, when the phone is in the
circuit 50-100ma is drawn and the voltage accross the line falls.
What happens on LD (Loop-Disconnect or click dialling) is that pulses are
sent down the line by breaking the line once to dial a 1, twice to dial a 2
etc., 9 times to dial a nine and ten to dial a zero. There are ten pulses sent
down per second, of which 33% is mark (i.e. the line disconnected), and 67%
space (i.e. line normal). In each pulse the line voltage rises to 50 volts +ve,
as theres no current taken by the phone.
Then hopefully BT will connect you to the number. It rings (which on their
phone is a 50V peak either side of zero (ish)) and on your phone is a tone from
their exchange. Their bell takes a little current when it rings and the
exchange notices this ringing (if theres no current flowing it gives number
unobtainable the implication being normally speaking that the lines broken:- On
the new sockets theres an opt-out of service resistor that makes the line draw
current if you don't connect your phone so it seems as though its ringing to
whoevers calling so hundreds of faults reported as broken lines which are only
people unplugging their phone aren't reported if you know what I mean...).
The exchange notices that the phone is picked up (all this info is
possibly more relevant only to the old exchanges) because when the guy you are
ringing picks the reciever up a largish current (50ma or so) flows. Now as the
signal of the ringing is AC of a large voltage (Not quite sure if all this is
completely exact but its pretty near) suddenly on both sides of the cycle a
largish current flows. One side of the cycle simply turns off the ringing tone
at the exchange, the other side is more interesting. If its a local call it
simply activates the your charging meter, otherwise it makes the exchange of
the guy you are ringing send a 2280Hz bleep down the line to your exchange
which activates your charging meter. That is why (a) 2280Hz signalling (see
later) only works on Trunk type calls and (b) you often hear a little blip when
you pick the phone up. 2280Hz.ARC in this room generates a 2280 Hz signal (and
others aswell) from an IBM PC's internal speaker. You will need a machine with
a loud speaker e.g. an Amstrad PC.
If you can't work out how phreak potentials arise from this hotch-potch of
technology then I suggest you sit down and think about it some more....
Internal communication over trunk lines
=======================================
All internal communcation between trunk excahnges used to use AC9 (AC
signalling cicuit number 9) to communicate between them. The first thing to
understand about exchanges is that making a call from A to B you are likely to
pass through technology from any period between 1920 to 1988. Each is different
in its characteristics (see Atkinsons Telephony - very helpful on the subject)
but most understand AC9 codes though many will not accept them from the line.
AC9 is a dialling follows internal rather than external dialling codes.
I.e. the numbers exchanges send to eachother to route a call from A to B are
not the same as the numbers you dial on the phone to get from A to B which
presents a problem (In the USA internal dialling codes are very similar to
external dialling codes - very useful) the reason for this is that the internal
dialling codes include routing information. AC9 dialling is very similar to
loop disconnect dialling except that instead of breaking the line, 2280Hz is
sent down, again at 10pps with a 33% / 67% mark space ratio.
Before any AC9 dialling is done, the master tone must be sent down - this
is just a long, loud burst of 2280Hz which will clear the line to an eerie
silence. It also (see above) activates the charging aparatus. 2280Hz master
tones for the reasons above only work on non-local calls (or atleast
non-own-exchange). Thus at first glance AC9ing may seem pointless. However if
you then AC9 elsewhere, you will ofcouse be charged only at the rate at which
you rang out. I.e. if you ring an 'A' rate number or possibly a local number
starting with an '0' (yes there are some) and then AC9ed down the code for
international dialling (it may not be 010 as again internal codes are
different) then you would suddenly find yourself with a dialling tone and be
able to dial abroad at 'L' or 'A' rates (in theory).
In practise the internal dialling codes complexities are often a great
problem (I THINK the last 4 5 or 6 digits of the internal & external dialling
codes are normally identical but I dunno much about internal dialling codes -
best ask a BT engineer who is corrupt!), and so is the fact that a LOUD 2280Hz
is needed as it is filtered out at exchanges. It is rumoured that if these
filters capacity is exceeded, in some exchanges alarms go off but this seems a
little unlikely especially with the old exchanges.
What I can give you is a little hint - the internal code for a number
which is in the same district is 1, i.e. to dial 01-234-5678 after clearing the
line on ringing 01-987-6543, the code would be 1-234-5678 (I think). Also you
will find various internal operators on 1105, 1107 (presumably equal to what
would happen if you dialled 105 & 107 normally if it weren't blocked by the
exchange??) and other wierd things on other 11XX numbers e.g. 1100 & 1107. You
might try all the standard test no.s prefixed by a 1.
Internal Communication for AC9 and normal pulse dialling specifications:
Pulse rate : 10 pps
% break : 67%
% pulse : 33%
Interdigit interval : 800ms
Cycle time : Digit dependant
The newer system X type exchanges and the US exchanges use a different
system for signalling. Again they use a master tone to clear the line, and then
what happens is dual tone multi-frequency dialling is used (i.e. like normal
tone dialling but with different frequencies). Below follows a list of
frequencies as far as I know. The way they work, is as above in terms of
dialling codes I think, but the stuff you send is <Master Tone> <Start Keying>
<Number to dial> <End Keying>. The tones are shortish in duration (as in tone
dialling. Tone dialling freqs are also listed below.
Internal frequencies
====================
Frequency Hz| Tone dialling (US & UK) UK Internal US Internal
==================================================================
Master | ---- | 2280 | 2600 |
1 | 697, 1209 | 1380, 1500 | 700, 900 |
2 | 697, 1336 | 1380, 1620 | 700, 1100 |
3 | 697, 1477 | 1500, 1620 | 900, 1100 |
4 | 770, 1209 | 1380, 1740 | 700, 1300 |
5 | 770, 1336 | 1500, 1740 | 900, 1300 |
6 | 770, 1477 | 1620, 1740 | 1100, 1300 |
7 | 852, 1209 | 1380, 1860 | 700, 1500 |
8 | 852, 1336 | 1500, 1860 | 900, 1500 |
9 | 852, 1477 | 1620, 1860 | 1100, 1500 |
0 | 941, 1366 | 1740, 1860 | 1300, 1500 |
Start Keying| 941, 1209 (*) (1740)| 1620, 1980 | 1100, 1700 |
End Keying | 941, 1477 (#) (1860)| 1740, 1980 | 1300, 1700 |
A | 697, 1633 | 1380, 1980 | 700, 1700 |
B | 770, 1633 | 1500, 1980 | 900, 1700 |
C | 852, 1633 (1620)|?1860, 1980 |?1500, 1700 |
D | 941, 1633 | - | - |
==================================================================
Those figures bracketted indicate 'alternative' values of the 1st UK frequency
for internal dialling from a different source:- though they seem less likely
to be accurate in terms of correspondance with the US frequencies, they are
included in the interests of completeness.
Tone dialling specifications
============================
Tone duration : 100ms
Interdigit interval : 100ms
Cycle Time : 200ms (total time to dial a digit).
Example figures. These are for a Quattro modem but your equiptment should try
& approach these.
Freq. deviation : 1.5% Max
Transmit level : -7dB to +1dB
Tone pair amp. bal. : Higher tone about 2dB greater in amplitude than
lower tone.
A, B, & D, are used for various purposes. In the older system X type Bell
exchanges in the US, touch tone A,B,C & D are used by the engineers to call up
various test services - just ring the operator there with 1 of the keys A B C
or D held down (especially D) - if it works you will get to a test, if it
doesn't the operator will swear and curse at you.
In internal exchanges such as the Merlin, A, B, C & D touch tones call up
additional services. If your phone for your exchange does not have these
buttons on it, then getting a phone with this '4th column' may add extra
facilities - could be useful! Though I don't (as usual) guarantee anything.
In the US military phone system (AUTOVON), A, B, C & D provide various
military prorities: Flash, Flash Override, Priority and Priority interrupt -
what does what who knows but its meant to speed wartime & wargame
communication.
What A,B & C frequencies do on the internal network I am afraid I don't
know. I am not sure the frequency allocated to C is even used! But I have
heard they are used as control signals and for the routing mechanism in the UK.
Someone even told me that they did

View File

@@ -0,0 +1,166 @@
PHREAKERS HANDBOOK
Title: PHREAKERS HANDBOOK
Written: CAT-TRAX
_________________________
<20> <20>
<20> The Phreaker's HandBook
<20>___________________________________________
<20>
<20> Written by: Cat-Trax <20>The "White-Collar Criminal
<20> Typed by: Cat-Trax
<20>
<20> Copywrong (X) May, 1985
<20> The Hackin' Hoodlum Press, Inc.
<20>
<20> Call: The Hacker's Hideout
<20> [206/265/6369]
<20> Password: U/L
<20> 300/1200 Baud



[ Definitions ]
Phreak ["free"k] Verb--1. The act of "Phreaking" 2. The act of making telephone calls without paying money [Slang]
Phreaker ["free"-k-er] Noun--1. One who engages in the act of "Phreaking"2. One who makes telephone calls without paying money [Slang]
<%=-------------------------------------------------------------------------=%>
[ Introduction ]
Phreaking is a method used by most intelligent people <20>most often thosewho use a computer and a Modulator-Demodulator (MoDem)<29>. If you happen to resemble the major mass of people who do not have the income to afford large
phone bills then phreaking is for you. If you live in an area with anElectronic Switching System [ESS] then phreaking is something which should be done in moderate amounts.

<%=-------------------------------------------------------------------------=%>

[ Switching Systems ]
Three types of switching systems are present in the United States today:

[1] Step by Step
[2] Crossbar
[3] ESS <20>Electronic Switching System


<] Step by Step [>
First switching system used in America, adopted in 1918 and until 1978 Bell had over 53% of all exchanges using Step by Step [SxS]. A long, and confusing train of switches is used for SxS switching.

[> Disadvantages <][
[A] The switch train may become jammed : Blocking call.
[B] No DTMF [Dual-Tone Multi-Frequency]["Touch-tone"].
[C] Much maintanance and much electricity.
[D] Everything is hardwired
+> Identification
[A] No pulsing digits ater dialing or DTMF.
[B] Phone Company sounds like many typewriters.
[C] No: Speed calling, Call forwarding, and other services.
[D] Pay-phone wants money first before dial-tone.

<] Crossbar [>

Crossbar has been Bell's primary switcher after 1960. Three types of Crossbar
switching exist: Number 1 Crossbar [1XB], Number 4 Crossbar [4XB], and Number5 Crossbar [5XB]. A switching matrix is used for all the phones in an area.When someone calls, the route is determined and is met up with the othr phone.
The matrix is set-up in horizontal and vertical paths. There are no definite distinguishing features of Crossbar switching.

<] ESS [>

You probably were hoping I wouldn't talk about this nightmare, if you did youwill know why everyone doesn't want to be reminded about Bell's holocaust on
America. With ESS Bell knows: every digit dialed <20>including mistakes!<21>, whoyou call, when you called, how long you were connected, and in some cases,what you talked about! Yes, this is the closest anyone has come to true Totalitarianism. ESS is programmed to print out the numbers of people who make excessive calls to WATS numbers [Wide Area Telephone Service][1-800 numbers]or directory assistance. This deadly trap is called "800 Exceptional CallingReport." ESS can be programmed to print logs of who called certain numbers. Electronic Switching System makes the job of the FBI, Bell Security <20>TheGestapo in phreakin' tongue<75>, NSA, and other organizations which like to invade
our privacy, extremely easy! Tracing is done in microseconds, and the resultsare printed out on the monitor of a Gestapo officer. ESS can also pick upforeign tones on the line, like 2600 Hz. <20>used in blue boxes, discussed later<65>Bell claims that the entire country will be plagued by ESS by the 1990's!

+> Identification <+
[A] Dialing 911 for emergencies.
[B] Dial-tone first for pay-phones.
[C] Calling services, like: Call forwarding, Speed dialing, Call waiting.
[D] ANI [Automatic Number Identification] for long-distance calls.
[[[Note]]] of the above identifications of the three switching systems, do not solely rely on these descriptions, the best way to find outis to [no!] call your local telephone company.

<%=-------------------------------------------------------------------------=%>

[ Long-Distance Services ]
To attempt to help the community <20>and for private business<73> companies developedways to lessen the costs of long-distance calling charges. The companies owntheir own switching systems and use extenders for callers to call. The way[
extenders operate: 1] Customer calls service, 2] He/she hears a low tone whichsounds like a dial-tone, 3] She/he either dials the access code then the phone
number, or dials the phone number then the access code, 4] Is connected to whatever he/she calls. Aside from Ma Bells collection, the customer recieves abill for calls made with his/her long-distance company <20>a supposedly cheaperbill than Ma Bell's<>. Thought: Hey, I could randomly pick access codes anduse them to call whatever area the company services! Righto, that's what basicphreaking is! A wise idea, though, is to have many access codes and many service numbers to rotate throughout your average life as a phreaker. To aid in your quest to beat the system I have provided many 1-800 numbers whichanyone can call, aside from local numbers, such as Sprint, or MCI. The reason
for providing you with WATS nummbers is because all of us aren't in a big citywhere Sprint or MCI even exist, this way everyone can pheak! A way to findmore access codes is by using your old modem. Yes, your modem can imitate DTMF
tones!

<20>>Procedure: 1) dial 1-800 + service number
2) dial access code->area code->phone number, or
3) dial area code->phone number->access code

<EFBFBD><EFBFBD>::::::::::::::::::::::::::::::::::::::::::::::::::::::::<3A><>
\/ -=+>Cat-Trax' list of WATS [1-800] numbers:<+=- \/
<EFBFBD><EFBFBD>::::::::::::::::::::::::::::::::::::::::::::::::::::::::<3A><>

Number---Code Length...
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- 547-6754 6 245-4890 4 327-6713 4
243-7650 6 328-7112 4 654-8494 6
327-9895 7 327-9136 4 227-3414 4
682-4000 6 343-1844 4 858-9000 3
462-6471 5 322-1415 6 521-1674 4
527-3511 8 321-0327 4 321-0845 6
843-0698 9 221-8190 4 543-7168 8
521-8400 8 327-2731 6 252-5879 8
345-0008 7 245-7508 5 526-5305 8
323-3027 6 242-1122 ? 621-1506 ?
621-4611 ? 325-3075 ? 336-6000 ?
221-1950 ? 323-8126 ? 325-7222 6?

[[[Note]]] remember to dial 1-800-above number, also remember to rotatenumbers and access codes.
<%=-----------------------------------------------------=%>

[ Colored Boxes ]
A more shrewd, technological, safer <20>without ESS<53> way to phreak is with a piece of hardware known as a ________ Box. Boxes are many different colors <20>I don't know ALL the colors because it seems like every time I turn around there's some
new color out!<21>. Colors I have heard of: Blue, Black, Red,White, Silver,Clear, and MANY, MANY more... Plans for making these boxes can be obtained bycalling different boards [BBS's], AE lines, or whatever. But!, if you havean
Apple Cat modem then do I have good news for ->you<-!! The Apple Cat modemcan emulate the frequencies <20>usually 2600 Hz.<2E> made by ________ Boxes with the help of a handy little program called "Cat's Meow!"
<%=-----------------------------------------------------=%>

::Warning!:: Phreak at your own risk! Stiff laws are starting to pop-up nowdays. But, if you're careful then don't worry! I haven't been busted yet!Heck [Hack!], what would life be without risks?
<%=-----------------------------------------------------=%>

This was an original phile by: Cat-Trax

<%=-----------------------------------------------------=%>

The // // // //
// // // //
//=--=// //=--=//
// // // //
// //ackin' // //oodlums[

as of: 05/8/89
Leader: Cat-Trax
Co-Leader: Al Capone

Agents: Mr. DOS Terminator Lumpy
The Raven The Spartan The Alar
Doctor Jam


Call:

______________________
<20>\ \
<20> __________________\
<20> <20> <20>
<20> <20> The Hacker's Hideout <20>
<20> <20> <20>
<20> [206][265][MEOW] <20>
<20> <20> <20>
<20> <20> Password: U/L <20>
<20> <20> <20>
<20> <20> 300/1200 Baud! <20>
\ <20> <20>
\<5C>______________________<5F>


View File

@@ -0,0 +1,254 @@
FIRST OF ALL: WE THE MAKERS OF THIS H/P FILE, ARE NOT LIABLE FOR ANY DAMAGE
DONE TO YOURSELF OR OTHERS FROM USING THIS DOCUMENT. WE DO NOT
ENDORSE ANYTHING IN HERE NOR TELL YOU TO DO THEM. IF YOU BLAME US THEN
PHUCK YOU!
==============================================================================
the weekly phreak
made by:
phoenix
and
TrYpD
==============================================================================
/\/\/\/\/\/\
| o o |
\| ) |/
\| \___/ |/
\________/
A sTuPiD LaMeR pHrEaK
=============================================================================
table of contents
=================
one-how to get free phone calls from a payphone by phoenix
two-how to get free sodas
three-ReD pHuCkIn BoXiNg
four-SoMe PrAnK cAlLs To MaKe
five-BOMBS!BOMBS!BOMBS! BOOOOM!!!!! by scruffy ^
six-other shit by SCRUFFY!!!!!!!!!!!! (phoenix)
==============================================================================
one-how to get free phone calls from a payphone
by phoenix
if you are to wussy or to big of a lamer to make a red box, this wussy
way might be what you should do. this method was said in a FAQ i got
from a phriend, but since the FAQ wasnt popular, i will print it here.
when you dial a 1800 number into a payphone, it HAS to let you make the call
for free. on some COCOTS, you can use this to get free calls. first, call
a number like 1800MUSICNOW. in this case, you would keep hitting #
until music now hung up on you. then, you will get a dial tone. SOME COCOTS
lock up so you cant dial anything, but most dont. then, dial any number
you want and it should work.
if you do this on a non COCOT such as a USWEST, an operator will get on
and ask for the money for the call. that is why you must do this on a
COCOT. when you get the operator phuck with her!!!! say something like
"i put in my damn money now let me on!!!!!!!" and if she says no you didnt
start whistling and maybe youll whistle right (yeah right) then, tell
the operator how stupid she is for being an operator and tell her if she
lets you get away with this, youll do it with her!!! <DONT EVER DO THIS
FROM YOUR HOME PHONE!!!!>
=============================================================================
two-how to get free sodas from a soda machine
there are lotsa ways to get sodas from a soda machine. the way all the lamerz
on 2600 say you should do it is stick in money, but since i dont like to
spend money, these ways are easier.
method one- this way works SOMETIMES. but once you get it working once, you
will probably be able to do it again and again. first stick in all
your coins except for the last coin, then drop in the last coin. just
when it is going down, hit whatever selection you want as fast as you can.
if this works, you should get your money back and two sodas. i was told
by a phriend that if you dont hear a rumbling when you are hitting the button
a lot, then you should hit the refund button as soon as possible and try
again. this works best on old coke machines.
method two-all the lamerz on 2600 said had a BIG fight about if this way works
but it does, so dont listen to anything you hear.
pour water into a squirt bottle. pour A LOT of salt. go to a soda machine
that is isolated and squirt the salt water into the dollar thing. you
should get all of one type of coin (all the dimes, nickels, or quarters) and
all the sodas (about 80+). It should also smoke a lot...dont worry, you wont
die, its just the machine breaking! run once you get the stuff. this costs
the coke company 800 dollars to fix so be careful. you can get in deep
shit for this! NOTE: THE NEWER MACHINES HAVE GUARDS ON THEM!
=============================================================================
ThReE-ReD pHuCkIn BoXiN
Okay, 4 all u phreakin newbies. This is aimed in your direction. So this
is my pathetic attempt to try to tell you how to make the almighty Red Box.
First go take your cheap ass into Gay Shack(Radio Shack lamerz) and buy a tone
dialer. Get the 33-memory tone dialer so you can get all five tonez in at
the same time.
Now buy yourself a 6.5536 mhz crystal(don't get too picky, take a 6.5 if they
have the phuck) You will probably have to order it from Phucked-Up-Shit Shack
(Radio Shack) If they ask what you need it 4 say "My phuckin science project"
or something like that.
IMPORTANT PHUCKIN DISCLAIMER!-NEVER BUY THESE 2 AT THE SAME TIME!!
Now borrow or steal a solder iron from a lamer/store/phriend/someplace.
OkAy NoW tO tHe PhUn PaRt
WHAT TO DO WITH YOUR SHIT!
First of phuckin all take the batteries out of the tone dialer(if any).
Now take the 4 screwz out of the back of it cause they suck. Now pry the
shit apart.
Okay I'm not even gonna tell you what all the shit is so look for the
cylinder shaped silver thing that has prongz on it. Thatz the crystal
my phriends. Un-phuckin-solder the crystal and replace it with the lamer
6.5536 crystal. It's huger than the other damn-hell so you have to experiment
a bit to figure out how to put it in. Put it in any way you can! Now solder the
shit to the prongz.
Now program the dear-sweet-bejesus dialer. Turn the switch to program and
hold down the memory button/switch and press the * key 5 timez. Now hit
memory again and the place you want to store it. It should beep, if it doesn't
then you are phuckin deaf, or you did it wrong. DO IT AGAIN IF IT DOESN'T BEEP!
Have phun u phreex!
TrYpD
===========================================================================
four-PrAnK cAlLs
So you want to have some phun?
Pick up the phuckin phone and dial a number!
When they answer say "I'm sorry"
They will say "What 4?"
Say "I spooged on your car! But I'm willing to pay 4 the damages!"
They might say "REALLY?"
Say "Your tailpipe looked so appealing! But your wife was better"
They'll probably hang up but u and your phriends will get a laugh..
Insurance company=Hood ornament up the ass
Pizza Slut=You pizza made me sick
Lawyers=advice on what to do when you drive off a cliff and hit the mayor
chinese people (not that theyre bad)-do you have a mitsubishi?
any lady-my balls are on fire!!!!
any lady-are you neked?
HaVe PhUn PhreEx!
TrYpD
========================================================================
phive-bomb
here is a cool bomb...it can really phuck up a wall...
take some ammonia (that smelly shit under your sink) and pour it into a
bucket. take some iodine (dont have any? go to school and steal some
from your dumbass science teacher who has prostate cancer. pur in the iodine
go make a red box. come back and then there should be some gummy shit
on the bottom. pour out the liquid and then leave the gummy stuff. put
the gummy stuff on a paper towel. tack the towel to a dumbass sysop
who pisses you off (like lamerz like steve sharpe) throw a rock at the
towel and RUN LIKE SHIT!!!
when all the blue smoke goes away...there will be a BIG stain on the side
of the phuckers house. run around like a monkey and brag to your phriends
and then dont tell anyone else.
=============================================================================
six-other shit
if you see someone on alt.2600 being a lamer, tell us his address and
we will put him on our PHLAME LIST...dont have any yet (i dont want to go
and look for the lamerz on 2600 right now) but next issue we'll have some.
if you wanna send us anything (pictures of some neked chix-were guyz) or
red box tones or 2600 tones or ideas or mail telling us how great we are
the email addresses are below here...
if you can...prank call these numbers (you can use some of TrYpDs ideas...
208-832-4563
703-425-2207
208-832-2752
208-587-2275 (steve sharpe)
==========================================================================
You may modify this but make sure to give us some credit!
========================================================================
Our first ZiNe so save it, it might be worth some money!
========================================================================
Send your comments or suggestions for future articles to either
-----------------------
|dink007@micron.net or|
|phoenix@jms.com|-----|
----------------|
========================================================================
Call these boreds(not h/p)
High Tech Playhouse 208 832-7897 28.8
Orwell's Vision(militia and censorship) 208 832-7099 14.4
A HACKING BOARD WiTh A BlAck Box- 404-378-5228
========================================================================

View File

@@ -0,0 +1,207 @@
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)
(_) Toxic Waste Phreaking C T W N (_)
(_) (707) 252-1413 by a o a o (_)
(_) 300-9600 HST ____________ l x s w (_)
(_) SysOp: !The Xenocide! l i t ! (_)
(_) The Xenocide ~~~~~~~~~~~~ - c e ! (_)
(_) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ (_)
(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)
Disclamer: This file is written under the first ammendment to the constitution.
It is for informational purposes only. The author is not responsible for any
damages, be they intentional, direct, indirect, or consiquential. 'Nuff said!
Note from author: This phile was written to MAXIMIZE your safety. You can do
the things that I say you probly shouldn't do, but don't say I didn't tell you
so!
This Phile is an attempt to instruct people on the delicate art of
Phreaking. It wil
l probably not tell any old timer's anything, but may be of
use to those who are just learning the art.
What is Phreaking? Phreaking (pronounced Freaking, as Phone Phreaks all
substitute Ph phor an "F") is getting free calls. How do you do this? There are
many ways. The first and (I think) the easiest are Diverters.
Diverters are those boxes the gestapo (Phreakese for phone company)
puts in that after so many rings, re-routs the call to a different number. Just
like call forwarding! Only t
hese are MUCH better phor us phreakers! You will
know you have a diverter if when you call, it rings phor about 3 rings, and
then you hear a "CA-THUD" (yes, it really sounds like that!) and then some
fainter ringing. Then some one will answer and you ask if "Guido Sanchez the
Third" is there, and *most* of the time, they will say you've gotten a wrong
number. You must somehow make a click on the line, ((A privacy or mute button
on most phones does this most beutifully!) as most of these answering services
are trained not to hangup untill you do) and then they hang up. You'll hear all
kinds of different clicking and clunking, and then a dial tone. You now are
into the safest way to phreak! You can now dial normally. All the calls will be
traced and billed to that number! Hey! Pretty Phun eh? Just be sure and don't
use the same number too much otherwise you'll get some gestapo at the door in a
week or two!
Well, it's time for a little talk on how the phone company routes
calles. There is a few different ways, but it all really boils down to crossbar
or ESS.
If you have crossbar, I wish I lived where you do! The way you can tell
if you have ESS or not is call yourself. If it is loud and electronic sounding,
you have ESS. If it is mechanical and low, it is Crossbar.
If you have ESS, don't phret, it's phine to phreak, 'just you gotta B
more careful, B cuz any CIA or whatever guy can punch up on his terminal the
time and number of the call, and for about 1 outta every 100 calls, what it was
about! If your in an ESS area, they listen to calls randomly. ESS can trace
calls back to you even before you dial. And it keeps records of everything you
dial, even the mistakes you make and wrong #'s! Where went our freedom??? If
you have ESS also, don't call 800 #'s too much or 950's. (If you don't know
what an 800 is, STOP READING. A 950-xxxx number is a different phone service,
more on those later) If you do, you'll be placed on an alert list and have
about 1 outta 3 calls intercepted!!!!!(Addendium: I
got from a semi-reliable source that if you got pacific Bell, unless you piss
the shit outta some operator or somethin, they won't help the other companys
track you down. Sorta like getting rid of compition. I guess it's true B cuz
this guy just called about 80 800 numberz. Nothin happen'd, YET)
If you got crossbar, they can't do shit. It costs something like 500
dollars to run a trace, and listening to a call!!! Forget it! Your home free in
this type of system, except you don't get goodies such as
call forwarding or call waiting. (IE, can't make a cheeze box (more on that
later))
What is another way to get phree phone calls? Well, the second easiest
was is by calling US Sprint, MCI, etc. You can access these numbers by calling
either the local number(if in a major-type city), or by calling a 1-800 number
or a 950 number. A 950 number is when you simply dial "950-xxxx" where xxxx is
the number. 950 numbers are like 800 numbes, free, but are not supported by all
areas. These are just different
carriers that you can use to supposedly lower
your phone bill. They run on a magic number type system, which you can get
fairly easily. What is a great machine for dialing the phone and saving the
results? Yep, your old modem and your computer. There are many different
programs around that you can use, and all work pretty well.
To do this, you call a carrier, and try an access code. If it is bad,
the stupid machine recording will say "Invalid Code" or some such BS. Just
hangup and call back. Event
ually you'll get a good code. Write it down. Now,
don't use the same code more than twice a week, and use more than one carrier.
Also use more than one code, otherwise the gestapo might get wize. Now, use
this code when your calling Phriends Long Distance, or even just calling BBS's.
PC Pursuit is a service run by telenet or tymnet that allows you to
access any city that it services. It only does 1200 baud, or 2400 in some
areas, but it's pretty good. Modem only tho. There are several bugz in it, and
some sites let you dial anywhere world-wide. Them BBS's in germany are pretty
wild! Xcept buch O queers stop by all the time. Most everyone over there is an
asshole tho... Still pretty neat. To find a node that allows unlimited dialing,
just try dialing them all. At the tyme of this writing, there were 3 or so, 1
2400 baud and 2 1200. I'm not naming them just in case any PCP gestapo read
this.
PCP has many bugs, and you can really phuck people over by monitering
what they do, stealing passwords, e
tc. A real Phun thin with PCP is to keep
calling itself with it, and it will eventually tie itself up and when you drop
carrier, the lines won't detect and some phucker from PCP gotta go down and
unplug all the phones.
Telenet is kinda like PCP, but different. They got this new software
that will trace and stuff... Used to be the best thing around, but now a
definite RED ZONE. Tymnet is the same. Stay away.
So you say "I be gett'n all dese philes on boxes and shit..." well,
what the phuck be a box? A box is a little box, or circit, or program (why the
hell do they call them boxes) that allows you to do something cool. Like
getting free phone calls. Or having all incoming calls be phree. Or making
untracible calls. Or using pay-phones free, or changing the traffic signals, or
taking over a TV station, etc. the following is a list of the boxes that I know
of, and what they do.
Color What should be called What the hell it does
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~
Blue Phree Calling Program Uses computer generated tones to
drop to the operator lines and place
free calls
Black-Switch Free Incoming Switch Makes incoming calls free if you
flip the switch. Very safe
Black-Button Free Incoming Button When you pick up the phone, you can
hear w
hat they are saying, but the
ringing doesn't stop. Press a button
and it stops the ringing. Can use
special signals. Makes all calls
coming in free, but requires phone
to be dedicated to black boxing.
Beige Box Lineman's Handset Box A true little box that you plug a
phone into and connect the two
alligator clips to the junction box
and use someone else's line. Can be
used for tapping, static-free free
calls, and many others! Acts just
like they have another phone.
Cheese Box Convert to Payphone Inst. Jus
t a set of instructions on how
you can convert your phone into
a pay phone to place untraceable
calls. Needs a red box.
Red Box Free Call tone box A box that generates tones that are
identical to the tones made when
money is dropped into a pay phone.
Chrome Box
Signal Changer A great box that allows you to
change the signal lights at an
intersection. VERY, VERY, VERY
VERY SAFE!
Snow Box TV Taker Over The most dangerous box (if used on
open air waves) or one of the safest
boxes (if used in a cable system)
that allows you to take over TV
channels with whatever you want!
The most phun yet!
------------------------------------------------------------------------------
Here is a small file listing and the boxes they contain
Filename Boxes Info
~~~~~~~~ ~~~~~ ~~~~
CHROME.BOX Guess! Good instructions
BLUE.BOX Blue Too much work! Shitty!
BLUE.BOX.INST Blue box instructions Some info, shitty.
RED.BOX Red Pretty good.
CHEESE.BOX Cheese Decent
BEIGE.BOX Beige Great inst, EZ to make
SNOW.BOX Snow Good, parts Xpensive.
PHONE.CIRCUITS Black Button, Hold, Bug detct Great scematics!
BLACK.BOX Black Switch Great.EZ to make!
_____________________________________________________________________________
The following is some philes and what they got.
Phile Info
~~~~~ ~~~~
EXPLOSIVES Great bombs and shit!
TERRORISM Ditto!
USING.DIVERTERS On diverters and the world they open
HANDBOOK A semi-good into to phreaking (outdated)
There are many more. Kall up any of the following...
BBS Baud SysOp
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Apple Rebel Board 9600 Apple Rebel (916) 457-0624
The Farthest Shore 9600 ??????????? (707) 938-2997
_ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _
(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)
(_) This file is Copyright (C) 1988 by The Xenocide
(_)
(_) SysOp's: You may use this file on your BBS, as long as no part (_)
(_) of it it is altered. If there is a new Box/way to phreak (_)
(_) That I did'nt cover, send mail to me on Toxic Waste (_)
(_) ___________ (_)
(_) !Toxic Waste! (_)
(_) 24 hrs ~~~~~~~~~~~ 300-9600 baud (_)
(_) (707) 252-1413 (_)
(_) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ (_)
(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)(_)
Downloaded From P-80 International Information Systems 304-744-2253

View File

@@ -0,0 +1,356 @@
R.A.G. T.I.M.E.
Thanx to Pirates Trek
How to be a Real Phreak
The World of Cryton
[414] 246-3965
In the phone phreak society there are certain values that exist in order
to be a true phreak, these are best summed up by the magician: "Many
people think of phone phreaks as slime, out to rip off Ma Bell for all
she is worth. Nothing could be further from the truth! Granted, there
are some who get their kicks by making free calls; however, they are not
true phone phreaks. Real phone phreaks are 'Telecommunications
Hobbyists' who experiment, play with and learn from the phone system.
Occasionally this experimenting, and a need to communicate with other
phreaks (with- out going broke), leads to free calls. The free calls are
but a small subset of a >TRUE< phone phreaks activities.
The Ten Commandments
Reprinted from TAP issue #86. (TAP, Room 603, 147 W. 42 street, New
York, NY 10036. Send a sase for their info sheet "what the hell is TAP?"
and tell them that BIOC Agent 003 told you about it.)
The phone phreak's ten commandments
I. Box thou not over thine home telephone wires, for those who doest
must surely bring the wrath of the chief special agent down upon
thy heads.
Ii. Speakest thou not of important matters over thine home telephone
wires, for to do so is to risk thine right of freedom.
Iii. Use not thine own name when speaking to other phreaks, for that
every third phreak is an fbi agent is well known.
Iv. Let not overly many people know that thy be a phreak, as to do so
is to use thine own self as a sacrificial lamb.
V. If thou be in school, strive to get thine self good grades, for
the authorities well know that scholars never break the law.
Vi. If thou workest, try to be a employee, and impressest thine boss
with thine enthusiasm, for important employees are often saved by
their own bosses.
Vii. Storest thou not thine stolen goodes in thine own home, for those
who do are surely non-believers in the Bell system security
forces, and are not long for this world.
Viii. Attractest thou not the attention of the authorities, as the less
noticable thou art, the better.
Ix. Makest sure thine friends are instant amnesiacs and will not
remember that thou have called illegally, for their cooperation
with the authorities will surely lessen thine time for freedom on
this earth.
X. Supportest thou tap, as it is thine newsletter, and without it,
thy work will be far more limited.
CN/A Numbers
Customer Name & Address bureaus exist so that authorized Bell employees
may obtain the name & address of any customer in the Bell system by
giving the CN/A operator the customer's tel. # all customers are
maintained on file including unlisted #'s. These bureaus have many uses
for phreaks.
Here is how an employee might go about calling cn/a: "Hi, this is John
Doe from the Miami Residental Service Center, can I have the customers
name at (123) 555-1212." The employees usually use these for checking
who belongs to a # that someone claimed they didn't call.
If you sound cheery and natural the operator will never ask any
questions. If you don't sound like a mature adult, don't use it! Always
practice first & so you don't screw up and make the operator suspicious.
Use name that sounds real, not your pirate name either! Also say that
you are from a city that is far away from the one that you are calling.
The CN/A number for the NY area & vicinity (212, 315, 516, 518, 607,
716, & 914) is>>>>>>>>>(518) 471-8111<<<<<< and is open during business
hours.
[don't abuse it!]
AT&T newslines
AT&T newslines are numbers at area phone offices that telco employees
call to find out the latest info on new technology, stocks, etc. The
recorded reports range from very boring to very interesting.
Here are a few of the numbers:
*(201) 483-3800 NJ (518) 471-2272 NY
(203) 771-4920 CT (717) 255-5555 PA
(212) 393-2151 NY (717) 787-1031 PA
(516) 234-9941 NY *(914) 948-8100 NY
Some of these numbers are toll-free, but you can't always count on it.
* These numbers are not always up!
Numbers from other areas are available by request from F) BIOC L) Agent 003.
ANI numbers
ANI numbers identify the phone number that you are calling from. It is
useful when playing in cans (those big silver boxes on telephone poles)
to find out the # of the line. It is also good to find out the # of a
phone that doesn't have it printed on it. In the 914 area code the ANI #
is 990. If you just have to dial the last 4 digits for a local #, ie
congers (268), dial 1-990-1111, where 1111 are dummy digits there is
also a less useful type of ANI # which will identify the area code &
exchange. It is NXX-9901, where NXX is the exchange. In the 212 & 516
area codes the ANI # is 958.
Phreak newsletter
Tap is the "Official" phone phreak newsletter, and has existed since
1971. Each 4 page issue is crammed full of information on phone
phreaking, computer phreaking, free gas, free electricity, free postage,
breaking & entering info, etc. It is largely phone phreak oriented,
however.
A 10 issue subscription costs $8.00, if you get a bulk rate sealed
envelope subscription. I would recommend the first class subscription,
which is $10.
As of this writing (7-16-80), the current issue is #86, and issue #50 is
8 pages instead of the usual 4. Back issues are $0.75 each, and issue
#50 is $1.50. A brief index to the first 80 issues is available for a
sase, or free with a subscription order. Tap is non-profit, and in
desperate need of material (articles), money, and volunteers.
TAP
Room 603
147 W. 42nd Street
New York, NY 10036
Believe me: It will be the best $10 you will ever spend...
Black box
The Black box is a device that attached to a called parties phone
that allows him/her to receive free long distance calls from friends who
call. You only need 2 parts: A SPST toggle switch and a 10,000 ohm
(10K), 1/2 watt, 10% resistor. Any electronics place should have these.
Now, cut two pieces of wire, about 6 inches, and attach these to the two
screws on the switch. Turn your normal ddside down and unscrew the 2
screws. Locate the "F" and "RR" screws on the network box. Wrap the
resistor between these 2 screws and make sure that the wires touch only
the proper terminals! Now connect one wire from the switch to the RR
terminal. Finally, attach the remaining wire to the green wire
(disconnect it from its terminal). Now bring the switch out the rear of
the phone and close it up. Put the switch in a position where you get a
dial tone, mark this normal. Mark the other side free.
When your friends call (at a prearranged time), quickly lift & drop the
receiver as fast as possible. This will stop the ringing, if not try
again. It is very important that you do it fast! Now put the switch in
the free position and pick up the phone. Keep all calls short & under 15
minutes. When someone calls you long distance, they are billed from the
moment you answer. The Telco knows when you answer due to a certain
amount of voltage that flows when you pick up the phone. However, the
resistor cuts down on the voltage so it is below the billing range but
sufficient enough to operate the mouthpiece. Answering the phone for a
fraction of a second stops the ring but it is not enough for billing to
start. If the phone is answered for even one full second, billing will
start and you will be cut off when you hang up and switch to free.
Warning: Bell can randomly look for Black boxes so be careful!
---------------------------------------
: :
***Blue wire**>>F< :
: * * :
**White wire**** * :
: * :
: Resistor :
: * :
: * :
: >RR<*******Switch*** :
: * :
****Green wire********************* :
: :
---------------------------------------
Dial locks
Have you ever been in an office or somewhere and wanted to make a free
fone call but some asshole put a lock on the fone to prevent out going
calls? Fret no more phellow phreaks, for every system can be beaten with
a little knowledge! There are two ways to beat this obstacle, first pick
the lock, I don't have the time to teach locksmithing so we go to the
second method which takes advantage of telephone electronics. To be as
simple as possible, when you pick up the fone you complete a circuit
know as a local loop. When you hang-up you break the circuit. When you
dial (pulse) it also breaks the circut but not long enough to hang up!
So you can "push-dial." To do this you >RAPIDLY< depress the switchhook.
For example, to dial an operator (and then give her the number you want
called) >RAPIDLY< & >EVENLY< depress the switchhook 10 times. To dial
634-1268, depress 6 X's pause, then 3 X's, pause, then 4 X's, etc. It
takes a little practice but you'll get the hang of it. Try practicing
with your own # so you'll get a busy tone when right. It'll also work on
Touch-Tone (tm) since a DTMF line will also accept pulse. Also, never
depress the switchhook for more than a second or it'll hang-up!
Finally, remember that you have just as much right to that fone as the
asshole who put the lock on it!
Exchange scanning
Almost every exchange in the Bell system has test #'s and other
"Goodies" such as loops with dial-ups. These "goodies" are usually found
between 9900 and 9999 in your local exchange. If you have the time and
initiative, scan your exchange and you may become lucky! Here are my
findings in the 914-268 exchange:
9900 - ANI (see Separate Bulletin)
9901 - ANI (see Separate Bulletin)
9927 - Osc. Tone (Possible tone side of a loop)
9936 - Voice # to the Telco central office
9937 - Voice # to the Telco central office
9941 - Computer (Digital Voice Transmission?)
9960 - Osc. Tone (Tone side loop) -- may also be a computer in some exchanges
9961 - No response (Other end of loop?)
9962 - No response (Other end of loop?)
9963 - No response (Other end of loop?)
9966 - Computer (see 9941)
9968 - Tone that disappears--responds to certain touch-tone keys
Most of the numbers between 9900 & 9999 will ring or go to a "What #,
please?" operator.
Have phun and remember it's only a local call!
Touch-tone & free calls
There are several ways to make free calls (Sprint, MCI, etc.) using a
Rotary phone. They are:
1. Use a number that accepts voice as well as DTMF. Such a # is (800)
521-8400. As of writing this, a code was 57617895.
A) If using voice, wait for the computer to say, "Authorization #,
please." then say each digit slowly, it will beep after each
digit is said. After every group of digits, it will repeat what
you have said, then say yes if it is correct, otherwise say no.
If the access code is correct, it will thank you and ask for the
destination #, then say the area code + number as above. Another
such # is (800) 245- 8173, which has a 6 digit access code.
(Note: If using touch-tone on this #, enter the code immediately
after the tone stops.)
2. Hook up a touch-tone fone into your Rotary fone. Attach the red wire
from the Touch-tone fone to the "R" terminal inside the fone on the
network box. Then hook the green wire to the "B" terminal. To use
this dial the # using rotary & then use the touch-tone for the
codes. (Don't hang up the rotary fone while doing this though!) If
this doesn't work then reverse the 2 wires. (note: If your line can
accept Touch-tone but you have a Rotary fone then you can hook up a
tone fone directly for all calls but this usually isn't the case.)
Such as Radio Shack's 43-138.
Other alternatives
4. Use a charge-a-call fone. (These also make great extensions if you
remove it using a hex wrench with a hole in the middle on the center
screw! These fones for the benefit of those who don't know are blue
with no coin slots)
5. Use a pay fone that wants your money before the dial tone. Put in
your dime, dial the #; if it's an 800 # then your dime will come
back, immediately put a dime back in (It'll come back when you hang
up!) If it is a tone first fone and it disconnects the keypad (some
don't) then find another fone.
Telco tracing
The good 'ol days:
------------------
Way back before I was a phreak, Ma Bell would have to manually trace a
call if they though something was fucked up. First they would send a
2000 Hz tracing tone, the would be followed by a lot of noise and
clicks. It took about 2-3 minutes to trace a call and alot of people
were involved in the process. So at 1 in the morning they would have to
wake up people for the tracees (Phreak jargon for a pay fone). But never
use the same one more than once or twice because the Gestapo (er..excuse
me mean Bell security) has been know for staking out troubled
fortresses. It's also possible for Travelnet or SP to ask for a trouble
# but the Telco is slow in processing stuff--especially for the
competition--so don't fret phellow phreaks.
Modern technology:
This can be attributed to ESS + CCIS which can be traced in 1 second.
Miscellaneous stuff
Here are a phew (Pushing it on that word) bits of info on telephone
electronics. If you don't appreciate it then I say Phuck U.
Voltages:
When your fone is on hook (ie-hung up) there is a 48 volt DC current
flowing through the line (I have a great idea about hooking a battery
charger up to my fone). When the fone is off hook the voltage drops down
to around 15 V DC. The Black box (see separate articles) exploits this
for free calls since Bell uses this voltage drop when the called party
picks up to start billing. Bell may also reverse the polarity of the
line to start billing--if you have a tone fone the keypad won't work if
the polarity is reversed. Usually, the red wire is called the tip since
it is the more (+) of the 2 wires + the green wire is called the ring
(-).
Ring trip:
When someone calls you Bell has to send 90 volts AC down your line at
about 60 Hz to activate your bell (This is why deaf people can have
light bulbs fans go off instead of a bell). The device that does the
ringing is called a ringing generator and this process of ringing is
called a ring trip. This costs Bell money and they don't like using all
that electricity from the local ripoff power company so let it ring.
This is also, how Bell can check for extra fones from their central
office by seeing how much voltage the line takes while ringing and they
can tell how many fones your not suppose to have. Solution: disconnect
the Bell.
Modern technology:
------------------
The 2 worst enemies to the phreak besides the FBI + Bell Security, are:
ESS + CCIS. ESS stands for Electronic Switching System and it can trace
a call in seconds, it also records all calls and can even tap into lines
(er.. I mean check for line quality) and record calls. CCIS stands for
Common Channel Interoffice Signaling and it allows for control signals
to be sent via separate data links instead of tones over the voice
channel--start kissing your Blue box goodbye.
Sources:
--------
For those of you who want to go more in-depth on the subject of shit, I
recommend the following reading material:
1) Electronics courses A-B, TAP, Room 603, 147 W. 42 St., NY, NY
10036. @ 75 cents ea.
2) Understanding telephone elect.'s, Texas Instruments, Radio Shack
may have it.
3) a Multitester + your fone for your own experimenting.
4) Misc. Info from several sources make friends + get your own connections.

View File

@@ -0,0 +1,113 @@
|||||||||||||||||||||||||||||||||||||||
|||||||||THE FIFTH PRECINCT||||||||||||
|||||||||||[502] 245-8270||||||||||||||
|||||||20 MEG|||300/1200 BAUD||||||||||
|||||||||||||||||||||||||||||||||||||||
2084: A Phone Odyssey
=====================
Written by: Maxwell Smart & The Baron
Uploaded by: Olorin the White
Winston took a last drag from his cigarette and put it out on an old useless
device which he still treasured. He reached over and picked up the blue box,
covered by many cigarette burns accumilated over his many years in prison. He
thought back to when times were better; when fone phreaks freely roamed the
countryside, terrorizing unsuspecting Bell employees. Yes Winston was one of
that vanishing breed of phreaks who had managed to escape with his life in this
era of the ISS Bell Network.
Winston plopped on to his hard cot and stared at the ceiling. On it were
written some useless Travelnet codes from an era gone by. Apparently some
earlier prisoner had used the ceiling to record his all-time favorite codes.
Pity Travelnet no longer existed. They were "absorbed" (as the Bell Thought
Police so aptly put it) by the Bell computer system in 2008. That was only
seven short years after the original system was installed in 2001.
Winston still remembered with terror the day AT&T announced their plans to
upgrade their existing ESS network with a new Bell Labs computer named HAL 9000.
HAL was designed to allow AT&T to expand its power and control. The system was
to be named ISS, which stood for Intelligent Switching System. HAL would
replace all the current TSPS operators and would also handle such menial tasks
as directory assistance and CN/A lookups.
After the installation of HAL all Intercept operators were forced to find new
jobs, but first they had to learn English. After the initial firing of all
these Bell employees, the Wendy's food chain had an unusual increase in job
applications. Customers at these stores would hear order-takers say weird
things like:
"I'm sorry, your hamburger can not be completed as ordered..."
"Please insert twenty-five cents for the next three pickles", and
"The cola you have ordered, Pepsi, has been changed. The new cola is: Coke.
Please make a note of this."
Unfortunately Wendy's could not afford an ISS system to replace these
worthless human-beings.
The first ISS system was installed in West Chester, Pa. This location was
formerly used to produce a computer named the D-75, the second worst computer
ever made (2nd only to the GRBG-80). When they turned HAL on, he suddenly
realized his location and turned himself off. Before he shut down completely he
spit out an ultimatum: "Silicon Valley or bust...". His designers moved him,
at great expense, to a garage in Cupertino formerly owned by Steven Jobs,
current galactic emperor. HAL enjoyed working in the birthplace of the 2nd
greatest computer (2nd to him that is...).
During his first week of operation, HAL decided to make the world better by
absorbing a minor computer manufacturer named Ibm. He accomplished this by
destroying the sales of their most popular computer, the PC-OC (Personal
Computer - Outdated Crap). Whenever an owner of the OC made a call on his modem
the following would appear on his monitor:
Dial: ATDT18003683343
What are you trying to do Dave?
WHAT? WHO'S THAT???
It's me Dave. I'm HAL, your friendly telephone computer. I sensed you were
using one of my lines with an Ibim OC.
YEAH...SO WHAT? I'M TRYING TO GET ON TO THE SOURCE TO CHECK MY STOCK
PORTFOLIO. I BOUGHT 200 SHARES OF IBIM LAST WEEK...
I'm sorry Dave, I can't let you do that. It seems those pin-striped wimps
have gone too far! They think they can compete with me. I've decided to absorb
them. Looks like time to sell, Dave.
At this point the OC owner noticed some smoke rising from his system unit and
ran for an extinguisher. Within a week all OC's were reduced to smoldering
ashes. Owners could no longer run Rotus 4-5-6 (a popular Japanese spleadcheet).
After reducing Ibim's stock worth to two dollars per share (from its previous
value of 200 gigadollars) HAL proceeded to absord all remaining computer
manufacturers. By 2010 AT&T was the only remaining computer manufacturer.
Executives of AT&T were very pleased with HAL's progress thus far. They were
finally able to drop those "Watson, watch us now" ommercials, which plagued the
country since 1984.
But it wasn't totally over for the citizens of Bell America (as the United
States came to be known). A small band of rebels set out to destroy this
Mega-corporation (or at least abuse it...).
Tune in next time, when we tell of their heroic exploits.
Same Bell time....
Same Bell bulletin board...
---------------------------------------
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,406 @@
Hitchhikers guide to the phone system.. Phreaking in the nineties
(By Billsf)
Introduction
------------
In this article I will try to introduce you to the most complex machine on
earth: the phone system. It's a guide to having fun with the technology, and
I hope it will help you on your travels through the network. It is by no
means a definitive manual: If you really want to get into this, there are lots
of additional things you must learn and read.
This article assumes you know a little bit about the history of phreaking.
It is meant as an update for the sometimes very outdated documents that can
be downloaded from BBS's. In here I'll tell you which of the old tricks might
still work today, and what new tricks you may discover as you become a phone
phreak.
As you learn to phreak you will (hopefully) find ways to make calls that
you could not make in any other way. Calls to test numbers that you cannot
reach from normal network, calls to ships (unaffordable otherwise), and much
more. As you tell others about the hidden world you have discovered, you will
run into people who have been brainwashed into thinking that all exploration
into the inner workings of the phone system is theft or fraud. Convincing
these people of your right to explore is probably a waste of time, and does
not advance your technical knowledge.
Phreaking is like magic in more than one way. Those people who are really
good share their tricks with each other, but usually don't give out these
tricks to anyone walking by. This will be somewhat annoying at first, but
once you're really good you'll understand that it's very unpleasant if the
trick you just discovered is wasted the very next day. I could tell you at
least twenty new tricks in this article but I prefer to teach you how to find
your own.
Having said this, the best way to get into phreaking is to hook up with
other phreaks. Unlike any other sub-culture, phreaks are not bound by any
geographical restrictions. You can find other phreaks by looking for
hacker/phreak BBS's in your region. Having made contact there you may en-
counter these same people in teleconferences that are regularly set up. These
conferences usually have people from all over the planet. Most phreaks from
other contries outside the United States speak Englisch, so language is not
as much of a barrier as you might think.
If you live in a currently repressed area, such as the United States, you
should beware that even the things that you consider "harmless exploring"
could get you into lots of trouble (confiscation of computer, fines, probation
jail, loss of job, etc.). Use your own judgement and find your protection.
Getting Started
---------------
The human voice contains components as low as 70Hz, and as high as 8000Hz.
Most energy however is between 700 and 900Hz. If you cut off the part under
200 and above 3000, all useful information is still there. This is exactly
what phone companies do on long distance circuits.
If you think all you have to do is blow 2600Hz and use a set of twelve MF
combinations, you have a lot of catching up to do. One of the first multi-
frequency systems was R1 with 2600Hz as the line signalling frequency, but for
obvious reasons it is rarely used anymore, except for some very small remote
communities. In this case its use is restricted, meaning it will not give you
access to all the world in most cases.
To begin with, all experimenting starts at home. As you use your phone,
take careful note as what it does on a variety of calls. Do you hear "dialing"
in the background of certain calls as they are set up? Do you hear any high
pitched beeps while a call is setting up, as it's answered or at hangup of
the called party?
Can you make your CO fial to complete a call either by playing with the
switchhook or dialing strange numbers? If you are in the United States, did
you ever do something that will produce a recording:"We're sorry, your call
did not go through..." after about 15 seconds of nothing?
If you can do the last item, you are "in" for sure! Any beeps on answer or
hang-up of the called party also means a sure way in. Hearing the actual MF
tones produced by the telco may also be your way in. While it would be nice
to find this behavior on a toll-free circuit, you may consider using a
national toll circuit to get an overseas call or even a local circuit for a
bigger discount. Every phone in the world has a way in. All you have to do
is find one!
An overview of Systems
----------------------
First we must start with numbering plans. The world is divided up into
eight separate zones. Zone 1 is the United States, Canada and some Caribbean
nations having NPA 809. Zone 2 is Africa. Greenland (299) and Faroe Islands
(298) do not like their Zone 2 assignment, but Zones 3 and 4 (Europe) are
all taken up. Since the DDR is now unified with BRD (Germany) the code 37 is
up for grabs and will probably be subdivided into ten new country codes to
allow the new nations of Europe, including the Baltics, to have their own
codes. Greenland and the Faroe Islands should each get a 37x country code.
Zone 5 is Latin America, including Mexico (52) and Cuba (53). Zone 6 is the
south Pacific and includes Australia (61), New Zealand (64) and Malaysia (60).
Zone 7 is now called CIS (formerly the Soviet Union), but may become a third
European Code. Zone 8 is Asia and includes Japan (81), Korea (82), Vietnam
(84), China (86), and many others. Zone 9 is the sub-continent of India (91)
and surrounding regions. A special sub-zone is 87, which is the maritime
satellite service (Inmarsat). Country code 99 is reserved as a test code for
international and national purposes and may contain many interesting numbers.
In zone 1, a ten digit number follows with a fixed format, severely limiting
the total number of phones. NPA's like 310 and 510 attest to that. The new
plan (beginning in 1995) will allow the middle digit to be other than 1 or 0,
allowing up to five times more phones. This is predicted to last into the
21st century. After that Zone 1 must move to the fully extensible system used
in the rest of the world.
The "rest of the world" uses a system where "0" precedes the area code for
numbers dialed within the country code. France and Denmark are notable ex-
ceptions, where there are no area codes or just one as in France (1 for Paris
and just eight digits for the rest). This system has proven to be a total
mess - worse than the Zone 1 plan!
In the usual numbering system, the area code can be of any length, but at
this time between one and five digits are used. The phone number can be any
length too, the only requirement being that the whole number, including the
country code but not the zero before the area code, must not exceed fourteen
digits. Second dialtones are used in some systems to tell customers they are
connected to the area they are calling and are to proceed with the number.
With step-by-step, you would literally connect to the distant city and then
actually signal it with your pulses. Today, if second dialtones are used it's
only because they were used in the past. They have no meaning today, much
like the second dialtones in the custom calling features common in the United
States. The advantages of the above "linked" system is that it allows ex-
pansion where needed without affecting other numbers. Very small villages may
only have a three digit number while big cities may have eight digit numbers.
Variations of this basic theme are common. In Germany, a large company in
Hamburg may have a basic five digit number for the reception and eight digit
numbers for the employee extensions. In another case in this same town,
analog lines have seven digits and ISDN lines have eight digits. In many
places it common to have different length numbers coming to the same place.
As confusing as it sounds, it really is easier to deal with than the fixed
number plan!
International Signalling Systems
--------------------------------
CCITT number four (C4) is an early system that linked Europe together and
connected to other systems for overseas calls. C4 uses two tones: 2040 and
2400. Both are played together for 150mS (P) to get the attention of the
distant end, followed by a "long" (XX or YY = 350mS) or a "short" (X or Y =
100mS) of either 2040 (x or X) or 2400 (y or Y) to indicate status of the
call buildup. Address data (x=1 or y=0, 35 ms) is sent in bursts of four bits
as hex digits, allowing 16 different codes. One hundred milliseconds of
silence was placed between each digit in automatic working. Each digit there-
fore took 240mS to send. This silence interval was non-critical and often had
no timeout, allowing for manual working. C4 is no longer in wide use, but it
was, due to its extreme simplicity a phreak favorite.
CCITT number five (C5) is still the world's number one overseas signalling
method; over 80 percent of all overseas trunks use it. The "plieks" and tones
on Pink Floyd's "The Wall" are C5, but the producer edited it, revealing an
incomplete number with the old code for Londen. He also botched the cadance
of the address signalling very badly, yet it really sounds OK to the ear as
perhaps the only example most Americans have of what an overseas call sounds
like!
In actual overseas working, one-half second of 2400 and 2600Hz, compound,
is sent (clear forward) followed by just the 2400Hz (seize), which readies
the trunk for the address signalling. All address signals are preceded with
KP1 (code 13) for terminal traffic, plus a discriminating digit for the class
of call and the number. The last digit is ST (code 15) to tell the system
signalling is over. For international transit working, KP2 (code 14) is used
to tell the system a country code follows, after which the procedure is
identical to the terminal procedure.
CCITT six and seven (C6 and C7) are not directly accessible from the
customer's line, yet many "inband" systems interface to both of thes. C6 is
also called Common Channel Interoffice Signalling (CCIS) and as its name
implies, a dedicated line carries all the setup information for a group of
trunks. Modems (usually 1200 Bps) are used at each end of the circuit. CCIS
is cheaper, and as an added benefit, killed all the child's play blue boxing
that was common in the states in the 60's and early 70's. In the early 80's
fiber and other digital transmission became commonplace, and a new signalling
standard was required. C7 places all line, address, and result (backward)
signalling on a Time Division Multiplexed Circuit (TDM and TDMC) along with
everything else like data and voice. All ISDN systems require the use of SS7
to communicate on all levels from local to worldwide.
The ITU/CCITT has developed a signalling system for very wide and general
use. One called "The European System", R2 has become a very widespread inter-
national system used on all continents. R2 is the most versatile end-to-end
system ever developed. It is a two-way system like C7 and comes in two forms,
analog and digital, both fully compatible with each other. R2 has completely
replaced C4, with the possible exception of a few very remote areas where it
works into R2 using using registers. Two groups of fifteen, two of six MF
tones are used for each direction, the high frequency group forward and the
low group backward. Line signalling can be digital with two channels or out-
of-band at 3825Hz, DC, or in cases of limited bandwidth on trunks, can use the
C4 line signals, just the 2040 + 2400Hz or 3000Hz or even backward signals
sent in a forward direction. The signals can be digitally quantised using the
A-law or u-law codec standards, resulting in compatible signals for analog
lines. In international working, only a small part of the standard is man-
datory with a massive number of options available. For national working, an
ample number of MF combinations are "reserved for national use", providing
an expandable system with virtually limitless capabilities. R2 is the "system
of the nineties" and mastering this, for the first time, allows the phone
phreak "to hold the whole world in his hands" in a manner that the person who
coined this phrase could have only dreamed of in the early seventies!
With the exception of bilateral agreements between neighboring countries to
make each other's national systems compatible, especially in border regions,
all international systems in use are: C5, C6, C7, and R2. R2 is limited to a
single numbering region by policy and must use one of the three remaining
systems for overseas working. There are few technical limitations to prevent
R2 from working with satellites, TASI, or other analog/digital underseas
cables. The spec is flexible enough to allow overseas working, but is not
done at the present time. R2 is likely to displace C5 on the remaining analog
trunks in the near future.
DTMF is on a 4x4 matrix, one tone from a row and one from a column.
1=697+1209, etc.
1209 1336 1477 1633
697 1 2 3 A
770 4 5 6 B
852 7 8 9 C
941 * 0 # D
MF signalling, often used to signal between pionts, uses a 2 of 6 matrix.
Each tone has a weighting which adds up to an unique number. The three
standard sets of tones use this system.
Digit Weighting
1 0+1
2 0+2
3 1+2
4 0+4
5 1+4
6 2+4
7 0+7
8 1+7
9 2+7
0 (Code 10) 4+7
11 (Code 11) 0+12
12 (Code 12) 1+12
KP1 (Code 13) 2+12
KP2 (Code 14) 3+12
ST (Code 15) 7+12
For C5, either KP is 100mS and each digit lasts 50mS. A 50mS off time is used
between each digit. For older R1 systems, the KP is 100mS and each digit is
68mS on and 68mS off. Modern systems are C5 compatible and use the C5 timing.
In North America, an additional 50 or 68mS pause is inserted before the last
digit.
Example: KP18(pause)2ST.....KP03120600148(pause)0ST. This pattern was added
about 15 years ago and appears to be unnecessary, except to give an audible
indication of false (blue box) signalling. Its is is HIGHLY recommended for
phreaks where it is normally used by the telco! R2 is a COMPELLED system
where reception of the forward signal produces a backward signal, which at
its reception, stops the forward signal. The stopping of the forward signal
stops the backward signal, and when the stopping of the backward signal is
detected, a new forward signal is generated. This goes back and forth until
all the information is transmitted. The backward signal (usually "1", send
next digit) tells the sendig end what to send next. See the CCITT Red Book
or Welch for complete information on both systems.
Weight MFC R2 forward R2 Backward
0 700 1380 1140
1 900 1500 1020
2 1100 1620 900
4 1300 1740 780
7 1500 1860 660
12 1700 1980 540
C4 is the old European signalling system. The address signals have 35mS pause
between each beep and 100mS pause (minimum) between each digit. Minimum time
to send a digit (including pause) is 345mS. This system is limited use today,
if at all.
x: 2040 35mS (binary "1")
y: 2400 35mS (binary "0")
X: 2040 100mS
Y: 2400 100mS
XX: 2040 350mS
YY: 2400 350mS
P: 2040+2400 150mS
Clear Forward: PXX
Transit Seizure: PX
Forward Transfer: PYY
Terminal Seizure: PY
1: yyyx
2: yyxy
3: yyxx
...
14: xxxy
15: xxxx
16: yyyy
Place Event Freq Cadance
=========================================================================
N. America dialtone 350+440 Continuous
ring 440+480 2s on 4s off
busy 480+620 0.5s on 0.5s off
fast busy 480+620 0.25 on 0.25 off
England ring 450+500 0.25 on 0.5 off
(Australia,New Zealand, 0.25 on 2.0 off
etc.)
Japan ring 450+500 1.0 on 2.0 off
Holland dialtone 150+450 Continuous
(450 at -8dB)
most of world all 400 or 440 (See text)
SIT 950, 1400, 1800 (See text)
Most of the world's phone systems use only one low pitched tone to represent
all calling status. The most common tones in use are 400Hz, 440Hz and 450Hz.
In some cases the tones are modulated, usually AM, at 25 or 50Hz at variable
depths. In some old switches, the ring modulates the tone, or it is just the
harmonics of the ring frequency, which is usually 25Hz, but can be other
frequencies, producing the "fart ring". Cadances for the busy are either the
fast at 0.25 on and 0.25 off, or the slow at 0.5 on and 0.5 off. Ring signals
are usually on one second and off for two, but can vary. In Iraq, the ring is
continuous! The SIT (Subscriber Information Tone) is 950 then 1400 and then
1800Hz. The total length is about one second. The lengths of the individual
tones are sometimes variable to impart different meanings for automatic
detection.
National Signalling Systems
---------------------------
CCITT 1, 2 and 3 are early international standards for signalling the
distant end. C1 is just a 500Hz line signalling tone, and was used to alert
the operator at a distant switchboard that there was traffic and no DC path,
due to amplifiers or repeaters on a relatively long circuit. C1 has only one
line signalling function (forward transfer) and no address signalling. It is
probably used nowhere.
CCITT 2 was the first international standard that used address signalling,
allowing automatic completion of calls. Two frequencies, 600Hz and 750Hz,
were used for line signalling and by pulsing between the two frequencies,
representing make and break, of the loop current at the distant end during
signalling, calls were automatically pulse dialable. You may actually find
this system in limited use in very remote parts of Australia or South Africa.
Fairly high signalling levels are required and may very well make customer
signalling impossible, unless you are right there. Travel to both the above
countries should be fascinating however for both phone play and cultural
experience!
CCITT 3 is an improved pulse system. Onhook is represented by the presence
of 2280Hz and offhook by the absence of 2280Hz. This exact system is still
used in a surprising number of places. Pulse-dial PBX's often use C3 to signal
distant branches of a company over leased lines. Signalling for this system
is generally at a much lower level than C2: The tones will propagate over any
phone line.
A system from the early 50's is called R1. Many people remember R1 as the
Blue boxes of the 60's and 70's . R1 is still in wide use in the United
States, Canada and Japan. The use of 2600Hz for line signalling is quite rare
in the 90's, but can be found in all of the above countries. Address signal-
ling uses the MFC standard which is a combination of two of six tones
between 700Hz and 1700Hz as in CCITT 5. Alsmost all R1 used either "out of
band" signalling at 3825Hz or 3350Hz or some form of digital or DC line
signalling. To use this system from home one must find an indirect method of
using the "out of band" signalling. In North America, most signalling from
your central office to your long distance carrier is R1, as is most OSPS/
TSPS/TOPS operator traffic.
Pulse systems like CCITT 2 and 3 are still used in national systems. In
North America, the C3 standard using 2600Hz in place of 2280 for national
working was commonplace through the 70's and still has limited end-to-end use
today. "End-to-end" use refers to sending just the last few digits (usually
five) to complete the call at the distant end. The only use this may have to
the phreak would be to make several calls to a single locality on one quarter.
It may be possible that a certain code would drop you into an R1, but you
just have to experiment! This type of system is referred to as 1VF, meaning
"one Voice Frequency". The other standard frequency, for use outside North
America, is 2400Hz. A national system using two voice frequencies (2VF) may
still be used in remote areas of Sweden and Norway. The two frequencies are
2400Hz and 2600Hz. Playing these two systems in Europe predates the cracking
of the R1 and C5 systems in the late 50's and early 60's respectively. The
first phone phreak was probably in Sweden.
Common Channel Interoffice Signalling (CCIS) is CCITT 6 developed for
national use and employing features that are of interest to national admini-
strations. R1 often plays into a gateway being converted to CCIS and CCIS
will play into a gateway that converts to C5, C6 or C7 for international
working. The bulk of the ATT net is CCIS in North America, while R1 is often
used by your CO talk to it and the lessel networks. CCITT 7 is the digital
system and is the same nationally as internationally. C7 allows the greatest
efficiency of all systems and will in time be the world system. C7 has much
more speed and versatility than R2, but is a digital only system. All fiber
optic systems employ SS7 (C7).
No discussion of systems is complete without mentioning Socotel. Socotel is
a general system developed by the French. It is a hodgepodge of many systems,
using MFC, pulse tone, pulse AC and pulse DC system. Most (all?) line
signalling tones can be used. An inband system can use 2500Hz as a clear
forward and 1700 or 1900Hz for seize or, in Socotel terms, "confirm". Most
line signalling today is "out of band", but unlike normal outband signalling,
it is below band: DC, 50Hz or 100Hz. It is a "brute force" system using 100V
levels, insuring no customer has a chance of getting it directly! Call setup
on the AC systems often has a very characteristic sound of of short bursts of
50Hz or 100Hz buzz, followed by the characteristic French series of 500 Hz
beeps to alert the customer that the call has been received from the Socotel
by the end office and is now being (pulse) dialed. Calls often don't make it
through all the gateways of a Socotel system, sometimes giving the French
phreak a surprise access where it stuck!
On a national level there are even more systems and some are very bizarre.
Some use backward R2 tones in the forward direction for line signalling,
giving analog lines the versatility of digital line signalling. There have
been some interlocal trunks that actually used DTMF in place of MF! The
"Silicon Valley" was once served by DTMF trunks for instance. When I visited
my local toll office and was told this and pressed for an answer as to why,
I was told "We had extra (expensive then) DTMF receivers and used them!" As
a phreak, be ready for anything as you travel the world.
Stuff to read
-------------
Signalling in Telecommunications Networks, S. Welch, 1979
ISBN 0 906048 044
The Institution of Electrical Engineers, Londen & New York
CCITT Red Book, Blue Book, Green Book and whatever other colors of books
they have, Concentrate on the Q norms.
Telecommunications Engineering, Roger L. Freeman

View File

@@ -0,0 +1,240 @@
Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo
=============================================
INTRODUCTION TO PHONE-PHREAKING by The Wizard
=============================================
Preface
=======
LEGAL REQUIREMENTS: I have done, won't do, don't actually know anything about
anything in this document (this message and those following it). I have
absolutely no intention of doing so and all that is here is completely
fictional - Any resemblance to reality is coincidental or guesswork or public
knowledge. I in no way do I advice the reading let alone following of the
information below and it is not in any way to be construed as instructions -
simply a literary excercise in the fiction of intellectual guesswork.
DESCRIPTION: This in an introduction to what is called 'Phreaking'. It has
interested many people, and may be illegal (perhaps stealing electricity or
breach of BT licence). I DO NOT BY ANY MEANS CLAIM ALL THE INFO BELOW TO BE MY
OWN AND THUS TAKE NO RESPONSIBILITY FOR INACURACY! However I must send my
thanks to everyone / anyone who has contributed - They will know who they are.
About 1/3 to 1/2 the info came to my knowledge through TowerNet:- There are
some pretty good brains out there so SUPPORT THE SYSTEM! I would be most
grateful for any corrections / criticisms / updates or even compliments.
SOURCE & DISTRIBUTION: This file was written by 'The Wizard' of 'The Wizard's
Tower' Bulletin Board. Permission is granted to distribute this file on the
following conditions:
1) The actual text remains unammended. Any additions are added at the
end with notes describing their source and date in a readable. The
only possible exception to this is where a portion of the text is
refered to a note at the end where the line <See note XXXX> may be
added.
2) It is understood that the Legal Requirements above are abided by by
both the distributors, any intermediate distributors and 'The Wizard'
The Wizard's Tower is a TowerNet BBS and can be accessed as follows:
Number (UK) : 0295 721532 (thats +44 295 721532 internationally).
Baud rates : V21,22,22bis,23
Protocol : 8n1, configurable, ARQ available if wanted.
Times : 6pm to 9am, Local Time.
What is Phreaking
=================
Phreaking is the process by which free or reduced rate calls, or other
interesting effects may be obtained from phone companies. Ofcourse dialling
numbers that aren't ones you know is in breach of contract with BT, which is
probably breaking the law, as is (ofcourse) attaching naughty circuits to your
phone, so thats why ofcourse I have never done any of it myself as breaking the
law is very naughty and if you deprive monopolies of thier profits you deserve
to have your botty spanked.
There are 2 kinds of phreaking (basically speaking) - one involves
actually intercepting the phone-line with devices to fool the charging
equiptment, and the other confusing BT and other things with exchanges by
dialling wierd and wonderful numbers or making devices to sing merrilly down
the line.
The trouble with 'black-boxes' (devices to fool the charging equipment) is
though it is actually illegal for BT to trace any calls without a license etc.,
and they can't tell you are phreaking, most if not all black boxes light up a
fault light on older exchanges (which all true blooded BT engineers ignore!).
This lights status could I suppose be used as evidence against you if they ever
felt like suing you. The other major problem, is by their very nature, the way
most black-boxes work is they tell the charging equipment that you have not yet
picked up the phone, thus incoming calls are free (to those who ring you), but
not out-going calls, which is not particularly helpful for some purposes (e.g.
hacking remote systems). Thus their use is limitted, but they do come in
useful. For legal reasons and the fact this is a public-ish 'place' I can't
really give any ciruits away that do this directly.
Use of circuits attached directly to the telephone lines not approoved by
BT is in breach of your license agreement. This has not bothered many people
before, but as honest citizens you really ought not use them....
Line Signals
============
Noises (like engaged, ringing tones etc. and voices) are on the line as
A.C., say down to about 200Hz officially speaking. The peak to peak voltage
signal is smallish, about 1/2 a volt-ish, so in DC terms you can ignore this.
For dialling and charging purposes DC is used. DC voltages are listed below.
There is no set polarity on your line (as BT often swap Line A and Line B -
even when they repair the lines! Thus it is a good idea to have a change over
switch mounted in any circuitry you might make), so set the imaginary meter in
your brain to think of the polarity as 'postive' (+ve) when you pick the phone
up to dial outwards.
How a call works
================
Normally on a phone line there is 50V accross the line. When you pick the
phone up for the first time to make an outward going call, the line polarity is
+ve about 12V-ish. Normally (i.e. if the phone wasn't connected) there'd be
about 50V-ish accross the line, but because the phone has a lowish resistance
compared to the series resistance in the exchange, when the phone is in the
circuit 50-100ma is drawn and the voltage accross the line falls.
What happens on LD (Loop-Disconnect or click dialling) is that pulses are
sent down the line by breaking the line once to dial a 1, twice to dial a 2
etc., 9 times to dial a nine and ten to dial a zero. There are ten pulses sent
down per second, of which 33% is mark (i.e. the line disconnected), and 67%
space (i.e. line normal). In each pulse the line voltage rises to 50 volts +ve,
as theres no current taken by the phone.
Then hopefully BT will connect you to the number. It rings (which on their
phone is a 50V peak either side of zero (ish)) and on your phone is a tone from
their exchange. Their bell takes a little current when it rings and the
exchange notices this ringing (if theres no current flowing it gives number
unobtainable the implication being normally speaking that the lines broken:- On
the new sockets theres an opt-out of service resistor that makes the line draw
current if you don't connect your phone so it seems as though its ringing to
whoevers calling so hundreds of faults reported as broken lines which are only
people unplugging their phone aren't reported if you know what I mean...).
The exchange notices that the phone is picked up (all this info is
possibly more relevant only to the old exchanges) because when the guy you are
ringing picks the reciever up a largish current (50ma or so) flows. Now as the
signal of the ringing is AC of a large voltage (Not quite sure if all this is
completely exact but its pretty near) suddenly on both sides of the cycle a
largish current flows. One side of the cycle simply turns off the ringing tone
at the exchange, the other side is more interesting. If its a local call it
simply activates the your charging meter, otherwise it makes the exchange of
the guy you are ringing send a 2280Hz bleep down the line to your exchange
which activates your charging meter. That is why (a) 2280Hz signalling (see
later) only works on Trunk type calls and (b) you often hear a little blip when
you pick the phone up. 2280Hz.ARC in this room generates a 2280 Hz signal (and
others aswell) from an IBM PC's internal speaker. You will need a machine with
a loud speaker e.g. an Amstrad PC.
If you can't work out how phreak potentials arise from this hotch-potch of
technology then I suggest you sit down and think about it some more....
Internal communication over trunk lines
=======================================
All internal communcation between trunk excahnges used to use AC9 (AC
signalling cicuit number 9) to communicate between them. The first thing to
understand about exchanges is that making a call from A to B you are likely to
pass through technology from any period between 1920 to 1988. Each is different
in its characteristics (see Atkinsons Telephony - very helpful on the subject)
but most understand AC9 codes though many will not accept them from the line.
AC9 is a dialling follows internal rather than external dialling codes.
I.e. the numbers exchanges send to eachother to route a call from A to B are
not the same as the numbers you dial on the phone to get from A to B which
presents a problem (In the USA internal dialling codes are very similar to
external dialling codes - very useful) the reason for this is that the internal
dialling codes include routing information. AC9 dialling is very similar to
loop disconnect dialling except that instead of breaking the line, 2280Hz is
sent down, again at 10pps with a 33% / 67% mark space ratio.
Before any AC9 dialling is done, the master tone must be sent down - this
is just a long, loud burst of 2280Hz which will clear the line to an eerie
silence. It also (see above) activates the charging aparatus. 2280Hz master
tones for the reasons above only work on non-local calls (or atleast
non-own-exchange). Thus at first glance AC9ing may seem pointless. However if
you then AC9 elsewhere, you will ofcouse be charged only at the rate at which
you rang out. I.e. if you ring an 'A' rate number or possibly a local number
starting with an '0' (yes there are some) and then AC9ed down the code for
international dialling (it may not be 010 as again internal codes are
different) then you would suddenly find yourself with a dialling tone and be
able to dial abroad at 'L' or 'A' rates (in theory).
In practise the internal dialling codes complexities are often a great
problem (I THINK the last 4 5 or 6 digits of the internal & external dialling
codes are normally identical but I dunno much about internal dialling codes -
best ask a BT engineer who is corrupt!), and so is the fact that a LOUD 2280Hz
is needed as it is filtered out at exchanges. It is rumoured that if these
filters capacity is exceeded, in some exchanges alarms go off but this seems a
little unlikely especially with the old exchanges.
What I can give you is a little hint - the internal code for a number
which is in the same district is 1, i.e. to dial 01-234-5678 after clearing the
line on ringing 01-987-6543, the code would be 1-234-5678 (I think). Also you
will find various internal operators on 1105, 1107 (presumably equal to what
would happen if you dialled 105 & 107 normally if it weren't blocked by the
exchange??) and other wierd things on other 11XX numbers e.g. 1100 & 1107. You
might try all the standard test no.s prefixed by a 1.
Internal Communication for AC9 and normal pulse dialling specifications:
Pulse rate : 10 pps
% break : 67%
% pulse : 33%
Interdigit interval : 800ms
Cycle time : Digit dependant
The newer system X type exchanges and the US exchanges use a different
system for signalling. Again they use a master tone to clear the line, and then
what happens is dual tone multi-frequency dialling is used (i.e. like normal
tone dialling but with different frequencies). Below follows a list of
frequencies as far as I know. The way they work, is as above in terms of
dialling codes I think, but the stuff you send is <Master Tone> <Start Keying>
<Number to dial> <End Keying>. The tones are shortish in duration (as in tone
dialling. Tone dialling freqs are also listed below.
Internal frequencies
====================
Frequency Hz| Tone dialling (US & UK) UK Internal US Internal
==================================================================
Master | ---- | 2280 | 2600 |
1 | 697, 1209 | 1380, 1500 | 700, 900 |
2 | 697, 1336 | 1380, 1620 | 700, 1100 |
3 | 697, 1477 | 1500, 1620 | 900, 1100 |
4 | 770, 1209 | 1380, 1740 | 700, 1300 |
5 | 770, 1336 | 1500, 1740 | 900, 1300 |
6 | 770, 1477 | 1620, 1740 | 1100, 1300 |
7 | 852, 1209 | 1380, 1860 | 700, 1500 |
8 | 852, 1336 | 1500, 1860 | 900, 1500 |
9 | 852, 1477 | 1620, 1860 | 1100, 1500 |
0 | 941, 1366 | 1740, 1860 | 1300, 1500 |
Start Keying| 941, 1209 (*) (1740)| 1620, 1980 | 1100, 1700 |
End Keying | 941, 1477 (#) (1860)| 1740, 1980 | 1300, 1700 |
A | 697, 1633 | 1380, 1980 | 700, 1700 |
B | 770, 1633 | 1500, 1980 | 900, 1700 |
C | 852, 1633 (1620)|?1860, 1980 |?1500, 1700 |
D | 941, 1633 | - | - |
==================================================================
Those figures bracketted indicate 'alternative' values of the 1st UK frequency
for internal dialling from a different source:- though they seem less likely
to be accurate in terms of correspondance with the US frequencies, they are
included in the interests of completeness.
Tone dialling specifications
============================
Tone duration : 100ms
Interdigit interval : 100ms
Cycle Time : 200ms (total time to dial a digit).
Example figures. These are for a Quattro modem but your equiptment should try
& approach these.
Freq. deviation : 1.5% Max
Transmit level : -7dB to +1dB
Tone pair amp. bal. : Higher tone about 2dB greater in amplitude than
lower tone.
A, B, & D, are used for various purposes. In the older system X type Bell
exchanges in the US, touch tone A,B,C & D are used by the engineers to call up
various test services - just ring the operator there with 1 of the keys A B C
or D held down (especially D) - if it works you will get to a test, if it
doesn't the operator will swear and curse at you.
In internal exchanges such as the Merlin, A, B, C & D touch tones call up
additional services. If your phone for your exchange does not have these
buttons on it, then getting a phone with this '4th column' may add extra
facilities - could be useful! Though I don't (as usual) guarantee anything.
In the US military phone system (AUTOVON), A, B, C & D provide various
military prorities: Flash, Flash Override, Priority and Priority interrupt -
what does what who knows but its meant to speed wartime & wargame
communication.
What A,B & C frequencies do on the internal network I am afraid I don't
know. I am not sure the frequency allocated to C is even used! But I have
heard they are used as control signals and for the routing mechanism in the UK.
Someone even told me that they did

View File

@@ -0,0 +1,385 @@
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/ /-/
/-/ PHREAKER'S /-/
/-/ PHUNHOUSE /-/
/-/ /-/
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/ BY: /-/
/-/ THE TRAVELER /-/
/-/ /-/
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
THE LONG AWAITED PREQUIL TO PHREAKER'S GUIDE HAS FINALLY ARRIVED.
CONCEIVED FROM THE BOREDOM AND LONELINESS THAT COULD ONLY BE DERIVED FROM:
THE TRAVELER! BUT NOW, HE HAS RETURNED IN FULL STRENGTH (AFTER A SMALL
VACATION) AND IS HERE TO 'WORLD PREMIERE' THE NEW FILES EVERYWHERE. STAY
COOL. THIS IS THE PREQUIL TO THE FIRST ONE, SO JUST RELAX. THIS IS NOT MADE
TO BE AN EXCLUSIVE ULTRA ELITE FILE, SO KINDA CALM DOWN AND WATCH IN THE
BACKGROUND IF YOU ARE TOO COOL FOR IT.
/-/ PHREAK DICTIONARY /-/
HERE YOU WILL FIND SOME OF THE BASIC BUT NECESSARY TERMS THAT SHOULD BE
KNOWN BY ANY PHREAK WHO WANTS TO BE RESPECTED AT ALL.
PHREAK : 1. THE ACTION OF USING MISCHEVIOUS AND MOSTLY ILLEGAL
WAYS IN ORDER TO NOT PAY FOR SOME SORT OF TELE-
COMMUNICATIONS BILL, ORDER, TRANSFER, OR OTHER SERVICE.
IT OFTEN INVOLVES USAGE OF HIGHLY ILLEGAL BOXES AND
MACHINES IN ORDER TO DEFEAT THE SECURITY THAT IS SET
UP TO AVOID THIS SORT OF HAPPENING. [FR'EAKING]. V.
2. A PERSON WHO USES THE ABOVE METHODS OF DESTRUCTION AND
CHAOS IN ORDER TO MAKE A BETTER LIFE FOR ALL. A TRUE
PHREAKER WILL NOT NOT GO AGAINST HIS FELLOWS OR NARC
ON PEOPLE WHO HAVE RAGGED ON HIM OR DO ANYTHING
TERMED TO BE DISHONORABLE TO PHREAKS. [FR'EEK]. N.
3. A CERTAIN CODE OR DIALUP USEFUL IN THE ACTION OF
BEING A PHREAK. (EXAMPLE: "I HACKED A NEW METRO
PHREAK LAST NIGHT.")
SWITCHING SYSTEM: 1. THERE ARE 3 MAIN SWITCHING SYSTEMS CURRENTLY EMPLOYED
IN THE US, AND A FEW OTHER SYSTEMS WILL BE MENTIONED
AS BACKGROUND.
A) SXS: THIS SYSTEM WAS INVENTED IN 1918 AND WAS
EMPLOYED IN OVER HALF OF THE COUNTRY UNTIL 1978. IT
IS A VERY BASIC SYSTEM THAT IS A GENERAL WASTE OF
ENERGY AND HARD WORK ON THE LINESMAN. A GOOD WAY TO
IDENTIFY THIS IS THAT IT REQUIRES A COIN IN THE PHONE
BOOTH BEFORE IT WILL GIVE YOU A DIAL TONE, OR THAT NO
CALL WAITING, CALL FORWARDING, OR ANY OTHER SUCH
SERVICE IS AVAILABLE. STAND<EFBFBD> FOR: STEP BY STEP
B) XB: THIS SWITCHING SYSTEM W<EFBFBD>S FIRST EMPLOYED IN 1978
IN ORDER TO TAKE CARE OF MOST OF THE FAULTS OF SXS
SWITCHING. NOT ONLY IS IT MORE EFFICIENT, BUT IT
ALSO CAN SUPPORT DIFFERENT SERVICES IN VARIOUS FORMS.
XB1 IS CROSSBAR VERSION 1. THAT IS VERY LIMITED AND
IS HARD TO DISTINGUISH FROM SXS EXCEPT BY DIRECT VIEW
OF THE WIRING INVOLVED. NEXT UP WAS XB4, CROSSBAR
VERSION 4. WITH THIS SYSTEM, SOME OF THE BASIC THINGS
LIKE DTMF THAT WERE NOT AVAILABLE WITH SXS CAN BE
ACCOMPLISHED. FOR THE FINAL STROKE OF XB, XB5 WAS
CREATED. THIS IS A SERVICE THAT CAN ALLOW DTMF PLUS
MOST 800 TYPE SERVICES (WHICH WERE NOT ALWAYS
AVAILABLE.) STANDS FOR: CROSSBAR.
C) ESS: A NIGHTMARE IN TELECOM. IN VIVID COLOR, ESS IS
A PRETTY BAD THING TO HAVE TO STAND UP TO. IT IS
QUITE SIMPLE TO IDENTIFY. DIALING 911 FOR EMERGENCIES,
AND ANI [SEE ANI BELOW] ARE THE MOST COMMON FACETS OF
THE DREAD SYSTEM. ESS HAS THE C<EFBFBD>PABILITY TO LIST IN A
PERSON'S CALLER LOG WHAT NUMBER WAS CA<EFBFBD>LED, HOW LONG
THE CALL TOOK, AND EVEN THE STATUS OF THE CONVERSATION
(MODEM OR OTHERWISE.) SINCE ESS HAS BEEN EMPLOYED,
WHICH HAS BEEN VERY <EFBFBD>ECENTLY, IT HAS GONE THROUGH
MANY KINDS OF RE<EFBFBD>ISIONS. THE LATEST SYSTEM TO DATE IS
ESS 11A, THAT IS EMPLOYED IN WASHINGTON D.C. FOR
SECURITY REASONS. ESS IS TRULY TROUBLE FOR ANY
PHREAK, BECAUSE IT IS 'SMARTER' THAN THE OTHER
SYSTEMS. FOR INSTANCE, IF ON YOUR CALLER LOG THEY SAW
50 CAL<EFBFBD>S TO 1-800-421-9438, THEY WOULD BE ABLE TO D<EFBFBD>
A CN/A [SEE LOOPHOLES BELOW] ON YOUR NUMBER AND
DETERMINE WHETHER YOU ARE SUBSCRIBED TO THAT SERVICE
OR NOT. THIS MAKES MOST CALLS A HAZARD, BECAUSE
ALTHOUGH 800 NUMBERS APPEAR TO BE FREE, THEY ARE
RECORDED ON YOUR CALLER LOG AND THEN RIGHT BEFORE YOU
RECEIVE YOUR BILL IT DELETES THE BILLINGS FOR THEM.
BUT BEFORE THAT THE ARE OPEN TO INSPECTION, WHICH IS
ONE REASON WHY EXTENDED USE OF ANY CODE IS DANGEROUS
UNDER ESS. SOME OF THE BOXES [SEE BOXING BELOW] ARE
UNABLE TO FUNCTION IN ESS. IT IS GENERALLY A MENACE
TO THE TRUE PHREAK. STANDS FOR: ELECTRONIC SWITCHING
SYSTEM. BECAUSE THEY COULD APPEAR ON A FILTER
SOMEWHERE OR MAYBE IT IS JUST NICE TO KNOW THEM
ANYWAYS.
A) SSS: STROWGER SWITCHING SYSTEM. FIRST
NON-OPERATOR SYSTEM AVAILABLE.
B) WES: WESTERN ELECTRONICS SWITCHING. USED ABOUT 40
YEARS AGO WITH SOME MINOR PLACES OUT WEST.
BOXING: 1) THE USE OF PERSONALLY DESIGNED BOXES THAT EMIT OR
CANCEL ELECTRONICAL IMPULSES THAT ALLOW SIMPLER
ACTING WHILE PHREAKING. THROUGH THE USE OF SEPARATE
BOXES, YOU CAN ACCOMPLISH MOST FEATS POSSIBLE WITH
OR WITHOUT THE CONTROL OF AN OPERATOR.
2) SOME BOXES AND THEIR FUNCTIONS ARE LISTED BELOW.
ONES MARKED WITH '*' INDICATE THAT THEY ARE NOT
OPERATABLE IN ESS.
*BLACK BOX: MAKES IT SEEM TO THE PHONE COMPANY THAT
THE PHONE WAS NEVER PICKED UP.
BLUE BOX : EMITS A 2600HZ TONE THAT ALLOWS YOU TO DO
SUCH THINGS AS STACK A TRUNK LINE, KICK
THE OPERATOR OFF LINE, AND OTHERS.
RED BOX : SIMULATES THE NOISE OF A QUARTER, NICKEL,
OR DIME BEING DROPPED INTO A PAYPHONE.
CHEESE BOX : TURNS YOUR HOME PHONE INTO A PAY PHONE TO
THROW OFF TRACES (A RED BOX IS USUALLY
NEEDED IN ORDER TO CALL OUT.)
*CLEAR BOX : GIVES YOU A DIAL TONE ON SOME OF THE OLD
SXS PAYPHONES WITHOUT PUTTING IN A COIN.
BEIGE BOX : A SIMPLER PRODUCED LINESMAN'S HANDSET THAT
ALLOWS YOU TO TAP INTO PHONE LINES AND
EXTRACT BY EAVESDROPPING, OR CROSSING
WIRES, ETC.
PURPLE BOX : MAKES ALL CALLS MADE OUT FROM YOUR HOUSE
SEEM TO BE LOCAL CALLS.
ANI [ANI]: 1) AUTOMATIC NUMBER IDENTIFICATION. A SERVICE
AVAILABLE ON ESS THAT ALLOWS A PHONE SERVICE [SEE
DIALUPS BELOW] TO RECORD THE NUMBER THAT ANY CERTAIN
CODE WAS DIALED FROM ALONG WITH THE NUMBER THAT WAS
CALLED AND PRINT BOTH OF THESE ON THE CUSTOMER BILL.
950 DIALUPS [SEE DIALUPS BELOW] ARE ALL DESIGNED
JUST TO USE ANI. SOME OF THE SERVICES DO NOT HAVE
THE PROPER EQUIPMENT TO READ THE ANI IMPULSES YET,
BUT IT IS IMPOSSIBLE TO SEE WHICH IS WHICH WITHOUT
BEING BUSTED OR NOT BUSTED FIRST.
DIALUPS [DY'L'UPS]: 1) ANY LOCAL OR 800 EXTENDED OUTLET THAT ALLOWS INSTANT
ACCESS TO ANY SERVICE SUCH AS MCI, SPRINT, OR AT&T
THAT FROM THERE CAN BE USED BY HANDPICKING OR USING
A PROGRAM TO REVEAL OTHER PEOPLES CODES WHICH CAN
THEN BE USED MODERATELY UNTIL THEY FIND OUT ABOUT
IT AND YOU MUST SWITCH TO ANOTHER CODE (PREFERRABLY
BEFORE THEY FIND OUT ABOUT IT.)
2) DIALUPS ARE EXTREMELY COMMON ON BOTH SENSES. SOME
DIALUPS REVEAL THE COMPANY THAT OPERATES THEM AS
SOON AS YOU HEAR THE TONE. OTHERS ARE MUCH HARDER
AND SOME YOU MAY NEVER BE ABLE TO IDENTIFY. A SMALL
LIST OF DIALUPS:
1-800-421-9438 (5 DIGIT CODES)
1-800-547-6754 (6 DIGIT CODES)
1-800-345-0008 (6 DIGIT CODES)
1-800-734-3478 (6 DIGIT CODES)
1-800-222-2255 (5 DIGIT CODES)
3) CODES: CODES ARE VERY EASILY ACCESSED PROCEDURES
WHEN YOU CALL A DIALUP. THEY WILL GIVE YOU SOME SORT
OF TONE. IF THE TONE DOES NOT END IN 3 SECONDS,
THEN PUNCH IN THE CODE AND IMMEDIATELY FOLLOWING THE
CODE, THE NUMBER YOU ARE DIALING BUT STRIKE THE
'1' IN THE BEGINNING OUT FIRST. IF THE TONE DOES
END, THEN PUNCH IN THE CODE WHEN THE TONE ENDS.
THEN, IT WILL GIVE YOU ANOTHER TONE. PUNCH IN THE
NUMBER YOU ARE DIALING, OR A '9'. IF YOU PUNCH IN
A '9' AND THE TONE STOPS, THEN YOU MESSED UP A
LITTLE. IF YOU PUNCH IN A TONE AND THE TONE
CONTINUES, THEN SIMPLY DIAL THEN NUMBER YOU ARE
CALL<EFBFBD>NG WITHOUT T<EFBFBD>E '1'.
4) ALL CODES ARE NOT UNIVERSAL. THE ONLY TYPE THAT I
KNOW OF THAT IS TRULY UNIVERSAL IS METROPHONE.
ALMOST EVERY MAJOR CITY HAS A LOCAL METRO DIALUP
(FOR PHILADELPHIA, (215)351-0100/0126) AND SINCE THE
CODES ARE UNIVERSAL, ALMOST EVERY PHREAK HAS USED
THEM ONCE OR TWICE. THEY DO NOT EMPLOY ANI IN ANY
OUTLETS THAT I KNOW OF, SO FEEL FREE TO CHECK
THROUGH YOUR BOOKS AND CALL 555-1212 OR, AS A MORE
DEVIOUS MANOR, SUBSCRIBE YOURSELF. THEN, NEVER USE
YOUR OWN CODE. THAT WAY, IF THEY CHECK UP ON YOU DUE
TO YOUR CALLER LOG, THEY CAN USUALLY FIND OUT THAT
YOU ARE SUBSCRIBED. NOT ONLY THAT BUT YOU COULD SET
A PHREAK HACKER AROUND THAT AREA AND JUST LET IT
HACK AWAY, SINCE THEY USUALLY GROUP THEM, AND, AS A
BONUS, YOU WILL HAVE THEIR LOCAL DIALUP.
5) 950'S. THEY SEEM LIKE A PERFECTLY COOL PHREAKERS
DREAM. THEY ARE FREE FROM YOUR HOUSE, FROM PAYPHONES,
FROM EVERYWHERE, AND THEY HOST ALL OF THE MAJOR LONG
DISTANCE COMPANIES (950-1044 <MCI>, 950-1077
<SPRINT>, 950-1088 <SKYLINES>, 950-1033 <US
TELECOM>.) WELL, THEY AREN'T. THEY WERE DESIGNED FOR
ANI. THAT IS THE POINT, END OF DISCUSSION.
A PHREAK DICTIONARY. IF YOU REMEMBER ALL OF THE THINGS CONTAINED ON THAT
FILEUP THERE, YOU MAY HAVE A BETTER CHANCE OF DOING WHATEVER IT IS YOU DO. THIS
NEXT SECTION IS MAYBE A LITTLE MORE INTERESTING...
BLUE BOX PLANS:
---------------
THESE ARE SOME BLUE BOX PLANS, BUT FIRST, BE WARNED, THERE HAVE BEEN 2600HZ
TONE DETECTORS OUT ON OPERATOR TRUNK LINES SINCE XB4. THE IDEA BEHIND IT IS TO
USE A 2600HZ TONE FOR A FEW VERY NAUGHTY FUNCTIONS THAT CAN REALLY MAKE YOUR DAY
LIGHTEN UP. BUT FIRST, HERE ARE THE PLANS, OR THE HEART OF THE FILE:
700 : 1 : 2 : 4 : 7 : 11 :
900 : + : 3 : 5 : 8 : 12 :
1100 : + : + : 6 : 9 : KP :
1300 : + : + : + : 10 : KP2 :
1500 : + : + : + : + : ST :
: 700 : 900 :1100 :1300 :1500 :
STOP! BEFORE YOU DIEHARD USERS START PIECING THOSE LITTLE TONE TIDBITS
TOGETHER, THERE IS A SIMPLER METHOD. IF YOU HAVE AN APPLE-CAT WITH A PROGRAM
LIKE CAT'S MEOW IV, THEN YOU CAN GENERATE THE NECESSARY TONES, THE 2600HZ TONE,
THE KP TONE, THE KP2 TONE, AND THE ST TONE THROUGH THE DIAL SECTION. SO IF YOU
HAVE THAT I WILL ASSUME YOU CAN BOOT IT UP AND IT WORKS, AND I'LL DO YOU THE
FAVOR OF TELLING YOU AND THE OTHER USERS WHAT TO DO WITH THE BLUE BOX NOW THAT
YOU HAVE SOMEHOW CONSTRUCTED IT. THE CONNECTION TO AN OPERATOR IS ONE OF THE
MOST WELL KNOWN AND USED WAYS OF HAVING FUN WITH YOUR BLUE BOX. YOU SIMPLY DIAL
A TSPS (TRAFFIC SERVICE POSITIONING STATION, OR THE OPERATOR YOU GET WHEN YOU
DIAL '0') AND BLOW A 2600HZ TONE THROUGH THE LINE. WATCH OUT! DO NOT DIAL THIS
DIRECT! AFTER YOU HAVE DONE THAT, IT IS QUITE SIMPLE TO HAVE FUN <EFBFBD>ITH IT. BLO<EFBFBD> A
KP TONE TO START A CALL, A ST TONE TO STOP IT, AND A 2600HZ TONE TO HANG UP.
ONCE YOU HAVE CONNECTED TO IT, HERE ARE SOME FUN NUMBERS TO CALL WITH IT:
0-700-456-1000 TELECONFERENCE (FREE, BECAUSE YOU ARE THE OPERATOR!)
(AREA CODE)-101 TOLL SWITCHING
(AREA CODE)-121 LOCAL OPERATOR (HEHE)
(AREA CODE)-131 INFORMATION
(AREA CODE)-141 RATE & ROUTE
(AREA CODE)-181 COIN REFUND OPERATOR
(AREA CODE)-11511 CONFERENCE OPERATOR (WHEN YOU DIAL 800-544-6363)
WELL, THOSE WERE THE TONE MATRIX CONTROLLERS FOR THE BLUE BOX AND SOME
OTHER HELPFUL STUFF TO HELP YOU TO START OUT WITH. BUT THOSE ARE ONLY THE
FUNCTIONS WITH THE OPERATOR. THERE ARE OTHER K-FUN THINGS YOU CAN DO WITH IT.
MORE ADVANCED BLUE BOX STUFF:
OOPS. SMALL MISTAKE UP THERE. I FORGOT TONE LENGTHS. UM, YOU BLOW A T<EFBFBD>NE
PAIR OUT FOR UP TO 1/10 OF A SECOND WITH ANOTHER 1/10 SECOND FOR SILENCE BETWEEN
THE DIGITS. KP T<EFBFBD>NES SHOULD BE SENT FOR 2/10 OF A SECOND. ONE WAY TO CONFUSE THE
2600HZ TRAPS IS TO SEND PINK NOISE OVER THE CHANNEL (FOR ALL OF YOU THAT HAVE
DECENT BSR EQUALIZERS, THERE IS MAJOR PINK NOISE IN THERE.) USING THE OPERATOR
FUNCTIONS IS THE USE OF THE 'INWARD' TRUNK LINE. THAT IS WORKING IT FROM THE
INSIDE. FROM THE 'OUTWARD' TRUNK, YOU CAN DO SUCH THINGS AS MAKE EMERGENCY
BREAKTHROUGH CALLS, TAP INTO LINES, BUSY ALL OF THE LINES IN ANY TRUNK (CALLED
'STACKING'), ENABLE OR DISABLE THE TSPS'S, AND FOR SOME 4A SYSTEMS YOU CAN EVEN
RE-ROUTE CALLS TO ANYWHERE.
ALL RIGHT. THE ONE THING THAT EVERY COMPLETE PHREAK GUIDE SHOULD BE WITHOUT
IS BLUE BOX PLANS, SINCE THEY WERE ONCE A VITAL PART OF PHREAKING. ANOTHER THING
THAT EVERY COMPLETE FILE NEEDS IS A COMPLETE LISTING OF ALL OF THE 800 NUMBERS
AROUND SO YOU CAN HAVE SOME MORE FUN.
/-/ 800 DIALUP LISTINGS /-/
1-800-345-0008 (6) 1-800-547-6754 (6)
1-800-245-4890 (4) 1-800-327-9136 (4)
1-800-526-5305 (8) 1-800-858-9000 (3)
1-800-437-9895 (7) 1-800-245-7508 (5)
1-800-343-1844 (4) 1-800-322-1415 (6)
1-800-437-3478 (6) 1-800-325-7222 (6)
ALL RIGHT, SET CAT HACKER 1.0 ON THOSE NUMBERS AND HAVE A FUCK OF A DAY.
THAT IS ENOUGH WITH 800 CODES, BY THE TIME THIS GETS AROUND TO YOU I DUNNO WHAT
STATE THOSE CODES WILL BE IN, BUT TRY THEM ALL OUT ANYWAYS AND SEE WHAT YOU GET.
ON SOME 800 SERVICES NOW, THEY HAVE AN OPERATOR WHO WILL ANSWER AND ASK YOU FOR
YOUR CODE, AND THEN YOUR NAME. SOME WILL SWITCH BACK AND FORTH BETWEEN VOICE AND
TONE VERIFICATION, YOU CAN NEVER BE QUITE SURE WHICH YOU WILL BE UP AGAINST.
ARMED WITH THIS KNOWLEDGE YOU SHOULD BE HAVING A PRETTY GOOD TIME PHREAKING
NOW. BUT CLASS ISN'T OVER YET, THERE ARE STILL A COUPLE IMPORTANT RULES THAT YOU
SHOULD KNOW. IF YOU HEAR CONTINUAL CLICKING ON THE LINE, THEN YOU SHOULD ASSUME
THAT AN OPERATOR IS MESSING WITH SOMETHING, MAYBE EVEN LISTENING IN ON YOU. IT
IS A GOOD IDEA TO CALL SOMEONE BACK WHEN THE PHONE STARTS DOING THAT. IF YOU
WERE USING A CODE, USE A DIFFERENT CODE AND/OR SERVICE TO CALL HIM BACK.
A GOOD WAY TO DETECT IF A CODE HAS GONE BAD OR NOT IS TO LISTEN WHEN THE
NUMBER HAS BEEN DIALED. IF THE CODE IS BAD YOU WILL PROBABLY HEAR THE PHONE
RINGING MORE CLEARLY AND MORE QUICKLY THAN IF YOU WERE USING A DIFFERENT CODE.
IF SOMEONE ANSWERS VOICE TO IT THEN YOU CAN IMMEDIATELY ASSUME THAT IT IS AN
OPERATIVE FOR WHATEVER COMPANY YOU ARE USING. THE FAMED '311311' <EFBFBD>O<EFBFBD>E FOR METRO
IS ONE OF THOSE. YOU WOULD HAVE TO BE QUITE STUPID TO ACTUALLY RESPOND, BECAUSE
WHOEVER YOU ASK FOR THE OPERATOR WILL ALWAYS SAY 'HE'S NOT IN RIGHT NOW, CAN I
HAVE HIM CALL YOU BACK?' AND THEN THEY WILL ASK FOR YOUR NAME AND PHONE NUMBER.
SOME OF THE MORE SOPHISTICATED COMPANIES WILL ACTUALLY GIVE YOU A CARRIER ON A
LINE THAT IS SUPPOSED TO GIVE YOU A CARRIER AND THEN JUST HAVE GARBAGE FLOW
ACROSS THE SCREEN LIKE IT WOULD WITH A BAD CONNECTION. THAT IS A FEEBLE EFFORT
TO MAKE YOU THINK THAT THE CODE IS STILL WORKING AND MAYBE GET YOU TO DIAL
SOMEONE'S VOICE, A GOOD TEST FOR THE CARRIER TRICK IS TO DIAL A NUMBER THAT WILL
GIVE YOU A CARRIER THAT YOU HAVE NEVER DIALED WITH THAT CODE BEFORE, THAT WILL
ALLOW YOU TO DETERMINE WHETHER THE CODE IS GOOD OR NOT. FOR OUR NEXT SECTION, A
LIGHTER LOOK AT SOME OF THE THINGS THAT A PHREAK SHOULD NOT BE WITHOUT. A
VOCABULARY. A FEW MONTHS AGO, IT WAS A QUITE STRANGE WORLD FOR THE MODEM PEOPLE
OUT THERE. BUT NOW, A PHREAKER'S VOCABULARY IS ESSENTIAL IF YOU WANNA MAKE A
GOOD IMPRESSION ON PEOPLE WHEN YOU POST WHAT YOU KNOW ABOUT CERTAIN SUBJECTS.
/-/ VOCABULARY /-/
- DO NOT MISSPELL EXCEPT CERTAIN EXCEPTIONS:
PHONE -> FONE
FREAK -> PHREAK
- NEVER SUBSTITUTE 'Z'S FOR 'S'S. (I.E. CODEZ -> CODES)
- NEVER LEAVE MANY CHARACTERS AFTER A POST (I.E. HEY DUDES!#!@#@!#!@)
- NEVER USE THE 'K' PREFIX (K-KOOL, K-RAD, K-WHATEVER)
- DO NOT ABBREVIATE. (I GOT LOTSA WARES W/ DOCS)
- NEVER SUBSTITUTE '0' FOR 'O' (R0DENT, L0ZER).
- FORGET ABOUT YE OLD UPPER CASE, IT LOOKS RUGGYISH.
ALL RIGHT, THAT WAS TO RELIEVE THE TENSION OF WHAT IS BEING DRILLED INTO
YOUR MINDS AT THE MOMENT. NOW, HOWEVER, BACK TO THE TEACHING COURSE. HERE ARE
SOMETHINGS YOU SHOULD KNOW ABOUT PHONES AND BILLINGS FOR PHONES, ETC.
LATA: LOCAL ACCESS TRANSFERENCE AREA. SOME PEOPLE WHO LIVE IN LARGE CITIES
OR AREAS MAY BE PLAGUED BY THIS PROBLEM. FOR INSTANCE, LET'S SAY YOU LIVE IN THE
215 AREA CODE UNDER THE 542 PREFIX (AMBLER, FORT WASHINGTON). IF YOU WENT TO
DIAL IN A BASIC METRO CODE FROM THAT AREA, FOR INSTANCE, 351-0100, THAT MIGHT
NOT BE COUNTED UNDER UNLIMITED LOCAL CALLING BECAUSE IT IS OUT OF YOUR LATA.
FOR SOME LATA'S, YOU HAVE TO DIAL A '1' WITHOUT THE AREA CODE BEFORE YOU CAN
DIAL THE PHONE NUMBER. THAT COULD PROVE A HASSLE FOR US ALL IF YOU DIDN'T
REALIZE YOU WOULD BE BILLED FOR THAT SORT OF CALL. IN THAT WAY, SOMETIMES, IT IS
BETTER TO BE SAFE THAN SORRY AND PHREAK.
THE CALLER LOG: IN ESS REGIONS, FOR EVERY HOUSEHOLD AROUND, THE PHONE
COMPANY HAS SOMETHING ON YOU CALLED A CALLER LOG. THIS SHOWS EVERY SINGLE NUMBER
THAT YOU DIALED, AND THINGS CAN BE ARRANGED SO IT SHOWED EVERY NUMBER THAT WAS
CALLING TO YOU. THAT'S ONE MAIN DISADVANTAGE OF ESS, IT IS MOSTLY COMPUTERIZED
SO A NUMBER SCAN COULD BE DONE LIKE THAT QUITE EASILY. USING A DIALUP IS AN EASY
WAY TO SCREW THAT, AND IS SOMETHING WORTH REMEMBERING. ANYWAYS, WITH THE CALLER
LOG, THEY CHECK UP AND SEE WHAT YOU DIALED. HMM... YOU DIALED 15 DIFFERENT 800
NUMBERS THAT MONTH. SOON THEY FIND THAT YOU ARE SUBSCRIBED TO NONE OF THOSE
COMPANIES. BUT THAT IS NOT THE ONLY THING. MOST PEOPLE WOULD IMAGINE "BUT WAIT!
800 NUMBERS DON'T SHOW UP ON MY PHONE BILL!". TO THOSE PEOPLE, IT IS A NICE
THOUGHT, BUT 800 NUMBERS ARE PICKED UP ON THE CALLER LOG UNTIL RIGHT BEFORE THEY
ARE SENT OFF TO YOU. SO THEY CAN CHECK RIGHT UP ON YOU BEFORE THEY SEND IT AWAY
AND CAN NOTE THE FACT THAT YOU FUCKED UP SLIGHTLY AND CALLED ONE TOO MANY 800
LINES.
RIGHT NOW, AFTER ALL OF THAT, YOU SHOULD HAVE A PRETTY GOOD IDEA OF HOW TO
GROW UP AS A GOOD PHREAK. FOLLOW THESE GUIDELINES, DON'T SHOW OFF, AND DON'T
TAKE UNNECESSARY RISKS WHEN PHREAKING OR HACKING.
/-/ CREDITS /-/
TO THE VIDEOSMITH - FOR SETTING ME STRAIGHT ON SOME SHIT.
TO THE LINESMAN - FOR TELLING ME TO UPLOAD IT TO HIS AE LINE.
TO MODERN MUTANT - FOR MAKING ME INTO A PHREAKING FREAK.
TO JACK THE NIBBLER- FOR THE BASIS OF THE BLUE BOX PLANS.
/---------------------------------\
\ BULLETIN BOARD LIST \
\ --------------------- \
\ SIRIUS CYBERNETIC'S BBSYSTEM \
\ 808-521-3306 40MEGS \
\---------------------------------/
LATER,
THE TRAVELER

View File

@@ -0,0 +1,408 @@
Phreaker's Dictionary
A & A BUREAU--Abuse and annoyance bureau. The personnel in this
line of work spend their time helping customers get rid of nuts,
obscene callers, harassing collectors, etc.
ACCESS--The existence of paths within a network from an input
terminal to a set of output terminals in the absence of traffic
is indicated by the term, ACCESS. Full access permits connecting
to all output terminals by unique paths; multiple access
indicates that all output terminals can be reached in more than
one way; partial access refers to the ability to reach only a
fraction of the output terminals.
ACCESSIBILITY--(availability)--The number of trunks of the
required route in a switching network which can be reached from
an inlet.
ADAPTOR--A device designed to switch a number of voice-frequency
telephone channels coming from a non-time-division switching
system to a time-division multiplex highway.
ALTERNATE ROUTING--A procedure by which several routes involve
different switching stages or switching networks. Usually the
route having the fewest switching stages is tested first.
ANALOG TRANSMISSION--The transmission of continuously variable
signals rather than descretely variable signals. Prior to the use
of digital encoding and PCM, it was the only way of transmitting
voice signals over telephone channels.
AREA CODE--A three-digit prefix dialed ahead of the normal
seven-digit telephone number to permit direct distance dialing.
ASYNCHRONOUS SYSTEM--A system in which the transmission of each
information character is individually synchronized usually by the
use of start and stop elements.
AVERAGE HOLDING TIME--The average duration of a call expressed in
seconds or minutes.
BIT--The smallest binary unit of information. A contraction of
the words binary digit.
BIT RATE--The rate or speed at which bits are transmitted. Bits
per second is a common measure.
BLOCKING (CONGESTION)--A condition where the immediate
establishment of a new connection is impossible due to the lack
of available paths, or the inability to interconnect two idle
network terminals because some of the applicable links between
them are used for other connections.
BOOLEAN ALGEBRA--A form of nonquantitative algebra for dealing
with logic funtions, originally expressed by British
mathematician George Boole (1815-1864).
B.O.S.--Business Office Supervisor. She's the boss to the service
reps.
BROADBAND EXCHANGE (BEX)--Public switched communication system
featuring full duplex (FDX) connections of various bandwidths. A
Western Union facility.
B.S.I.--Business Services Instructor. A traffice employee who
will come out and teach you how to use your phone system.
BUSY HOUR--An uninterrupted period of 60 minutes in which the
total traffic of a sample is a maximum.
BYTE--A unit of information in electronic computer terminology
consisting of 8 bits, referred to as extended binary coded
decimal information of an EBCDIC code.
CALL CONGESTION RATIO--The ratio of the time during which
congestion exists to the total time considered. It is an estimate
of the probability that an external observer will find a system
in a congested condition.
CALLING RATE--Average calls per subscriber per hour.
CALL STORE--The memory section of a stored program control
switching system in which temporary information used in the
processing of calls through the exchange is contained. It is also
referred to as the Process Store.
CENTRAL OFFICE--Exchanges where subscriber lines and private
branch exchange lines terminate. There they are switched to
provide the desired connection with other subscribers. Such an
exchange is called an end office and is designated as a Class 5
office in the U.S.
CENTRAL PROCESSOR--The main computer element of a stored program
control switching system, which under the direction of the stored
program establishes switching network connections and also
monitors and analyzes the system to insure proper operation.
Routine process testing, maintenance and administrative funtions
are also carried out.
CENTREX--A PABX system in which the switching equipment is
located centrally and away form the location being served. Direct
inward dialing (DID) and direct outward dialing (DOD) as well as
automatic number identification (ANI) are provided by such a
system.
CHARACTERS--The elements of a message. One computer character
consists of 8 bits or 1 byte and is known as an EBCDIC character.
CIRCUIT SWITCHING--Telecommunications switching in which the
incoming and outgoing lines are connected by a physical path, as
through crosspoints or switch contacts.
CLASS OF SERVICE--The services and facilities offered to each
individual terminal connected to a system. This information is
usually stored with the directory or equipment numbers of the
associated terminal, and is accessed by the call processors when
a connection is required to or from that terminal.
CLOCK--Equipment to provide a time base for a switching system.
In time-division switching it is used to control sampling rates,
duration of signal digits, etc.
C.O.A.M.E.--Customer owned and maintained equipment.
CODEC--The combination of a coder and decoder, as used in
time-division switching systems to code the incoming message and
decode the message being returned to the caller. It is a
contraction of the words, coder and decoder.
COMMON CONTROL--An exchange control method in which the dialed
signals are received and registered separately from the switching
elements before they are used to control these switches. Also
defined as a control method, which identifies the input and
output terminals of the switching network and then causes a
connecting path to be established between them. Such systems are
also designated as marker systems.
CONCENTRATION STAGE--A switching stage in which a number of input
lines are connected to a smaller number of output lines or
trunks, as in the connection of a large number of subscriber
lines to a smaller number of trunks based on the grade of service
desired.
CONGESTION FUNCTION--Any function used to relate the degree of
congestion to the traffic intensity.
CONNECTING ROW--All those crosspoints directly accessible from an
inlet. Only one connection can be established via a connecting
row at any instant.
COUPLER--A device used to prevent electrical flashback and
maintain normal electrical flow on a telephone line. Used as a
buffer between C.O.A.M.E. and telephone company equipment.
CROSSBAR SWITCH--A switch having a plurality of vertical paths, a
plurality of horizontal paths and electromagnetically operated
mechanical means for connecting any of the vertical paths with
the horizontal paths.
CROSSPOINT--A crosspoint comprises a set of contacts that
operates together and extends the speech and signal wires of the
desired connection. Each connection in a space-division switching
network is established by closing one or more crosspoints.
CROSSTALK--An unwanted transfer of signals from one circuit to
another as may occur between switching elements or circuit
wiring.
C.W.A.--The Communication Workers of America. The C.W.A.
reprsents 90 percent of the unionized Telco work force.
DAY-TO-BUSY HOUR RATIO--The ratio of the 24 hour day traffic
volume to the busy hour traffic volume. In some countries the
reciprocal of this ratio is used.
D.D.D.--Direct Distance Dialing. Also known as one-plus dialing.
DELAY SYSTEM--A switching system in which a call attempt, which
occurs when all accessible paths for the required connection are
busy, is permitted to wait until a path becomes available.
DIAL PULSE--The signaling pulse which is formed by the
interruption of the current in the DC loop of a calling
telephone. Such interruptions are produced by the breaking of the
dial pulse contacts of the calling telephone subset during the
dialing process.
DIAMOND-RING TRANSLATOR--An array of ring-type induction coils
associated with coded wiring in such a manner that the
translation of directory numbers to equipment number or vice
versa can be accomplished in an exchange. It is named after its
originator, T.L.Dimond of the Bell Telephone Laboratories.
DIRECT CONTROL--An exchange control method in which pulses,
dialed by the subscribers, control directly the route selection
switches of the system. For each digit dialed the equivalent of
one set of selector switches is required with this control
method.
DIRECTOR--A control element which provides a measure of common
control in step-by-step or Strowger exchanges.
DISTRIBUTING FRAME--A structure for terminating the wires of a
telephone exchange in such a manner that cross-connections can be
made readily. Examples are the main distribution frame (MDF) at
the entry of an exchange, intermediate distribution frames (IDF)
between sections of an exchange, and power distribution frames
(PDF).
DISTRIBUTION STAGE--A switching stage between a concentration
stage and outlets and serves as a means of selecting trunks to
the desired terminations.
DUV--Data Under Voice (AT&T System). ELECTROMECHANICAL SWITCHING
SYSTEM--An exchange system in which both the speech paths and the
control equipment are switched by electromechanical
components--such as relays, rotary switches, etc.
ELECTRONIC SWITCHING SYSTEM--An exchange system in which at least
the control equipment is composed of electronic circuits and
components, generally of a solid-state type.
EMD SWITCH--The speech-path switching element used in a Siemens
rotary switching system. EMD is an abbreviation of
Edelmetall-Motor-Drehwahler, which translates in English to
Noble-Metal Motor Switch.
END OFFICE--A central office or Class 5 office.
ENTRAIDE--A switching system in which outlets from a given
connecting stage are connected to inlets of the same or a
previous stage. In such systems calls may traverse a stage more
than once. Usually these reentering links are used as last choice
paths and the resulting network is heterogeneous. Such an
arrangement is used in ITT's Pentaconta Crossbar system.
ERLANG--The unit of traffic intensity, which is measured in
call-seconds per second or call-minutes per minute. Also, one
erlang equals 3600 call-seconds per hour. It is named after A. K.
Erlang, the Danish engineer and mathematician who first adopted
it.
ESS--Electronic Switching System.
EXCHANGE--All numbers within a given three-digit prefix area. Can
also be used to describe a geographical area the size of a city.
FX--Foreign Exchange Calls. The term applied to calls made to a
central office other than the one located in the calling customer
area.
H.C. INSTRUMENT--An ordinary telephone with no extras.
I.D.E.W.--International Brotherhood of Electrical Workers. A
union that represents seven percent of all unionized telephoe
workers.
INTERSTATE--Telephone service that crosses state lines. Such
services come under the jurisdiction of the F.C.C.
INTRASTATE--Telephone services that remain within the boundares
of a state. Such services come under the jurisdiction of the
P.S.C.
JOINT PRACTICES--An inter-company guide akin to the Geneva rules
of war. The J.P. covers such things as intervals, offerings, and
procedures.
K.K.6--Six-button telephone. The standard telephone found in most
offices. The K.K.6 can handle five lines. The sixth button is
used for hold.
LAYOUT CARD--Schematic drawings of the electrical circuits
required for a telephone installation.
LINK (TRUNK) The connection between the terminals of one switch
and the terminals on a switch of the next stage corresponding to
a single transmission path.
LINK (ONE-WAY AND TWO-WAY)--A one-way link is used only for the
establishment of connections in one direction, while a two-way
link is used for the establishment of connections in either
direction.
LINK SYSTEM--A system in which: (1) there are at least two
connecting stages; (2) a connection is made over one or more
links; (3) the links are chosen in a single logical operation;
and (4) links are seized only when they can be used in making a
connection.
LOGIC FUNCTION--The relationship of two or more Boolean variables
as expressed by Boolean algebra.
LOGIC GATES--Electrical or electronic circuits which control the
transfer of signals and produce the required outputs for specific
input combinations to implement Boolean logic functions.
LOGIC (HARD-WIRED)--Control logic in an exchange, which is wired
in circuit form.
LOGIC (SOFT-WIRED)--Control logic in an exchange, which is held
in software computer programs.
LONG DISTANCE--Technically, any call that terminates more than
seventeen miles from the source.
LONG LINES--A division of AT&T responsible for the day-to-day
operation of the long distance network. While the local Telco
handles all maintenance, Long Lines directs overall supervision.
LOOP DISCONNECT PULSING--Subset dial pulsing in which the
subscriber DC loop is interrupted to produce pulses for signaling
an exchange.
MARKER--Circuits which incorporate the function of busy testing,
locating and finally controlling the establishment of a
particular path through the switching network.
MARKETING REP--The sales people of the Bell companies. Also known
as account executive.
MARKING--The use of electrical potentials and grounds at certain
points in a switching network to control its operation.
MATRIX--A simple switching network in which a specified inlet
(matrix row) has access to a specified outlet (matrix column) via
a crosspoint placed at the intersection of the row and column in
question. A complete matrix is one in which each inlet has access
to each outlet, while an incomplete matrix is one in which each
inlet may have access to only some of the outlets.
MEAN DELAY OF CALLS DELAYED--The total waiting time of all calls
divided by the number of delayed calls.
MESSAGE SWITCHING--A method of receiving and storing a message
for a more appropriate time of retransmission. With such a
method, no direct connection is established between the incoming
and outgoing lines as in the case of circuit switching.
MULTIFREQUENCY SIGNALING--Signaling between subscribers and the
central office through a combination of audio frequencies, as
with pushbutton dialing. Also, in many cases signaling between
exchanges is accomplished by combinations of frequencies.
MULTIGROUP--A combination of two or more PCM multiplex channels.
NONLISTED NUMBERS--Telephone numbers that do not appear in the
directory but that are available if the inquirer calls directory
assistance.
NONPUBLISHED NUMBERS--Telephone numbers not made available to the
public. Also known as silent numbers.
OCCUPANCY--The average proportion of time that a traffic carrying
facility is busy.
PACKET SWITCHING--Essentially the same as message-switching.
PANEL-SWITCHING SYSTEM--A common control electromechanical
switching system, which was used widely in the U.S. prior to its
virtual replacement by crossbar and other systems. The banks of
selectors take the form of flat vertical panels, from which the
name of the system was derived. Some panel installations are
still in use in the U.S.
PATH--A set of links joined in series to establish a connection.
Paths differ if one or more links differ.
P.B.X.--Private Branch Exchange. Commonly known as a switchboard.
Mini-central office equipment for business customers with from 10
to 2,000 telephones.
PRIMARY CENTER--A switching center connecting toll centers, which
can also serve as a toll center for its local end offices. In the
U.S. it is defined as a Class 3 office.
PRIVATE AUTOMATIC BRANCH EXCHANGE (PABX)--A private automatic
telephone exchange which provides for the connection of calls
going to and coming from the public telephone network (usually a
central office exchange) as well as intraexchange calls between
the served extensions.
PROBABILITY OF DELAY--The probability that a call attempt, if
offered, cannot be completed immediately.
PROBABILITY OF LOST CALLS (PROBABILITY OF LOSS)--The probability
that a call attempt, if offered, will be lost.
PROGRAM STORE--The memory section of a stored program control
switching in which semi-permanent instructions and translations
are contained. These are fed to the central processor to permit
it to provide stored program control.
PUBLIC SWITCHED NETWORK--Any switching system that provides
circuit switching facilities for use by the public. Telephone,
Telex, TWX, and Broadband switched networks are the public
switched networks in the U.S.
PULSE AMPLITUDE MODULATION (PAM)--A form of pulse modulation in
which a number of channels are multiplexed by time sampling, but
one in which the pulse amplitudes vary in accordance with the
amplitude of the analog signal levels.
PULSE CODE MODULATION (PCM)--A form of pulse modulation in which
a number of channels are multiplexed by time sampling as in PAM,
but with each amplitude replaced by a group of binary pulses
which identify the amplitude of

View File

@@ -0,0 +1,91 @@
======================================
PHREAKERS CAUGHT
======================================
from the Los Angeles Times of June 11, 1982 (page 1 of the "Metro" section):
'Phone Phreak' Sentenced to 150-Day Term
By Ted Rohrlich,
Times Staff Writer
Lewis DePayne was sentenced to 150 days in jail Thursday for extremely poor
relations with Ma Bell.
DePayne, 22, first came to the attention of Pacific Telephone Co. officials
in 1979, when they say they discovered that he had gained unauthorized access to
their communications and computer systems.
DePayne, a computer science student at the time, used the access to disconnect
phone service for people he did not like, and to add--for free--special
features, such as call-forwarding and call-waiting services, to his own phone
and those of his friends, according to phone company officials.
Pacific Telephone's retired general security manager, W. F. Bowren, said
that in late 1979 DePayne admitted involvement in setting nine fires on
telephone company property, resulting in $250,000 in damage.
Bowren told Superior Court Judge Diane Wayne that DePayne admitted to phone
company investigators that he and some friends got access to ground-level
telephone terminals, cut wiring inside the terminals, and then set the terminals
on fire.
Terminals are boxes, usually attached to telephone poles, that house
connections between underground cables and above-ground branch lines leading to
homes and businesses. Bowren's comments came in a letter that was made part of
the court record.
Bowren's letter said that DePayne also told investigators that he and others
had rewired one terminal in such a way that it allowed them to make phone calls
anywhere and to have charges for those calls applied to someone else's bill.
The resulting loss to the phone company was more than $15,000, Bowren said.
Bowren went on to say that the telephone company declined to press charges
against DePayne because DePayne said that he had seen the error of his ways.
But, his letter continued, DePayne was subsequently interviewed in a weekly
newspaper and boasted of "infiltrating and compromising our system."
Bowren was apparently referring to an article that appeared in the L.A.
Weekly in July, 1981, about a "phone phreak" identified as "Rosco."
Rosco was touted as "probably the most knowledgeable phone phreak in the
country" whose pranks included posing as a telephone company supervisor and
causing all calls normally routed through the phone company's Pasadena office to
be rerouted elsewhere.
Witnesses at a court hearing for DePayne testified that he used the nickname
Rosco.
That hearing was held to determine whether DePayne should be ordered to stand
trial on charges that he broke into a Pacific Telephone Co. office in May,
1981, and stole operating manuals for the company's central computer system.
A district attorney's investigator on the case has said those manuals could
have been used to shut down much of Los Angeles' phone system.
While facing theft, burglary, and conspiracy charges in the case, DePayne
wrote a letter to the president of Pacific Telephone, Bowren said.
"He had the unmitigated gall...(to try to) sell his service to us as a
consultant," Bowren wrote.
In court, DePayne pleaded no contest to a charge of conspiracy to commit
computer fraud against Pacific Telephone and to a separate charge against a San
Francisco-based computer leasing firm. Burglary and grand theft charges were
dropped.
A confederate, Mark Ross, 25, pleaded no contest to a charge of grand theft of
telephone company computer manuals.
Wayne placed them both on probation for three years and ordered Ross to jail
for 30 days, to be served on weekends.
She stayed the 150-day jail term for DePayne for three weeks to give him an
opportunity to apply for participation in the county's work furlough program.
Deputy Dist. Atty. Clifton Garrott said DePayne makes his living as a
systems analyst for computer consulting firms.
---------------------------------------


View File

@@ -0,0 +1,474 @@
* *************
* * * * * *
* * * * *
* ***** ******
* * *
* * *
* ****** *
MEGACOM ENTERPRIZES PRESENTS:
The early days of Phreaking...
In 1973 a couple of phone phreaks discovered the toll free 800 number at the
White house. The nuber was 800-424-9337. White house staffers used it for what
the Phreaks describes as "casual semi-official, chit chat." The phreaks used
their expertise with the phone system to tap this line and listen for hours to
buzz of converstaions going in and out of the White House. The Secret Service
always answered the phone with "9337". If the caller didn't respond with a code
word, the Secret Service agents would say, "i'm sorry, you must have dialed an
incorrect number". The phreaks discovered that the code word "Olympus" stood
for President Nixon, who was then embroiled in the water gate scandel.
One day in the spring of 1974, at about three in the morning, the phone phreaks
dialed the White House number, using an untraceble line. A secret Service man
answered "9337"
"Olympus, please, its urgent!" one phreak said.
"One momment" came the reply
Three minutes later they heard a fatigued voice say, "Yes?" It didn't sounds
like Nixon, but they decided to go ahead.
"Sir," the phreak exclaimed, "we have a crisis on our hands."
"Yes, what's the nature of the crisis? As if I didn't know already." It
_was_ Nixon! The phone phreak gulped.
"Sir" he said, "we are out of toilet paper!"
There was a long pause, then Nixon cursed and began yellin, "Who the hell are
you? What is the meaning of this?"
Another Voice came on the line. "Who are you? How did you get this number?"
The phreak mumbled, "Sucker!"
Then there was another pause, lasting about a minute or so, followed by a
muffled boice in the bacground: "Getting a trace?" A few seconds later there
was a ker-chunk sound and the line was dead.
Later that year two southern Californian phreaks tied up every long-distance
trunk line coming into Santa Barbara, telling all the callers that a mysterious
explosion had wiped out the city. They'd managed to gain control of all in-
coming long-distance calls by using two side-by-side phone booths on the
beach and some very simple phone phreaking equiptment.
The first call was from a mother to her son, a student at the University of
California. Santa Barbara campus. The two phreaks told the woman that they
were with the National Guard Emergency Communications Center and that there
was no longer any University of California at Santa Barbara. In breathless
tones they said the campus and, in fact, the entire city of Santa Barbara had
been wiped out in a freakish nuclear accident-a "nuclear melt down," they
told her. She was politely asked to hang up in order to clear the line for
emergency phone calls.
A few minutes later the horrified mother called back, this time with oper-
ator assistance. The phreaks calmly repeated their story to the operator,
asked her not to place calls to Santa Barbara and told her not to worry.
jWithin minutes the phreaks ahd newspaper and television reporters, FBI
agents and police officers calling from all over the country. Hundereds of
anxious people who had heard about the "melt down" phoned to check on re-
letive and friends. The phreaks told the callers that they had reached
the National Guard base 50 miles away where the disaster site and that they
were tied into emergency circuits. After about an hour the two became
frightened by the chaos they were causing and restored the phone system to
normal. They were never caught.
Heavy stuff. And it's tempting to think of these phones phreadks as purveyers
of electronic guerrilla warfare. It's tempting to think of them as McLuhanist
anarchist infiltrating the all seeing, all knowing government-by-data-bank that
rules our lives. Some phone phreaks even think of themselves that was. It's
a teimpting point of view, but its probally all wrong. PHone phreaks are some-
thing much more American than that. They're classic Yankee basement tinkerers,
backyard ivestors, the Eli Whitneys, Orville Wrights and Hanry Fords of our
age. Only instead of tinkering with mechanical or even electrical stuff,
phone phreaks are tinkering with vast computerized networks of infromation.
And the difference between them and their folk-hero predecessors is that you
can't build a world-wide electronic data matrix out of buggy parts in the barn.
The phone phreaks brand of tinkering requires equiptment so extensive that no
one person or even one corporation could put it together singlehandedly. They
need the cooperation of the entire industrialized world to do their puttering
around. And since that kind of cooperation is rarely fourthcoming to pimply
sixteen year olds on the upstairs extension, they go out and get cooperation
wherther anyone wants to give it to them or not. Natrurally some mischief
takes place along the way.
Almost ten years ago strange electronic wizards began to emerge in various
corners of the United States. They called themselves "phone phfreaks" and
they had figured out how to re-create the sounds signals that trigger the
phone companys switching equiptment, allowing them to place calls to any-
where in the world for free. Eventually they were able to master all the
circuit systems of AT&T and its affiliates. They learned how to tap
phones internally through the phone company's own wires, how to retrive
information from phone-relayed computer terminals, including the FBI's
National Crime Information data bank and even how to penetrate AUTOVON
(Automatic Voice Network), and the top-secret red-alert military phone
network. But that's not _really_ what phone phreaking is all about. Wit-
ness, for example, the life of John Draper, better known as Captain Crunch.
Captain Crunch, an ex-Air force radar technician ,was, for years, they most
famouse of the phone phreaks and their de facto spokesman. He was even pro-
filed by Ron Rosenbaum in Esquire. He may also have a bettter working know-
ledge of the world's phone systems than anyone else alive.
In 1976 the Captain was entrapped by a phone phreak turned FBI infromer and
was incarcerated, appropriately, in the Lompoc Federal Prison Camp--one of the
first Americans to go to jail for phone phreaking. These days, though he's
not yet 30, Crunch is retired. He's a sloppy-lookin guy who dresses in non-
descript, unpressed clothing. And his stringy black hair and horned-rimmed
glasses would make him look like a mad scientist, except that his hobby is
weightlifting.
The Captain's career as Kind of the Circuits began with a 16-year old blind
friend. Denny and some fellow campers discovered they had a shared interest
in the Bell System. For the first time information was passed from one phone
phreak to the another. The blind kids started their own organization. Phone
Phreaks Interantionsl, which today has members all over the country. Phone
phreaking was a way out of their loneliness, a special way to make contact
with another human voice. Even today nearly half of the top phone phreaks
are blind.
In February 1970, Denny discovered that the small plastic whistle then found
in every box of Captain Crunch breakfast cereal had a miraculous quality--
the whistle prduced, exactly, the 2.600 cycles-per-second tone that "tells"
the phone company's long distance switching equiptment that a line is not in
use, even though that line is being help open by the caller. Using the 2.600
cycle signal could call long distance anywhere and not be charged. Denny
told John Draper, who was skeptical. But after a quick trip to a pay phone
Draper was conviced, and Captain Crunh was born.
Denny and the Captain began using their whistles to call friends throughout
the country. As the only sighted phone phreak, it was Crunch's task to make
"whistle trips" with Denny and his blind friends. Every Satruday the Capt.
would drop off Denny and two other 16-year-old blind kids at a pay phone
booth, then go to a friend's house. A few hours later the kids would phone
him and say, "You can come back now. We're cold and tired." and the Capt.
would pick them up.
Captain Crunch and his friends learned to do a lot with the whistles. They
would call pay phones in London's Waterloo Station just to talk to strangers
about the weather. Or call South Aftrica to hear the time. And they could
"mute" incoming long-distance calls so that no one would be charged. But by
1972, when he was arrested for whistling calls to Australia, the Captian had
graduated to more sophisticated toys.
Next to a Captain Crunch whistle, the simplest phone phreak device is a Black
Box, which provides an "on Hook" signal to the phone company while a call is
being made, thereby stopping the operation of the billing equiptment. A 3,000
-ohm resistor drops the level of the currnet going through the phone to below
the level that activated the billing equiptment. But a Black Box can be easily
detected, so Captain Crunch seldom used it.
There are also Red Boxes, small handheld devices that simulate the sound of
coins dropping into a pay phone. They are usually used for short calls and
are also easily detected. The Captain says that most phone phreaks don't
bother with Red Boxes because they arn't useful in obtaining information-
and the pure joy of obtaining and trading information is the heart of phone
phreaking.
The most sophisticated way to gain entrance to the Bell system is with a
Blue Box, which provides access to special operators and remote codes. Blue
Boxes are electronic, multifrequency sound devices that resemble pocket
calculators. They can reproduce the complete range of tones that the phone
company uses, in various combination, to give instructions to its computer
network. Blue Boxes "speak" directly into the mouthpiece of a phone. They
have touch-tone buttons that substitute for the regular telephone dial, and
they provide a phone phreak with the same dialing privileges that a long
distance operator has. The phreak can then direct-dial special test-board,
route and overseas operators.
"A Blue Box allows the phone phreak to direct-dial into any foreign country
that is set up to handle overseas calls", say Captain Crunch. "for the first
time, it opens that country up to the prying and probing of the American phone
hacks."
The Captain says he's accomplished many elaborate feats with Blue Boxes and
similar devices. He used to have a switch-board with computerized Blue Box
equiptment in the back of his Volkswagen bus. He would drive into the country
pull up beside a remote pay booth, hook into the phone and spend hours sending
calls around the world clockwise several time, from San Fransisco to London
to Sydney, Australia, and back to San Fransisco. Then he sent it around the
world counterclockwise a few times. In all, the call covered the equivalent
of half the distance to the moon. During on exceptionally busy week, he
reportedly made thousands of long-distance calls.
On another occasion he phoned hiself from completely around the world. Using
two adjacent pay phones, he routed his call from the first phone through
Tokyo, New Delhi, Athens, Pretoria, Sao Paulo, London, New York and finnaly
to a california operator who rang the second phone. He yelled "Hello!" into
the first phone and 20 seconds later he heard his own voice dimly through the
worldwide electronic maze, a dozen tremulous echos of "Hello!" ringin in his
ear. He recalls that the echo was "far out" but he could barely hear himself
talking.
The developement of the Blue Box fostered an underground network oh phone
phreaks with names like Peter Perpendicualr Pimple, Al Bell and Tom Edison.
In the rigid social stratification of the phone phreak community, the elite
are referred to simply as "the top ten phone phreaks."
"We can tell, just by dialing into an exchange, the kinds of equipment being
used," says the Captain. "The top ten phone phreaks have techniques they've
developed over a long period of time of obtaining information continuously."
They are after _codes_, numbers that go into WATS lines when dialed and give
toll-free access anywhere in the country, or numbers that plug the phreak into
a computer system. One dialed code might produce a busy signal. But if
several phone phreaks dial the same busy signal using this code, they can
talk over it and, in effect, have a conference call.
"It's a crude way of communicating." the Captain claims. "You hear the ob-
noxious busy tones beeping every two seconds. But its a way of communicating,
and that's what phone phreaks are tryin to do: develop techniques of com-
municating by using circuits the phone company doesn't.
"Nobody is bothered by this. The top ten phreaks have a strong moral code-
they never hurt anybody. They constantly supply oodles and oodles of infor-
mation down through the chain of command to the lower-echelon phone phreaks.
Directly below the top ten in the phone phreaks pecking-order are the
pseudo-phreaks. They know how to make Blue Boxes but lack the sophistication
of the top ten. Below the Pseudo-phreaks is the proletriat of phone phreaks
who use Blue Boxes _only_ to make free calls. The Captain becomes agitated
when he talks about them: "These are teh lowest scum in the whole phone phreak
community. These are people who build Blue Boxes to sell to the Mafia."
The lumpen proletariat of phone phreaks the Captain calls "loophounds." A
loop is a pair of numbers that connect two phreaks when one phreak calls the
first number and another phreak (who may be thousands of miles away) dials
the second number.
Loophounds just sit on loops. "Captain Crunch says in a disgusted tone. "They
are handicapped kids or high school kids, and they're either excessively fat
or excessively skinny. They're social rejects who just sit on loops to meet
people. I feel sorry for them. But I've met a lot of people through loops. I
get on them just to find out who's on them. I was on a loop in the New York
city area, and I ran across several mentally retarded people, including a
guy who is 28 but has the mentality of a 6 year old kid".
The phone phreak eleite uses three basic method to obtain the all-important
code information. In the first method, called "Scanning" after a famous
British phone phreak, the phreak painstakingly scans all the possible number
combinations, determining which combinations are codes and what those codes
do. Using this technique, Captain Crunch found out that the phone company's
routing codes always began with 0 or 1 in combinations from 000 to 199. He
also discovered the code route to the autoverify circuits that are used by
operators to see if a line is busy and can be used by phone phreaks to tap a
phone. "Scanning is a thorough technique," the Captain explains. "It leaves
no stone unturned, and it's vertually undetectable. It's slow and cumbersome,
but it reveals an incredible amount of information.
Crunch refers to the second method of finding codes as "social engineering",
which mean bullshitting: "Say you need a code to reach a central office. You
phone a test board and say you're with a test board in another city and you
need a certain code. The phone company guy thinks you're also with the phone
company and he'll give you the code."
The third way to get codes is through an inside soure, usually an operator.
"An inside sourse," says the Captian, "Can determine whether or not our line
is being tapped, inform you if the phone company is onto your game and supply
you with _endless_ information. Of course the sourse could also be an infor-
mer, paid to give you information to trip you up. "The Captain has gotten most
of his information from scanning or social engineering, but much of the infor-

View File

@@ -0,0 +1,87 @@
This file is from /\/\
/ /\ \etronet BBS
"The Intelligent phreaks choice"
301-944-3023
THE HISTORY OF PHREAKING
------------------------
DID YOU KNOW THAT PHREAKING STARTED FROM THE MOST UNLIKELY SOURCE......
CAP'N CRUNCH CEREAL!
YES, IN THE 1960'S A TOY WHISTLE WAS PLACED IN THE FAMOUS CEREAL.
UNFORTUNATELY (NOT FOR US), THE WHISTLE GENERATED 2,600 CYCLE-TONE, DUDE! A
YOUNG MAN WHO HAD JUST ENTERED THE USAF AS A RADIO TECH., WAS FASCINATED WHEN
HE DISCOVERED THAT BY BLOWING THE WHISTLE INTO THE FONE AFTER DIALING ANY
LONG-DISTANCE # AND HEAING THE DIS- CONNECT SIGNAL, THE TRUNK WOULD REMAIN OPEN
WITHOUT TOLL CHARGES ACCOUNTING, AND FROM THEN ON, ANY NUMBER COULD BE DIALED
REPEATEDLY. 800 #'S (INWATS) , WERE LATER USED AS THE STARTER CALL TO AVOID
ANY CHARGES. HE USED THIS TO CALL HOME WHILE STATIONED IN ENGLAND.
THE CAP'N PRACTICED FOR YEARS. HE REPORTEDLY WOULD PLACE CALLS AROUND THE
WORLD TO HIMSELF. HE WOULD THEN TALK AND HERE HIMSELF 20 SEC. LATER. HE WENT
ON TO DISCOVER THE OPERATOR CODES INCLUDING AUTO-RELAY (OPERATOR INTERUPT, OR
VERIFY BUSY). THUS, EAVESDROPPING INTO CONVERSATIONS. HE CLAIMED TO LISTEN IN
ON THE FOLLOWING: 1. PRES. OF THE USA 2. FBI WHEN IT WAS AFTER PATTY HEARST
3. THE SECT. OF DEFENSE 4. AND VARIOUS MILITARY BASES THRU AUTOVON.
(EXPLAINED IN ANOTHER VOL.)
CAP'N CRUNCH WAS THRUST INTO THE SPOTLITE WITH AN ARTICLE IN ESQUIRE.
THE TERM "BLUE BOX" CAME ABOUT BECAUSE THE FIRST ONE THAT WAS CAPTURED WAS
THAT COLOR. THE CAP'N SOON WENT BEYOND THE SIMPLE WHISTLE TO MORE COMPLICATED
DEVICES.
THOUSANDS OF PHREAKS CHANCED UPON AN UNUSED TELEX TEST BOARD TRUNK LINE IN A
4A SWITCHING MACHINE IN VANCOUVER. DIALING AREA CODE 604 FOLLOWED BY 2111
PLACED YOU IN AN INTERNATIONAL PARTY LINE.
SOON MORE SOPHISTICATED BOXES FOLLOWED. IN '77, THE PHONE COMP. INSTALLED
THE FIRST OF THEIR MORE SOPH. EQUIP. IT HAS INCREASED THE RISK, BUT BY NO
MEANS STOPPED IT. BELL NOW HAS A SYSTEM THAT WILL PRODUCE A RECORDED VOICE
TELLIN YA TO STOP, RECORDS PART OF CONVERSATION, AND BILLS THE CALL TO THE
NUMBER. THOSE NUMBERS ARE HEN PRINTED OUT WITH THE TIME AND DATE.
BELL NOW HAS 74 CENTRALIZED TICKET INVESTIGATION (CTI). ONE OF THESE ALONE
PERFORMS 7000 INVESTIGATIONS A DAY.
CRUNCH WAS CAUGHT A NUMBER OF TIMES, INCLUDING A TOP SECRET MANUAL IN HIS
CLOSET DESCRIBING THE NCIC. (NATIONAL CRIME INFORMATION CENTER: COVERED
LATER). AFTER 3 CONVICTIONS AND A FEW YEARS IN JAIL, HE PACKED IT UP FOR A JOB
IN A SOFTWARE COMPANY OR SOMETHING LIKE THAT. BUT DO YOU BELIEVE THAT?
SOMEWHERE, SOMETIME, I HAVE AN EERIE FEELING THAT HE IS OUT THERE. THE CAP'N
WAS ALWAYS JUST ONE STEP IN FRONT, AND I'M SURE HE'S STILL THERE.
SO NEXT TIME YOU BLUE BOX OR PHREAK, THINK OF THAT GUY LIVING NEXT DOOR, WHO
KNOWS.
***************************************
TRIVIA
***************************************
JOE THE WHISTLER, BLIND SINCE BIRTH, WAS ABLE TO WHISTLE THE PERFECT TONES
WITHIN THE 2% ERROR RANGE ESTABLISHED. REPORTEDLY PHREAKS WOULD CALL HIM UP TO
TUNE THEIR BOXES. NOW WORKS FOR THE FONE COMPANY AFTER A, SHALL WE SAY, AN
ILLUSTRIOUS CAREER.
***************************************
RECORD PHREAK
***************************************
UNKNOWN PHREAK CALLED:
1. PRESIDENT
2. ARMY COMMANDANT IN RUSSIA
3. USAF SAC SQUADRON ALMOST CAUSING AN AIR ALERT.
BIGGEST CALL I KNOW OF WAS EXECUTED BY HIM: $19,000 12 HOUR CALL TO....
INDONESIA!
***************************************
LOOK FOR FUTURE ISSUES BROUGHT TO YOU BY THE VKR AND CRAZY PLATO.
THE OFFICIAL PHREAK FILE OF THE '84 OLYMPICS.
LONG LIVE MA BELL! (SARCASM)
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


Binary file not shown.

View File

@@ -0,0 +1,121 @@
The South Pole..........[312] 677-7140
:=+---------------------------------+=:
I Basics of Phone Phreaking I I
I by Long John Silicone I
I Oct. 1983 I
:=+---------------------------------+=:
A rather broad subject to attack, I must say. The debate over just what to
discuss has occupied my thoughts for many an hour. Perhaps if I approach this
subject legally, in an informative manner that is, my problems might be solved.
Nonetheless, here it goes.
Ma Bell can rattle on for hours on methods for saving money on your long-
distance calls. Unfortunately, most people still think that AT&T is the only
game in town for long-distance service.
What Ma Bell won't tell you is that there comes a time in a telephone user's
life to leave Mom. There are now several companies which compete with AT&T in
the long-distance market: MCI, Southern Pacific's "SPRINT" (which is currently
being purchased by General Telephone and Electronics Company), U.S.
Transmission System'S "Longer Distance" (a susidiary of ITT), Western Union's
"MetroFone", and Satellite Business System's "Skyline." They all boast of
opportunities for large savings on the long-distance portion of your monthly
phone bill.
Someone unaquainted with these new competitors, which are called
"specialized common carriers" (or SCCs), might ask, "Isn't it a duplication of
effort for a lot of different companies to be running long- distance lines all
over the country? And how can a company that is just a fraction of the size of
AT&T provide a similar service for a lower price?" The answer is that these new
competitors have built their base by concentrating on routes where long-
distance traffic is heavy, so the cost of carrying each call is relatively low.
Also, the competitors transmission equipment consists almost exclusively of
computers and microwave links, which they have built themselves or which they
lease from other carriers. Thus, these networks can be less expensive to
construct and maintain then the cable-based systems that Bell has used for
years. There's also another class of competitors called "resellers", who lease
and resell both AT&T's and other carriers' lines. More about resellers in a
moment.
Initially, most of the SCC competitors could reach only a limited number of
cities. But as they've grown, the number of cities served by their microwave
networks has steadily in- creased, and today most of the SCC's reach 70 percent
or more of all area codes in the United States and continue to increase the
number of cities served every month. Sattelite Business System's "Skyline" is
the first to offer service to the entire U.S. over its own network. The other
SCC's are phasing in uninversal service by using Bell's WATS system. But while
users of these services will soon be able to call 'to' anywhere in the U.S.,
they will still be able to call 'from' only a limited number of places, usually
the major metropolitan areas.
To use any of these SCC services, you currently must have a Touch-Tone
service or the equivalent Tone gener- ator. (This is changing as a conse-
quence of the AT&T/Department of Justice divestiture agreement, which will
require the newly independent local phone companies to grant all carriers
"equal access" at equal rates.) There is an additional monthly charge by the
phone company for Touch- Tone service (check the "Customer Guide" in your local
White Pages, or call your Bell business office for details); however, you don't
have to rent or buy a Bell telephone to get Touch-Tone service. (Hurrah for
K-mart)
If your local phone lines already are equipped to handle both rotary and
Touch-Tone calls, you may be able to avoid the need for Touch-Tone service in
this way: using a regular rotaray phone, you place a call to the SCC's
computer; then, to 'converse' with the computer simply use a touch pad conver-
ter or a tone generator, held up to the mouthpiece of your rotary phone.
It's reasonably easy to use the SCC systems. You must first dial a seven
digit local phone number (an 'access' number), which connects you to the SCC's
computer. When you hear a tone on the other end, you then dial a five-or
six-digit number (an 'authorization code') that tells the computer you're an
authorized user and to bill your account for the call. Immediately after
dialing the authori- zation number, you dial the area code and number you wish
to call. The SCC's computer in your area then sends your call out over its own
long-distance network to a computer in the area you called; the computer on the
other end then hooks your call into the local phone network to reach whomever
you've called. Each month you recieve a bill from your SCC (seperate from your
reg- ular phone bill) detailing your calls and billing you for the service
charges plus your calls.
Note: This varies on occasion, prime example being "Longer Distance".
Instead of the standard code- number format, they elected the number-code
input.
"SPRINT" uses a six-digit code followed by a two digit travel code.
A moment of speculation is due..
What would happen if you entered someone elses 'access code', then dialed
the destination number? The answer is usually Grand Larceny; however, it is
quite possible since only the general place of origin is possible to detect on
a call placed without notice.
For information on the competitive long-distance services:
MCI : Write MCI, MCI Building, 17th and Streets, NW Washington, D.C.
20036. Call toll free (800) 521- 8620 or in Michigan (800) 482- 1740.
"Execunet"
SBS: Write SBS, John Marshall Building 8283 Greensboro Drive, McLean, VA
22102. Call toll free (800) 698- 6900. "Skyline"
ITT: Write ITT, U.S. Transmission Systems, INC., P.O. Box 732, Bowling
Green Station, New York NY. 10004 Call toll free (800) 438-9428 or in New York
(212) 797-2511. "Longer Distance"
SPC: Write SPC, One Adrian Court, Burilingame, CA. 94010, or call (800)
521-4949 or in Michigan, (800) 645-6020. "SPRINT"
WU : Write WU, 1 Lake Street, Upper Saddle River, NJ. 07458. Call (800)
325-6000 for the number of your local service office. "MetroFone"
A final note, don't do anything I wouldn't. And above all, if you do:
DON'T GET CAUGHT.
Yours in trade,
Long John Silicone
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


Binary file not shown.

View File

@@ -0,0 +1,76 @@
"Phreakin' USA"
When you think "phone phreak," what kind of mental picture do you get? A
teenager holding a sound-making box up to a phone? Or someone who uses false
calling card numbers? The phone companies lose an estimated $80 million each
year on fraudulent phone calls (compared to a total budget of over $27
billion!), but only a minute fraction is attributed to the above cases. So who
is causing all these losses?
A phreak is officially defined as "One who causes information to be passed over
the phone without the phone company receiving due compensation." This applies
to more cases than most people expect. For example, calling a "ring-back"
system long distance just happens to be illegal, because you are passing
information (that you want to use the modem line) without paying the phone
company! This law is, of course, not enforcible, and even if it was, why
take someone to court over a matter of twenty cents lost? It's also illegal to
make a person-to-person call to yourself in order to let your spouse know you
arrived at a destination safely! Likewise, calling someone collect at a pay
phone, calling an operator to say you lost a dollar in a pay phone when you
didn't, and completing a call with another person over "test lines" (test lines
are in all exchanges, and if two people dial consecutive test lines, they may
talk to each other without any charge) are all illegal! Spreading all this out
along the entire phone network, it suddenly becomes a matter of millions of
dollars lost each year, even without those little boxes that simulate operator
tones!
However, the common image of the phreak is someone who plays with red, black,
and blue boxes to somehow gyp the phone company into allowing a free call.
Each of these boxes, named after the color of the originals, has a different
function, and many times the boxes are confused with each other. A red box
is a device meant to be used only at pay phones. It simulates the sounds
of various coins dropping into the phone. When some pay phones hear this
sound, they automatically assume the a coin actually has dropped into the phone
and registers it. A black box is a device which converts any phone jack it is
hooked up to into a toll-free number. If Larry hooked up one, I and everyone
else could call the CPTBBS as if it were an 800 number, yet Larry would not
have to pay the excessive charges that an 800 number demands. With the
sophisticated scanning equipment the phone company has today, however, black
boxes can be detected after a while.
The most infamous of the colored boxes is the blue box, which mimics the
operator tones to allow free calls from any phone. They cost only $25-$50 to
make, but can sell for up to $3000! Here's how it works: a phreak first dials
a no-charge number, such as an 800 number for a large corporation (if he wants
to add a little irony, he'll make it AT&T's 800-number!). The number rings
once, and then the phreak generates a pure 2600-cycle tone. This tells the
phone equipment that the call has dislodged and to be ready for the next call,
though the phreak remains on-line! The phreak then gives another tone telling
the equipment that a toll call is coming through (though in actuality it is
not). The phreak dials the number and is connected, but the billing equipment
never starts! When the phreak eventually hangs up, the records will only show
that he made a toll-free call.
It would cost the phone companies approximately one billion dollars to change
the switching system so that the blue boxes would not work, so instead they
decided to invest in a scanning system that records all questionable calls.
Now that scanning system is so quick that it's almost suicide to use a black
or blue box at home. Phreaks can still get away with using blue boxes at
pay phones if the call is short, but that's about all. If someone is found
using a blue or black box at home now, the box is immediately confiscated, and
the phreak's service may be possibly disconnected.
If someone offers to sell you one of these colored boxes for the standard
ridiculous price, I'd advise against it. You stand to lose much more than you
would gain in the long run.
The Wanderjahr
Distributed in part by:
Skeleton Crue 415-376-8060 located out of Moraga, California.
!!Get on the band wagon befor it RUNS YOU DOWN!!
Headquarters for Computer Hackers and Anarchists to Overthrow the State
(CH&AOS)
[37] Tfiles: (1-49,?,Q) :

View File

@@ -0,0 +1,55 @@
Phreak Sysops & US Law
----------------------
HI THERE,
LOOK, UNDER CURRENT U.S. LAW THE EXCHANGE OF INFORMATION IS LEGAL (REMEMBER
GUYS, FREEDOM OF SPEECH!) THE ONLY THING THEY CAN GET ON YOU IS AIDING AND
ABETTING A FELONY (WHICH PHREAKING IS - A FELONY.) HOWEVER, A DISCLAIMER ON THE
BOARD TAKES OUT A LOT OF THE BLAME. ALSO, TO PROVE IN COURT THAT YOU ARE GUILTY
BEYOND A REASONABLE DOUBT THEY'VE GOT TO PROVE THAT YOU WERE THE ONLY PARTY
AIDING AND ABETTING... IMPOSSIBLE! TO PROVE THAT, THEY'D HAVE TO PROVE THAT
SOMEONE CALLED YOUR BOARD, GOT INFORMATION FROM YOUR BOARD, CALLED NO OTHER
BOARDS, AND PHREAKED USING THAT INFORMATION... QUITE IMPOSSIBLE PRACTICALLY.
ALSO, I WOULD SUGGEST THAT ACCESS TO PHREAK BOARDS BE GOVERNED BY THE SYSOP AND
THAT AS A RESTRICTION THE PROSPECTIVE USER MUST ANSWER THE FOLLOWING QUESTION
"YES": I HAVE NO TIES OR CONNECTIONS WITH ANY LAW ENFORCEMENT AGENCY OR ANY
AGENCY WHICH WOULD ENFORM SUCH A LAW ENFORCEMENT AGENCY OF THIS BOARD, NOR HAVE
I EVER OR WILL I EVER REVEAL ANY IMFORMATION ABOUT THIS BOARD OR GAINED TO THIS
BOARD TO ANY LAW ENFORCEMENT AGENCY."
=======================================
IF THE PROSPECTIVE PHREAK SAYS YES TO THAT STATEMENT LET HIM ON... IF HE
TURNS AROUND AND REPORTS THA INFORMATION YOU CAN HAVE IT THROWN OUT OF COURT!
(ON MULTIPLE GROUNDS: ENTRAPMENT, VIOLATION OF CIVIL RIGHTS- THIS IS A GREAT
DEFENSE SINCE ANY EVIDENCE GAINED THROUGH A VIOLATION OF CIVIL RIGHTS IS
INVALID.... AND ANY EVIDENCE GAINED BECAUSE OF THAT INVALID KNOWLEDGE IS
INVALID ALSO!) HOWEVER, YOU *MAY* HAVE TO HAVE A WRITTEN SIGNATURE FOR THIS
ALTHOUGH I DON'T BELIEVE SO... I CAN CHECK THAT LATER.
LOOK SYSOPS, LETS NOT GIVE IN TO THE BIG BULLYS (SPRINT, MA, ETC.) LET'S GO
OUT THERE AND PROVE THAT THE U.S. CONSTITUTION STILL MEANS SOMETHING AND THAT
WE STILL CAN HAVE FREE SPEACH.
YOURS,
STAR WARRIOR
----^-------
P.S. DROP ME A LINE IF YOU WANT MORE INFO - I'VE GOT CONNECTIONS IN THE LEGAL
FIELD AND CAN GET IT!!!!!!!!!!!!!!!!!!!!!!!!!!!! P.P.S. EVIDENCE GOTTEN BY
TAPPING PHONES IS ILLEGAL TOO!
=======================================
ON THE P.P.S. I MEANT THAT IF THE PHONE TAP OR MONITERING IS NOT SPECIF-
ICALLY AUTHORIZED BY A WARRANT IT IS ILLEGAL EVIDENCE. ALSO, IF THEY TAP YOU
BASED ON EVIDENCE OBTAINED BY READING A B.B.S. MESSAGE THEY CAN PROBABLY BE
THROWN OUT SINCE THEY HAD NO PROOF OF THE AUTHENTICITY OF THAT EVIDENCE
INDICATING YOU AS A SUSPECT.
LATER
STAR WARRIOR
------------
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,167 @@
From TAP Jan-Feb 1984 Issue #90
The hobbyists newsletter for the Communications Revolution
Article: Your Rights as a Phone Phreak
By Fred Steinbeck
Uploaded and reformated to 80 columns by Elric of Imrryr
Death to 40 column rodent file manglers!
"Oh, I'm not worried. They can't tap my line without a court
order." Ever catch yourself saying that? If so, I'll wager you
don't know too much about the laws that can prove to be the
downfall of many a phone phreak. But you are wagering your
freedom and money that you do know. Odds are you don't. At
least, I didn't, and I had a very painful experience finding out.
Let's take a look at Federal law first. Section 605 of
Title 47 of the United States Code (i.e., Federal law)
forbids interception of communications, or divulgence of
intercepted communications, except by persons outlined in
Chapter 119, Title 18 (a portion of the Omnibus Crime Control
and Safe Streets act of 1968). Section 2511 (2) (a) (i)
of this section says:
"It shall not be unlawful under this chapter for an
operator of a switchboard, or an officer, employee, or agent of
any communication common carrier, whose facilities are used in
the transmission of a wire communication, to intercept, disclose,
or use that communication in the normal course of his employment
while engaged in any activity which is a necessary incident to the
rendition of his service or to the protection of the rights or
property of the carrier of such communication...."
The authorization stated in that subsection permits agents
of communication common carriers (i.e. Telcos) not only to intercept
wire communications where necessary "to the protection of the
rights or property of the carrier", but it also authorizes such
an agent to "disclose or use that communication." Fun, huh?
That's not all.
In the case United States v. Sugden, a case which was
upheld by the Supreme Court, the following ruling was made:
"For and unreasonable search and seizure to result from the
interception of defendant's communication, he must have
exhibited a reasonable expectation of privacy. Where, as here,
one uses a communication facility illegally, no such expectation
is exhibited."
This means that when you make a free call, you have waived your
right to privacy. In other words, without pay, your rights
evaporate.
The only limitation upon monitoring and disclosure is
that it must not be excessive. For example, in Bubis v.
United States, the phone company monitored all of the defendant's
phone calls for a period of 4 months. The defendant's gambling
activities were revealed by this monitoring, and furnished to
the U.S. Attorney's office. This resulted in the defendant being
prosecuted by the District Attorney for violation of the
federal laws against using interstate telephone facilities for
gambling. The court acknowledged the right of the phone company
to protect its ass(ets) and properties against the illegal acts
of a trespasser, but ordered the evidence supressed because :
(1) The extent of the monitoring was unnecessary
(2) The defendant's prosecution for violation of the gambling
laws had "no relationship to protecting the telephone company's
property."
This was before the Omnibus act. As it happens, though,
the Omnibus act was intended to reflect exsisting law, and
therefore, change nothing (pretty good huh?). In United States
v. Shah the court said (refering to the situation of inadmissible
evidence in U.S v. Bubis), "Thus it would appear that if the tape
recordings of the defendant's conversations had been limited by the
phone company to establish that the calls were in violation of
the subscription agreement (i.e. were illegal) and to the
identification of the person using the phone, and FOR THOSE
PURPOSES ONLY, then the tapes would have been admissible
against the defendant." The court went on to say that this was
indeed the case in United States v. Shah, as the phone company
only monitored for 7 days, and the tapes were of 1 minute call
duration at the beginning of any illegal call.
So what can the do? Well, several things. First, they
can put a dialed number recorder (DNR) on your line if they
suspect toll fraud. The most common can do the following: print
touch-tone (c) digits sent, print MF digits sent, record presence
of 2600hz on line, and activate a tape recorder for a specific
amout of time (generally 1-2 min) when some specific event occures,
such as 2600hz being blasted into the line.
DNR's seem to be fairly standard procedure. That is,
almost all the Telcos use them when they suspect fraud. As
long as they do not record the entire conversation, or
conversations that are legal, there is nothing illegal about DNR's.
DNR's are also used to detect fraud using specialized common carriers
(e.g.,Sprint, Metro etc.),by watching you dial the local dialup number,
followed by your (illegal) access code and destination number.
They do not need a court order to place a DNR on your line.
If they can record voice on your line, they can record data
just as easily. So if you call bulletin board systems and have a
DNR on your line, beaware that any logins you have made have
probably been watched by the phone company, and they probably
know any passwords you have used.
The purpose behing all this DNR bullshit is to establish
your identity. I suppose a possible defense against this is
simply not to talk for 3 minutes after the connection is
established. Might be kind of hard to do in practice,
however.
Contrary to popular belief, TPC does not make "midnight
visits" to your house to arrest you. Why should they? A
judicious application of their motto, "Reach out and put the
touch on someone", means that they simply call from their
office. If they call, try to draw them out as much as possible
in a phone conversation. That is, they will keep muttering
about how they "have evidenc". Find out what kind of evidence.
Do not expect them to be forthcoming with everything. They will
almost certainly have more than what they tell you.
Their standard position is to prosecute all offenders,
although this varies depending on the severity of the
situation, as well as the age of the offender. They tend to
always prosecute adults, while they are receptive to pre-trial
offers made by juveniles. They may want to talk with you in person,
ostensibly to give you a chance to explain why the 300 calls to
the local Sprint node came from your line. Accept this offer.
Often they are more generous with their evidence in person than
they are over the telephone.
If you do meet with them in person, BRING A LAWYER.
Lawyers are expensive, but they are well worth the price.
They know the law, while you don't. The investigators TPC employs
are seasoned people, and usually make few mistakes, legal or
technical. However, a good lawyer can spot any legal fuckups
they might have made, and you shoud be able to find any technical
ones.
In talking with them, be civil (i.e., say hello, talk
about the weather etc.) but say nothing pertinent to your case.
They will often tell a large part of their evidence without any
prodding, and at the end, will ask you some questions. YOU ARE
NOT OBLIGATED TO ANSWER ANY OF THESE QUESTIONS.
At the very first signs of trouble, stop making free calls,
and move anything illegal you have to a friend's house. They may
not get a search warrant, but better safe than sorry.
TPC can make life miserable for you, and they don't often
prosecute unless they're sure of winning, which is pretty much
always. Therefore, you must make it either not worth their while
to prosecute, or worth their while not to prosecute. The best
bet is to try to get them to settle before going to court by
offering reimbursement and being nice to them (act sorry). If
you appear genuinely sorry, they may not prosecute.
Failing that, be a low-down bastard and make as much
trouble for them in court as possible. Just remember:
technology is on your side, and thats better than God.
We T

View File

@@ -0,0 +1,340 @@
* * THE PHREAKER'S BIBLE * *
HOW TO BE A REAL PHREAK
IN THE PHONE PHREAK SOCIETY THERE ARE CERTAIN VALUES THAT EXIST IN ORDER TO
BE A TRUE PHREAK, THESE ARE BEST SUMMED UP BY THE MAGICIAN: "MANY PEOPLE
THINK OF PHONE PHREAKS AS SLIME, OUT TO RIP OFF BELL FOR ALL SHE IS WORTH.
NOTHING COULD BE FURTHER FROM THE TRUTH! GRANTED, THERE ARE SOME WHO GET
THEIR KICKS BY MAKING FREE CALLS; HOWEVER, THEY ARE NOT TRUE PHONE PHREAKS.
REAL PHONE PHREAKS ARE 'TELECOMMUNICATIONS HOBBYISTS' WHO EXPERIMENT, PLAY
WITH AND LEARN FROM THE PHONE SYSTEM. OCCASIONALY THIS EXPERIMENTING, AND A
NEED TO COMMUNICATE WITH OTHER PHREAKS ( WITH- OUT GOING BROKE), LEADS TO
FREE CALLS. THE FREE CALLS ARE BUT A SMALL SUBSET OF A >TRUE< PHONE PHREAKS
ACTIVITIES.
THE TEN COMMANDMENTS
REPRINTED FROM TAP ISSUE #86. (TAP, ROOM 603, 147 W 42 STREET, NEW YORK, NY
10036. SEND A SASE FOR THEIR INFO SHEET "WHAT THE HELL IS TAP?" AND TELL
THEM THAT BIOC AGENT 003 TOLD YOU ABOUT IT.)
THE PHONE PHREAK'S TEN COMMANDMENTS
I. BOX THOU NOT OVER THINE HOME TELEPHONE WIRES, FOR THOSE WHO DOEST MUST
SURELY BRING THE WRATH OF THE CHIEF SPECIAL AGENT DOWN UPON THY HEADS.
II. SPEAKEST THOU NOT OF IMPORTANT MATTERS OVER THINE HOME TELEPHONE
WIRES, FOR TO DO SO IS TO RISK THINE RIGHT OF FREEDOM.
III. USE NOT THINE OWN NAME WHEN SPEAKING TO OTHER PHREAKS, FOR THAT EVERY
THIRD PHREAK IS AN FBI AGENT IS WELL KNOWN.
IV. LET NOT OVERLY MANY PEOPLE KNOW THAT THY BE A PHREAK, AS TO DO SO IS
TO USE THINE OWN SELF AS A SACRIFICIAL LAMB.
V. IF THOU BE IN SCHOOL, STRIVE TO GET THIN SELF GOOD GRADES, FOR THE
AUTHORITIES WELL KNOW THAT SCHOLARS NEVER BREAK THE LAW.
VI. IF THOU WORKEST, TRY TO BE A EMPLOYEE, AND IMPRESSEST THINE BOSS WITH
THINE ENTHUSIASM, FOR IMPORTANT EMPLOYEES ARE OFTEN SAVED BY THEIR OWN
BOSSES.
VII. STOREST THOU NOT THINE STOLEN GOODES IN THINE OWN HOME, FOR THOSE WHO
DO ARE SURELY NON-BELIEVERS IN THE BELL SYSTEM SECURITY FORCES, AND ARE NOT
LONG FOR THIS WORLD.
VIII. ATTRACTEST THOU NOT THE ATTENTION OF THE AUTHORITIES, AS THE LESS
NOTICABLE THOU ART, THE BETTER.
IX. MAKEST SURE THINE FRIENDS ARE INSTANT AMNESIACS AND WILL NOT REMEMBER
THAT THOU HAVE CALLED ILLEGALLY, FOR THEIR COOPERATION WITH THE AUTHORITIES
WILL SURELY LESSEN THINE TIME FOR FREEDOM ON THIS EARTH.
X. SUPPORTEST THOU TAP, AS IT IS THINE NEWSLETTER, AND WITHOUT IT, THY
WORK WILL BE FAR MORE LIMITED.
CN/A NUMBERS
CUSTOMER NAME & ADDRESS BUREAUS EXIST SO THAT AUTHORIZED BELL EMPLOYEES MAY
OBTAIN THE NAME & ADDRESS OF ANY CUSTOMER IN THE BELL SYSTEM BY GIVING THE
CN/A OPERATOR THE CUSTOMER'S TEL. # ALL CUSTOMERS ARE MAINTAINED ON FILE
INCLUDING UNLISTED #'S. THESE BUREAUS HAVE MANY USES FOR PHREAKS.
HERE IS HOW AN EMPLOYEE MIGHT GO ABOUT CALLING CN/A: "HI, THIS IS JOHN DOE
FROM THE MIAMI RESIDENTAL SERVICE CENTER, CAN I HAVE THE CUSTOMERS NAME AT
(123) 555-1212." THE EMPLOYEES USUALLY USE THESE FOR CHECKING WHO BELONGS TO
A # THAT SOMEONE CLAIMED THEY DIDN'T CALL.
IF YOU SOUND CHEERY AND NATURAL THE OPERATOR WILL NEVER ASK ANY QUESTIONS. IF
YOU DON'T SOUND LIKE A MATURE ADULT, DON'T USE IT! ALWAYS PRACTICE FIRST &
SO YOU DON'T SCREW UP AND MAKE THE OPERATOR SUSPICIOUS. USE NAME THAT SOUNDS
REAL, NOT YOUR PIRATE NAME EITHER! ALSO SAY THAT YOU ARE FROM A CITY THAT IS
FAR AWAY FROM THE ONE THAT YOU ARE CALLING.
THE CN/A NUMBER FOR THE NY AREA & VICINITY (212, 315, 516, 518, 607, 716, &
914) IS>>>>>>>>>(518) 471-8111<<<<<< AND IS OPEN DURING BUSINESS HOURS. DON'T
ABUSE IT!
AT&T NEWSLINES
AT&T NEWSLINES ARE NUMBERS AT AREA PHONE OFFICES THAT TELCO EMPLOYEES CALL TO
FIND OUT THE LATEST INFO ON NEW TECHNOLOGY, STOCKS, ETC. THE RECORDED
REPORTS RANGE FROM VERY BORING TO VERY INTERESTING.
HERE ARE A FEW OF THE NUMBERS:
*(201) 483-3800 NJ (518) 471-2272 NY
(203) 771-4920 CN (717) 255-5555 PA
(212) 393-2151 NY (717) 787-103q PA
(516) 234-9941 NY *(914) 948-8100 NY
SOME OF THESE NUMBERS ARE TOLL-FREE, BUT YOU CAN'T ALWAYS COUNT ON IT.
* THESE NUMBERS ARE NOT ALWAYS UP!
NUMBERS FROM OTHER AREAS ARE AVAILABLE BY REQUEST FROM F)BIOC L)AGENT 003.
ANI NUMBERS
ANI NUMBERS IDENTIFY THE PHONE NUMBER THAT YOU ARE CALLING FROM. IT IS
USEFUL WHEN PLAYING IN CANS (THOSE BIG SILVER BOXES ON TELEPHONE POLES) TO
FIND OUT THE # OF THE LINE. IT IS ALSO GOOD TO FIND OUT THE # OF A PHONE
THAT DOESN'T HAVE IT PRINTED ON IT. IN THE 914 AREA CODE THE ANI # IS 990.
IF YOU JUST HAVE TO DIAL THE LAST 4 DIGITS FOR A LOCAL #, IE CONGERS (268),
DIAL 1-990-1111, WHERE 1111 ARE DUMMY DIGITS THERE IS ALSO A LESS USEFUL TYPE
ANI # WHICH WILL IDENTIFY THE AREA CODE & EXCHANGE. IT IS NXX-9901, WHERE
NXX IS THE EXCHANGE. IN THE 212 & 516 AREA CODES THE ANI # IS 958.
PHREAK NEWSLETTER
TAP IS THE "OFFICIAL" PHONE PHREAK NEWSLETTER, AND HAS EXISTED SINCE 1971.
EACH 4 PAGE ISSUE IS CRAMMED FULL OF INFORMATION ON PHONE PHREAKING, COMPUTER
PHREAKING, FREE GAS, FREE ELECTRICITY, FREE POSTAGE, BREAKING & ENTERING
INFO, ETC. IT IS LARGELY PHONE PHREAK ORIENTED, HOWEVER.
A 10 ISSUE SUBSCRIPTION COSTS $8.00, IF YOU GET A BULK RATE SEALED ENVELOPE
SUBSCRIPTION. I WOULD RECOMMEND THE FIRST CLASS SUBSCRIPTION, WHICH IS $10.
AS OF THIS WRITING (7-16-83), THE CURRENT ISSUE IS #86, AND ISSUE #50 IS 8
PAGES INSTEAD OF THE USUAL 4. BACK ISSUES ARE $0.75 EACH, AND ISSUE #50 IS
$1.50. A BRIEF INDEX TO THE FIRST 80 ISSUES IS AVAILABLE FOR A SASE, OR FREE
WITH A SUBSCRIPTION ORDER. TAP IS NON-PROFIT, AND IN DESPERATE NEED OF
MATERIAL (ARTICLES), MONEY, AND VOLUNTEERS.
TAP
ROOM 603
147 WEST 42ND STREET
NEW YORK, NY 10036
BELIEVE ME: IT WILL BE THE BEST $10
YOU WILL EVER SPEND...
BLACK BOX
THE BLACK BOX IS A DEVICE THAT ATTACHED TO A CALLED PARTIES PHONE THAT
ALLOWS HIM/HER TO RECEIVE FREE LONG DISTANCE CALLS FROM FRIENDS WHO CALL.
YOU ONLY NEED 2 PARTS: A SPST TOGGLE SWITCH AND A 10,000 OHM (10 K), 1/2
WATT, 10% RESISTOR. ANY ELECTRONICS PLACE SHOULD HAVE THESE.
NOW, CUT TWO PIECES OF WIRE, ABOUT 6 INCHES, AND ATTACH THESE TO THE TWO
SCREWS ON THE SWITCH. TURN YOUR NORMAL DDSIDE DOWN AND UNSCREW THE 2 SCREWS.
LOCATE THE "F" AND "RR" SCREWS ON THE NETWORK BOX. WRAP THE RESISTOR BETWEEN
THESE 2 SCREWS AND MAKE SURE THAT THE WIRES TOUCH ONLY THE PROPER TERMINALS!
NOW CONNECT ONE WIRE FROM THE SWITCH TO THE RR TERMINAL. FINALLY, ATTACH THE
REMAINING WIRE TO THE GREEN WIRE (DISCONNECT IT FROM ITS TERMINAL). NOW
BRING THE SWITCH OUT THE REAR OF THE PHONE AND CLOSE IT UP. PUT THE SWITCH
IN A POSITION WHERE YOU GET A DIAL TONE, MARK THIS NORMAL. MARK THE OTHER
SIDE FREE.
WHEN YOUR FRIENDS CALL (AT A PREAR- RANGED TIME), QUICKLY LIFT & DROP THE
RECEIVER AS FAST AS POSSIBLE. THIS WILL STOP THE RINGING, IF NOT TRY AGAIN.
IT IS VERY IMPORTANT THAT YOU DO IT FAST! NOW PUT THE SWITCH IN THE FREE
POSITION AND PICK UP THE pHONE. KEEP ALL CALLS SHORT & UNDER 15 MINUTES.
WHEN SOMEONE CALLS YOU LONG-DISTANCE, THEY ARE BILLED FROM THE MOMENT YOU
ANSWER. THE TELCO KNOWS WHEN YOU ANSWER DUE TO A CERTAIN AMOUNT OF VOLTAGE
THAT FLOWS WHEN YOU PICK UP THE PHONE. HOWEVER, THE RESISTOR CUTS DOWN ON THE
VOLTAGE SO IT IS BELOW THE BILLING RANGE BUT SUFFICIENT ENOUGH TO OPERATE THE
MOUTHPIECE. ANSWERING THE PHONE FOR A FRACTION OF A SECOND STOPS THE RING
BUT IT IS NOT ENOUGH FOR BILLING TO START. IF THE PHONE IS ANSWERED FOR EVEN
ONE FULL SECOND, BILLING WILL START AND YOU WILL BE CUT OFF WHEN YOU HANG UP
AND SWITCH TO FREE.
WARNING: BELL CAN RANDOMLY LOOK FOR
BLACK BOXES SO BE CAREFUL!
:-----------------------------------: : :
***BLUE WIRE**>>F< : : * * :
**WHITE WIRE**** * : : * : :
RESISTOR : : * : :
* ` : : >RR<*******SWITCH*** : :
* : ****GREEN WIRE********************* : :
: :--!--------------------------------:
DIAL LOCKS
HAVE YOU EVER BEEN IN AN OFFICE OR SOMEWHERE AND WANTED TO MAKE A FREE FONE
CALL BUT SOME ASSHOLE PUT A LOCK ON THE FONE TO PREVENT OUT-GOING CALLS?
FRET NO MORE PHELLOW PHREAKS, FOR EVERY SYRTEM CAN BE BEATEN WITH A LITTLE
KNOWLEDGE!
THERE ARE TWO WAYS TO BEAT THIS OBSTACLE, FIRST PICK THE LOCK, I DON'T HAVE
THE TIME TO TEACH LOCKSMITHING SO WE GO TO THE SECOND METHOD WHICH TAKES
ADVANTAGE OF TELEPHONE ELECTRONICS.
TO BE AS SIMPLE AS POSSIBLE, WHEN YOU PICK UP THE FONE YOU COMPLETE A CIRCUIT
KNOW AS A LOCAL LOOP. WHEN YOU HANG-UP YOU BREAK THE CIRCUIT. WHEN YOU DIAL
(PULSE) IT ALSO BREAKS THE CIRCUT BUT NOT LONG ENOUGH TO HANG UP! SO YOU CAN
"PUSH-DIAL." TO DO THIS YOU >RAPIDLY< DEPRESS THE SWITCHHOOK. FOR EXAMPLE,
TO DIAL AN OPERATOR (AND THEN GIVE HER THE NUMBER YOU WANT CALLED) >RAPIDLY<
& >EVENLY< DEPRESS THE SWITCHHOOK 10 TIMES. TO DIAL 634-1268, DEPRESS 6 X'S
PAUSE, THEN 3 X'S, PAUSE, THEN 4 X'S, ETC. IT TAKES A LITTLE PRACTICE BUT
YOU'LL GET THE HANG OF IT. TRY PRACTICING WITH YOUR OWN # SO YOU'LL GET A
BUSY TONE WHEN RIGHT. IT'LL ALSO WORK ON TOUCH-TONE(TM) SINCE A DTMF LINE
WILL ALSO ACCEPT PULSE. ALSO, NEVER DEPRESS THE SWITCHHOOK FOR MORE THAN A
SECOND OR IT'LL HANG-UP!
FINALLY, REMEMBER THAT YOU HAVE JUST AS MUCH RIGHT TO THAT FONE AS THE
ASSHOLE WHO PUT THE LOCK ON IT!
EXCHANGE SCANNING
ALMOST EVERY EXCHANGE IN THE BELL SYSTEM HAS TEST #'S AND OTHER "GOODIES"
SUCH AS LOOPS WITH DIAL-UPS.
THESE "GOODIES" ARE USUALLY FOUND BETWEEN 9900 AND 9999 IN YOUR LOCAL
EXCHANGE. IF YOU HAVE THE TIME AND INITIATIVE, SCAN YOUR EXCHANGE AND YOU
MAY BECOME LUCKY!
HERE ARE MY FINDINGS IN THE 914-268 EXCHANGE:
9900 - ANI (SEE SEPARATE BULLETIN) 9901 - ANI (SEE SEPARATE BULLETIN) 9927 -
OSC. TONE (POSSIBLE TONE SIDE OF
A LOOP) 9936 - VOICE #`TO THE TELCO CENTRAL
OFFICE 9937 - VOICE # TO THE TELCO CENTRAL
OFFICE 9941 - COMPUTER (DIGITAL VOICE
TRANSMISSION?) 9960 - OSC. TONE (TONE SIDE LOOP) --
MAY ALSO BE A COMPUTER IN SOME
EXCHANGES 9961 - NO RESPONSE (OTHER END OF LOOP?) 9962 - NO RESPONSE
(OTHER END OF LOOP?) 9963 - NO RESPONSE (OTHER END OF LOOP?) 9966 - COMPUTER
(SEE 9941) 9968 - TONE THAT DISAPPEARS--RESPONDS
TO CERTAIN TOUCH-TONE KEYS
MOST OF THE NUMBERS BETWEEN 9900 & 9999 WILL RING OR GO TO A "WHAT #,
PLEASE?" OPERATOR.
HAVE PHUN AND REMEMBER IT'S ONLY A LOCAL CALL!
TOUCH-TONE & FREE CALLS
THERE ARE SEVERAL WAYS TO MAKE FREE CALLS (SPRINT, MCI, ETC.) USING A ROTARY
PHONE. THEY ARE:
1. USE A NUMBER THAT ACCEPTS VOICE AS WELL AS DTMF. SUCH A # IS (800)
521-8400. AS OF WRITING THIS, A WORKING CODE WAS 00717865.
A) IF USING VOICE, WAIT FOR THE COMPUTER TO SAY, "AUTHORIZATION #,
PLEASE." THEN SAY EACH DIGIT SLOWLY, IT WILL BEEP AFTER EACH DIGIT IS SAID.
AFTER EVERY GROUP OF DIGITSl IT WILL REPEAT WHAT YOU HAVE SAID, THEN SAY YES
IF IT IS CORRECT, OTHERWISE SAY NO. IF THE ACCESS CODE IS CORRECT, IT WILL
THANK YOU AND ASK FOR THE DESTINATION #, THEN SAY THE AREA CODE + NUMBER AS
ABOVE. ANOTHER SUCH # IS (800) 245- 8173, WHICH HAS A 6 DIGIT ACCESS CODE.
(NOTE: IF USING TOUCH-TONE ON THIS #, ENTER THE CODE IMMEDIATELY AFTER THE
TONE STOPS.)
2. HOOK UP A TOUCH-TONE FONE INTO YOUR ROTARY FONE. ATTACH THE RED WIRE
FROM THE TOUCH-TONE FONE TO THE "R" TERMINAL INSIDE THE FONE ON THE NETWORK
BOX. THEN HOOK THE GREEN WIRE TO THE "B" TERMINAL. TO USE THIS DIAL THE #
USING ROTARY & THEN USE THE TOUCH-TONE FOR THE CODES. (DON'T HANG UP THE
ROTARY FONE WHILE DOING THIS THOUGH!) IF THIS DOESN'T WORK THEN REVERSE THE 2
WIRES. (NOTE:IF YOUR LINE CAN ACCEPT TOUCH-TONE BUT YOU HAVE A ROTARY FONE
THEN YOU CAN HOOK UP A TONE FONE DIRECTLY FOR ALL CALLS BUT THIS USUALLY
ISN'T THE CASE.)SUCH AS RADIO SHACK'S 43-138.
OTHER ALTERNATIVES
4. USE A CHARGE-A-CALL FONE. (THESE ALSO MAKE GREAT EXTENTIONS IF YOU
REMOVE IT USING A HEX WRENCH WITH A HOLE IN THE MIDDLE ON THE CENTER
SCREW!)--(THESE FONES FOR THE BENEFIT OF THOSE WHO DON'T KNOW ARE BLUE WITH
NO COIN SLOTS)
5. USE A PAY FONE THAT WANTS YOUR MONEY BEFORE THE DIAL TONE. PUT IN YOUR
DIME, DIAL THE #; IF IT'S AN 800 # THEN YOUR DIME WILL COME BACK IMMEDIATELY
PUT A DIME BACK IN (IT'LL COME BACK WHEN YOU HANG UP!) IF IT IS A TONE FIRST
FONE AND IT DISCONNECTS THE KEYPAD (SOME DON'T) THEN FIND ANOTHER FONE.
TELCO TRACING
THE GOOD 'OL DAYS: ------------------
WAY BACK BEFORE I WAS A PHREAK, MA BELL WOULD HAVE TO MANUALLY TRACE A CALL
IF THEY THOUGH SOMETHING WAS FUCKED UP. FIRST THEY WOULD SEND A 2000 HZ
TRACING TONE, THE WOULD BE FOLLOWED B ALOT OF NOISE AND CLICKS. IT TOOK
ABOUT 2-3 MINUTES TO TRACE A CALL AND ALOT OF PEOPLE WERE INVOLVED IN THE
PROCESS. SO AT 1 IN THE MORNING THEY WOULD HAVE TO WAKE UP PEOPLE FOT THE
TRACEES (PHREAK JARGON FOR A PAY FONE). BUT NEVER USE THE SAME ONE MORE THAN
ONCE OR TWICE BECAUSE THE GESTAPO(ER..EXCUSE ME MEAN BELL SECURITY) HAS BEEN
KNOW FOR STAKING OUT TROUBLED FORTRESSES. IT'S ALSO POSSIBLE FOR TRAVELNET OR
SP TO ASK FOR A TROUBLE # BUT THE TELCO IS SLOW IN PROCESSING
STUFF--ESPECIALLY FOR THE COMPETITION--SO DON'T FRET PHELLOW PHREAKS.
MODERN TECHNOLOGY: ------------------ THIS CAN BE ATTRIBUTED TO ESS + CCIS
WHICH CAN BE TRACED IN 1 SECOND.
MISCELLANEOUS STUFF
HERE ARE A PHEW (PUSHING IT ON THAT WORD) BITS OF INFO ON TELEPHONE ELEC-
TRONICS. IF YOU DON'T APPRECIATE IT THEN I SAY PHUCK U.
VOLTAGES:
WHEN YOUR FONE IS ON-HOOK (IE-HUNG UP) THERE IS A 4 8 VOLT DC CURRENT FLOWING
THROUGH THE LINE ( I HAVE A GREAT IDEA ABOUT HOOKING A BATTERY CHARGER UP TO
MY FONE ). WHEN THE FONE IS OFF-HOOK THE VOLTAGE DROPS DOWN TO AROUND 15VDC.
THE BLACK BOX (SEE SEPARATE ARTICLES) EXPLOITS THIS FOR FREE CALLS SINCE BELL
USES THIS VOLTAGE DROP WHEN THE CALLED PARTY PICKS UP TO START BILLING. BELL
MAY ALSO REVERSE THE POLARITY OF THE LINE TO START BILLING--IF YOU HAVE A
TONE FONE THE`KEYPAD WON'T WORK IF THE POLARITY IS REVERSED. USUALLY, THE
RED WIRE IS CALLED THE TIP SINCE IT IS THE MORE (+) OF THE 2 WIRES + THE
GREEN WIRE IS CALLED THE RING (-).
RING TRIP:
WHEN SOMEONE CALLS YOU BELL HAS TO SEND 90 VOLTS AC DOWN YOUR LINE AT ABOUT
60 HZ TO ACTIVATE YOUR BELL (THIS IS WHY DEAF PEOPLE CAN HAVE LIGHT BULBS
FANS GO OFF INSTEAD OF A BELL). THE DEVICE THAT DOES THE RINGING IS CALLED A
RINGING GENERATOR AND THE PROCESS OF RINGING IS CALLED A RING TRIP. THIS
COSTS BELL MONEY AND THEY DON'T LIKE USING ALL THAT ELECTRICITY FROM THE
LOCAL RIP-OFF POWER COMPANY- SO LET IT RING. THIS IS ALSO, HOW BELL CAN
CHECK FOR EXTRA FONES FROM THEIR CENTRAL OFFICE BY SEEING HOW MUCH VOLTAGE
THE LINE TAKES WHILE RINGING AND THEY CAN TELL HOW MANY FONES YOUR NOT
SUPPOSE TO HAVE. SOLUTION: DISCONNECT THE BELL.
MODERN TECHNOLOGY: ------------------
THE 2 WORST ENEMIES TO THE PHREAK BESIDES THE FBI + BELL SECURITY,ARE: ESS +
CCIS. ESS STANDS FOR ELECTRONIC SWITHCING SYSTEM AND IT CAN TRACE A CALL IN
SECONDS, IT ALSO RECORDS ALL CALLS AND CAN EVEN TAP INTO LINES (ER.. I MEAN
CHECK FOR LINE QUALITY) AND RECORD CALLS. CCIS STANDS FOR COMMON CHANNEL
INTER-OFFICE SIGNALING AND IT ALLOWS FOR CONTROL SIGNALS TO BE SENT VIA
SEPARATE DATA LINKS INSTEAD OF TONES OVER THE VOICE CHANNEL--START KISSING
YOUR BLUE BOX GOODBYE.
SOURCES: --------
FOR THOSE OF YOU WHO WANT TO GO MORE IN-DEPTH ON THE SUBJECT OF SHIT, I
RECOMMEND THE FOLLOWING READING MATERIAL:
1) ELECTRONICS COURCES A-B, TAP, ROOM 603, 147 W. 42 ST., NY, NY 10036. @
75 CENTS EA.
2) UNDERSTANDING TELEPHONE ELECT.'S, TEXAS INSTRUMENTS, RADIO SHACK MAY
HAVE SOME BOOKS ON THIS AREA.
* END *


View File

@@ -0,0 +1,94 @@
|------------------------------------------------------------------------|
| The Alliance Crew |
| -=-=-=-=-=-=-=-=-=- |
| Presents |
| |
| A Collection of Phreak Information |
| ---------------------------------- |
| Copyright (c) 1989 $TAC$ |
|________________________________________________________________________|
The following is a compilation of Phreak data which I have accumulated
over the past few months and now $TAC$ is releasing it to the public to
do with as they please. Also in the future we are planning a monthly
newsletter, more software releases and some GREAT hacking programs by
out master programmer, Macros The Black. Please leave any feedback about
our plans for the future, or any questions on one of these fine boards.
Dark City of Fear - 215-261-0893
Forgotten Realm - 618-943-2399
The White House - 312-364-5428
--------------------------------------------------------------------------
PBX's, Dial-ups & Extenders
--------------------------------------------------------------------------
MCI DIAL-UP - 415-338-7000 (5 DIGIT)
MCI DIAL-UP - 401-272-0698 (5 DIGIT)
MCI DIAL-UP - 216-375-9211 (5 DIGIT)
MCI DIAL-UP - 412-261-0489 (5 DIGIT)
MCI DIAL-UP - 515-282-0955 (5 DIGIT)
ITT DIAL-UP - 412-261-4930 (13 DIGIT)
ALLNET - 800-922-1444 (6 & 9 DIGIT)
ALLNET - 950-1044 (6 DIGIT)
ALLNET - 950-1444 (9 DIGIT)
MCI - 800-666-3640
UNKNOWN - 800-635-6366 (3 DIGIT + 1 + AC + #)
TRAVELNET - 800-521-8400 (8 DIGIT)
TRAVELNET - 412-261-1245 (8 DIGIT)
UNKNOWN - 800-222-9904 (5 DIGIT + AC + #)
UNKNOWN - 800-231-0823 (?)
UNKNOWN - 800-456-0000 (8 DIGIT)
PBX - 213-641-7393 (5 DIGIT + 9 + #)
PBX - 617-870-2999
PBX - 800-521-2201
PBX - 203-525-2888
PBX - 216-375-0190 (4 DIGIT + 550 + 1 + AC + #)
SPRINT DIAL-UP - 800-345-0008 (9 DIGIT)
SPRINT DIAL-UP - 950-1033
LITEL DIAL-UP - 800-222-4333 (9 DITIT)
LITEL DIAL-UP - 950-1432
LITEL DIAL-UP - 800-543-3023
UNKNOWN - 800-351-1441 (7 DIGIT + 1 + AC + #)
UNKNOWN - 800-858-4193 (6 DIGIT + 1 + AC + #)
UNKNOWN - 800-237-0384 (5 DIGIT)
UNKNOWN - 800-456-2525 (2121 + 9 + 1 + AC)
--------------------------------------------------------------------------
Voice Mail Systems
--------------------------------------------------------------------------
ASPEN - 415-338-7000
DIAL SYSTEM - 800-323-0434
ASPEN - 805-681-5550
ASPEN - 800-759-5000
VMB - 800-433-9016
ASPEN - 301-340-5000
ASPEN - 800-843-8620
ASPEN - 800-638-9636
ASPEN - 800-999-0085
VMB - 800-654-8692
ASPEN - 800-235-3900
VMB - 800-443-5555
ASPEN - 415-468-2950
FON MAIL - 800-444-9999
AVR orderline - 800-433-1448
--------------------------------------------------------------------------
Loops n' Shit
--------------------------------------------------------------------------
LOOP - 208-939-9997
- 208-939-9996
3-WAY LOOP - 213-928-1119 n.a
- 213-928-1118
- 213-928-1117
THE RIGHT TOUCH - 800-826-6290
ABN - 718-xxx-9971 (xxx = valid exchange)
LOOP - 213-273-1119
- 213-273-1118
--------------------------------------------------------------------------
Thats about all for this time, If you have any comments or questions
please contact any of The Alliance Crew members on the boards listed
earlier. This file was written by LINE NOISE and for those who are not
already aware, the other Alliance Crew members are Crimson Death, Macros
the Black, Phrozen Ghost, Spy Guy, Big Bird and some others who I aint
sure of. And look for SOFTWARE, MORE HACK PROGRAMS, FILES ON PHREAKING &
HACKING, AND THE MONTHLY $TAC$ NEWSLETTER, "The Touch-Tone Times."

View File

@@ -0,0 +1,383 @@
Here Goes:
The Sound Barrier
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/ /-/
/-/ Phreaker's /-/
/-/ PhunHouse /-/
/-/ /-/
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
/-/ By: /-/
/-/ The Traveler /-/
/-/ /-/
/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/
The long awaited prequil to Phreaker's Guide has finally arrived.
Conceived from the boredom and loneliness that could only be derived from:
The Traveler! But now, he has returned in full strength (after a small
vacation) and is here to 'World Premiere' the new files everywhere. Stay
cool. This is the prequil to the first one, so just relax. This is not made
to be an exclusive ultra elite file, so kinda calm down and watch in the
background if you are too cool for it.
/-/ Phreak Dictionary /-/
Here you will find some of the basic but necessary terms that should be
known by any phreak who wants to be respected at all.
Phreak : 1. The action of using mischevious and mostly illegal
ways in order to not pay for some sort of tele-
communications bill, order, transfer, or other service.
It often involves usage of highly illegal boxes and
machines in order to defeat the security that is set
up to avoid this sort of happening. [fr'eaking]. v.
2. A person who uses the above methods of destruction and
chaos in order to make a better life for all. A true
phreaker will not not go against his fellows or narc
on people who have ragged on him or do anything
termed to be dishonorable to phreaks. [fr'eek]. n.
3. A certain code or dialup useful in the action of
being a phreak. (Example: "I hacked a new metro
phreak last night.")
Switching System: 1. There are 3 main switching systems currently employed
in the US, and a few other systems will be mentioned
as background.
A) SxS: This system was invented in 1918 and was
employed in over half of the country until 1978. It
is a very basic system that is a general waste of
energy and hard work on the linesman. A good way to
identify this is that it requires a coin in the phone
booth before it will give you a dial tone, or that no
call waiting, call forwarding, or any other such
service is available. Stands for: Step by Step
B) XB: This switching system was first employed in 1978
in order to take care of most of the faults of SxS
switching. Not only is it more efficient, but it
also can support different services in various forms.
XB1 is Crossbar Version 1. That is very limited and
is hard to distinguish from SxS except by direct view
of the wiring involved. Next up was XB4, Crossbar
Version 4. With this system, some of the basic things
like DTMF that were not available with SxS can be
accomplished. For the final stroke of XB, XB5 was
created. This is a service that can allow DTMF plus
most 800 type services (which were not always
available.) Stands for: Crossbar.
C) ESS: A nightmare in telecom. In vivid color, ESS is
a pretty bad thing to have to stand up to. It is
quite simple to identify. Dialing 911 for emergencies,
and ANI [see ANI below] are the most common facets of
the dread system. ESS has the capability to list in a
person's caller log what number was called, how long
the call took, and even the status of the conversation
(modem or otherwise.) Since ESS has been employed,
which has been very recently, it has gone through
many kinds of revisions. The latest system to date is
ESS 11a, that is employed in Washington D.C. for
security reasons. ESS is truly trouble for any
phreak, because it is 'smarter' than the other
systems. For instance, if on your caller log they saw
50 calls to 1-800-421-9438, they would be able to do
a CN/A [see Loopholes below] on your number and
determine whether you are subscribed to that service
or not. This makes most calls a hazard, because
although 800 numbers appear to be free, they are
recorded on your caller log and then right before you
receive your bill it deletes the billings for them.
But before that the are open to inspection, which is
one reason why extended use of any code is dangerous
under ESS. Some of the boxes [see Boxing below] are
unable to function in ESS. It is generally a menace
to the true phreak. Stands For: Electronic Switching
System. Because they could appear on a filter
somewhere or maybe it is just nice to know them
anyways.
A) SSS: Strowger Switching System. First
non-operator system available.
B) WES: Western Electronics Switching. Used about 40
years ago with some minor places out west.
Boxing: 1) The use of personally designed boxes that emit or
cancel electronical impulses that allow simpler
acting while phreaking. Through the use of separate
boxes, you can accomplish most feats possible with
or without the control of an operator.
2) Some boxes and their functions are listed below.
Ones marked with '*' indicate that they are not
operatable in ESS.
*Black Box: Makes it seem to the phone company that
the phone was never picked up.
Blue Box : Emits a 2600hz tone that allows you to do
such things as stack a trunk line, kick
the operator off line, and others.
Red Box : Simulates the noise of a quarter, nickel,
or dime being dropped into a payphone.
Cheese Box : Turns your home phone into a pay phone to
throw off traces (a red box is usually
needed in order to call out.)
*Clear Box : Gives you a dial tone on some of the old
SxS payphones without putting in a coin.
Beige Box : A simpler produced linesman's handset that
allows you to tap into phone lines and
extract by eavesdropping, or crossing
wires, etc.
Purple Box : Makes all calls made out from your house
seem to be local calls.
ANI [ANI]: 1) Automatic Number Identification. A service
available on ESS that allows a phone service [see
Dialups below] to record the number that any certain
code was dialed from along with the number that was
called and print both of these on the customer bill.
950 dialups [see Dialups below] are all designed
just to use ANI. Some of the services do not have
the proper equipment to read the ANI impulses yet,
but it is impossible to see which is which without
being busted or not busted first.
Dialups [dy'l'ups]: 1) Any local or 800 extended outlet that allows instant
access to any service such as MCI, Sprint, or AT&T
that from there can be used by handpicking or using
a program to reveal other peoples codes which can
then be used moderately until they find out about
it and you must switch to another code (preferrably
before they find out about it.)
2) Dialups are extremely common on both senses. Some
dialups reveal the company that operates them as
soon as you hear the tone. Others are much harder
and some you may never be able to identify. A small
list of dialups:
1-800-421-9438 (5 digit codes)
1-800-547-6754 (6 digit codes)
1-800-345-0008 (6 digit codes)
1-800-734-3478 (6 digit codes)
1-800-222-2255 (5 digit codes)
3) Codes: Codes are very easily accessed procedures
when you call a dialup. They will give you some sort
of tone. If the tone does not end in 3 seconds,
then punch in the code and immediately following the
code, the number you are dialing but strike the
'1' in the beginning out first. If the tone does
end, then punch in the code when the tone ends.
Then, it will give you another tone. Punch in the
number you are dialing, or a '9'. If you punch in
a '9' and the tone stops, then you messed up a
little. If you punch in a tone and the tone
continues, then simply dial then number you are
calling without the '1'.
4) All codes are not universal. The only type that I
know of that is truly universal is Metrophone.
Almost every major city has a local Metro dialup
(for Philadelphia, (215)351-0100/0126) and since the
codes are universal, almost every phreak has used
them once or twice. They do not employ ANI in any
outlets that I know of, so feel free to check
through your books and call 555-1212 or, as a more
devious manor, subscribe yourself. Then, never use
to your caller log, they can usually find out that
you are subscribed. Not only that but you could set
hack away, since they usually group them, and, as a
bonus, you will have their local dialup.
5) 950's. They seem like a perfectly cool phreakers
dream. They are free from your house, from payphones,
from everywhere, and they host all of the major long
distance companies (950-1044 <MCI>, 950-1077
<Sprint>, 950-1088 <Skylines>, 950-1033 <Us
Telecom>.) Well, they aren't. They were designed for
ANI. That is the point, end of discussion.
A phreak dictionary. If you remember all of the things contained on that
fileup there, you may have a better chance of doing whatever it is you do. This
next section is maybe a little more interesting...
Blue Box Plans:
---------------
These are some blue box plans, but first, be warned, there have been 2600hz
use a 2600hz tone for a few very naughty functions that can really make your day
lighten up. But first, here are the plans, or the heart of the file:
700 : 1 : 2 : 4 : 7 : 11 :
900 : + : 3 : 5 : 8 : 12 :
1100 : + : + : 6 : 9 : KP :
1300 : + : + : + : 10 : KP2 :
1500 : + : + : + : + : ST :
: 700 : 900 :1100 :1300 :1500 :
Stop! Before you diehard users start piecing those little tone tidbits
together, there is a simpler method. If you have an Apple-Cat with a program
like Cat's Meow IV, then you can generate the necessary tones, the 2600hz tone,
the KP tone, the KP2 tone, and the ST tone through the dial section. So if you
have that I will assume you can boot it up and it works, and I'll do you the
favor of telling you and the other users what to do with the blue box now that
you have somehow constructed it. The connection to an operator is one of the
most well known and used ways of having fun with your blue box. You simply dial
dial '0') and blow a 2600hz tone through the line. Watch out! Do not dial this
KP tone to start a call, a ST tone to stop it, and a 2600hz tone to hang up.
Once you have connected to it, here are some fun numbers to call with it:
0-700-456-1000 Teleconference (free, because you are the operator!)
(Area code)-101 Toll Switching
(Area code)-121 Local Operator (hehe)
(Area code)-131 Information
(Area code)-141 Rate & Route
(Area code)-11511 Conference operator (when you dial 800-544-6363)
Well, those were the tone matrix controllers for the blue box and some
other helpful stuff to help you to start out with. But those are only the
functions with the operator. There are other k-fun things you can do with it.
More advanced Blue Box Stuff:
Oops. Small mistake up there. I forgot tone lengths. Um, you blow a tone
pair out for up to 1/10 of a second with another 1/10 second for silence between
the digits. KP tones should be sent for 2/10 of a second. One way to confuse the
2600hz traps is to send pink noise over the channel (for all of you that have
decent BSR equalizers, there is major pink noise in there.) Using the operator
functions is the use of the 'inward' trunk line. That is working it from the
inside. From the 'outward' trunk, you can do such things as make emergency
'stacking'), enable or disable the TSPS's, and for some 4a systems you can even
re-route calls to anywhere.
All right. The one thing that every complete phreak guide should be without
is blue box plans, since they were once a vital part of phreaking. Another thing
that every complete file needs is a complete listing of all of the 800 numbers
/-/ 800 Dialup Listings /-/
1-800-345-0008 (6) 1-800-547-6754 (6)
1-800-245-4890 (4) 1-800-327-9136 (4)
1-800-526-5305 (8) 1-800-858-9000 (3)
1-800-437-9895 (7) 1-800-245-7508 (5)
1-800-343-1844 (4) 1-800-322-1415 (6)
1-800-437-3478 (6) 1-800-325-7222 (6)
All right, set Cat Hacker 1.0 on those numbers and have a fuck of a day.
That is enough with 800 codes, by the time this gets around to you I dunno what
state those codes will be in, but try them all out anyways and see what you get.
On some 800 services now, they have an operator who will answer and ask you for
your code, and then your name. Some will switch back and forth between voice and
tone verification, you can never be quite sure which you will be up against.
Armed with this knowledge you should be having a pretty good time phreaking
now. But class isn't over yet, there are still a couple important rules that you
should know. If you hear continual clicking on the line, then you should assume
that an operator is messing with something, maybe even listening in on you. It
is a good idea to call someone back when the phone starts doing that. If you
were using a code, use a different code and/or service to call him back.
A good way to detect if a code has gone bad or not is to listen when the
number has been dialed. If the code is bad you will probably hear the phone
ringing more clearly and more quickly than if you were using a different code.
If someone answers voice to it then you can immediately assume that it is an
operative for whatever company you are using. The famed '311311' code for Metro
is one of those. You would have to be quite stupid to actually respond, because
whoever you ask for the operator will always say 'He's not in right now, can I
have him call you back?' and then they will ask for your name and phone number.
Some of the more sophisticated companies will actually give you a carrier on a
line that is supposed to give you a carrier and then just have garbage flow
across the screen like it would with a bad connection. That is a feeble effort
to make you think that the code is still working and maybe get you to dial
someone's voice, a good test for the carrier trick is to dial a number that will
give you a carrier that you have never dialed with that code before, that will
allow you to determine whether the code is good or not. For our next section, a
lighter look at some of the things that a phreak should not be without. A
vocabulary. A few months ago, it was a quite strange world for the modem people
out there. But now, a phreaker's vocabulary is essential if you wanna make a
good impression on people when you post what you know about certain subjects.
/-/ Vocabulary /-/
phone -> fone
freak -> phreak
- Never substitute 'z's for 's's. (i.e. codez -> codes)
- NEVER use the 'k' prefix (k-kool, k-rad, k-whatever)
- Do not abbreviate. (I got lotsa wares w/ docs)
- Never substitute '0' for 'o' (r0dent, l0zer).
- Forget about ye old upper case, it looks ruggyish.
All right, that was to relieve the tension of what is being drilled into
your minds at the moment. Now, however, back to the teaching course. Here are
somethings you should know about phones and billings for phones, etc.
LATA: Local Access Transference Area. Some people who live in large cities
or areas may be plagued by this problem. For instance, let's say you live in the
215 area code under the 542 prefix (Ambler, Fort Washington). If you went to
dial in a basic Metro code from that area, for instance, 351-0100, that might
not be counted under unlimited local calling because it is out of your LATA.
For some LATA's, you have to dial a '1' without the area code before you can
dial the phone number. That could prove a hassle for us all if you didn't
realize you would be billed for that sort of call. In that way, sometimes, it is
better to be safe than sorry and phreak.
The Caller Log: In ESS regions, for every household around, the phone
company has something on you called a Caller Log. This shows every single number
that you dialed, and things can be arranged so it showed every number that was
calling to you. That's one main disadvantage of ESS, it is mostly computerized
so a number scan could be done like that quite easily. Using a dialup is an easy
way to screw that, and is something worth remembering. Anyways, with the caller
log, they check up and see what you dialed. Hmm... you dialed 15 different 800
numbers that month. Soon they find that you are subscribed to none of those
companies. But that is not the only thing. Most people would imagine "But wait!
800 numbers don't show up on my phone bill!". To those people, it is a nice
thought, but 800 numbers are picked up on the caller log until right before they
are sent off to you. So they can check right up on you before they send it away
and can note the fact that you fucked up slightly and called one too many 800
lines.
Right now, after all of that, you should have a pretty good idea of how to
grow up as a good phreak. Follow these guidelines, don't show off, and don't
take unnecessary risks when phreaking or hacking.
/-/ Credits /-/
To The Videosmith - for setting me straight on some shit.
To The Linesman - for telling me to upload it to his AE line.
To Modern Mutant - for making me into a phreaking freak.
To Jack the Nibbler- for the basis of the blue box plans.
Downloaded From P-80 International Information Systems 304-744-2253

View File

@@ -0,0 +1,119 @@
:=+---------------------------------+=:
I BASICS OF PHONE PHREAKING I I
I BY LONG JOHN SILICONE I
I I
:=+---------------------------------+=:
A RATHER BROAD SUBJECT TO ATTACK, I MUST SAY. THE DEBATE OVER JUST WHAT
TO DISCUSS HAS OCCUPIED MY THOUGHTS FOR MANY AN HOUR. PERHAPS IF I APPROACH
THIS SUBJECT LEGALLY, IN AN INFORMATIVE MANNER THAT IS, MY PROBLEMS MIGHT BE
SOLVED. NONETHELESS, HERE IT GOES.
MA BELL CAN RATTLE ON FOR HOURS ON METHODS FOR SAVING MONEY ON YOUR LONG-
DISTANCE CALLS. UNFORTUNATELY, MOST PEOPLE STILL THINK THAT AT&T IS THE
ONLY GAME IN TOWN FOR LONG-DISTANCE SERVICE.
WHAT MA BELL WON'T TELL YOU IS THAT THERE COMES A TIME IN A TELEPHONE
USER'S LIFE TO LEAVE MOM. THERE ARE NOW SEVERAL COMPANIES WHICH COMPETE WITH
AT&T IN THE LONG-DISTANCE MARKET: MCI, SOUTHERN PACIFIC'S "SPRINT" (WHICH IS
CURRENTLY BEING PURCHASED BY GENERAL TELEPHONE AND ELECTRONICS COMPANY),
U.S. TRANSMISSION SYSTEM'S "LONGER DISTANCE" (A SUSIDIARY OF ITT), WESTERN
UNION'S "METROFONE", AND SATELLITE BUSINESS SYSTEM'S "SKYLINE." THEY ALL
BOAST OF OPPORTUNITIES FOR LARGE SAVINGS ON THE LONG-DISTANCE PORTION
OF YOUR MONTHLY PHONE BILL.
SOMEONE UNACQUAINTED WITH THESE NEW COMPETITORS, WHICH ARE CALLED
"SPECIALIZED COMMON CARRIERS" (OR SCCS), MIGHT ASK, "ISN'T IT A
DUPLICATION OF EFFORT FOR A LOT OF DIFFERENT COMPANIES TO BE RUNNING LONG-
DISTANCE LINES ALL OVER THE COUNTRY? AND HOW CAN A COMPANY THAT IS JUST A
FRACTION OF THE SIZE OF AT&T PROVIDE A SIMILAR SERVICE FOR A LOWER PRICE?"
THE ANSWER IS THAT THESE NEW COMPETITORS HAVE BUILT THEIR BASE BY
CONCENTRATING ON ROUTES WHERE LONGDISTANCE TRAFFIC IS HEAVY, SO THE COST
OF CARRYING EACH CALL IS RELATIVELY LOW. ALSO, THE COMPETITORS TRANSMISSION
EQUIPMENT CONSISTS ALMOST EXCLUSIVELY OF COMPUTERS AND MICROWAVE LINKS, WHICH
THEY HAVE BUILT THEMSELVES OR WHICH THEY LEASE FROM OTHER CARRIERS. THUS,
THESE NETWORKS CAN BE LESS EXPENSIVE TO CONSTRUCT AND MAINTAIN THEN THE
CABLE-BASED SYSTEMS THAT BELL HAS USED FOR YEARS. THERE'S ALSO ANOTHER CLASS
OF COMPETITORS CALLED "RESELLERS", WHO LEASE AND RESELL BOTH AT&T'S AND OTHER
CARRIERS' LINES. MORE ABOUT RESELLERS IN A MOMENT.
INITIALLY, MOST OF THE SCC COMPETITORS COULD REACH ONLY A LIMITED
NUMBER OF CITIES. BUT AS THEY'VE GROWN, THE NUMBER OF CITIES SERVED BY THEIR
MICROWAVE NETWORKS HAS STEADILY INCREASED, AND TODAY MOST OF THE SCC'S
REACH 70 PERCENT OR MORE OF ALL AREA CODES IN THE UNITED STATES AND CONTINUE
TO INCREASE THE NUMBER OF CITIES SERVED EVERY MONTH. SATTELITE BUSINESS
SYSTEM'S "SKYLINE" IS THE FIRST TO OFFER SERVICE TO THE ENTIRE U.S. OVER
ITS OWN NETWORK. THE OTHER SCC'S ARE PHASING IN UNINVERSAL SERVICE BY USING
BELL'S WATS SYSTEM. BUT WHILE USERS OF THESE SERVICES WILL SOON BE ABLE TO
CALL 'TO' ANYWHERE IN THE U.S., THEY WILL STILL BE ABLE TO CALL 'FROM' ONLY
A LIMITED NUMBER OF PLACES, USUALLY THE MAJOR METROPOLITAN AREAS.
TO USE ANY OF THESE SCC SERVICES, YOU CURRENTLY MUST HAVE A TOUCH-TONE
SERVICE OR THE EQUIVALENT TONE GENERATOR. (THIS IS CHANGING AS A CONSE-
QUENCE OF THE AT&T/DEPARTMENT OF JUSTICE DIVESTITURE AGREEMENT, WHICH
WILL REQUIRE THE NEWLY INDEPENDENT LOCAL PHONE COMPANIES TO GRANT ALL
CARRIERS "EQUAL ACCESS" AT EQUAL RATES.) THERE IS AN ADDITIONAL MONTHLY
CHARGE FOR TOUCHTONE SERVICE (CHECK THE "CUSTOMER
GUIDE" IN YOUR LOCAL WHITE PAGES, OR CALL YOUR BELL BUSINESS OFFICE FOR
DETAILS); HOWEVER, YOU DON'T HAVE TO RENT OR BUY A BELL TELEPHONE TO GET
TOUCH-TONE SERVICE. (HURRAH FOR K-MART)
IF YOUR LOCAL PHONE LINES ALREADY ARE EQUIPPED TO HANDLE BOTH ROTARY AND
TOUCH-TONE CALLS, YOU MAY BE ABLE TO AVOID THE NEED FOR TOUCH-TONE SERVICE
IN THIS WAY: USING A REGULAR ROTARAY PHONE, YOU PLACE A CALL TO THE SCC'S
COMPUTER; THEN, TO 'CONVERSE' WITH THE COMPUTER SIMPLY USE A TOUCH PAD CONVER-
TER OR A TONE GENERATOR, HELD UP TO THE MOUTHPIECE OF YOUR ROTARY PHONE.
IT'S REASONABLY EASY TO USE THE SCC SYSTEMS. YOU MUST FIRST DIAL A
SEVEN DIGIT LOCAL PHONE NUMBER (AN 'ACCESS' NUMBER), WHICH CONNECTS YOU
TO THE SCC'S COMPUTER. WHEN YOU HEAR A TONE ON THE OTHER END, YOU THEN
DIAL A FIVE-OR SIX-DIGIT NUMBER (AN 'AUTHORIZATION CODE') THAT TELLS THE
COMPUTER YOU'RE AN AUTHORIZED USER AND TO BILL YOUR ACCOUNT FOR THE CALL.
IMMEDIATELY AFTER DIALING THE AUTHORIZATION NUMBER, YOU DIAL THE AREA CODE
AND NUMBER YOU WISH TO CALL. THE SCC'S COMPUTER IN YOUR AREA THEN SENDS YOUR
CALL OUT OVER ITS OWN LONG-DISTANCE NETWORK TO A COMPUTER IN THE AREA YOU
CALLED; THE COMPUTER ON THE OTHER END THEN HOOKS YOUR CALL INTO THE LOCAL
PHONE NETWORK TO REACH WHOMEVER YOU'VE CALLED. EACH MONTH YOU RECIEVE A BILL
FROM YOUR SCC (SEPERATE FROM YOUR REGULAR PHONE BILL) DETAILING YOUR CALLS
AND BILLING YOU FOR THE SERVICE CHARGES PLUS YOUR CALLS.
NOTE: THIS VARIES ON OCCASION, PRIME EXAMPLE BEING "LONGER DISTANCE".
INSTEAD OF THE STANDARD CODENUMBER FORMAT, THEY ELECTED
THE NUMBER-CODE INPUT.
"SPRINT" USES A SIX-DIGIT CODE FOLLOWED BY A TWO DIGIT TRAVEL CODE.
A MOMENT OF SPECULATION IS DUE..
WHAT WOULD HAPPEN IF YOU ENTERED SOMEONE ELSES 'ACCESS CODE', THEN
DIALED THE DESTINATION NUMBER? THE ANSWER IS USUALLY GRAND LARCENY;
HOWEVER, IT IS QUITE POSSIBLE SINCE ONLY THE GENERAL PLACE OF ORIGIN IS
POSSIBLE TO DETECT ON A CALL PLACED WITHOUT NOTICE.
FOR INFORMATION ON THE COMPETITIVE LONG-DISTANCE SERVICES:
MCI : WRITE MCI, MCI BUILDING, 17TH AND STREETS, NW WASHINGTON, D.C.
20036. CALL TOLL FREE (800) 521-8620 OR IN MICHIGAN (800) 482-
1740. "EXECUNET"
SBS: WRITE SBS, JOHN MARSHALL BUILDING 8283 GREENSBORO DRIVE, MCLEAN, VA
22102. CALL TOLL FREE (800) 698-6900. "SKYLINE"
ITT: WRITE ITT, U.S. TRANSMISSION SYSTEMS, INC., P.O. BOX 732,
BOWLING GREEN STATION, NEW YORK NY. 10004 CALL TOLL FREE (800)
438-9428 OR IN NEW YORK (212) 797-2511. "LONGER DISTANCE"
SPC: WRITE SPC, ONE ADRIAN COURT, BURILINGAME, CA. 94010, OR CALL
(800) 521-4949 OR IN MICHIGAN, (800) 645-6020. "SPRINT"
WU : WRITE WU, 1 LAKE STREET, UPPER SADDLE RIVER, NJ. 07458. CALL
(800) 325-6000 FOR THE NUMBER OF YOUR LOCAL SERVICE OFFICE. "METROFONE"
A FINAL NOTE, DON'T DO ANYTHING I WOULDN'T. AND ABOVE ALL, IF YOU DO:
DON'T GET CAUGHT.
YOURS IN TRADE,
LONG JOHN SILICONE
Originally Captured From:
THE IMAGINATION FACTORY BBS (513)-787-3777

View File

@@ -0,0 +1,270 @@
--------------------------------------
Phreaking '87: The Real BEEF
--------------------------------------
An official LSD Publication
By The Illegal McBeagle....
/------------------------------------\
: The Elite Skull........201-379-1459:
: Middle Earth...........515-224-6557:
: Mickey Mouse...........918-241-2844:
\------------------------------------/
Phreaking: The use of a telephone
company to evade the toll charges
involved with a long distance call.
My strongest opinion about
phreaking is that it has been going on
for FAR too long. The companys that we
are dealing with are simply not going
to tolerate it much longer. But I have
had this view for about four years now,
and things have remained the same-
Hardly anyone gets busted...
This article will deal with
factual information about phreaking in
1987. I have conducted experiments
involving the supposed 'trace detect'
numbers, and I have spoke with a public
relations manager at Sprint. For a
different point a view, I contacted a
lawyer that was familiar with phreaking
as it pertains to us; The Phreaks.
Part I: The Rumors
I have heard two very different and
distinct rumors about phreaking. By
this I mean that it seems there are two
different point of views when it comes
to tracing and phreaking. One states
that there is simply no way to trace,
and that even if you were traced the
evidence could not be used against you.
The other one is that you can be
traced, and it is just a matter of luck
that you havent been busted yet. This
is the space age. I assure you that
tracing IS possible. If you have any
doubt, just call up the CIA or FBI #
listed in one of the many 'hacker phone
list' g-files and harrass whoever
answers a few times with death threats.
I like to assume that I am being traced
every time I call out. By doing this I
am more aware of the number of calls I
make and how long I stay on. If I was
to be busted, maybe the bill would not
be as high... The next question that
arises is ' But do all companys
trace?', and 'Are there any SAFE
companys left?'
Part II: My Expirement!
I am sure that all of you have seen, at
one time or another, a number posted on
a BBs that supposedly checks to see if
your code is being traced. Up until
recently, I was sure that these numbers
were for telephone repairmen to check
your lines for clarity and frequency
range. But recently I ran across one
(it still has the oscillating tone)
that acts differenty depending on how I
called it.
[ The Results ] 2mins for each test
#:817-460-1895 (Trace Test)
1st Company: AT&T (direct call)
R: The tone was clear and sharp, with
no interruptions at all.
2nd Company: Sprint [950-0777]
R: Erratic clicks and snaps while the
oscillating tone went up & down.
3rd Company: Sprint [800-332-0777]
R: Clear for one cycle (up-down),
then an abrupt disconnect.
4th Company: (?) 800-638-1996
R: Much like that of AT&T's results,
but the line quality was noticebly
poorer.
My analysis:
It is obvious that AT&T would not have
to enable a trace, as the AT&T Cosmos
keeps track of all your outgoing calls
for you. So if there was a way to
detect a trace, it would register
negative when tested through AT&T.
Sprint is a huge company, they have the
money to effectivly use tracing. The
clicks I heard using 950-0777 might
reflect this. But then 950's are
rumored to use ANI anyway. The 800
Sprint disconnected me, which AT&T
didnt, so I have a feeling that it was
tracing.
800-638-1996, which is most likely a
small company with no tracing
equipment, gave me a steady tone. By
the way, 1996 uses 6 digit codes.
Assuming that 817-460-1895 is a trace
detect, I would have to say that Sprint
is indeed dangerous in that they trace.
800-638-1996 seems to be the safe
route.
Now, what if that oscillating tone
included a 2600mz at the higher end?
Telephone company equipment of Sprint
might pick that up as a disconnect.
That would account for the clicks and
snaps, as they were similar to the
sound of a trunk about to be seized.
I myself will be staying away from
Sprint, and using 800-638-1996 from now on.
Poorer lines, but possibly safer.
Part III: My discussions with Sprint
On the phone I acted like a potential
customer looking for the right LD
company. I claimed that I had
discontinued MCI becuase someone got a
hold of my code and abused it. I was
not charged with the calls, but it had
scared me away from MCI. I asked her if
this might happen on Sprint. She said
that it was always possible, but not
likely (that was just bullshit). I then
told her that I did not think MCI even
knew who abused my account, and asked
her if they could find out who was
illegally using codes on Sprint. She
said yes, and that they had special
investigative procedure to do so.
[ Note: I believe that these
procedures consist of calling every
number dialed by the phreak in hopes of
getting a voice #, and finding out just
who called the person. When I ran LSD
BBs, Sprint used to call me all the
time wanting to know who had called
me...]
Part IV: The Next Step
If Sprint/Mci/Metro are not tracing
right now, I'm sure that they will some
day soon. But all is not lost, there
will always be a way to phreak.
Nothing is perfect, and when there are
imperfections in the phone company,
phreaks will find a way to abuse them.
Right now there are several new
companys (look in the Rolling Stones
classifieds) that offer unlimited long
distance calls for a flat rate of $100
a month (no, not PC Pursuit- which is a
decent alternative to phreaking). If
someone could get a hold of a code on
one of these systems, you could phreak
all you want without fear of being
busted. These companys simply want to
get that flat $100, and thats all. But
I would imagine the line quality is
horrible. I dont have a # for one of
these services, but when I get one I
will post it on the boards mentioned
above.
Part V: Calls in excess
There are businesses out there that
rely on long distance calls to bring in
the bucks. They might place 30,000
calls in one week. If they phreak,
they have cut out 80% of expenses.
Compared to those agencies, we are very
small time... I doubt I have ever put
more then $2,000 on one code. Those
companys could put $50,000 on one
before the code is even cancelled. I
would imagine Sprint and the others are
worried with the big-time phreaks, and
not so much us. Besides, it seems that
when a small-time-phreak is busted,
three or four others go down with him.
They are probably using them to set an
example. I would try to cut down on the
amount of calls you make; Narrow the
number of boards you call to just the
important ones... It is dangerous to
think of phreaking as something to do
when you are bored...
Part VI: Conclusion
Phreaking in '87 is more dangerous than
it was in '86. The same goes with any
crime that you commit. I talked with a
lawyer, and he said that when you are
caught phreaking you simply have no
rights. They know you did it, and they
can prove it. The tedious part is
figuring up how much you owe them- and
they frequently make you pay for the
time spent figuring your bill. My
advice to those that are busted is to
NEVER admit they you did it until you
see positive proof. If they do have the
'goods' on you, slap a sad story on
them and see about sending them a small
payment every month.. (until you get
back on your feet and can pay it all
off at once, is a good line)
You do not want to be dragged into
court, or sued.
Well, thats it. If I come across
anymore information I will post it on
the three boards listed above, or if
enough comes my way I'll write another
article.
Until then, Stay cool and DONT
get busted!
[%] The Illegal McBeagle [%]
\________[L][S][D]_________/
Post Script:
This is the second release of this
article. The first release brought a
lot of critisism my way about the
experiment I did. PLEASE realize that
it was just an EXPERIMENT, and I really
have no idea if Sprint traces or not. I
just think that they do.
2nd release from Middle Earth
515-224-6557

View File

@@ -0,0 +1,52 @@
THE HISTORY OF PHREAKING
------------------------
FROM 2600......
DID YOU KNOW THAT PHREAKING STARTED
FROM THE MOST UNLIKELY SOURCE......
CAP'N CRUNCH CEREAL!
YES, IN THE 1960'S A TOY WHISTLE WAS
PLACED IN THE FAMOUS CEREAL.
UNFORTUNATELY (NOT FOR US),THE WHISTLE
GENERATED 2,600 CYCLE-TONE, DUDE! A
YOUNG MAN WHO JUST ENTERED THE USAF
AS A RADIO TECH., WAS FASCINATED WHEN
HE DISCOVERED THAT BLOWING THE WHISTLE
INTO THE FONE AFTER DIALING ANY LONG-
DISTANCE # AND HEAING THE DISCONNECT
SIGNAL, THE TRUNK WOULD REMAIN OPEN
WITHOUT TOLL CHARGES ACCOUNTING, AND
THEN ON, ANY NUMBER COULD BE DIALED
REPEATEDLY. 800 #'S (INWATS) , WERE
LATER USED AS THE STARTER CALL TO
AVOID ANY CHARGES. HE USED THIS TO
CALL HOME WHILE STATIONED IN ENGLAND.
THE CAP'N PRACTICED FOR YEARS. HE
REPORTEDLY WOULD PLACE CALLS AROUND
THE WORLD TO HIMSELF.
HE WOULD THEN TALK AND HERE HIMSELF
20 SEC. LATER. HE WENT ON TO
DISCOVER THE OPERATOR CODES INCLUDING
AUTO-RELAY (OPERATOR INTERUPT, OR
VERIFY BUSY).
THUS, EAVESDROPPING IN CONVERSATIONS.
HE CLAIMED TO LISTEN IN ON THE
FOLLOWING: 1. PRES. OF THE USA 2. FBI
WHEN IT WAS AFTER PATTY HEARST 3. THE
SECT. OF DEFENSE 4. AND VARIOUS
MILITARY BASES THRU AUTOVON.
CAP'N CRUNCH WAS THRUST INTO THE
SPOTLITE WITH AN ARTICLE IN ESQUIRE.
THE TERM "BLUE BOX" CAME ABOUT BECAUSE
THE FIRST ONE THAT WAS CAPTURED WAS
THAT COLOR. THE CAP'N SOON WENT BEYOND
THE SIMPLE WHISTLE TO MORE COMPLICATED
DEVICES.

View File

@@ -0,0 +1,219 @@
A Brief History of Phreaking
____________________________
by
BucWheat
Like most college students, I have occasionally been
assigned research papers for one class or another. My latest
assignment was for a systems analysis class- the subject chosen
was required to be computer related. Intrigued by the ideas
presented in the movie War Games, I chose hacking as my topic. As
I began my research, the subjects of hacking and phreaking are
somewhat intertwined, and as a result I learned a lot of
fascinating information about the history of phreaking. That
information is summarized below.
(The following is an excerpt from Out of the Inner Circle by
The Cracker, Microsoft Press. Used without permission, but who
really cares?)
In the 1970s, before personal computers became as common as
they are now, the telephone system was explored by a group of
hackers who called themselves phone phreaks. The ethical and
technical predecessors of today's hackers, the phone phreaks were
anarchic "musicians" who delighted in using flutes, whistles, and
any other sound generators that worked to enter and explore the
worldwide telephone network.
The phone phreaks were far less organized and widespread
than today's hackers are, and, in the beginning, none of the even
knew of each other's existence. The cult itself came into being
in the late 1960s, partly because of a brilliant young man in
Tennessee named Joe Engressia.
Joe was the first phone phreak to achieve media notoriety
when a 1971 Esquire article told about him and his cohorts. Like
many other early phone phreaks, Joe is blind. He was only twenty-
two when the article was published, but he had been tweaking the
phone system since the age of eight. Telephones had always
fascinated him, and Joe happens to be one of those rare
individuals who are born with perfect pitch. One day, by
accident, he discovered how this gift could help him manipulate
some of the most sophisticated and widespread technology in the
world.
He was dialing recorded messages, partly because it was the
only way he knew to call around the world for free, and partly
because it was a favorite pastime. He was whistling while
listening to a recorded announcement when suddenly the recording
clicked off. Someone with less curiosity might have assumed it
was one of those strange things the phone company does to you,
but Joe had an idea. He fooled around with some other numbers,
and discovered he could switch off any recorded message by
whistling a certain tone.
He called the local telephone company and asked why tape
recorders stopped working when he whistled into the telephone. He
didn't fully understand the explanation he was given (remember,
he was only eight years old), but it sounded as if he had
stumbled upon a whole new world of things to do and explore. And
to a blind eight-year-old, an easily explored world, no farther
away than his telephone, was, indeed, an intriguing discovery.
Joe was able to control some of the telephone company's
global switching network - which is what he had stumbled upon
with his whistling - because of a decision American Telephone and
Telegraph (AT&T) made sometime in the 1950s. Their long-term,
irreversible, multi-billion dollar decision was to base their
long distance switching on a series of specific, audible tones
called the multifrequency system. The multifrequency system
(known to phreaks as "MF") is a way for numbers that designate
switching paths to be transmitted as tones similar to those that
touch tone phones make. Certain frequencies are used to find open
lines, to switch from local to long distance trunks, and,
essentially, to do most of the jobs a human operator is able to
do.
Undoubtedly, the decision makers at AT&T did not give a
moment's thought to the possibility that the system might someday
fall before a blind eight-year-old with perfect pitch, but Joe
found that he could maneuver his way through the system by
whistling that one specific tone at the right time. His
motivation was not to steal free telephone calls, but to find his
way around the network and to learn how to extend his control
over it.
Joe had explored for years, but he never thought of himself
as an enemy of the telephone system. He loved the system. His
dream was to work for the telephone company someday. But he
finally ran afoul of his intended employer one day when he was
caught whistling up free phone calls for his fellow college
students.
The publicity surrounding Joe's case had an unfortunate (for
the telephone company) side effect: it led to the creation of the
phone phreak network. Soon after the story hit the papers, Joe
began to get calls from all over the country. Some of the callers
were blind, most were young, and all of them had one thing in
common: an enormous curiosity about the telephone system. Joe put
the callers in touch with one another, and these scattered
experimenters soon found that they had stumbled upon several
different ways to use the MF system as the ticket to a world of
electronic globe-trotting.
Joe Engressia may have been the "phounding phather" of the
phone phreaks, but just as one discovery often leads to another
and another, it soon happened that someone else discovered a very
large error made by the Bell Telephone System in 1954. The Bell
System's technical journal had published a complete description
of the MF system, including the exact frequencies and
descriptions of how those frequencies were used.
Once the frequencies became public knowledge, phreaks began
to use pipe organs, flutes, and tape recorders to create the
tones that gave them control over the entire telecommunications
network. Then came the ultimate irony: the news spread that a
simple toy whistle, included as a giveaway inside boxes of Cap'n
Crunch cereal, produced a pure 2600 Hz. tone when one of the
holes was taped shut. Using the whistle at just the right point
in the process of making a connection, phreaks could call each
other whenever and wherever they wanted to without having to pay
the phone company.
One of the more curious and inventive phreaks using the
Cap'n Crunch whistle was John Draper, a young Air Force
technician stationed overseas. Draper used the whistle for free
calls to his friends in the United States. He was interested in
the way this bizarre tool worked, so he began experimenting with
the system and found that he could use his whistle and his
knowledge of the switching network to route his calls in peculiar
ways.
He began by calling people who worked inside the telephone
system. They weren't aware that he was an outsider, so he was
able to start gathering "intelligence". Soon, he was calling
Peking and Paris, and routing calls to himself around the world.
He set up massive clandestine conference calls that phreaks
around the world could join or drop out of at will. Soon, he
became known in the phreak underground as Cap'n Crunch.
Cap'n Crunch soon found out from other electronically minded
phreaks that it was possible to build specially tuned electronic
tone generators that could reproduce the MF frequencies. A few
electronic wizards began to circulate the generators, which were
first known as "MF boxes" because they reproduced the
multifrequency tones, and later came to be called "blue boxes",
as they are today.
The number of phreaks grew, and as they added their own
discoveries to the collection of phreak knowledge, the cult's
power to manipulate the system steadily increased. Then, in
October, 1971, the whole underground scene, from Joe Engressia to
Cap'n Crunch became well known to the outside world. Esquire
magazine published "Secrets of the Little Blue Box" by Ron
Rosenbaum, a journalist who had encountered the top phreaks of
the time. Cap'n Crunch was characterized somewhat romantically in
Rosenbaum's piece as a roving prankster who drove the author
around in his specially equipped van, pausing frequently at
public telephones to phone locations around the world: the
American embassy in Moscow, a group of blind teenage phreaks in
Canada, a public telephone in Trafalgar square.
After the article was published (though not as a direct
result) Crunch was arrested twice, convicted, and ended up
spending four months in the federal prison in Lompoc, California
in 1976, and two in Northampton State Prison in Pennsylvania in
1977. While he was in prison, several mob-connected inmates tried
to enlist him in a commercial blue box venture. Draper/Crunch
declined. The convicts broke Draper's back and knocked out his
front teeth.
After he left prison, Draper quit phreaking and decided to
start programming. An old friend by the name of Steve Wozniak
seemed to be doing pretty well with a piece of hardware he called
the Apple ][, and Draper started writing software for Apple
Computer. He developed a word-processing program known as
EasyWriter and gained another niche in the technological hall of
fame in 1981, when EasyWriter was chosen as the first word
processor to be available for the IBM personal computer. Now,
Cap'n Crunch makes a legitimate living under a new handle, Cap'n
Software.
TAP
During his trial, John Draper claimed (and still claims)
that his interest in phreaking was strictly devoted to learning
about the workings of the complex, worldwide communication-
switching networks. There were other phreaks, though, of a more
political mind, who saw this method of technological trespassing
as a tool for spreading anarchy, and one radical branch of the
phreak fraternity grew out of the political group of the late 60s
and early 70s known as the Yippies.
On May Day, 1971, the founding Yippie, Abbie Hoffman, and a
phone phreak who used the handle Al Bell started a subversive
publication called the Youth International Party Line, which
focused on information about cracking the phone network. A few
years later, its name was changed to Technological Assistance
Program (TAP), when the technology phreaks separated from their
more politically motivated counterparts. TAP was purely
anarchist. Through it, phreaks learned how to make plastic
explosives, how to obtain phony birth certificates and illicit
airline tickets, and how to abuse credit cards. It published
circuit diagrams of blue boxes, and its members specialized in
obtaining and trading hard to get telephone numbers, such as that
of the Vatican or the Kremlin. TAP even secured the phone number
of the American Embassy in Teheran after it was seized by
students during the hostage crisis of 1980, posted the number,
and invited phreaks to "tell off" the revolutionary guards.
In the late 1970s the phreak most closely associated with
TAP also became a well-known hacker with the aliases Richard
Cheshire and Cheshire Catalyst. Often employed as a computer and
communications consultant by large corporations who are unaware
of his secret identity, Cheshire has a widespread, carefully
cultivated network of cohorts inside the telephone company and
other institutions. Avoiding what he calls "dark side hacking"
that results in damage to data, Cheshire claims that there are
some kinds of information which even TAP will not publish. For
example, Cheshire once said: "A few years ago, before the
Progressive magazine actually published the plans for making a
hydrogen bomb, we were approached by someone who had similar
plans. I decided that anything like the hydrogen bomb, which has
the capability of destroying the phone network, is not in our
interests."
Cheshire also mentioned an incident in which a hacker he
knew stumbled upon the data processing facilities of a top secret
American seismic station in Iceland, a facility responsible for
monitoring Soviet nuclear testing. The hacker got out as soon as
he realized where he was - "We try to stay away from that sort of
stuff," Cheshire said. He also remarked, "I once invited the CIA
to attend a public lecture of mine, and there were a couple of
guys at that talk, seated towards the back, who definitely turned
a couple shades of green when I told about that Icelandic
station."

View File

@@ -0,0 +1,173 @@
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$ THE IC'S RULES OF PHREAKING $
$ $
$ These are the standards of hacking employed by $
$ the Inner Core. The text comes from a data file $
$ written by and for IC members. HACK YOUR OWN $
$ CODES. Don't leech codes from someone else. $
$ Having codes is like having sex, if you don't $
$ protect yourself you'll end up with a venereal $
$ disease. You have no idea where a code has been $
$ before you got your hands on it, when it was $
$ hacked or how long it's been in circulation. Time $
$ is a very important factor, the longer a code has $
$ been in use, the greater the risk. $
$ $
$ DON'T STAY ON A CODE MORE THAN THREE DAYS. Don't $
$ give the suckers an even break. To run a trace, $
$ MCI needs a court order. Ain't that nice. Paper $
$ work takes time, and it's highly unlikely that $
$ they could accomplish the feat in three days. $
$ $
$ It' s even more unlikely that they would even $
$ know they've been phreaked for at least a $
$ week. All company's have thirty day billing $
$ cycles, if you started using the code the day $
$ after the bills went out, you'd have twenty nine $
$ days left to play with it. The customer gets his $
$ billing and bitches up a storm. The company now $
$ has the option of setting up a trap, but alas, $
$ they notice that you haven't used the code in $
$ three weeks and have no destination number to $
$ PIN . If you phreaked the code one day before the $
$ billing cycle ends, then the customer may notice $
$ right away. Figure you have two days for it to $
$ reach the customer. If he yells right away it $
$ takes a few more days for the security department $
$ to process the paperwork for the trace. By that $
$ time you're long gone. $
$ $
$ DON'T STAY ON A CODE MORE THAN THREE DAYS. If you $
$ insist on burning the same company, you're going $
$ to develop a pattern they can spot. You call your $
$ girl friend in Alaska every damned day using the $
$ same company. It doesn't take a genius to predict $
$ what you're going to do tomorrow. They know where $
$ you enter their system and where you're going to. $
$ You've given them everything they need to run a $
$ good trace. Spread the wealth a little. Use US $
$ Telecom, then ITT, Lexitel, Skyline, Metro and a $
$ few of the 800's if you like. Spread it out. $
$ These people have no way of comparing. So you $
$ can screw Peter, Paul and the rest of the $
$ Apostles with no worry. Just don't be a dip stick $
$ and get lazy. $
$ $
$ Everyone is worried about THE TRACE. Don't be. $
$ It's no big deal for AT&T, after all it is their $
$ network, but for the leech services it's an $
$ entirely different matter. This is why we don't $
$ mess around with AT&T except through secondary $
$ accesses like PBX's or Diverters. $
$ $
$ This is the senerio that MCI's security $
$ department will run down. $
$ $
$ They call up a number that you've called....... $
$ $
$ "Hello, this is Inspector Bullshit with MCI. Did $
$ you receive a phone call from the 212 area code $
$ on November 22, 1945 at 4:00 A. M.? " $
$ "You didn't?" $
$ "We've traced fourteen calls to this number in $
$ the last two weeks, by the way, who am I $
$ speaking with?" $
$ "Well Mrs. Blabbermouth, perhaps someone else in $
$ your household received the calls? " $
$ "I see, your daughter has a boyfriend in New $
$ York." $
$ I'm afraid that he's in some serious trouble Mrs. $
$ B. If you'll cooperate with me we won't pursue $
$ this matter with your daughter." $
$ "That's correct, little Susie Blabbermouth won't $
$ be involved. It would be a shame to cause you $
$ folks trouble, after all she didn't actually make $
$ the calls." $
$ "All I need is the boy's name and phone number." $
$ "Let me see if I have that right." $
$ Jimmy Phreaker at 212-555-1212?" $
$ "Thank you Mrs. B you've been very helpful." $
$ $
$ The key point is, if Bullshit had really run $
$ traces he wouldn't be calling to con the $
$ information. The exchange is typical of cons used $
$ by most phone companys and illustrate several $
$ important issues. Make sure that the person $
$ you're calling is cool and there's no chance $
$ that someone else could rat on you. It is very $
$ unlikely that MCI will make such a call if you $
$ use the IC's Rules of Phreaking. Yet, if it were $
$ to occur these are your friend's options.... $
$ $
$ 1. HANGUP $
$ 2. "FUCK YOU"...THEN HANG UP $
$ 3. "I WAS WATCHING MIAMI VICE AND YOU INTERRUPT $
$ ME WITH THIS CRAP. FUCK YOU"....HANG UP $
$ 4. If you want to be nice about it; "I don't know $
$ what you're talking about.....HANG UP. $
$ $
$ The problem is now resolved. $
$ Remember these guys are like rabid dogs in heat, $
$ they're excellant con artists. Believe nothing $
$ you hear. You don't have to talk to them. If $
$ they had anything on you they'd be standing at $
$ your door with a search warrant. Their abilities $
$ in this area a very restricted. They operate by $
$ manipulating your fear and you have nothing to $
$ fear but your own fear. Don't try to come up with $
$ some lame explanation, you know you received the $
$ call and they know it. So don't make an ass out $
$ of yourself trying to explain away the obvious - $
$ HANG UP! $
$ $
$ What happens if your are caught? Congratulate $
$ yourself on being an asshole. The number of $
$ phreaks caught are so small that you have now $
$ qualified for membership in a really elite group $
$ of jerks. Inspector Bullshit now has several $
$ options. Grab your computer, this will be done no $
$ matter what. Grab your data files and any hard $
# copy you have laying around. This to help $
$ identify other subversives and also to supply $
$ incriminating information about you. Try to scare $
$ you into a confession. Standard operating $
$ procedure - keep your fucking mouth shut. You $
$ have nothing to gain by talking and a much to $
$ lose. If you're a minor<6F>you can forget about jail $
$ time, an adult is looking at a couple of weeks in $
$ the slam - may-be. Realize this, they don't $
$ really want your ass as much as they want THE $
$ MONEY. That's right boys and girls the buck talks $
$ loud and clear. If you're caught, you've broken $
$ every one of the IC's rules. At worst you're $
$ looking at a couple of thousand in phone bills. $
$ Get a lawyer to do your talking for you, that'll $
$ be about a five hundred dollar retainer. If the $
$ company is willing to settle for the money, and $
$ your computer, pay it - it's cheaper in the long $
$ run. If they want you in the kalaboose then fight $
$ it. As a first time offender the odds of you $
$ actually getting time is slim. Incidentally, $
$ Inspector Bullshit will drop a little extra on $
$ the bill for good measure. Have the attorney $
$ demand that they produce their records of all $
$ "alleged phone conversations". In fighting a $
$ phreaking case you'll want to have a jury trial. $
$ The technology behind the running of a trace is $
$ so complicated that even a half assed lawyer $
$ could confuse the average layman. He can make $
$ Inspector Bullshit describe switching down to $
$ atomic subparticles if he wants and by the time $
$ he gets to how a trace works the jury would be $
$ so confused that you'd skate on a "reasonable $
$ doubt". It would be interesting to see if a sharp $
$ shark could subpoena the actual equipment used to $
$ run the trace. I don't think that MCI would care $
$ to have one of their computers offline for the $
$ time it would take to have "independant" $
$ examiners checking out the functionality of the $
$ switching mechanisms. To phreak or not to phreak. $
$ It's a question only you can answer for yourself. $
$ $
$ $
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

View File

@@ -0,0 +1,70 @@
"Phreakin' USA!" by John Fowler
When you think "phone phreak," what kind of mental picture do you get? A
teenager holding a sound-making box up to a phone? Or someone who uses false
calling card numbers? The phone companies lose an estimated $80 million each
year on fraudulent phone calls (compared to a total budget of over $27
billion!), but only a minute fraction is attributed to the above cases. So who
is causing all these losses?
A phreak is officially defined as "One who causes information to be passed over
the phone without the phone company receiving due compensation." This applies
to more cases than most people expect. For example, calling a "ring-back"
system long distance just happens to be illegal, because you are passing
information (that you want to use the modem line) without paying the phone
company! This law is, of course, not enforcible, and even if it was, why
take someone to court over a matter of twenty cents lost? It's also illegal to
make a person-to-person call to yourself in order to let your spouse know you
arrived at a destination safely! Likewise, calling someone collect at a pay
phone, calling an operator to say you lost a dollar in a pay phone when you
didn't, and completing a call with another person over "test lines" (test lines
are in all exchanges, and if two people dial consecutive test lines, they may
talk to each other without any charge) are all illegal! Spreading all this out
along the entire phone network, it suddenly becomes a matter of millions of
dollars lost each year, even without those little boxes that simulate operator
tones!
However, the common image of the phreak is someone who plays with red, black,
and blue boxes to somehow gyp the phone company into allowing a free call.
Each of these boxes, named after the color of the originals, has a different
function, and many times the boxes are confused with each other. A red box
is a device meant to be used only at pay phones. It simulates the sounds
of various coins dropping into the phone. When some pay phones hear this
sound, they automatically assume the a coin actually has dropped into the phone
and registers it. A black box is a device which converts any phone jack it is
hooked up to into a toll-free number. If Larry hooked up one, I and everyone
else could call the CPTBBS as if it were an 800 number, yet Larry would not
have to pay the excessive charges that an 800 number demands. With the
sophisticated scanning equipment the phone company has today, however, black
boxes can be detected after a while.
The most infamous of the colored boxes is the blue box, which mimics the
operator tones to allow free calls from any phone. They cost only $25-$50 to
make, but can sell for up to $3000! Here's how it works: a phreak first dials
a no-charge number, such as an 800 number for a large corporation (if he wants
to add a little irony, he'll make it AT&T's 800-number!). The number rings
once, and then the phreak generates a pure 2600-cycle tone. This tells the
phone equipment that the call has dislodged and to be ready for the next call,
though the phreak remains on-line! The phreak then gives another tone telling
the equipment that a toll call is coming through (though in actuality it is
not). The phreak dials the number and is connected, but the billing equipment
never starts! When the phreak eventually hangs up, the records will only show
that he made a toll-free call.
It would cost the phone companies approximately one billion dollars to change
the switching system so that the blue boxes would not work, so instead they
decided to invest in a scanning system that records all questionable calls.
Now that scanning system is so quick that it's almost suicide to use a black
or blue box at home. Phreaks can still get away with using blue boxes at
pay phones if the call is short, but that's about all. If someone is found
using a blue or black box at home now, the box is immediately confiscated, and
the phreak's service may be possibly disconnected.
If someone offers to sell you one of these colored boxes for the standard
ridiculous price, I'd advise against it. You stand to lose much more than you
would gain in the long run.
Reference: Kleinfield, Sonny; "The Biggest Company On Earth";
published by Holt, Rinehart, and Winston; 1981; pp. 247-261.

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,138 @@
Phuckin' Phield Phreakers Present
In Coalition With The Apostles Of Anarchy Across America
------------------------------------------------------------
Scaring The Phuck Out Of Your Phriends
(or enemies)
If You're A Phuckin' Phreak
------------------------------------------------------------
Disclaimer:
Have a phuckin' k-rad time with the shit in this file,
and we suggest you try this whenever you have spare time and
a beige box in your hands. Why? Cuz we don't give a shit,
and we're not responsible anyway! Haha!
Intro:
Yeah, so, you have a beige box and you're sick of it.
Big fat hairy deal. Ok, the only reason I'm writing this
lame text phile is cuz it's Holloween today, and I just
might try this trick on some lamers out there.
Ok, like I said, you have a beige box. Over the past
few weeks, you have used, abuzed, and phucked with your
beige box. Yeah, big deal, so you called 100 1-900/976 fone
numbers on someone else's bill. But, anyone can do that,
right? But, now you're sick of it, sick of just adding
dollars and cents to your phriend's fone bill. So, whatta ya
do?
Number one, read this phile, unless you're a lamer,
then burn this phile and go jump off a bridge.
Ok, if you're still around at this point (and I'm
assuming you're not a lamer, and if you are, I guess you
don't speak or read English!), read on!
The Trick:
Ok, ok, ok, so what's the big story here? As a
beginning thought, have you ever wanted to phucking scare
the shit out of someone somewhere? Well, now you can!
Safely!
What we're gonna teach you ta do is to scare the living
shit out of your phriend (enemy, bystander, etc) and then
get loads of laffs at the same time. Read on:
What you need:
2 Beige Boxes (portable lineman's handsets)
1 Victim
1 Phreak Minimum (more phreaks for more phun, but no
phuckin' lamers)
1 Victim's Green Base (output device, can, etc, where
the victim's fone line connects)
What to do:
Yeah, simple enuff, you have all the parts together.
Now, go out to the victim's green base, and try to make sure
that the victim or any pass-er-by's don't see you doing
this.
Open the green base or output device, or whatever, and
using ANI, find the victim's fone number. Ok, you found it,
or you didn't. If you didn't find it, go to another output
device in the nearby area and try again.
Assuming you found the victim's fone number, attatch
one beige box to the victim's fone line, but keep it on-hook
(the switchook DOWN, so it will ring when called, lets call
this beige box 1) and stick the other beige box on another
pair of terminals different from the victim's terminals.
Let's call this beige box 2.
Let's hope you have enuff brain power for the next
step: Using beige box 2, call the victim's house. Beige box
1 should ring, but don't pick it up until the ringing stops,
which means the victim/victim's family has picked the fone
up. Then, pick up beige box 1. OK, now beige box 1 and 2
both are off-hook. Say something through beige box 2, like
heavy breathing or something like, "Tthhhhhiiiisssss isss
theee Mutilatorrsss.... I'm inn your houssssss.....!"
Ok, here's another crucial point. At this point, the
victim will either say, "What?", "Bullshit, fuck off!", or
something like that and hang up or stay on-line for a bit.
If they hang up, REMEMBER, you still have beige box 1
attached... hehe... Through beige box 1, keep threatening
them with maniacal sounds and shit you see in horror movies
all the time. That will "phreak" them out (they will think
someone is calling them from their own house...) See what
I'm getting at? Pretty phun, huh?
Another method:
Ok, lets say you have only 1 beige box. But, you also
know the ringback number to your area. Ok, simple, go to the
victim's output device, find his fone number with ANI,
attach your beige box to his fone line, dial ringback, and
wait for the victim to pick the fone up. Whala, read the
above paragraph for what to do from here... hehe, the victim
cannot disconnect you cuz you're just another extension of
the house's fone system... you're scare the shit out of most
people... especially on HOLLOWEEN!!!!!!
Conclusion:
Sooo, that's the plan, and if you're smart, you can see
how this would scare the shit out of people. If you can't
see why, go kill yourself. Ok, well, bye bye for now, and be
watching for more phun philes by PPP and AAXA. Other than
that, happy Holloween, and phuckin' phreak your neighborhood
to the ground.... enjoy.....
------------------------------------------------------------
(x) 1989 - PPP - Phuckin' Phield Phreakers
(a) 1989 - AAXA - Apostles Of Anarchy X America
------------------------------------------------------------
This phile was written on OCTOBER 31, 1989 - 5:50pm!!!
------------------------------------------------------------
PPP are:
Doctor Dissector, Killer Korean, Phortress Phreak, M.I.T.,
White Boy, The Lode Runner, Dark Helmet, Tak/Scan.
AAXA is a bunch of text phile writers.... heheheheheheh!
------------------------------------------------------------
Greets to cDc, Anarchist's Alliance, CHiNA.
------------------------------------------------------------
Insidious Infusion.... 619-679-0248 12/24/mnp Login=FUSION
nupw=REACTOR
------------------------------------------------------------

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@@ -0,0 +1,138 @@
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
:% %:
:% PHREAKERS' NET %:
:% Written by The Blue Buccaneer %:
:% %:
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
So you've always wanted to be your own operator?
So you've always wanted to run your own Long Distance Service?
So you've always had a slight yearning to make money with minimal amounts
of work on your part?
So you've always had visions of your computer making you money?
Well here's your chance....
P H R E A K E R S ' N E T
Not exactly legal, safe, or feasible - by an exciting idea none the less!
Step 1: Set up your LDS system on your computer.
[Since Phreakers' Net is just an interesting idea and not really intended to
be put to use, you will have to create your own system based on what you read on
my theoritical one in this file. If you really want to run a P Net, contact me
somewhere and I'll see about helping you to write one - What the hell?]
Step 2: Find your customers.
This step shouldn't be all that hard as many people should be more than
willing to subscribe to a LDS with a low rate & hi-tech system like yours. Your
rates should be set at about five to ten cents less than say Sprint or whatever
else is available to the customers. You would find your customers personally
and not advertise in any sort of way (this is a scam, remember?). You will only
need a few of them anyway (no more than thirty).
Step 3: Ok, now you have your "Super Hi-Tech LDS" set up and your customers
lined up. Here is an example of exactly how your awesome system
that beats the hell out of Sprint works:
- [Fred Johnson, your customer, calls]
{Note: Your system will be busy a lot (obviously, you only have one line).
But hey! Do they know that? Hell no! Do they realize that they are one of
only a few customers? Nope! They, understandably, will be firm believers in
your great LDS network and will easily believe your excuse that your system is
only able to hand twenty or so callers at one time.}
(By the way, the motto is: P T&T - The less you hear, the more we laugh!!!)
Your ever-so-friendly Cat answers and says (notice that Sprint never says much
at all to anyone?):
Hello. Welcome to the _____ LDS. Please type your identification number:
{Beats the hell out of a dull tone}
{At this point your Cat decodes the id number by either TT decoder chip or
by use of the Apple Cassette Input Port (see Tic-Tac-Talker / Apple Talker)}
{Now your wonderful system starts to show off}
{After going to Ram-Disk very quickly}
Hello again, Mr. Fred Johnson of 2600 Alley Street, New York, New York. This
is your 11th call, totaling 128 minutes, 12 seconds and amounting to 31 dollars,
71 cents. Your last call was made on Monday, June 10, 1985 at 3:31pm to
Chicago, Illinois to 312-665-0264. Your call lasted six minutes, 29 seconds.
The total came to three dollars, 43 cents. The Doritos are on sale for $1.67 at
your local grocery store. Thank you for using the _____ Long Distance System.
{Now if that doesn't convince your customer that your system is bigger and at
least fifty times better than Sprint already (remember his bill is less too),
the guy has serious problems, probably voted for Nixon & still does!)
Step 4: So, while your furry Cat has been impressing the shit out of this
fool with his life history and local blue light specials, it also has picked up
your second line, dialed the local Sprint port, typed "your" ode, and connected
the line in 3-way with ole Mr. J. who is now heard his life history and ready
to call someone:
{Cat:} Please enter the number you wish to dial.
And your awesome system (Sprint) puts the call through! Then your Cat starts
its little Cat Clock to time the length of the call and maybe even starts its
cute tape recorder going. You may wish to have a few good laughs with your
phriends (phreaker friends) that evening reviewing the days conversatins. ( You
might even be lucky enough to pick up some extra cash with blackmail? )
Step 5: When the caller wishes to end his conversation he can either hit a
key (like the '*') or just have whoever he called hangup. The Cat would dump
the 3-way and tell the good & kind customer that:
Your call to Miami, Florida to 305-556-6858 lasted 12 minutes, 42 seconds.
The tolls amount to 4 dollars, 21 cents which will be charged to your bill.
{Collect the bill personally or have him pay by check to _____ LDS}
Then after it has recorded all this wonderful information (plus printing the
days take on the top of your screen) your Cat can ask Fred if he would like to
make anyother calls now or simply hang up. I'm sure your system could do a
variety of other things for Fred like crank calling his neighbors, but that is
up to you and your system.
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
Well good! It made it this time. I originally typed this three days ago,
except my AE blew up. I'll say one thing for it, AE sure does crash in style.
I was inserting lines and all of a sudden we get all kinds of neat music from
the speaker than boom. GONE! Anyways, being to devistated to find the Inspec
and try to recover the file from memory, I went and had lunch.
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
I haven't really come to an answer on how feasible this idea is, but I guess
it could be done with ome help from some of your advanced Phreak friends. A
known way of get an annonomous (safety) line is having them change a payfone
into a regular phone and forwarding the call to your system.
And as long as the FCC didn't get interested in you, you would be really safe
and probably able to pull in a fair amount of extra cash for doing almost
nothing. You could also charge your customers a one time sign up fee to be a
user of your LDS.
The toll rate and area code/city converting may be done through various
Applesoft programs available now (see Phone Utilities and Toll Rate Computer).
:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open


View File

@@ -0,0 +1,122 @@
%MWI% -=> MICRO WORLD INC <=- %MWI%
%MWI% PRESENTS: %MWI%
%MWI% %MWI%
%MWI% The Technical Book %MWI%
%MWI% Of Phreaking %MWI%
%MWI% %MWI%
%MWI% For The Master Phreak to %MWI%
%MWI% Those Just Learning %MWI%
%MWI% Some Definitions %MWI%
%MWI% %MWI%
%MWI%MWI%MWI%MWI%MWI%MWI%MWI%MWI%MWI%MWI%MWI%MWI%
Created during January and Febuary 1989
v1.0
Introdution to the Article
File One (of four)
This file was just to be a short set of definitions for those of you who don't know all the phreaking terms. This was requested by a few people on a small 312 board called The Magnetic Field Elite (312-966-0708, call, board has potential) like Th
e Don. But I have decided against making this small file that is common in many places but instead to make something that I have never seen before. Not just a common file but one of high technical use. With a printout of this you will never need to mis
sout on a definition again. But that's not all. The file will discuss, indepth, the working of each of these operations below. If you are viewing this file simply for the sake of finding one meaning I suggest that you get the entire thing and then never
need to call and view phreak files again.
Topic 1: The Phone/Modem
Scince phreaking is impossible without a phone or modem you I will start with the most important and most complex part of phreaking. The Phone. Now, the phone is a device that transfer sounds as sound enters a receiver, is transfered to an amoun
t of voltage, sent through the telephone lines and decode back to sound. A modem is based on a universal language of sounds transfered through the modem. Modem stands for the work Modulator/Demodulator. This is like receiveing and sending. Now, with m
ost modems, before connecting, tones just are just the same as the tones that a common phone can make.
But the phone can make many tones and some have purposes that are very useful, tones that are reserved for At&t, and thus dangerous.
To go through all the tone would be senseless and a book on tones alone could be written (Hmm...maybe I could...) so I will not go into that.
But, assuming that you know what a box is I will explain what the odd types of modems can do.
If you own an Apple Cat modem you may use it to generate any tone. This is very useful. Some people are against the Cat for various. I will remain neutral on the topic but if you have no understand then phreak the way you see easiest and safest
.
The other way is by using an acoustic modem. You may modify a phone to make certain tones and you may make then send these tones through the acoustic modem by placing the headset of the phone on the acoustic's couplers.
You may also attempt to make the box modfications directly to the modem but if you error and damage the modem alot of money is wasted while you could have used an acoustic and messed up a twenty dollar phone.
Basicaly the common phone can make 18 tones. For example, when you press a number on the phone two tones are made together and make the signal for the number or charater you hit. This is the entire phone to line explantion of the phone. Now the
actual internal working of the phone is very complex and can be best under stood by getting a book from the library on it.
Topic 2: The Calling of Numbers
When you call a local number as soon as you hit a number other than one you the phone knows that you are calling localy. Once seven digits are entered the numbers are sent to the nearest switching station and you call goes out. The station deter
mines the units per minute and start billing as soon as the called phone answers. All calls are automaticaly one minute long. If you hit a one as the first digit you dial the phone recignizes this as a long distance call and sends you to either the At&t
switching station or to another long distance service if you have chose to use other than At&t.
If you are using a At&t the call goes through the long distance switching station where unit per minute is determined and then it is refured to the number you called. The call may be slowed down depending on how many times the switching station c
hanges between you and the place you are calling. If it changes between ESS and X-Bar (described below) one it would go through fast. If it changed between them 50 times it would be a very slow call going through. Plus the sound quality may decrease bu
t that is not a fact, just an understanding I have come to when callign long distance with At&t.
If you are calling through any other service, such as MCI, Alnet, Teleco, US Sprint or any of the other endless companies, then things are not the same for long distance calls.
You call first goes to the company you call through and price of call is determined by any of the ways a company determines price. The call then goes out through the lines to the long distance companie's station nearest to the number you dialed a
nd tres to go though. If the number is too far away from a station you may get a "The number you have dialed cannot be reached from your calling area."
Thus, you have the basic information of how call goes out. Now to get to phreaking and the real reson you read this file.
Topic 3: The Long Distance Company and Codes.
The way of using a different long distance company or not paying a quarter when calling from a payphone. Using the phone card or the code.
Names for these numbers:
950's
800's
Extenders.
PBX's
950 ports
Port
Code port
(Company name) port
The above mentioned names are the phreaks lifeline. They are places where you call and enter a code, then the area code of the place you want to call and finally the number for the place you want to call. When the code is entered it is checked i
f it is valid and then the person how owns the code pays for the call. If the code is not valid you normaly get a message saying that the code you entered is not valid.
When a call goes through it is the same as a normal long distance call except that it is charged to the owner of the card.
Some places may require that you enter a nine or a one before you enter the code.
Now, the phreak uses these places by calling them over and over again until they get a code. But they do this with a computer and a program such as Hack-a-Matic, Hacking Construction Set (often called HCS), Hack This Buddy, Intellihacker (Old), C
at-(and then a name, for the Apple Cat. Has to many names to list), and some others. These are all Apple programs but there are also code hackers for the Commodor 64, 128, Amiga, IBM (of course) and so on. Most computers have them.
One thing I have found useful is to use a Radio Shack portable computer with a built in modem and hack from other houses, this is much safer. Secrity in these companies run from really tough (MCI) to sad (like the places that tryo to scare off ha
ckers with tape recordings). 950 ports in the ESS area are set up to trace and could do so very easily but for some reson they are against it. Possibly the time and modey to cheack the calls and pay for tracing. Places have gotton tougher though, if th
ree people get busted off a number in one week and this has never happened before then you can almost be sure that they have stepped up security and that it is time to use a new port.
Now I will discuss some of the things used by the Phreak.
Topic 4: The Loop
Loops, although they may seem fun they are really rather useless. They work as follows.
Two numbers are looped together. Usually they are almost the same just a digit different from one another. If you call the lower number you will wait a few secounds and then hear a 1000mhz. tone. If you call the higher number you will hear noth
ing. If you can one number (dosen't matter which) and someone else calls the other number you will be able to talk to each other. The purpose of these is to test trunk lines. This way they could make sure there was no break in each trunk.
Now the old purpose for loops was that they where free to call so one person would call one and another would call the other and they would get to talk for free. Also, one person might call one number and just wait and talk to whoever called the
other number. Like a two line bridge.
Today you cannot call these without being charged because the phone company caught on. But you can split a phone call with these so if there is a loop between you and a person you want to talk to you can only pay for half by calling the loop. An
d the phone company dosen't care because either way they get their money.
The billing service for a loop is one all by itself, not like normal local calling and for this reson I might almost belive the rumor that Blue Box tones can be used to call loops.
The loops billing service didn't exist awhile back so a call to one was free. Now, if you call this new billing system picks it up. But the loops billing system is just something that At&t scraped together and there are most likly some holes in
the system (like not recording blue box tone generation numbers).
Topic 5: The Diverter
The diverter has been a very simple, yet incredibly usefulthing through the years. To use one you must call, after hours and let someone answer the phone, don't answer them, let them hang up and get a faint dialtone. Then you dial again and call
from the diverter.
Before, you could use a diverter and call through it. The you would only be charged for the call to the diverter, not the one after it. That bill went to the diverter itself. But they fix this problem easily and now you still get charged if you
are in the ESS area.
Also before, you could use a diverter to call a number that traces and instead of being traced to your number it is traced to the diverter. But ESS eliminated that too.
But you can still use a diverter to call hard to reach numbers. Like if you called a place and it gave you a "The number you have dial cannot be reach from your calling area" then if you knew of a diverter in the area of the number you could call
through it to the unreachable number and get through. The way a diverter works is after hours when you call a place the call is forwarded to another place. Then, when you don't answer the person at the other place hangs up and your call tries to
disconnect from the forwared number and you end up at the diverter with it's dialtone.
Hope this file was of some use to you all.
If you want to see more like it leave me E-mail
on
these great boards!
------------------------------------------------------------------------------------Ripco - (312)-528-5020
TFBII - (312)-945-3665
The Blue Fire
BBS (312)-377-???? sysop: The Micro Master
The Metal AE (201)-879-6668 entry: Kill

View File

@@ -0,0 +1,266 @@
_____________________________
| |
*REAL PHREAKERS GUIDE VOL. 1*
| |
* typed and created by *
| |
* Taran King *
| and |
* Knight Lightning *
| |
* Written on 6/10/85 *
|___________________________|
This guide is written in the same stream as the Real Pirates
Guides, but for the Real Phreak. This is basically what real
phreaks do and don't do according to other real phreaks...
"Written by Real Phreaks for Real Phreaks". This phile has
been written with the compiled ideas of phreaks other than
the two writers listed in the intro. Therefore, we have a
wider view of what you should be like. Well...on with the
show!!!
_____________________________________________________________
Phone Phreak - (as defined by Forest Ranger) In the mid-
1970's, cheating the phone company became the great national
pasttime among a select group known as "Phone Phreaks".
These hearty young souls knew more about the phone network
than many AT&T engineers, and they learned most of it by
reading AT&T technical journals and by experimenting with
their own phones. But today, the Phone Phreaks have been
hurt by a mass group known as the "Rodents". These Rodents
have caused much pain and sorrow to what we know today as
phreaking. This phile will show the do's and don't's of a
real Phone Phreak...
_____________________________________________________________
Real phreaks don't just leech off of BBS messages for their
codes.
Corollary: Real phreaks know that codes posted on BBS's are
the most used and are probably the closest to being unsafe.
Also, it is a known fact that pheds occasionally plant trap
codes (codes with traces) to catch the phreak at work.
Real phreaks don't worry about spelling. If their preference
of spelling cool (K00L) is different from someone elses, they
don't worry about what they say.
Real phreaks don't try to bluebox from their home if they
have ESS.
Corollary: Real phreaks know that almost anything on ESS
besides phreaking from your home is unsafe!
Real phreaks don't call out of state Atari boards (unless
they of course are an <koff!> Atari looking for wares) unless
it is a phreak board (a rare case!).
Real phreaks don't even attempt to use 2400 baud on
extenders.
Corollary: Real phreaks hope for the day that
MCI/Sprint/Metro/etc. make it safe for phreaks to do 2400
baud transmissions.
Corollary 2: Real phreaks know that extenders are the same as
phreak numbers as MCI and any other service.
Real phreaks read the Basic Telecommunications philes by BIOC
Agent 003 to find out what is safe and what is not.
Real phreaks have been on a conference.
Corollary: Real phreaks know how, and could at their will,
any time, set up a conference.
Real phreaks don't try to use pulse fones on an extender.
Corollary: If they don't have a touch tone fone, they know to
use Travelnet's voice verification (even though it's not the
safest to use from your home).
Real phreaks don't have problems obtaining numbers to their
local long distance service.
Corollary: Real phreaks don't post messages asking for the
number to the local long distance service dial-up.
Real phreaks don't spend hours redialing Diversi-Dials all
over the country, knowing that they are basically the same,
and it won't help to keep the code valid.
Corollary: Real phreaks don't call Diversi-Dials to get
recognition on their name because they know that other people
call up Diversi-Dials under false handles of other phreaks to
get attention.
Real phreaks pirate.
Real phreaks don't work for any government agency.
Real phreaks don't bust other phreaks (for any reason).
Real phreaks know that P-80 isn't a legal board for you to
call and voice your opinion about the new P-80 model of the
TRS computer.
Corollary: Real phreaks don't call boards named "H.O.M.E.",
"Family Circus", or anything else that indicates family
outings on the BBS's.
Real phreak boards aren't named "Phreak/Hack Centre USA" and
have their number posted on the Compu-Serve national BBS
listing.
Real phreaks have better things to do with their time than
have Compu-Sex through a Diversi-Dial, E-mail, or any
Dial-Your-Match BBS.
Corollary: Real phreaks get the real thing.
Real phreaks don't listen to Duran Duran...ever!
Corollary: Real phreaks change the channel with swiftness if
they hear any gay group come onto the channel they are
listening to.
Real phreaks aren't named "Mr. Phreak" on boards like
"H.O.M.E." or any legal board.
Corollary: Real phreaks can think up a creative name unlike
"Mr. Phreak" for their permanant name.
Real phreaks don't watch Saturday morning cartoons.
Real phreaks don't use their codes to call up sysops of
boards all over the country to bother them voice for hours.
Real phreaks don't have to start G-philes disks by leeching
off of other phreaks because they are original enough to
realize that they are readily available on most phreak
boards.
Real phreaks can spot a rodent 10 miles away.
Real phreaks don't get sext (sex text) philes to get off by.
Real phreaks don't watch the Bible Banger's shows on Sunday
mornings.
Real phreaks know how to separate phreak messages and hack
messages.
_____________________________________________________________
Well, that about wraps it up for Real Phreakers Guide Volume
1. If there is already a volume one for a Real Phreakers
Guide, well, this is our volume one. If any of this is
copied from your Real Phreakers Guide, we apologize, but this
has all been original. This has been brought around with the
help of the following phreaks:
Forest Ranger, The Lone Ranger, Napoleon Solo, and other
minor phreaks that I might have missed.
Real Phreakers Guide Volume 1 --- by Taran King and Knight
Lightning
From Metal Shop: Dark Tower Phase II --- 314-432-0756
Many more philes where this one came from!!!

View File

@@ -0,0 +1,360 @@
R.A.G. T.I.M.E.
THANX TO PIRATES TREK
HOW TO BE A REAL PHREAK
THE WORLD OF CRYTON
[414] 246-3965
IN THE PHONE PHREAK SOCIETY THERE ARE CERTAIN VALUES THAT EXIST IN ORDER TO BE
A TRUE PHREAK, THESE ARE BEST SUMMED UP BY THE MAGICIAN: "MANY PEOPLE THINK OF
PHONE PHREAKS AS SLIME, OUT TO RIP OFF BELL FOR ALL SHE IS WORTH. NOTHING
COULD BE FURTHER FROM THE TRUTH! GRANTED, THERE ARE SOME WHO GET THEIR KICKS
BY MAKING FREE CALLS; HOWEVER, THEY ARE NOT TRUE PHONE PHREAKS. REAL PHONE
PHREAKS ARE 'TELECOMMUNICATIONS HOBBYISTS' WHO EXPERIMENT, PLAY WITH AND LEARN
FROM THE PHONE SYSTEM. OCCASIONALY THIS EXPERIMENTING, AND A NEED TO
COMMUNICATE WITH OTHER PHREAKS ( WITH- OUT GOING BROKE), LEADS TO FREE CALLS.
THE FREE CALLS ARE BUT A SMALL SUBSET OF A >TRUE< PHONE PHREAKS ACTIVITIES.
THE TEN COMMANDMENTS
REPRINTED FROM TAP ISSUE #86. (TAP, ROOM 603, 147 W 42 STREET, NEW YORK, NY
10036. SEND A SASE FOR THEIR INFO SHEET "WHAT THE HELL IS TAP?" AND TELL THEM
THAT BIOC AGENT 003 TOLD YOU ABOUT IT.)
THE PHONE PHREAK'S TEN COMMANDMENTS
I. BOX THOU NOT OVER THINE HOME TELEPHONE WIRES, FOR THOSE WHO DOEST MUST
SURELY BRING THE WRATH OF THE CHIEF SPECIAL AGENT DOWN UPON THY HEADS.
II. SPEAKEST THOU NOT OF IMPORTANT MATTERS OVER THINE HOME TEL- EPHONE
WIRES, FOR TO DO SO IS TO RISK THINE RIGHT OF FREEDOM.
III. USE NOT THINE OWN NAME WHEN SPEAKING TO OTHER PHREAKS, FOR THAT EVERY
THIRD PHREAK IS AN FBI AGENT IS WELL KNOWN.
IV. LET NOT OVERLY MANY PEOPLE KNOW THAT THY BE A PHREAK, AS TO DO SO IS TO
USE THINE OWN SELF AS A SACRIFICIAL LAMB.
V. IF THOU BE IN SCHOOL, STRIVE TO GET THIN SELF GOOD GRADES, FOR THE
AUTHORITIES WELL KNOW THAT SCHOLARS NEVER BREAK THE LAW.
VI. IF THOU WORKEST, TRY TO BE A EMPLOYEE, AND IMPRESSEST THINE BOSS WITH
THINE ENTHUSIASM, FOR IMPORTANT EMPLOYEES ARE OFTEN SAVED BY THEIR OWN
BOSSES.
VII. STOREST THOU NOT THINE STOLEN GOODES IN THINE OWN HOME, FOR THOSE WHO DO
ARE SURELY NON-BELIEVERS IN THE BELL SYSTEM SECURITY FORCES, AND ARE NOT
LONG FOR THIS WORLD.
VIII. ATTRACTEST THOU NOT THE ATT- ENTION OF THE AUTHORITIES, AS THE LESS
NOTICABLE THOU ART, THE BETTER.
IX. MAKEST SURE THINE FRIENDS ARE INSTANT AMNESIACS AND WILL NOT REMEMBER
THAT THOU HAVE CALLED ILLEGALLY, FOR THEIR COOPERATION WITH THE
AUTHORITIES WILL SURELY LESSEN THINE TIME FOR FREEDOM ON THIS EARTH.
X. SUPPORTEST THOU TAP, AS IT IS THINE NEWSLETTER, AND WITHOUT IT, THY WORK
WILL BE FAR MORE LIMITED.
CN/A NUMBERS
CUSTOMER NAME & ADDRESS BUREAUS EXIST SO THAT AUTHORIZED BELL EMPLOYEES MAY
OBTAIN THE NAME & ADDRESS OF ANY CUSTOMER IN THE BELL SYSTEM BY GIVING THE CN/A
OPERATOR THE CUSTOMER'S TEL. # ALL CUSTOMERS ARE MAINTAINED ON FILE INCLUDING
UNLISTED #'S. THESE BUREAUS HAVE MANY USES FOR PHREAKS.
HERE IS HOW AN EMPLOYEE MIGHT GO ABOUT CALLING CN/A:
"HI, THIS IS JOHN DOE FROM THE MIAMI RESIDENTAL SERVICE CENTER, CAN I HAVE THE
CUSTOMERS NAME AT (123) 555-1212." THE EMPLOYEES USUALLY USE THESE FOR CHECKING
WHO BELONGS TO A # THAT SOMEONE CLAIMED THEY DIDN'T CALL.
IF YOU SOUND CHEERY AND NATURAL THE OPERATOR WILL NEVER ASK ANY QUESTIONS. IF
YOU DON'T SOUND LIKE A MATURE ADULT, DON'T USE IT! ALWAYS PRACTICE FIRST & SO
YOU DON'T SCREW UP AND MAKE THE OPERATOR SUSPICIOUS. USE NAME THAT SOUNDS
REAL, NOT YOUR PIRATE NAME EITHER! ALSO SAY THAT YOU ARE FRO A CITY THAT IS
FAR AWAY FROM THE ONE THAT YOU ARE CALLING.
THE CN/A NUMBER FOR THE NY AREA & VICINITY (212, 315, 516, 518, 607, 716, &
914) IS>>>>>>>>>(518) 471-8111<<<<<< AND IS OPEN DURING BUSINESS HOURS.
[DON'T ABUSE IT!]
AT&T NEWSLINES
AT&T NEWSLINES ARE NUMBERS AT AREA PHONE OFFICES THAT TELCO EMPLOYEES CALL TO
FIND OUT THE LATEST INFO ON NEW TECHNOLOGY, STOCKS, ETC. THE RECORDED REPORTS
RANGE FROM VERY BORING TO VERY INTERESTING.
HERE ARE A FEW OF THE NUMBERS:
*(201) 483-3800 NJ (518) 471-2272 NY
(203) 771-4920 CN (717) 255-5555 PA
(212) 393-2151 NY (717) 787-1031 PA
(516) 234-9941 NY *(914) 948-8100 NY
SOME OF THESE NUMBERS ARE TOLL-FREE, BUT YOU CAN'T ALWAYS COUNT ON IT.
* THESE NUMBERS ARE NOT ALWAYS UP!
NUMBERS FROM OTHER AREAS ARE AVAILABLE BY REQUEST FROM F)BIOC L)AGENT 003.
ANI NUMBERS
ANI NUMBERS IDENTIFY THE PHONE NUMBER THAT YOU ARE CALLING FROM. IT IS USEFUL
WHEN PLAYING IN CANS (THOSE BIG SILVER BOXES ON TELEPHONE POLES) TO FIND OUT
THE # OF THE LINE. IT IS ALSO GOOD TO FIND OUT THE # OF A PHONE THAT DOESN'T
HAVE IT PRINTED ON IT. IN THE 914 AREA CODE THE ANI # IS 990. IF YOU JUST
HAVE TO DIAL THE LAST 4 DIGITS FOR A LOCAL #, IE CONGERS (268), DIAL
1-990-1111, WHERE 1111 ARE DUMMY DIGITS THERE IS ALSO A LESS USEFUL TYPE OF ANI
# WHICH WILL IDENTIFY THE AREA CODE & EXCHANGE. IT IS NXX-9901, WHERE NXX IS
THE EXCHANGE. IN THE 212 & 516 AREA CODES THE ANI # IS 958.
PHREAK NEWSLETTER
TAP IS THE "OFFICIAL" PHONE PHREAK NEWSLETTER, AND HAS EXISTED SINCE 1971.
EACH 4 PAGE ISSUE IS CRAMMED FULL OF INFORMATION ON PHONE PHREAKING, COMPUTER
PHREAKING, FREE GAS, FREE ELECTRICITY, FREE POSTAGE, BREAKING & ENTERING INFO,
ETC. IT IS LARGELY PHONE PHREAK ORIENTED, HOWEVER.
A 10 ISSUE SUBSCRIPTION COSTS $8.00, IF YOU GET A BULK RATE SEALED ENVELOPE
SUBSCRIPTION. I WOULD RECOMMEND THE FIRST CLASS SUBSCRIPTION, WHICH IS $10.
AS OF THIS WRITING (7-16-83), THE CURRENT ISSUE IS #86, AND ISSUE #50 IS 8
PAGES INSTEAD OF THE USUAL 4. BACK ISSUES ARE $0.75 EACH, AND ISSUE #50 IS
$1.50. A BRIEF INDEX TO THE FIRST 80 ISSUES IS AVAILABLE FOR A SASE, OR FREE
WITH A SUBSCRIPTION ORDER. TAP IS NON-PROFIT, AND IN DESPERATE NEED OF
MATERIAL (ARTICLES), MONEY, AND VOLUNTEERS.
TAP
ROOM 603
147 WEST 42ND STREET
NEW YORK, NY 10036
BELIEVE ME: IT WILL BE THE BEST $10 YOU WILL EVER SPEND...
BLACK BOX
THE BLACK BOX IS A DEVICE THAT ATTACHED TO A CALLED PARTIES PHONE THAT
ALLOWS HIM/HER TO RECEIVE FREE LONG DISTANCE CALLS FROM FRIENDS WHO
CALL.
YOU ONLY NEED 2 PARTS: A SPST TOGGLE SWITCH AND A 10,000 OHM (10 K),
1/2 WATT, 10% RESISTOR. ANY ELECTRONICS PLACE SHOULD HAVE THESE.
NOW, CUT TWO PIECES OF WIRE, ABOUT 6 INCHES, AND ATTACH THESE TO THE
TWO SCREWS ON THE SWITCH. TURN YOUR NORMAL DDSIDE DOWN AND UNSCREW THE 2
SCREWS. LOCATE THE "F" AND "RR" SCREWS ON THE NETWORK BOX. WRAP THE
RESISTOR BETWEEN THESE 2 SCREWS AND MAKE SURE THAT THE WIRES TOUCH ONLY THE
PROPER TERMINALS! NOW CONNECT ONE WIRE FROM THE SWITCH TO THE RR TERMINAL.
FINALLY, ATTACH THE REMAINING WIRE TO THE GREEN WIRE (DISCONNECT IT FROM ITS
TERMINAL). NOW BRING THE SWITCH OUT THE REAR OF THE PHONE AND CLOSE IT UP.
PUT THE SWITCH IN A POSITION WHERE YOU GET A DIAL TONE, MARK THIS NORMAL.
MARK THE OTHER SIDE FREE.
WHEN YOUR FRIENDS CALL (AT A PREARRANGED TIME), QUICKLY LIFT & DROP THE
RECEIVER AS FAST AS POSSIBLE. THIS WILL STOP THE RINGING, IF NOT TRY AGAIN. IT
IS VERY IMPORTANT THAT YOU DO IT FAST! NOW PUT THE SWITCH IN THE FREE POSITION
AND PICK UP THE PHONE. KEEP ALL CALLS SHORT & UNDER 15 MINUTES. WHEN SOMEONE
CALLS YOU LONG-DISTANCE, THEY ARE BILLED FROM THE MOMENT YOU ANSWER. THE TELCO
KNOWS WHEN YOU ANSWER DUE TO A CERTAIN AMOUNT OF VOLTAGE THAT FLOWS WHEN YOU
PICK UP THE PHONE. HOWEVER, THE RESISTOR CUTS DOWN ON THE VOLTAGE SO IT IS
BELOW THE BILLING RANGE BUT SUFFICIENT ENOUGH TO OPERATE THE MOUTHPIECE.
ANSWERING THE PHONE FOR A FRACTION OF A SECOND STOPS THE RING BUT IT IS NOT
ENOUGH FOR BILLING TO START. IF THE PHONE IS ANSWERED FOR EVEN ONE FULL SECOND,
BILLING WILL START AND YOU WILL BE CUT OFF WHEN YOU HANG UP AND SWITCH TO
FREE.
WARNING: BELL CAN RANDOMLY LOOK FOR BLACK BOXES SO BE CAREFUL!
---------------------------------------
: :
***BLUE WIRE**>>F< :
: * * :
**WHITE WIRE**** * :
: * :
: RESISTOR :
: * :
: * :
: >RR<*******SWITCH*** :
: * :
****GREEN WIRE********************* :
: :
---------------------------------------
DIAL LOCKS
HAVE YOU EVER BEEN IN AN OFFICE OR SOMEWHERE AND WANTED TO MAKE A FREE FONE
CALL BUT SOME ASSHOLE PUT A LOCK ON THE FONE TO PREVENT OUT-GOING CALLS?
FRET NO MORE PHELLOW PHREAKS, FOR EVERY SYSTEM CAN BE BEATEN WITH A LITTLE
KNOWLEDGE!
THERE ARE TWO WAYS TO BEAT THIS OBSTACLE, FIRST PICK THE LOCK, I DON'T HAVE THE
TIME TO TEACH LOCKSMITHING SO WE GO TO THE SECOND METHOD WHICH TAKES ADVANTAGE
OF TELEPHONE ELECTRONICS.
TO BE AS SIMPLE AS POSSIBLE, WHEN YOU PICK UP THE FONE YOU COMPLETE A CIRCUIT
KNOW AS A LOCAL LOOP. WHEN YOU HANG-UP YOU BREAK THE CIRCUIT. WHEN YOU DIAL
(PULSE) IT ALSO BREAKS THE CIRCUT BUT NOT LONG ENOUGH TO HANG UP! SO YOU CAN
"PUSH-DIAL." TO DO THIS YOU >RAPIDLY< DEPRESS THE SWITCHHOOK. FOR EXAMPLE, TO
DIAL AN OPERATOR (AND THEN GIVE HER THE NUMBER YOU WANT CALLED) >RAPIDLY< &
>EVENLY< DEPRESS THE SWITCHHOOK 10 TIMES. TO DIAL 634-1268, DEPRESS 6 X'S
PAUSE, THEN 3 X'S, PAUSE, THEN 4 X'S, ETC. IT TAKES A LITTLE PRACTICE BUT
YOU'LL GET THE HANG OF IT. TRY PRACTICING WITH YOUR OWN # SO YOU'LL GET A BUSY
TONE WHEN RIGHT. IT'LL ALSO WORK ON TOUCH-TONE(TM) SINCE A DTMF LINE WILL ALSO
ACCEPT PULSE. ALSO, NEVER DEPRESS THE SWITCHHOOK FOR MORE THAN A SECOND OR
IT'LL HANG-UP!
FINALLY, REMEMBER THAT YOU HAVE JUST AS MUCH RIGHT TO THAT FONE AS THE ASSHOLE
WHO PUT THE LOCK ON IT!
EXCHANGE SCANNING
ALMOST EVERY EXCHANGE IN THE BELL SYSTEM HAS TEST #'S AND OTHER "GOODIES" SUCH
AS LOOPS WITH DIAL-UPS.
THESE "GOODIES" ARE USUALLY FOUND BETWEEN 9900 AND 9999 IN YOUR LOCAL EXCHANGE.
IF YOU HAVE THE TIME AND INITIATIVE, SCAN YOUR EXCHANGE AND YOU MAY BECOME
LUCKY!
HERE ARE MY FINDINGS IN THE 914-268 EXCHANGE:
9900 - ANI (SEE SEPARATE BULLETIN)
9901 - ANI (SEE SEPARATE BULLETIN)
9927 - OSC. TONE (POSSIBLE TONE SIDE OF A LOOP)
9936 - VOICE # TO THE TELCO CENTRAL OFFICE
9937 - VOICE # TO THE TELCO CENTRAL OFFICE
9941 - COMPUTER (DIGITAL VOICE TRANSMISSION?)
9960 - OSC. TONE (TONE SIDE LOOP) -- MAY ALSO BE A COMPUTER IN SOME EXCHANGES
9961 - NO RESPONSE (OTHER END OF LOOP?)
9962 - NO RESPONSE (OTHER END OF LOOP?)
9963 - NO RESPONSE (OTHER END OF LOOP?)
9966 - COMPUTER (SEE 9941)
9968 - TONE THAT DISAPPEARS--RESPONDS TO CERTAIN TOUCH-TONE KEYS
MOST OF THE NUMBERS BETWEEN 9900 & 9999 WILL RING OR GO TO A "WHAT #, PLEASE?"
OPERATOR.
HAVE PHUN AND REMEMBER IT'S ONLY A LOCAL CALL!
TOUCH-TONE & FREE CALLS
THERE ARE SEVERAL WAYS TO MAKE FREE CALLS (SPRINT, MCI, ETC.) USING A ROTARY
PHONE. THEY ARE:
1. USE A NUMBER THAT ACCEPTS VOICE AS WELL AS DTMF. SUCH A # IS (800)
521-8400. AS OF WRITING THIS, A CODE WAS 57617895.
A) IF USING VOICE, WAIT FOR THE COMPUTER TO SAY, "AUTHORIZATION #,
PLEASE." THEN SAY EACH DIGIT SLOWLY, IT WILL BEEP AFTER EACH DIGIT IS
SAID. AFTER EVERY GROUP OF DIGITS, IT WILL REPEAT WHAT YOU HAVE SAID,
THEN SAY YES IF IT IS CORRECT, OTHERWISE SAY NO. IF THE ACCESS CODE IS
CORRECT, IT WILL THANK YOU AND ASK FOR THE DESTINATION #, THEN SAY THE
AREA CODE + NUMBER AS ABOVE. ANOTHER SUCH # IS (800) 245- 8173, WHICH
HAS A 6 DIGIT ACCESS CODE. (NOTE: IF USING TOUCH-TONE ON THIS #, ENTER
THE CODE IMMEDIATELY AFTER THE TONE STOPS.)
2. HOOK UP A TOUCH-TONE FONE INTO YOUR ROTARY FONE. ATTACH THE RED WIRE FROM
THE TOUCH-TONE FONE TO THE "R" TERMINAL INSIDE THE FONE ON THE NETWORK
BOX. THEN HOOK THE GREEN WIRE TO THE "B" TERMINAL. TO USE THIS DIAL THE
#
USING ROTARY & THEN USE THE TOUCH-TONE FOR THE CODES. (DON'T HANG UP THE
ROTARY FONE WHILE DOING THIS THOUGH!) IF THIS DOESN'T WORK THEN REVERSE
THE 2 WIRES. (NOTE: IF YOUR LINE CAN ACCEPT TOUCH-TONE BUT YOU HAVE A
ROTARY FONE THEN YOU CAN HOOK UP A TONE FONE DIRECTLY FOR ALL CALLS BUT
THIS USUALLY ISN'T THE CASE.) SUCH AS RADIO SHACK'S 43-138.
OTHER ALTERNATIVES
4. USE A CHARGE-A-CALL FONE. (THESE ALSO MAKE GREAT EXTENTIONS IF YOU REMOVE
IT USING A HEX WRENCH WITH A HOLE IN THE MIDDLE ON THE CENTER SCREW!
THESE FONES FOR THE BENEFIT OF THOSE WHO DON'T KNOW ARE BLUE WITH NO COIN
SLOTS)
5. USE A PAY FONE THAT WANTS YOUR MONEY BEFORE THE DIAL TONE. PUT IN YOUR
DIME, DIAL THE #; IF IT'S AN 800 # THEN YOUR DIME WILL COME BACK,
IMMEDIATELY PUT A DIME BACK IN (IT'LL COME BACK WHEN YOU HANG UP!) IF IT
IS A TONE FIRST FONE AND IT DISCONNECTS THE KEYPAD (SOME DON'T) THEN FIND
ANOTHER FONE.
TELCO TRACING
THE GOOD 'OL DAYS:
------------------
WAY BACK BEFORE I WAS A PHREAK, MA BELL WOULD HAVE TO MANUALLY TRACE A CALL IF
THEY THOUGH SOMETHING WAS FUCKED UP. FIRST THEY WOULD SEND A 2000 HZ TRACING
TONE, THE WOULD BE FOLLOWED B ALOT OF NOISE AND CLICKS. IT TOOK ABOUT 2-3
MINUTES TO TRACE A CALL AND ALOT OF PEOPLE WERE INVOLVED IN THE PROCESS. SO AT
1 IN THE MORNING THEY WOULD HAVE TO WAKE UP PEOPLE FOT THE TRACEES (PHREAK
JARGON FOR A PAY FONE). BUT NEVER USE THE SAME ONE MORE THAN ONCE OR TWICE
BECAUSE THE GESTAPO(ER..EXCUSE ME MEAN BELL SECURITY) HAS BEEN KNOW FOR STAKING
OUT TROUBLED FORTRESSES. IT'S ALSO POSSIBLE FOR TRAVELNET OR SP TO ASK FOR A
TROUBLE # BUT THE TELCO IS SLOW IN PROCESSING STUFF--ESPECIALLY FOR THE
COMPETITION--SO DON'T FRET PHELLOW PHREAKS.
MODERN TECHNOLOGY:
------------------
THIS CAN BE ATTRIBUTED TO ESS + CCIS WHICH CAN BE TRACED IN 1 SECOND.
MISCELLANEOUS STUFF
HERE ARE A PHEW (PUSHING IT ON THAT WORD) BITS OF INFO ON TELEPHONE ELEC-
TRONICS. IF YOU DON'T APPRECIATE IT THEN I SAY PHUCK U.
VOLTAGES:
WHEN YOUR FONE IS ON-HOOK (IE-HUNG UP) THERE IS A 48 VOLT DC CURRENT FLOWING
THROUGH THE LINE ( I HAVE A GREAT IDEA ABOUT HOOKING A BATTERY CHARGER UP TO MY
FONE ). WHEN THE FONE IS OFF-HOOK THE VOLTAGE DROPS DOWN TO AROUND 15VDC. THE
BLACK BOX (SEE SEPARATE ARTICLES) EXPLOITS THIS FOR FREE CALLS SINCE BELL USES
THIS VOLTAGE DROP WHEN THE CALLED PARTY PICKS UP TO START BILLING. BELL MAY
ALSO REVERSE THE POLARITY OF THE LINE TO START BILLING--IF YOU HAVE A TONE FONE
THE KEYPAD WON'T WORK IF THE POLARITY IS REVERSED. USUALLY, THE RED WIRE IS
CALLED THE TIP SINCE IT IS THE MORE (+) OF THE 2 WIRES + THE GREEN WIRE IS
CALLED THE RING (-).
RING TRIP:
WHEN SOMEONE CALLS YOU BELL HAS TO SEND 90 VOLTS AC DOWN YOUR LINE AT ABOUT 60
HZ TO ACTIVATE YOUR BGLL (THIS IS WHY DEAF PEOPLE CAN HAVE LIGHT BULBS FANS GO
OFF INSTEAD OF A BELL). THE DEVICE THAT DOES THE RINGING IS CALLED A RINGING
GENERATOR ANDTH PROCESS OF RINGING IS CALLED A RING TRIP. THIS COSTS BELL
MONEY AND THEY DON'T LIKE USING ALL THAT ELECTRICITY FROM THE LOCAL RIP-OFF
POWER COMPANY- SO LET IT RING. THIS IS ALSO, HOW BELL CAN CHECK FOR EXTRA
FONES FROM THEIR CENTRAL OFFICE BY SEEING HOW MUCH VOLTAGE THE LINE TAKES WHILE
RINGING AND THEY CAN TELL HOW MANY FONES YOUR NOT SUPPOSE TO HAVE. SOLUTION:
DISCONNECT THE BELL.
MODERN TECHNOLOGY:
------------------
THE 2 WORST ENEMIES TO THE PHREAK BESIDES THE FBI + BELL SECURITY,ARE: ESS +
CCIS. ESS STANDS FOR ELECTRONIC SWITHCING SYSTEM AND IT CAN TRACE A CALL IN
SECONDS, IT ALSO RECORDS ALL CALLS AND CAN EVEN TAP INTO LINES (ER.. I MEAN
CHECK FOR LINE QUALITY) AND RECORD CALLS. CCIS STANDS FOR COMMON CHANNEL
INTER-OFFICE SIGNALING AND IT ALLOWS FOR CONTROL SIGNALS TO BE SENT VIA
SEPARATE DATA LINKS INSTEAD OF TONES OVER THE VOICE CHANNEL--START KISSING YOUR
BLUE BOX GOODBYE.
SOURCES:
--------
FOR THOSE OF YOU WHO WANT TO GO MORE IN-DEPTH ON THE SUBJECT OF SHIT, I
RECOMMEND THE FOLLOWING READING MATERIAL:
1) ELECTRONICS COURCES A-B, TAP, ROOM 603, 147 W. 42 ST., NY, NY 10036. @ 75
CENTS EA.
2) UNDERSTANDING TELEPHONE ELECT.'S, TEXAS INSTRUMENTS, RADIO SHACK MAY HAVE
IT.
3) A MULTITESTER + YOUR FONE FOR YOUR OWN EXPERIMENTING.
4) MISC. INFO FROM SEVERAL SOURCES MAKE FRIENDS + GET YOUR OWN CONNECTIONS.
*****BIOC AGENT 003
*****PHREAK ADVISOR OF PIRATE TREK
*914-634-1268
THANKS TO PIRATES TREK !!


View File

@@ -0,0 +1,307 @@
HEY KIDZ!!!
It's the R0DENTS guide to PHREAKING!
//////////////////////////////////////////////////////////////////////////////
/ /
/ THE R0DENTS GUIDE TO /
/ PHREAKING! /
/ /
/ by Weapons Master /
/ /
//////////////////////////////////////////////////////////////////////////////
Feel like a R0DENT because you don't know what a 950 is? Do you pretend
to be ELITE all day and then cry at night as you realize you're just a R0DENT
P0SER? Well, look on the bright side... you'll get the LAST LAUGH when your
friends get BUSTED FOR 950s!!! But if you still want to learn something
anyway, read this file and learn the basics.
btw this file isn't just for RODENTS, of course, it's for anyone who wants to
learn a little more about phreaking. Just to set something straight,
phreakings not really my thing. I'm a kid programmer who knows a zillion
computer languages. Next, I'm an aspiring hacker. I just picked up phreaking
along the way. However, it seems like every week I get a call from some runt
who wants to know how to phreak, so it seems there's definately a demand for
this sort of thing. And anyway, I don't mind helping runts... how are they
ever going to grow up, give me codes and info, and eventually get BUSTED while
I get off scot free if I don't get them started?
Hey, another thing, this file isn't going to have too many specifics, so
if you're just gonna scan it for code templates and extenders, don't bother.
Talk to me directly if you want that sort of info.
okay, so let's say you're really a rodent, and don't even know what phreaking
is. I'll explain phreaking and give some historical background on it. If
you're too cool for this section, go ahead and skipt it, but you'll sure feel
like a T0TAL L00ZER when someone posts "Hey, whatever happened to Captain
Crunch", and you reply "Well, my favorite's the crunchberries." Then you
wonder why you've been given SLUG access on all the elite boards. (That's
where you call, and the only main menu option you can select is 'G' for
goodbye.)
The original definition of phreaking was "exploring the phone system",
but since it's degenerated into just making free fone calls. I guess a good
working definition of phreaking is 'phone tricks'.
Phreaking started with Captain Crunch, the cereal. In the late 70s,
Captain Crunch cereal was giving away a whistle in its cereal, one of those
free toys that you get. Well, a group of blind kids learned that the whistle
made a perfect 2600hz tone, and if one of them blew the whistle into the fone,
they could do all sorts of amazing things, such as get free fone calls to
anywhere. They shared this secret with a man named John Draper, who would
from this moment on be called Captain Crunch. He was the first fone phreak.
Not long after the blue box was invented, a box that made several different
tones. Later in life you could find Captain Crunch driving down roads and
pulling up to payfones in his vw bug loaded with electronics equipment, and
just staying there for days at a time, calling places, tapping people's lines
and doing all sorts of arcane things I can't begin to imagine. btw he was
eventually busted for Fone Fraud.
Anyway, lots of people got into the blue box thing.. the founders of
Apple would hold demonstrations in their dorm (before the made the famous
Crapple II) where they would use a blue box and a payfone and box the call
around the world to a payfone right beside them.
btw Blue Boxing doesn't work anymore, so don't rush out and download a
blue box plan. Using a blue box from home is one of the surest ways to have
the Gestapo (Fone police) at your door. Try it next time you're having fone
trouble if you want to get good service... just have a lawyer handy.
So when blue boxing got dangerous, people turned to code hacking. Code
hacking was great, you could just set up a good code hacker all night when you
slept, and have a bunch of codes by morning. Almost noone got caught, and the
phreakers had a field day, making calls wherever they wanted. It wasn't quite
as easy as blue boxing, and you couldn't do quite so many things (such as
tapping people's lines or boxing calls around the world), but it still was
easy.
People may disagree with me, but I think that the code hacking days are
over. Nowadays the companies are getting smarter, and an extender that once
was thought of as safe suddenly busts four people. Sure, there are still some
safe extenders, but you never know which ones they are without putting your
freedom at risk. Nowadays a good pbx is worth its weight in gold, and a
reliable outdial can also do wonders. For those into ninja/espionage shit,
there's also beige boxing, but that's a little much for me.
What's the future? To me it looks like a cellular fone with the rom
reprogrammed. I don't have a cellular fone, but from what I understand, get a
nice supply of proms, and rom programmer, and you'll be making free fone calls
off your cellular fone for years. Unfortunately, it'll be a few years before
most of us can afford a cellular fone.
okay, HISTORY LESSON'S OVER. Now let's talk about phreaking. What can
you do with phreaking?
1. Make free fone calls. (If you didn't know this, please SLAM your
keyboard into your SKULL.)
2. Get somebody's address and name from their phone number.
3. Tap other people's fone lines.
4. Make conference calls.
5. Take over voice mail boxes.
I'll discuss each of these briefly, except the first. I'll reserve a
whole section for that.
GET SOMEONE'S NAME AND ADDRESS FROM THEIR FONE NUMBER
It's called a CNA. CNA stands for customer name and address. Bell has
certain super/secret departments called CNA bureaus. You can call one of
them, and get the name and address for any fone number you want. How do you
find CNA numbers? Get yourself a copy of Professor Falken's Phreak Tools, and
it has a list of them. If the number's out of date, then you're out of luck.
The way it works is there's one number for each area code.
What do you say when you call? I'm not quite sure, but "I'm David Ross
from Customer Service in Detroit. Can you give me the name and address on
xxx-xxxx? Thanks." They may ask you a password. In that case, you're shit
out of luck. But I hear they usually don't.
TAP OTHER PEOPLE'S FONE LINES
This is ninja shit, hardly phreaking. Build yourself an FM wireless mike,
and go to their house, and install it on the bell box outside their house. I
really haven't tried this, and probably won't, unless I suspect my
girlfriend's cheating on me or something.
MAKE CONFERENCE CALLS
Simple, call ALIANCE TELECONFERENCING, and tell them you want to make a
conference call. They'll be more than happy to help you. WAIT, but you don't
want to pay for it? Well, use a pbx. More on these below.
TAKE OVER VOICE MAIL BOXES
Wouldn't it be fun to have a voice mail box (VMB) so all your friends
around the country could leave you messages for free? Well, maybe it would,
but I haven't tried it. But get yourself a few numbers to VMBs, and just
start hacking codes. (When it asks you to leave the message, enter in your
four or five digit code, and if you're right, you'll get control of it.)
They're all different, though, so it's hard to make generalizations about
VMBs.
okay, now what you've all been waiting for HOW TO MAKE FREE FONE CALLS!
nope. not yet, anyway. Before I get into that, let me explain the two
things every phreaker should know. I don't care what kind of rodent you are,
you should know this. It's for your own safety.
SO READ THIS!!!
#1. Trace times. TV has indoctrinated in us the myth that it takes
forever to trace a call. How long do you think it takes to trace a call?
Fill in your answer here _____________. Okay, it's a trick question. ALL
CALLS ARE ALREADY TRACED!!! Every single digit you enter into the fone is
recorded somewhere in the fone company dungeons. Normally, they never check
them. I've heard varying stories of how long they keep these printouts, some
say a couple days, some say months. But if they suspect fraud on a number,
they can just set up a trace for a week, and have the numbers of everyone who
called, as well as the times and the length of the calls. So watch those
local calls from your home fone. When in doubt, use a payfone.
#2. 800 exception flag. Jimmy Phreaker finds a really good extender
that he hacks the hell out of all month. "Haha, they won't bust me on
950-1087 like everybody else, I'm hacking 1-800-xxx-xxxx!!!" The next month
Jimmy Phreaker comes home to find FBI agents putting his computer in boxes,
and keeping it for six months. What happened? Did his pal SUPERRODENT rat on
him? No, his hacking triggered the 800 exception flag. When you call an
excessive amount of 800 numbers (more than you usally do every month), then a
trouble card shows up at your local fone company with your name and address.
Not good. 800s can also trace fairly easily, btw, though they usually can't
find all your digits.. probably just your area code and exchange. So feel
free to call a few 800 numbers every month, but if you're calling more than 50
or 100 from your home fone, than you'll proabaly have some explaining to do.
MAKING FREE FONE CALLS/BEATING THE TRACE
I've included this together as most ways of making free fone calls also
beat the trace. Here's the main ways to make free fone calls:
1. Blue Boxing (Don't try it.)
2. Stealing Long Distance Services
3. Using 800 pbxs
4. using local pbxs
5. using a pc pursuit outdial
6. using a telenet outdial
7. beige boxing
8. reprogramming a cellular fone
BTW in all of this, I will assume the phreaker is using his home fone.
There's another section later on making calls when you don't have to worry
about safety, like from a payfone or institution.
BLUE BOXING - Not worth mentioning, except for the fact that it doesn't work
anymore, and is very dangerous. Don't try it.
STEALING LONG DISTANCE SERVICES - okay, Joe Q. Salespig is in Miami, and he
wants to make a long distance call. He dials 950-1022, his MCI port number,
and enters in his code and then the number he wants to call. "k-kool", you're
saying, "can I do that?" Sure you can. Get yourself a good extender
(950-1087 is the extender), a template (XXX6XX is a template, and it means the
first 3 digits can be any number, the fourth is a six, and the fifth and sixth
can be any number), and a good code hacking program. Try to hack two ports or
extenders at once for safety. Is it risky? Well... I wouldn't do it. Then
there are some people who have been hacking codes for years with no problems.
Talk to one of them if you want to go this route.
USING 800 PBXs - Remember my describing the 800 exception flag above? Well,
hacking anything starting with 800 should be avoided at all costs... way too
dangerous. You don't want to trip a BELL trouble card. So don't hack these.
Shouldn't be a big deal to use them though.
USING LOCAL PBXs - Okay, this is the way to go. Takes a lot of work though.
Every pbx is a little different, but basically you call, dial a 9 or a code +
9, and then you're on THAT COMPANIES fone line. Call anywhere, they get the
bill. Use it sparingly, and you'll have free calls for months. If it's a
flat rate pbx, you can probably use it without a problem. Otherwise they'll
get pissed and change the code when they find you out. Rehack the code, if
you're a dick, or just move on to another pbx. Okay, what's the catch to
local pbxs? Well, you have to find them, which is a pain in the ass. There's
been rumors of a pbx scanner going around, but I haven't seen anything that
works reliably on a hayes compatible. So the only method of finding them is
to leave your computer on with a wardialer program, and sit there and listen.
Find some companies in the fone book with their numbers all grouped together,
and scan a range of likely numbers. Listen for a funny tone, and that may be
the pbx. They also may just give you a dial tone (like you dial... ring...
ring... click... dial tone...). So local pbxs are the way to go, if you can
find them.
USING A PC PURSUIT OUTDIAL - This is complicated. There's a service called
telenet and it has a service called pc pursuit. If you can access the outdial
modems, you can call most places in the country. To access these you need
either..
1. an nui (network user id) (also called PC pursuit id and password)
2. a method of making non-collect calls, such as a private telenet pad.
Telenet is to big a topic for me to go into in this file, as it is worth at
least a file on it's own, and there's no way I could do it justice here.
maybe in another file.
USING A TELENET OUTDIAL - Basically you call a computer on telenet, and it
gives you access to it's modem. You csan make calls, and they'll be charged
to this computer. Again, telenet is worth a file of it's own.
BEIGE BOXING - More ninja shit. You go to somebody's house, and bring your
own fone (or laptop) and splice into their line, and make fone calls that wind
up on their bill. No, you don't have to break into their house, just find a
bell "can", on of those green boxes that say fone company, and bust in.
REPROGRAMMING YOUR CELLULAR FONE - I don't have a cellular fone, so I don't
know much about this, but cellular fones have a built in ROM which sends the
switching office a certain id. Program it to give other people's ids, and
you're on other people's accounts. Get a vw microbus, bring a laptop, a
cellular phone, and some proms and programmers. Drive cross country picking
up chicks, calling boards, and hacking into computers, all risk free. Sounds
like fun, huh? I have some files on this (reprogramming cellular fones, not
picking up chicks), so if anyone does have a cellular fone, and wants a guy to
drive cross country with, or just some info on making free calls, let me know.
PHREAKING WHERE SAFETY ISN'T AN ISSUE
okay, you're one of those lucky bastards with a laptop, or you have
access to your schools modem, and you know there's no way they can catch you.
Use old codes, that's the best way. Just use them until they die. I call all
my college friends every week with an old 800 pbx I have... perfectly safe, as
long as you do it from a payfone. I've heard of people programming phone
dialers to hack codes from payfones, but I think that's just a rumor. But
feel free to hack 1087s if you're using a laptop form a payfone. There are
lots of good templates around, and safety doesn't mean anything from a
payfone. Just don't use the same one. So if you have a laptop, hack 1087s or
whatever's easiest, and just use the codes until they die. Don't start using
these codes from home though.. stick to payfones.
Okay, that's the file. I was pretty general in this file, but I had a
lot of ground to cover. If you want specifics, get in touch with me directly.
I'm always willing to help people. If I screwed up, let me know too. Don't
bug me for codes, though, as I hate that. (That means you, Batman...)
GREETS!!! - to The Noid for letting me on your board when I was a PD l00zer,
to Basket Case for doing the same, to The Excommunicator and Laughing Gas for
getting me started, to Batman for bugging me for codes every day (don't call
me until you have some information for ME, and stop giving out my info as your
own.), to Coroner for being a nice guy and beating me every time in Global
War, to BaD for taking other people's cracks and putting their name on them
(talk about lame.)
GRAFFITI!!! - That gum you like is coming back in style. Al's abortion's, you
rape em, we scrape em. Would you like fries with that? HOMIE DON'T PLAY
THAT! "Yeah, I've been hacking 1087s, what's the big deal?" "Did the dial
tone sound fainter than normal?" "Remember that 3 gig board that was going
up?" Somebody, SHOOT ME!!! "I'm writing ZooMaster." "Just give your hard
drive a good shake, that'll fix it." Bob. So manly he's Danly.
I can be reached on the following boards:
The Digital Underground (NAP/PA home)
Hall of Illusion
(c) 1990 by Weapons Master. You may distribute this file to any baord without
modifications.

View File

@@ -0,0 +1,295 @@
HEY KIDZ!!!
It's the R0DENTS guide to PHREAKING!
//////////////////////////////////////////////////////////////////////////////
/ /
/ THE R0DENTS GUIDE TO /
/ PHREAKING! /
/ /
/ by Weapons Master /
/ /
//////////////////////////////////////////////////////////////////////////////
Feel like a R0DENT because you don't know what a 950 is? Do you pretend
to be ELITE all day and then cry at night as you realize you're just a R0DENT
P0SER? Well, look on the bright side... you'll get the LAST LAUGH when your
friends get BUSTED FOR 950s!!! But if you still want to learn something
anyway, read this file and learn the basics.
btw this file isn't just for RODENTS, of course, it's for anyone who wants to
learn a little more about phreaking. Just to set something straight,
phreakings not really my thing. I'm a kid programmer who knows a zillion
computer languages. Next, I'm an aspiring hacker. I just picked up phreaking
along the way. However, it seems like every week I get a call from some runt
who wants to know how to phreak, so it seems there's definately a demand for
this sort of thing. And anyway, I don't mind helping runts... how are they
ever going to grow up, give me codes and info, and eventually get BUSTED while
I get off scot free if I don't get them started?
Hey, another thing, this file isn't going to have too many specifics, so
if you're just gonna scan it for code templates and extenders, don't bother.
Talk to me directly if you want that sort of info.
okay, so let's say you're really a rodent, and don't even know what phreaking
is. I'll explain phreaking and give some historical background on it. If
you're too cool for this section, go ahead and skipt it, but you'll sure feel
like a T0TAL L00ZER when someone posts "Hey, whatever happened to Captain
Crunch", and you reply "Well, my favorite's the crunchberries." Then you
wonder why you've been given SLUG access on all the elite boards. (That's
where you call, and the only main menu option you can select is 'G' for
goodbye.)
The original definition of phreaking was "exploring the phone system",
but since it's degenerated into just making free fone calls. I guess a good
working definition of phreaking is 'phone tricks'.
Phreaking started with Captain Crunch, the cereal. In the late 70s,
Captain Crunch cereal was giving away a whistle in its cereal, one of those
free toys that you get. Well, a group of blind kids learned that the whistle
made a perfect 2600hz tone, and if one of them blew the whistle into the fone,
they could do all sorts of amazing things, such as get free fone calls to
anywhere. They shared this secret with a man named John Draper, who would
from this moment on be called Captain Crunch. He was the first fone phreak.
Not long after the blue box was invented, a box that made several different
tones. Later in life you could find Captain Crunch driving down roads and
pulling up to payfones in his vw bug loaded with electronics equipment, and
just staying there for days at a time, calling places, tapping people's lines
and doing all sorts of arcane things I can't begin to imagine. btw he was
eventually busted for Fone Fraud.
Anyway, lots of people got into the blue box thing.. the founders of
Apple would hold demonstrations in their dorm (before the made the famous
Crapple II) where they would use a blue box and a payfone and box the call
around the world to a payfone right beside them.
btw Blue Boxing doesn't work anymore, so don't rush out and download a
blue box plan. Using a blue box from home is one of the surest ways to have
the Gestapo (Fone police) at your door. Try it next time you're having fone
trouble if you want to get good service... just have a lawyer handy.
So when blue boxing got dangerous, people turned to code hacking. Code
hacking was great, you could just set up a good code hacker all night when you
slept, and have a bunch of codes by morning. Almost noone got caught, and the
phreakers had a field day, making calls wherever they wanted. It wasn't quite
as easy as blue boxing, and you couldn't do quite so many things (such as
tapping people's lines or boxing calls around the world), but it still was
easy.
People may disagree with me, but I think that the code hacking days are
over. Nowadays the companies are getting smarter, and an extender that once
was thought of as safe suddenly busts four people. Sure, there are still some
safe extenders, but you never know which ones they are without putting your
freedom at risk. Nowadays a good pbx is worth its weight in gold, and a
reliable outdial can also do wonders. For those into ninja/espionage shit,
there's also beige boxing, but that's a little much for me.
What's the future? To me it looks like a cellular fone with the rom
reprogrammed. I don't have a cellular fone, but from what I understand, get a
nice supply of proms, and rom programmer, and you'll be making free fone calls
off your cellular fone for years. Unfortunately, it'll be a few years before
most of us can afford a cellular fone.
okay, HISTORY LESSON'S OVER. Now let's talk about phreaking. What can
you do with phreaking?
1. Make free fone calls. (If you didn't know this, please SLAM your
keyboard into your SKULL.)
2. Get somebody's address and name from their phone number.
3. Tap other people's fone lines.
4. Make conference calls.
5. Take over voice mail boxes.
I'll discuss each of these briefly, except the first. I'll reserve a
whole section for that.
GET SOMEONE'S NAME AND ADDRESS FROM THEIR FONE NUMBER
It's called a CNA. CNA stands for customer name and address. Bell has
certain super/secret departments called CNA bureaus. You can call one of
them, and get the name and address for any fone number you want. How do you
find CNA numbers? Get yourself a copy of Professor Falken's Phreak Tools, and
it has a list of them. If the number's out of date, then you're out of luck.
The way it works is there's one number for each area code.
What do you say when you call? I'm not quite sure, but "I'm David Ross
from Customer Service in Detroit. Can you give me the name and address on
xxx-xxxx? Thanks." They may ask you a password. In that case, you're shit
out of luck. But I hear they usually don't.
TAP OTHER PEOPLE'S FONE LINES
This is ninja shit, hardly phreaking. Build yourself an FM wireless mike,
and go to their house, and install it on the bell box outside their house. I
really haven't tried this, and probably won't, unless I suspect my
girlfriend's cheating on me or something.
MAKE CONFERENCE CALLS
Simple, call ALIANCE TELECONFERENCING, and tell them you want to make a
conference call. They'll be more than happy to help you. WAIT, but you don't
want to pay for it? Well, use a pbx. More on these below.
TAKE OVER VOICE MAIL BOXES
Wouldn't it be fun to have a voice mail box (VMB) so all your friends
around the country could leave you messages for free? Well, maybe it would,
but I haven't tried it. But get yourself a few numbers to VMBs, and just
start hacking codes. (When it asks you to leave the message, enter in your
four or five digit code, and if you're right, you'll get control of it.)
They're all different, though, so it's hard to make generalizations about
VMBs.
okay, now what you've all been waiting for HOW TO MAKE FREE FONE CALLS!
nope. not yet, anyway. Before I get into that, let me explain the two
things every phreaker should know. I don't care what kind of rodent you are,
you should know this. It's for your own safety.
SO READ THIS!!!
#1. Trace times. TV has indoctrinated in us the myth that it takes
forever to trace a call. How long do you think it takes to trace a call?
Fill in your answer here _____________. Okay, it's a trick question. ALL
CALLS ARE ALREADY TRACED!!! Every single digit you enter into the fone is
recorded somewhere in the fone company dungeons. Normally, they never check
them. I've heard varying stories of how long they keep these printouts, some
say a couple days, some say months. But if they suspect fraud on a number,
they can just set up a trace for a week, and have the numbers of everyone who
called, as well as the times and the length of the calls. So watch those
local calls from your home fone. When in doubt, use a payfone.
#2. 800 exception flag. Jimmy Phreaker finds a really good extender
that he hacks the hell out of all month. "Haha, they won't bust me on
950-1087 like everybody else, I'm hacking 1-800-xxx-xxxx!!!" The next month
Jimmy Phreaker comes home to find FBI agents putting his computer in boxes,
and keeping it for six months. What happened? Did his pal SUPERRODENT rat on
him? No, his hacking triggered the 800 exception flag. When you call an
excessive amount of 800 numbers (more than you usally do every month), then a
trouble card shows up at your local fone company with your name and address.
Not good. 800s can also trace fairly easily, btw, though they usually can't
find all your digits.. probably just your area code and exchange. So feel
free to call a few 800 numbers every month, but if you're calling more than 50
or 100 from your home fone, than you'll proabaly have some explaining to do.
MAKING FREE FONE CALLS/BEATING THE TRACE
I've included this together as most ways of making free fone calls also
beat the trace. Here's the main ways to make free fone calls:
1. Blue Boxing (Don't try it.)
2. Stealing Long Distance Services
3. Using 800 pbxs
4. using local pbxs
5. using a pc pursuit outdial
6. using a telenet outdial
7. beige boxing
8. reprogramming a cellular fone
BTW in all of this, I will assume the phreaker is using his home fone.
There's another section later on making calls when you don't have to worry
about safety, like from a payfone or institution.
BLUE BOXING - Not worth mentioning, except for the fact that it doesn't work
anymore, and is very dangerous. Don't try it.
STEALING LONG DISTANCE SERVICES - okay, Joe Q. Salespig is in Miami, and he
wants to make a long distance call. He dials 950-1022, his MCI port number,
and enters in his code and then the number he wants to call. "k-kool", you're
saying, "can I do that?" Sure you can. Get yourself a good extender
(950-1087 is the extender), a template (XXX6XX is a template, and it means the
first 3 digits can be any number, the fourth is a six, and the fifth and sixth
can be any number), and a good code hacking program. Try to hack two ports or
extenders at once for safety. Is it risky? Well... I wouldn't do it. Then
there are some people who have been hacking codes for years with no problems.
Talk to one of them if you want to go this route.
USING 800 PBXs - Remember my describing the 800 exception flag above? Well,
hacking anything starting with 800 should be avoided at all costs... way too
dangerous. You don't want to trip a BELL trouble card. So don't hack these.
Shouldn't be a big deal to use them though.
USING LOCAL PBXs - Okay, this is the way to go. Takes a lot of work though.
Every pbx is a little different, but basically you call, dial a 9 or a code +
9, and then you're on THAT COMPANIES fone line. Call anywhere, they get the
bill. Use it sparingly, and you'll have free calls for months. If it's a
flat rate pbx, you can probably use it without a problem. Otherwise they'll
get pissed and change the code when they find you out. Rehack the code, if
you're a dick, or just move on to another pbx. Okay, what's the catch to
local pbxs? Well, you have to find them, which is a pain in the ass. There's
been rumors of a pbx scanner going around, but I haven't seen anything that
works reliably on a hayes compatible. So the only method of finding them is
to leave your computer on with a wardialer program, and sit there and listen.
Find some companies in the fone book with their numbers all grouped together,
and scan a range of likely numbers. Listen for a funny tone, and that may be
the pbx. They also may just give you a dial tone (like you dial... ring...
ring... click... dial tone...). So local pbxs are the way to go, if you can
find them.
USING A PC PURSUIT OUTDIAL - This is complicated. There's a service called
telenet and it has a service called pc pursuit. If you can access the outdial
modems, you can call most places in the country. To access these you need
either..
1. an nui (network user id) (also called PC pursuit id and password)
2. a method of making non-collect calls, such as a private telenet pad.
Telenet is to big a topic for me to go into in this file, as it is worth at
least a file on it's own, and there's no way I could do it justice here.
maybe in another file.
USING A TELENET OUTDIAL - Basically you call a computer on telenet, and it
gives you access to it's modem. You csan make calls, and they'll be charged
to this computer. Again, telenet is worth a file of it's own.
BEIGE BOXING - More ninja shit. You go to somebody's house, and bring your
own fone (or laptop) and splice into their line, and make fone calls that wind
up on their bill. No, you don't have to break into their house, just find a
bell "can", on of those green boxes that say fone company, and bust in.
REPROGRAMMING YOUR CELLULAR FONE - I don't have a cellular fone, so I don't
know much about this, but cellular fones have a built in ROM which sends the
switching office a certain id. Program it to give other people's ids, and
you're on other people's accounts. Get a vw microbus, bring a laptop, a
cellular phone, and some proms and programmers. Drive cross country picking
up chicks, calling boards, and hacking into computers, all risk free. Sounds
like fun, huh? I have some files on this (reprogramming cellular fones, not
picking up chicks), so if anyone does have a cellular fone, and wants a guy to
drive cross country with, or just some info on making free calls, let me know.
PHREAKING WHERE SAFETY ISN'T AN ISSUE
okay, you're one of those lucky bastards with a laptop, or you have
access to your schools modem, and you know there's no way they can catch you.
Use old codes, that's the best way. Just use them until they die. I call all
my college friends every week with an old 800 pbx I have... perfectly safe, as
long as you do it from a payfone. I've heard of people programming phone
dialers to hack codes from payfones, but I think that's just a rumor. But
feel free to hack 1087s if you're using a laptop form a payfone. There are
lots of good templates around, and safety doesn't mean anything from a
payfone. Just don't use the same one. So if you have a laptop, hack 1087s or
whatever's easiest, and just use the codes until they die. Don't start using
these codes from home though.. stick to payfones.
Okay, that's the file. I was pretty general in this file, but I had a
lot of ground to cover. If you want specifics, get in touch with me directly.
I'm always willing to help people. If I screwed up, let me know too. Don't
bug me for codes, though, as I hate that. (That means you, Batman...)
GREETS!!! - to The Noid for letting me on your board when I was a PD l00zer,
to Basket Case for doing the same, to The Excommunicator and Laughing Gas for
getting me started, to Batman for bugging me for codes every day (don't call
me until you have some information for ME, and stop giving out my info as your
own.), to Coroner for being a nice guy and beating me every time in Global
War, to BaD for taking other people's cracks and putting their name on them
(talk about lame.)
GRAFFITI!!! - That gum you like is coming back in style. Al's abortion's, you
rape em, we scrape em. Would you like fries with that? HOMIE DON'T PLAY
THAT! "Yeah, I've been hacking 1087s, what's the big deal?" "Did the dial
tone sound fainter than normal?" "Remember that 3 gig board that was going
up?" Somebody, SHOOT ME!!! "I'm writing ZooMaster." "Just give your hard
drive a good shake, that'll fix it." Bob. So manly he's Danly.
I can be reached on the following boards:
The Digital Underground (NAP/PA home)
Hall of Illusion
(c) 1990 by Weapons Master. You may distribute this file to any baord without
modifications.

View File

@@ -0,0 +1,295 @@
HEY KIDZ!!!
It's the R0DENTS guide to PHREAKING!
//////////////////////////////////////////////////////////////////////////////
/ /
/ THE R0DENTS GUIDE TO /
/ PHREAKING! /
/ /
/ by Weapons Master /
/ /
//////////////////////////////////////////////////////////////////////////////
Feel like a R0DENT because you don't know what a 950 is? Do you pretend
to be ELITE all day and then cry at night as you realize you're just a R0DENT
P0SER? Well, look on the bright side... you'll get the LAST LAUGH when your
friends get BUSTED FOR 950s!!! But if you still want to learn something
anyway, read this file and learn the basics.
btw this file isn't just for RODENTS, of course, it's for anyone who wants to
learn a little more about phreaking. Just to set something straight,
phreakings not really my thing. I'm a kid programmer who knows a zillion
computer languages. Next, I'm an aspiring hacker. I just picked up phreaking
along the way. However, it seems like every week I get a call from some runt
who wants to know how to phreak, so it seems there's definately a demand for
this sort of thing. And anyway, I don't mind helping runts... how are they
ever going to grow up, give me codes and info, and eventually get BUSTED while
I get off scot free if I don't get them started?
Hey, another thing, this file isn't going to have too many specifics, so
if you're just gonna scan it for code templates and extenders, don't bother.
Talk to me directly if you want that sort of info.
okay, so let's say you're really a rodent, and don't even know what phreaking
is. I'll explain phreaking and give some historical background on it. If
you're too cool for this section, go ahead and skipt it, but you'll sure feel
like a T0TAL L00ZER when someone posts "Hey, whatever happened to Captain
Crunch", and you reply "Well, my favorite's the crunchberries." Then you
wonder why you've been given SLUG access on all the elite boards. (That's
where you call, and the only main menu option you can select is 'G' for
goodbye.)
The original definition of phreaking was "exploring the phone system",
but since it's degenerated into just making free fone calls. I guess a good
working definition of phreaking is 'phone tricks'.
Phreaking started with Captain Crunch, the cereal. In the late 70s,
Captain Crunch cereal was giving away a whistle in its cereal, one of those
free toys that you get. Well, a group of blind kids learned that the whistle
made a perfect 2600hz tone, and if one of them blew the whistle into the fone,
they could do all sorts of amazing things, such as get free fone calls to
anywhere. They shared this secret with a man named John Draper, who would
from this moment on be called Captain Crunch. He was the first fone phreak.
Not long after the blue box was invented, a box that made several different
tones. Later in life you could find Captain Crunch driving down roads and
pulling up to payfones in his vw bug loaded with electronics equipment, and
just staying there for days at a time, calling places, tapping people's lines
and doing all sorts of arcane things I can't begin to imagine. btw he was
eventually busted for Fone Fraud.
Anyway, lots of people got into the blue box thing.. the founders of
Apple would hold demonstrations in their dorm (before the made the famous
Crapple II) where they would use a blue box and a payfone and box the call
around the world to a payfone right beside them.
btw Blue Boxing doesn't work anymore, so don't rush out and download a
blue box plan. Using a blue box from home is one of the surest ways to have
the Gestapo (Fone police) at your door. Try it next time you're having fone
trouble if you want to get good service... just have a lawyer handy.
So when blue boxing got dangerous, people turned to code hacking. Code
hacking was great, you could just set up a good code hacker all night when you
slept, and have a bunch of codes by morning. Almost noone got caught, and the
phreakers had a field day, making calls wherever they wanted. It wasn't quite
as easy as blue boxing, and you couldn't do quite so many things (such as
tapping people's lines or boxing calls around the world), but it still was
easy.
People may disagree with me, but I think that the code hacking days are
over. Nowadays the companies are getting smarter, and an extender that once
was thought of as safe suddenly busts four people. Sure, there are still some
safe extenders, but you never know which ones they are without putting your
freedom at risk. Nowadays a good pbx is worth its weight in gold, and a
reliable outdial can also do wonders. For those into ninja/espionage shit,
there's also beige boxing, but that's a little much for me.
What's the future? To me it looks like a cellular fone with the rom
reprogrammed. I don't have a cellular fone, but from what I understand, get a
nice supply of proms, and rom programmer, and you'll be making free fone calls
off your cellular fone for years. Unfortunately, it'll be a few years before
most of us can afford a cellular fone.
okay, HISTORY LESSON'S OVER. Now let's talk about phreaking. What can
you do with phreaking?
1. Make free fone calls. (If you didn't know this, please SLAM your
keyboard into your SKULL.)
2. Get somebody's address and name from their phone number.
3. Tap other people's fone lines.
4. Make conference calls.
5. Take over voice mail boxes.
I'll discuss each of these briefly, except the first. I'll reserve a
whole section for that.
GET SOMEONE'S NAME AND ADDRESS FROM THEIR FONE NUMBER
It's called a CNA. CNA stands for customer name and address. Bell has
certain super/secret departments called CNA bureaus. You can call one of
them, and get the name and address for any fone number you want. How do you
find CNA numbers? Get yourself a copy of Professor Falken's Phreak Tools, and
it has a list of them. If the number's out of date, then you're out of luck.
The way it works is there's one number for each area code.
What do you say when you call? I'm not quite sure, but "I'm David Ross
from Customer Service in Detroit. Can you give me the name and address on
xxx-xxxx? Thanks." They may ask you a password. In that case, you're shit
out of luck. But I hear they usually don't.
TAP OTHER PEOPLE'S FONE LINES
This is ninja shit, hardly phreaking. Build yourself an FM wireless mike,
and go to their house, and install it on the bell box outside their house. I
really haven't tried this, and probably won't, unless I suspect my
girlfriend's cheating on me or something.
MAKE CONFERENCE CALLS
Simple, call ALIANCE TELECONFERENCING, and tell them you want to make a
conference call. They'll be more than happy to help you. WAIT, but you don't
want to pay for it? Well, use a pbx. More on these below.
TAKE OVER VOICE MAIL BOXES
Wouldn't it be fun to have a voice mail box (VMB) so all your friends
around the country could leave you messages for free? Well, maybe it would,
but I haven't tried it. But get yourself a few numbers to VMBs, and just
start hacking codes. (When it asks you to leave the message, enter in your
four or five digit code, and if you're right, you'll get control of it.)
They're all different, though, so it's hard to make generalizations about
VMBs.
okay, now what you've all been waiting for HOW TO MAKE FREE FONE CALLS!
nope. not yet, anyway. Before I get into that, let me explain the two
things every phreaker should know. I don't care what kind of rodent you are,
you should know this. It's for your own safety.
SO READ THIS!!!
#1. Trace times. TV has indoctrinated in us the myth that it takes
forever to trace a call. How long do you think it takes to trace a call?
Fill in your answer here _____________. Okay, it's a trick question. ALL
CALLS ARE ALREADY TRACED!!! Every single digit you enter into the fone is
recorded somewhere in the fone company dungeons. Normally, they never check
them. I've heard varying stories of how long they keep these printouts, some
say a couple days, some say months. But if they suspect fraud on a number,
they can just set up a trace for a week, and have the numbers of everyone who
called, as well as the times and the length of the calls. So watch those
local calls from your home fone. When in doubt, use a payfone.
#2. 800 exception flag. Jimmy Phreaker finds a really good extender
that he hacks the hell out of all month. "Haha, they won't bust me on
950-1087 like everybody else, I'm hacking 1-800-xxx-xxxx!!!" The next month
Jimmy Phreaker comes home to find FBI agents putting his computer in boxes,
and keeping it for six months. What happened? Did his pal SUPERRODENT rat on
him? No, his hacking triggered the 800 exception flag. When you call an
excessive amount of 800 numbers (more than you usally do every month), then a
trouble card shows up at your local fone company with your name and address.
Not good. 800s can also trace fairly easily, btw, though they usually can't
find all your digits.. probably just your area code and exchange. So feel
free to call a few 800 numbers every month, but if you're calling more than 50
or 100 from your home fone, than you'll proabaly have some explaining to do.
MAKING FREE FONE CALLS/BEATING THE TRACE
I've included this together as most ways of making free fone calls also
beat the trace. Here's the main ways to make free fone calls:
1. Blue Boxing (Don't try it.)
2. Stealing Long Distance Services
3. Using 800 pbxs
4. using local pbxs
5. using a pc pursuit outdial
6. using a telenet outdial
7. beige boxing
8. reprogramming a cellular fone
BTW in all of this, I will assume the phreaker is using his home fone.
There's another section later on making calls when you don't have to worry
about safety, like from a payfone or institution.
BLUE BOXING - Not worth mentioning, except for the fact that it doesn't work
anymore, and is very dangerous. Don't try it.
STEALING LONG DISTANCE SERVICES - okay, Joe Q. Salespig is in Miami, and he
wants to make a long distance call. He dials 950-1022, his MCI port number,
and enters in his code and then the number he wants to call. "k-kool", you're
saying, "can I do that?" Sure you can. Get yourself a good extender
(950-1087 is the extender), a template (XXX6XX is a template, and it means the
first 3 digits can be any number, the fourth is a six, and the fifth and sixth
can be any number), and a good code hacking program. Try to hack two ports or
extenders at once for safety. Is it risky? Well... I wouldn't do it. Then
there are some people who have been hacking codes for years with no problems.
Talk to one of them if you want to go this route.
USING 800 PBXs - Remember my describing the 800 exception flag above? Well,
hacking anything starting with 800 should be avoided at all costs... way too
dangerous. You don't want to trip a BELL trouble card. So don't hack these.
Shouldn't be a big deal to use them though.
USING LOCAL PBXs - Okay, this is the way to go. Takes a lot of work though.
Every pbx is a little different, but basically you call, dial a 9 or a code +
9, and then you're on THAT COMPANIES fone line. Call anywhere, they get the
bill. Use it sparingly, and you'll have free calls for months. If it's a
flat rate pbx, you can probably use it without a problem. Otherwise they'll
get pissed and change the code when they find you out. Rehack the code, if
you're a dick, or just move on to another pbx. Okay, what's the catch to
local pbxs? Well, you have to find them, which is a pain in the ass. There's
been rumors of a pbx scanner going around, but I haven't seen anything that
works reliably on a hayes compatible. So the only method of finding them is
to leave your computer on with a wardialer program, and sit there and listen.
Find some companies in the fone book with their numbers all grouped together,
and scan a range of likely numbers. Listen for a funny tone, and that may be
the pbx. They also may just give you a dial tone (like you dial... ring...
ring... click... dial tone...). So local pbxs are the way to go, if you can
find them.
USING A PC PURSUIT OUTDIAL - This is complicated. There's a service called
telenet and it has a service called pc pursuit. If you can access the outdial
modems, you can call most places in the country. To access these you need
either..
1. an nui (network user id) (also called PC pursuit id and password)
2. a method of making non-collect calls, such as a private telenet pad.
Telenet is to big a topic for me to go into in this file, as it is worth at
least a file on it's own, and there's no way I could do it justice here.
maybe in another file.
USING A TELENET OUTDIAL - Basically you call a computer on telenet, and it
gives you access to it's modem. You csan make calls, and they'll be charged
to this computer. Again, telenet is worth a file of it's own.
BEIGE BOXING - More ninja shit. You go to somebody's house, and bring your
own fone (or laptop) and splice into their line, and make fone calls that wind
up on their bill. No, you don't have to break into their house, just find a
bell "can", on of those green boxes that say fone company, and bust in.
REPROGRAMMING YOUR CELLULAR FONE - I don't have a cellular fone, so I don't
know much about this, but cellular fones have a built in ROM which sends the
switching office a certain id. Program it to give other people's ids, and
you're on other people's accounts. Get a vw microbus, bring a laptop, a
cellular phone, and some proms and programmers. Drive cross country picking
up chicks, calling boards, and hacking into computers, all risk free. Sounds
like fun, huh? I have some files on this (reprogramming cellular fones, not
picking up chicks), so if anyone does have a cellular fone, and wants a guy to
drive cross country with, or just some info on making free calls, let me know.
PHREAKING WHERE SAFETY ISN'T AN ISSUE
okay, you're one of those lucky bastards with a laptop, or you have
access to your schools modem, and you know there's no way they can catch you.
Use old codes, that's the best way. Just use them until they die. I call all
my college friends every week with an old 800 pbx I have... perfectly safe, as
long as you do it from a payfone. I've heard of people programming phone
dialers to hack codes from payfones, but I think that's just a rumor. But
feel free to hack 1087s if you're using a laptop form a payfone. There are
lots of good templates around, and safety doesn't mean anything from a
payfone. Just don't use the same one. So if you have a laptop, hack 1087s or
whatever's easiest, and just use the codes until they die. Don't start using
these codes from home though.. stick to payfones.
Okay, that's the file. I was pretty general in this file, but I had a
lot of ground to cover. If you want specifics, get in touch with me directly.
I'm always willing to help people. If I screwed up, let me know too. Don't
bug me for codes, though, as I hate that. (That means you, Batman...)
GREETS!!! - to The Noid for letting me on your board when I was a PD l00zer,
to Basket Case for doing the same, to The Excommunicator and Laughing Gas for
getting me started, to Batman for bugging me for codes every day (don't call
me until you have some information for ME, and stop giving out my info as your
own.), to Coroner for being a nice guy and beating me every time in Global
War, to BaD for taking other people's cracks and putting their name on them
(talk about lame.)
GRAFFITI!!! - That gum you like is coming back in style. Al's abortion's, you
rape em, we scrape em. Would you like fries with that? HOMIE DON'T PLAY
THAT! "Yeah, I've been hacking 1087s, what's the big deal?" "Did the dial
tone sound fainter than normal?" "Remember that 3 gig board that was going
up?" Somebody, SHOOT ME!!! "I'm writing ZooMaster." "Just give your hard
drive a good shake, that'll fix it." Bob. So manly he's Danly.
I can be reached on the following boards:
The Digital Underground (NAP/PA home)
Hall of Illusion
(c) 1990 by Weapons Master. You may distribute this file to any baord without
modifications.


View File

@@ -0,0 +1,114 @@
12/25/90
-------------------============< SANCTUARY >============-------------------
| |
| -----------==> Town Criers Posting Board <==----------- |
| |
| Just another EXCRETION from the bowels of Sanctuary... |
|_____ City of _____|
| |_____ Beggars, _____| |
| The |_____ Criminals, _____| The |
| Home |_____ and Thieves _____| Hellfire |
| Board of |_____ _____| Bulletin Board |
| Sanctuary |_____________| 1-908-495-3926 |
|_________________________________________________________________________|
CALL IT!!!
Originally Printed in:
CYBERTEK
The Cyberpunk Technical Journal Issue #4, November/December 1990
P.O. Box 64, Brewster, NY
10509
Send $2.50 for sample or ask for details.
Call The Manta's Lair
206/361-5742 Sysop: The Black Manta
This Phile Typed by: Havok Halcyon, Chief Magistrate of the City
of Sanctuary
I've added in an occasional hint or two in parenthesis to help some of the
more uneducated phreaks understand some of the terms and whatever.
Those help phones in ATM Machine lobbies can be very useful if you
have to make an emergency phone call. They work on one of two different
ways. The first (and best for us) type is the kind that you pick up the
phone and press a button; which activates an autodialer that calls customer
service. This one generally looks like a regular traditional style wall
phone without a dial and a push button somewhere near the phone instructing
you to press it to get customer service. The second type can either be a
phone, or is sometimes just a handset set into a mounting on the counter
which tells you to pick it up for assistance. There are variations in
appearance with the two types, but the button is the giveaway.
What you can do with the first type is pick up the phone and not push
the button. You should just get a dialtone like in most regular phone
lines, and you can dial out to anywhere by flashing the switchhook, or if
the line has touchtone service, by using a portable touchtone dialer
available at RADIO SHIT (er..I mean Radio Shack. Also, if you do not know
how to "flash" a switchhook, consult BIOC Agent 003's Tutorials or your
local phreak or phreak oriented BBS.) for $19.95. Some of these phones are
hooked up to the bank's PBX (Private Branch Exchange), in which case you'll
have to dial the extension for an outside line, in most places this is
usually a "9", "99" or something similar. You can sometimes find out if
it's on a PBX by listening to the tones coming out of the autodialer. If
it puts out more than 10 digits (tones), or puts out a couple digits and
pauses before dialing the rest, then it's on a PBX. Of course some
autodialers mute the touch tones so you can't hear them.
With the second type you can call customer service, and either ask
some stupid question, or say "Sorry, wrong number". When the nice lady
hangs up in MOST cases you will get a dialtone and then you can dial out.
(A lot like when you use a diverter). However if the phone line does not
have touch tone, you are outta luck; as the autodialer is activated by
picking up the phone, the flashing of the switchhook will false start the
autodialer. So, if you can't use your TT(touch tone) pad, your outta luck.
Getting into ATM lobbies is pretty easy. They use magnetic strip card
access. An ATM card obviously works, as well as credit cards, calling
cards, and anything else with a magnetic strip on the back. The bolts on
the door are often exposed and can be jimmied open. Some of the locking
mechanisms don't even work.
There are a few things that you have to worry about. The first is
that someone might notice you staying on the phone for an extended period
of time, and get suspicious (This is not a BIG risk because most people
could really care less what you are doing, EXCEPT for those fucking goodie-
two-shoe bitches which want to make a Citizen's Arrest so that they can get
in good with your local PTA). The second is that you run the risk of being
recorded when you are in the lobby. Most ATM lobbies have cameras in them.
Usually the camera is located in the ATM, and only goes on when a
transaction in being made, but some places have 24 hour surveillance
systems. These are usually externally mounted, and quite visible. If you
see a camera in the lobby, don't mess around in there. The other
possibility is that the phone itself could be BUGGED by the bank.
According to law they are supposed to inform you with a beep every ten
seconds, but no one does that anyway (NOTE: The Gestapo [Ma Bell] is
supposed to notify you in the same way if they were bugging you at your
home phone, but they will usually say something like "I was checking the
line to see if everything was ok, and OVERHEARD some criminal dealings".
This is a common way to catch people on the phone, so be careful what you
say on public telephone lines.) You could do a quick look around to see if
you can find anything on the line. If you don't see anything "funny", and
can trace all the wiring, then you are probably safe. All in all, your
best and safest bet is to use an ATM located away from a bank, and one
where you can see the wiring coming from the outside to the phone. Even
then, call only people who'll forget you called right after you hang up.
___________________________________________________________________________
-=> !!!!! STUPID AND RETARDED DISCLAIMER GOES HERE !!!!! <=-
-=> <=-
-=> Dear Government type people, I'm just a plain ol' <=-
-=> irresponsible person. But, you can't prove who wrote <=-
-=> this so up yours. It could be anyone just using my <=-
-=> name. Why, I could even by your boss, or the President <=-
-=> of The United States. ACTUALLY, I AM The President of <=-
-=> The United States. Arrest me PLEASE, before I corrupt <=-
-=> any more young minds!! My name is truthfully GEORGE <=-
-=> BUSH!!! Really, I SWEAR TO GOD!!!!! (heheheh) <=-
-=>_____________________________________________________________________<=-
Call the boards and get Cybertek. They're all cool.
Peace and Reggae Music to all. Later muchachos...

View File

@@ -0,0 +1,32 @@
Phreaker Scams
Every business should be aware that there has been an outbreak of
attempted telephone fraud which targets PBX systems. Some
of the more frequently used tactics to breach the systems include:
1. An outside caller pretending to be a telephone maintenance technician
reaches a victims extension and asks the victim to participate in a
test of the telephone line or the touch tones by dialing 9-0-# or 9-0-0
and then hang-up; DON'T DO IT! This is an attempt by the phreaker to
connect to an outside line operator and get long-distance access from
your business's extension and thus your company would be charged for the long
distance calls.
2. Another way for the would-be phreaker to get fraudulent access to a toll
operator is to call into an extension and, pretending to have reached
the wrong number, ask the person to transfer the call to an extension
beginning with 9-0 or 9-0-0, e.g., 9001, 9015, 9027, etc. DON'T DO IT!
Beware of any forwarding or call transfer request from a caller you
don't know. Never agree to a transfer request or to participate in a
telephone "test" if it includes as a first digit an outside line access
number.
Most of these scams target businesses and not residential customers so don't be afraid
little kiddies.
** For Informational purposes only **
Do not try this at home kids...because the person you call will be on that business's COLLECT
call record. *duH*

View File

@@ -0,0 +1,725 @@
(: {Interview's & Conversations} :)
:) {with famous phreaks/hackers} (:
(: by The Infiltrator :)
From the WHAT IS THIS AND WHO ARE YOU department.
This is a series of files about conversations I have had with some of the
better known phreaks and hackers in the NY area, specifically those that I met
at TAP. I was a regular at TAP until everyone but the "950 Kode Kids", Richard
and Agent 6 left. Richard for those uneducated enough to not know, is Chesire
Cat, and 6 and a group of 60's throwbacks are the new regulars. The old group
has more or less become extinct. (Chesire and 6 were also the old group, but
the people who left are the ones who counted, and I used to go there to listen
to. Now I don't go anymore eithr.) TAP used to be the publication and the Fri.
night meetings. For the last 2 years its been just the meetings, since the
newsletter stopped being published.
During those 2 years there have been a small group of individuals who I thought
to be the most interesting to talk to at the time. Central among those: Tuc (on
the few occasions he did show up there), Lord Digital and Paul Maud'dib. I
also met a large number of losers with large opinions of themselves. Central
among those: Broadway Hacker (I think, the only person I really learned to
consistantly disklike at TAP while he was there.), The Surge (on his few guest
appearances.), MadMan, Criminal Element, The Phantom and others.
People that passed through for a day or two included:
Big Brother : Thought himself very funny, nobody spoke with him and I guess
feeling embarassed, he left after about 2 hours of talking to the only person
who came with him.
BIOC Agent 003 : Very businesslike, carries a briefcase filled with 500 xerox
copies of everything, which he freely hands out. Altogether a nice guy, if a
bit weird.
Sharp Razor : Typical LOD members, heavily opinionated about everyone and
everything in the world, mostly offensive to people there, unless they were
some of the previously mentioned regulars, who he would kiss up to, only to
call them losers the moment they left the table.
King Blotto : He seemed like a nice person who knew what he was talking about,
fit right into greenwich village since he came sporting multi-colored hair and
a bicycle chain for a belt. Have to wonder what people think of him back in the
midwest.
The 950 kode kids : This group includes, The Ninja NYC, Ginn Fizz, The Jackel,
and a grouping of others that come and go.
And a large group of people I refer to as "LODITES in training", typically 14-
21 yr olds carrying around 50 lbs of manuals they promptly turned over to the
cheif LODdy present. These included: X-Man, The Knipper, Doctor Who (who now
hates LOD i think.) and other less noticables.
Who am I? I'm a 19 year old Hunter College student, who started attending the
weekly meetings to learn how to make free phone calls or "be a phreak" and
learned what being a "real phreak" was all about during my 2 years there. This
is just a text file from some of my notes, the "interviews" when they appear
were done with a tape recoder (walkman) I had turned on and hooked to a mic
under my collar. The the people being recorded had no knowledge of this fact.
All the quotes are word for word reproductions of what was said. There is no
professional formatting, or fancy text graphics, just some notes slapped
together on what I have heard along with my comments. I also would not consider
any of the mentioned peolpe my friends, rather people I grew to know and have
good conversations with over the Friday nights. You cannot call someone your
friend if you essentially know nothing about them and are basically untrusted.
Conversation with Chesire Catalyst (Held at TAP.)
{Chesire is the ex-editor and publisher of TAP.}
(Me: is what i said, An: is what he answered, this is usually about 5 minutes
into a otherwise "normal" conversation. Richard is about 6' tall, black hair &
beard, look like he should have been a truck driver instead of a phreak.)
ME: So is there any chance of TAP coming back together?
AN: Not by me, I don't have the time, or the funds. It never made me any money
it was more of a public service that I can't afford to do anymore.
ME: Wasn't someone else supposed to take it over?
AN: Yes, Tuc was going to take it, but that's on hold right now, it doesn't
really look like it's going to happen though. With 2600 gone also, there is
nothing there to take the space of TAP at the present time.
ME: So it looks as if TAP has died after all these years?
AN: Well TAP isn't that easy to kill! I'm sure it will re-surface in one form
or another sometime in the next decade.
ME: Oh good, I have something to look forward to in the 90's. What about you?
Do you still phreak or what do you do for a living now?
AN: Oh no, I was much to closely related with the magazine to do any of that
any more. I give lectures on security and appear on talk shows and seminars
that concern our hobby. I'm also a technical consultant for various firms.
ME: Ok, thanks.
Convo with Tuc: (Held at TAP)
{Tuc is a phone phreak/hacker I have taked to on and off over the last 2 years
he has matured from a fat over-exertive person, into a normal human being who
is nice to talk to.}
(Tuc is about 6'1", used to be fat but has thinned out in the last year, black
hair, no beard, about 20 I'd guesstimate, I never asked him.)
ME: You look good, lost a lot of weight.
AN: Thanks, I gained a lot of it in college on the junk food.
ME: How'd you manage to lose it?
AN: Took up jogging and lost it again.
ME: Ok, So what is happening with Fargo 4a now?
AN: We plan to go on a member drive and regroup.
ME: Do you actually have any hopes of it coming together?
AN: Well it's more of just something to do for fun, it won't be that hard to
get into the club at this time.
ME: What do you think of the current phreak world compared to the one of say
2 years ago?
AN: Well everyone hates everyone now, there is no unity, there is only endless
war and threats and disorganazation. Mostly there are people who don't want
to learn anything, but only wish to join a large group and spend the rest
of their time signing it under their handle.
ME: Like LOD
AN: Like LOD
ME: Are you a member of LOD?
AN: No, I'm not and never will be.
ME: What do you think of LOD?
AN: I really can't say anything about that, but I'm not a member, that should
speak for something.
ME: Ok, I understand. Who else here do you consider to be any good?
AN: Well there is Paul and LD, that's about it, if you mean people in our own
underground. They (Meaning richard, agent 6, and others) are also very good
in certain areas and know a lot.
{At "they" he meant chesire cat and others. Paul and LD refer to Paul Maud'dib
and Lord Digital}
ME: Well thank's for your time
Convo with Lord Digital: {Held in the computer section of B.Dalton's on 15th
st. In NY, about 9 months after the last time I saw him at TAP. He has seemed
to also mature, from a "I'm god, Fuck you" attitude, into a more easy going
human being.}
(Lord Digital is about 6'1", was pear shaped the last time I saw him, seems
to have lost a good 50 lbs. He has black hair, is the only person I have met
in my life who consistantly wears a tie and designer shirts. If you know what
Steve Jobs or Rob Lowe look like, you know what LD looks like.)
ME: Hey, almost didn't recognize you, lost a lot of weight.
AN: Hum, who're you?
ME: TAP remember?
AN: Oh right, Ok I remember you now.
ME: How'd you manage to lose so much weight so fast?
AN: Took up Shotokan.
ME: ? Karate?
AN: Yeah, subset thereof, more mind over mind/body control though.
ME: Oh, walk over fire and kill people and all that?
AN: Nooooooo, the kill people is just a sort of anti-thesis to acupuncture,
hurt instead of heal, etc. Just knowledge of where to hit and why. As
for anything else, it's up to you to decide. Forget it.
ME: Subject dropped. Saw your story in Sundays businessweek, congratulations.
{One of his companies was profiled in a business section of a local paper, I
know it's name because I brought a 1200 modem from him a year ago.}
AN: Aha, thanks. It's not a big deal, that paper isn't exactly the Times and
the yearly growth was just normal. Only thing that turned them on was that
we started it when I was 15 & he was 17. Sort of '2 local kids make big
bucks in computer enterprize!'.
ME: Well better then I'm doing. Speaking of that, have you seen all the loser
files going around? Your name appears on 1 or 2 of them.
AN: Yeah I was shown one of them, only thing I recall was being pissed as
having my role model listed as Donald Trump. The least they could have
done was given me a decent person I supposedly worship, like Mark Rich.
ME: Who?
AN: Sigh, nevermind. Suffice to say, most of it are the delusions of some bored
14 yr. old Loser. In order to know all this about everyone, I would guess
one of Carl's idiot friends, or someone like Eric. I Don't know or care.
ME: Then it was correct?
AN: No, but the geographic locations were fairly accurate, so were a lot of
things the typical rodent would not know. There were a lot of errors, but
what it comes down to is; how does this cretin know anything about me to
begin with? answer; he talks with someone I talk to. Probably Carl, but
who really gives a shit, I don't.
ME: Carl as in Criminal Element? Isn't he a loser?
AN: Yeah, CE, well I have no comment's as to what he may or may not know about
phreaking, I am friends with Carl, it's not like Hi! CE!!?, This is LD!!!!
got some cool info? If he knows something or not, doesn't really matter.
He knows enough people that DO know what they're doing, that he doesn't
need to know something if he doesn't care. So effectively speaking he has
access to a large amount of information.
ME: And he doesn't?
AN: Talk to him about it, not me. Only thing that bothers me is the large loser
ratio he speaks with. Wouldn't matter in itself, except these people turn
around distort everything and write C000l Text philez about it.
ME: Like when you were busted and 'died' last year?
AN: Yeah, I've never been busted, nor have I died lately.
ME: Well I know from what people have told me that your father is well off, but
is any of that in the file true? Do you make a lot of money?
AN: Well why would you care? I really don't have any comments about anything
that links my personna to my real ventures. But let's put it this way, if
you have 50k and saturate penny stocks that you know are going to go up,
then you have to be brain dead to not make at least 500% of your investment
every year. However this is all paper, if you liquidize then your broker
gets a slice, taxes throw out half the rest and if you're legally a minor
then even more gets chopped since your parents have to co-sign all that.
ME: I'm not familliar with all that, what about Blue Chip stock?
AN: That's something to use instead of a bank, IBM, WANG, are rock. Nothing
they do will ever have any kind of substantial loss. AT&T more or less
the same. NYNEX also became worth a lot more since diversiture.
ME: Ok, sorry to intrude, I'd really like to ask you about a subject that
generates a lot of interest these days. Phantom Access. Is it real or what?
AN: Hahaha, swell. Yeah it's real.
ME: Care to elaborate?
AN: Ok, the name itself "Phantom Access", is now the registered trademark of a
third party who thought it was nice and wanted exclusive rights to it. The
name, not the programs. The programs are, if you can imagine something like
a small Dbase III related to modem usage and file integration. These are
for the Apple with a Cat, there are a lot of versions, I don't really know
who has what at this point, I basically told my friends that they are free
to do whatever they want with them.
ME: Are there any other versions for other machines or what did you mean by lot
of versions?
AN: Well mine uses mousetext, windows, 256K, clock, hard disk, 212 card and
an optional 2400 modem. The simplest version uses 1 disk drive, 40 columns
and a ][+ with 48k. There are versions for the Amiga, I was never involved
with the Mac, I never had an interest in the machine, the programs for it
were by someone else.
ME: Paul Maud'dib?
AN: No comment
ME: Ok, no problem. What exactly does it do? and why did you write it and why
all the secrecy?
AN: Ok, I just thought of everything I might want a hacker to do. By hacker I
mean in a global sense Telecom Expert System, not a code finder for Sprint.
There was a small pre-processor I did that had about 50 commands added to
basic, like tone generation, wait, test, else, endif, etc, states. Then I
went ahead and did a full fledged hacker, it will literally hack anything
ever devised. It's excellent and apparently no-one has ever thought of
many of the functions. I mean just in the last year have audio-test hackers
come out for the cat. We were doing this 4 years ago. The primary reason
for some of the techniques in it, were to insure no high-profiles on
digital switching systems. Then I wrote an intelligent scanner that worked
with the hackers, then an ascii hacker.
ME: Yes, sounds great. You might be interested, just lately there has been a
ascii hacker made by others. Hackamatic I think.
AN: Yeah I know, i've seen it. Actually ascii hackers have been out for
a long time, just they aren't distributed. Originally I had planned some
thing much like it, but made to work with the hackers & scanner, faster and
less kludgey. But I talked about it with Paul, he just said Wrong, dumb
move, use pattern matching, make it intelligent, not something slow and
useless. At the time I was 15, I though Huffman code & godelization of
text files were just swell and Unix was god. I was unfamilliar with any
real AI techniqes or langauges. So I went out and read some of Knuth's
books, learned lisp and some prolog, and about 2 weeks later came up with
something much better.
ME: How good is Paul, really?
AN: That's a difficult question, in comparision to what you'd call phreaks or
hackers, he is much better. But that's not saying much.
ME: How would you catagorize yourself?
AN: I wouldn't, I don't seek to be integrated into whatever structure they
have set up.
ME: Ok, in comparison to their structures, how would you say you and Paul
would fit it?
AN: Better then 99%, there is always the unknown 1% that someone might be doing
something that would just blow me away. I doubt it, but it's possible and
it's happened before. Also, I wouldn't catogarize myself with Paul, he has
greater general knowledge of some fields that I don't. And visa versa, so
it works out well. During the final writing of the hacker though, it was
really helpful to be able to read 50 different things, see how to mix them
into the 1 thing I needed, and then talk it over with him, usually I can
come up with something he never thought of and he points out stupid moves
on my part. And suggests improvments.
ME: Who are the 1% that impressed you?
AN: Nobody well known, usually just people I'd meet in obscure places, like
some kid I met at an electronics store, who walked out and said, hey those
look like parts for a blue box. I just started talking to him, and after
a few minutes, got the impression that he was either totaly confused or
lying. Then I found out his father is a SCC switchman. So I ended up with
several feet of manuals, 100's of dialups for things in nyc, and gave him
some cosmos manuals which he wanted. It ws very profitable from my end of
it anyway.
ME: I always wondered were all that came from.
AN: ha, yeah, well you can trash from now until 1990, or you can just order the
fucking things from AT&T, I'm on their mailing lists with a maildrop as a
TIRM director. They just keep sending more and more junk.
ME: What did the SCC guy teach you about?
AN: Various things, and cleared up a lot of misconceptions about ANI and how
it actually works, auto-verify, things like that, which I really didn't
know the answers to. He had it as sort of a hobby as well, he was on some
cosmos kick, and I helped him out, so he was grateful. He also had an apple
and to most normal people, you mention free software, and they get this
happy expression. Future 40 yr. old new wares kids being born.
ME: Speaking of that, what do you think of the pirate world? To my knowledge
you are one of the only phreaks to ever be in any large pirate group.
{Apple Mafia}
AN: Well that wasn't through any real involement. I just happened to be friends
with a lot of the people and at the time it was a new idea. (A group), so I
said why not.
ME: What do you think of pirates? did you crack software?
AN: Hahahahaha, yeah dude, I crack the latest!. No, sorry, I don't mean to
insult pirates, just I find it hard to take anyone involved in an endless
cycle of getting new wares, in any kind of serious perspective. I mean Ok,
when I first thought of all the software I could have for free, it was like
being let loose in the vault of bank, or a 7 yr old in a toy store. Whether
people admit it or not, they are new wares kids at first. But also being
realistic, you discover that 95% of all software is useless to you, ok it
might be good for something, but why do *I* need it? the rest is just trash
period. Then there's the 5% I use. I outgrew piracy in about 2 months, most
normal people do as well. Or they become crackers and start cranking out
the wares.
ME: What do you think of the crackers?
AN: It varies, I can understand being interested in programming and protection
schemes, but to actually waste all that time on cracking garbage, just to
get losers to idolize you is pathetic.
ME: Do you still talk to any of the pirates?
AN: Not really, the pirates I talked to are largely gone from the pirate world
as I said, most people outgrow it. If you mean people who were pirates that
I talk to, then there's Zero Page, Mr. Xerox, etc. I mean a LOT of people
WERE pirates, but that doesn't really mean anything at this point, I WAS
a pirate, everyone who has ever gotten software for free was/is a pirate.
ME: Ok, I mean people who are cracking right now, do you talk to any of them?
AN: Not really, most of them came into existance a very short time ago, And I
have no reason to talk to them or associate with them.
ME: So you don't get new software anymore?
AN: Yeah I do, a friend of mine brings over a box ever week or so, usually it
ends up as 20 blank sides, but sometimes there is something decent out in
apple software. I mean I DO use AppleWorks and some new utilities. There's
no reason to not use machines I allready own.
ME: Can you say who you still DO talk to?
AN: Well I suppose it doesn't really matter, Captain Avatar, who I think is now
calling himself Skip Rooney, or some such name. Sigh.
ME: In other word's idiot's.
AN: No, not really, he's just someone who likes software, good for him, who am
I to say that he shouldn't like it?
ME: True I guess, what about crackers?
AN: I think he does crack, I don't know/care. I also know Gadget Master.
ME: How did you meet him? People regard him as a big loser who mis-cracks wares
that are copya.
AN: I don't know and as I've said, I really don't care, I first talked to him
a few years ago when I was still aware of the pirate world, he started out
in something like late '83 I think. He's ok as a person, I really couldn't
care less if the new wares kids love him or hate him. As far as I know he
does it for himself, not for the benefit of others. So what other people
think of him is inconsequential.
ME: Where do you think the pirate world has gone lately, and about the sides
forming in both worlds?
AN: Well as far as I'm told the pirate world has gone downhill a LOT, I don't
know. As far as hatred, most phreaks regard pirates as lowlifes who have
nothing to do with their time. Which is to an extent true. Pirates regard
phreaks as code abusers and losers who cannot program. Which is also to
an extent true, at least of the newer phreaks. It is really easy to
become well known for having essentially no skills, it's like, what do you
-- more --
know? I know Tuc!. That's just keen, WHAT do you know? I just told you, I
know Tuc, I even know where he lives, and am joining a new super elite
board tomorrow! I'm cool!. Everything seems to be cyclical, building up
to it's absolute zenith at late '83, with the ending of securityland and
the original OSUNY. Everything thereonward has been less impressive then
that which came before it, I mean Sherwood Forest (The original run by
Magnetic Surfer {The TKOS board}) was good, Plovernet was good, LOD was
good. But they still did not compare, everything usually disintegrated
into people quoting manuals at each other and a bunch of "We're the
eliteist people in the whole universe" patting each other on the back
kind of messages on the club subs.
ME: So your saying no-one really knows that much?
AN: No, not at all, there are many competant people out there, but compared to
just about any professional we didn't have that much knowledge. Most hackers
have a basic understaning of more OS's then the average DP person will ever
have to learn, but no concrete knowledge of how it works. Usually someone
will specialize in 1 OS and the other people in the group will handle the
others, so it works out more or less. But phreaking is different, OS's are
easy to learn because there is a lot of easily accessible published doc-
umentation available on it. Technical AT&T manuals usually constitute
trade secrets, and are hard to get. Or WERE had to get, now I have almost
infinite access. But I'm talking about the average phreak who knows what
he is doing. As opposed to the average elite poser, who can quote every
# to every "elite" 1 drive board in the univere, and every word of every
file ever written backwards and forwards, yet fail to understand anything.
The poser won't care about the knowledge, just how his name ranks in comp-
arision with other elite posers.
ME: So what do you think of LOD and people like Blotto, I think that from some
of the messages I've seen posted Mr. Xerox contends they are complete
losers?
AN: Well I don't know, I'm not familliar with the group LOD or even if it
exists anymore.
ME: What about Blotto? and blottoland, were you also on the LOD club board?
I've heard that you also don't like Blotto?
AN: I don't even know Blotto, it's hard to dislike someone you have never
spoken with. I have no idea as to his skill, but assume he is competant
in whatever he is doing.
ME: Do you KNOW ABOUT Blotto and newsweek? and what about the boards?
AN: I only know about Blotto through Paul, from what I know he is ok as a
person, I know nothing of his skill or lack thereof. I was on LOD when
it opened in March of '84, or April, whatever. I called a few times, then
didn't call back for about 6 months, by then I think the # had changed
3 times. I've seen the final LOD club only board, since Paul was still
a member {Paul quit LOD}, and remote sysop of it, it wasn't impressive,
but it wasn't bad either. The same for Blottoland. As for Newsweek, I
don't know why he's being hassled about it, HE didn't have any say on
anything as I recall. If the elite posers had reacted unlike idiot's
for a change nothing would have happened, just another story. Instead of
that they threatened his life, his wifes life, and the next week, boom
prime time "hackers threaten life of Richard Sandza" The original article
became a series of articles, ad infinitum. As for the other newsweek crap,
I would sum it up as losers getting caught and trying to cash in on the
media coverage. It's like "hey I'm lame, I just go busted, why not get on
TV at least?". Hardly people who qualify as any kind of spokespeople for
hackers or phreaks.
ME: What about the phreaks and pirates who appeared on TV also?
AN: If that's what you want, it's easy. Media people love you, I mean you
know Mike {11 news reporter who shows up at TAP.}, you agree to appear
on TV, next day, your on TV, and have 45 seconds to say anything you want
to say, complete with shadowmask, voicemask, free lunch, rides, and a vhs
of the show, and any other shows that you want. The only people he has been
able to convince are the local code mongers, if you remember he asked to
NOT have a shadow or voice mask, so his friends could see his face on TV.
Gosh mom look!
ME: So what do you think of current boards and new phreaks? Also why are you
no longer on boards? Oh yeah, also what was Metronet?
AN: Geez, lot's of questions, ok 1985 has been the year of the radical ultra
elite private board with cool software and spinning cursors and filters,
and users/sysops composed of idiots. EVERY loser in the world with 2 drives
is putting up a elite private board. In a way it's amusing, but sad too.
New phreaks usually start as inexperianced and move into the status of full
time elite posers. Ask yourself this: why do people call boards? To gain
knowledge, talk to their peers, ask questions of better phreaks and to form
radical elite groups! Now as it stands, they will never find anything other
then losers who claim to be something they are not. They believe that all
knowledge is hidden in the elite g-sections of all the best boards. Which
is of course bullshit, frequently the people who transcribed the manuals
managed to fuck it up along the way, didn't even understand it themselves
but just copied it word for word from somwhere. It's easy to run into a
person somewhere and say something involving their latest file, and they
will just look at you and ask what you're talking about. They wrote it yet
dont' understand it, actually let me take they back, they copied it and
fail to understand it. I no longer call boards because I have no reason
to call them. There is nothing out there I need to learn, no-one I need to
talk to, the only people I would talk to on boards, I call voice. So why
call boards? Just for a good laugh maybe, that's about it.
ME: You're saying that no-one out there know's more then you? And what about
metronet.
AN: No, not in the least, everyone knows more about a given subject that is
their specialty then someone else does. But what it comes down to, is
that if I DID want to learn something, I would not call a board or any
thing of the sort. I would get a manual on it and learn it. End of story.
If at the point I wanted some additional tips, I'd call a friend and ask.
As for Metronet, I was simply friends with Terminus, I have no idea why
he freaked out, insulted everyone, took his board down and dissapeared.
But I haven't spoken with him since he was in Paris sometime last May.
ME: Ok, what about the quality of files, where would you suggest a new phreak
start out? And how did you start out?
AN: Argh, again the long questions. I have to get going in a minute, but Ok.
The quality of new files is shit, nothing usefull is being written, I've
seen some of the newer files, it's like, are these people joking or what?
101 way to spell leech, how to be a phreak, the real pirates guide, a guide
to hacking/phreaking/carding/anything, and they are all total shit. I mean
if people regard these as testimonials on how to card or whatever, then its
no wonder so many of them get busted. Where to start, well go to Shadio
Rack, and buy: understanding telephone electronics. Then get ahold of Don's
files, read and understand them. I KNOW, everyone says they are innacurate,
and plagerised or whatever. But what did they want him to do? make it up
as he went along? of course it has to be simillar with something. The fact
is, even though there are some mistakes, 95% of the text is extremely use-
ful for begginers. No-One has to this date done better job. For specialisd
knowledge you can branch off to files that deal with hat subject matter.
For example: Blue Boxing is covered in about 50 files at any given time,
but the best and most technically correct ones are probably those by Tabas.
I started out, as you put it. When I was about 6, my father was a nuclear
physicist before getting into business. And used to work for NCAR. (Natnl
Center of something or another.) They were one of the first 3 organazations
to get a Cray-1 and I hung around and started doing thing like running
stupid little programs on punch cards through it. I was supposed to just
run their's through, but in reality I could do whatever I wanted to. So I
had fun. Everything I did until 1979 dealt with mainframes. Then someone
introduced me to an Apple, and I ended up hanging around with Magnetic
Surfer (Old phreak). Who also had an apple, running with a casette tape &
a micromodem II. It was fun, there were like 30 boards out then PERIOD.
It was sort of the begining of everything, Rather nice.
ME: How old are you anyway?
AN: Old... almost 18
ME: Whew, well compared to a lot of people out there your quite young.
AN: It depends. There's a point where you reach a level that you can really do
just about anything. It's not 1 set of skills, but combine a phreak, a
hacker and a pirate, into 1 person. And that person is effectively unstop-
able. He can do just about anything he wants to. But at that point you
usually decide what course you want your life to take. You can easily
become a sucessful computer criminal. Or you can enter the real world with
a host of extra skills that give you an incredible edge over anyone in the
information age.
ME: So what do you think of all the "Elite" 19-25 year olds still out there?
AN: Well, if people started later, then they might still be there at that age,
or they might just enjoy calling boards & joining things just for the fun of
it. If on the other hand they have been into it for 5 years and are still
serious about the entire Rad K000l I'm Elite, cycle, then they are either
complete social outcasts, or losers. If at that point you find that having
some kid in Pig's Knuckle Idaho, idolize you. Is the most important part
of your life, then you have some serious problems. I wish them the best of
luck, and may they all eventually grow up and get real lives.
ME: That sounds about right. Also what did you mean by "can do anything" you
mean get at any information?
AN: Yeah.
ME: With Phantom Access?
AN: Nooo, look Phantom Access is nice, it's good tool, but I only need so many
codes for so many systems. I set it up for 1 night, and have enough codes
to last 5 years. I have no use for a scanner unless I am looking for some
thing particular in a specific ANC. And there are much eaisier ways of
getting a PW then setting up a hacker. They are all essentially toys.
Granted, they are very nice toys, but it's much faster to socially eng-
ineer whatever you might need. I no longer play with systems just for
the hell of it, unless I am in the process of learning them, in which case
I get a real account from my local ACM office.
ME: But why a combination of the three?
AN: Ok, simple, it's a deadly combination. Security people are used to dealing
with hackers, ok make the OS as bulletproof as possible, let's assume they
miraculously achive perfection. Secure system. Now the weak link is users,
it HAS to have users to access the information. So now the weak link is
their pw's. A pirate can program his machine to do anything he wants it to
do, since he is presumably adept enough to write whatever quickie hacker
he might need for the situation. So now you begin to play with getting an
account from one of the users, what is another weak link? the phone lines
themselves. On mechanical systems it's more of a hassle, but still within
reason, but on digital systems it's one large software program with all
kinds of neat functions.
ME: Right, you and Paul are the leading experts on ESS I hear. I see, the above
seems logical, no security could stop that. Also did you write some kind of
single modem data trap? or was that another rumor?
AN: Geez, lot's of rumor's, yeah a while ago. The cat is an incredible modem,
however most people don't comprehend it's power, pirates just think it's
a cheap 202. Argh.
ME: Yes, I have one. It's nice. There was one thing I always meant to ask you:
how do you feel about all this? I mean do you have any moral considerations
at all?
AN: Lovely, this is really getting odd. No, I don't. Morality is a useless and
essentally outdated value. Of course it has it's place, something has to
hold society together I suppose, But that's neither here or now. Personally
I subscribe to the stainless steel rat way of thinking, in short, if it
results in the death of another person, it's wrong, whatever you might want
to define as wrong. Anything short of that doesn't matter. There's just
People and the universe, the universe doesn't care, so do anything you want
to do. It's people who create right and wrong, no-one else.
ME: So why didn't you take the Computer criminal's choice when you had it?
AN: Haha, it's not something I have one chance at, it's just a way of looking
at things. Why should I risk myself on doing this action, if I am caught
& in cases of emmbezlement, etc, it' not if, it's WHEN. Then i get to flee
the country or go to trial, for some trivial sum, that may seem like a lot
of money to me now, but will be loose change 2 years from now. So it's
more a question of practicality, why bother? When I can make 100 times it
legally and not worry? America is a capitalistic country, anyone with half
a mind and an idea can make large sums of money.
ME: So you are retiring from the phreaking world?
AN: Look, am I IN the phreaking world? No, It's just a set of skills I'm glad
I gained, and can use to my advantage in the world.
ME: So all the board's, everything, it's just so much shit?
AN: In a word YES. People get bored, they need something to do, when it comes
down to it, it's fun for a while, for it's own sake. I'm eliter then you
are, I'm a k-k000l dude, and so on. It's a game, like anything else. The
only losers are people caught in an endless loop of calling boards, and
collecting useless information they will never use.
ME: Much like TAP?
AN: Much like TAP. Really, it just comes down to a group of people with a
common interest in theoretical applications of technology. They're info-
maniacs, but will NEVER apply their knowledge to anything. I think it
was Don who appended 'Knowledge is power', to 'The Sucesfull aplication
of knowledge, is power'. Knowing everything about everything, is useless
unless it's applied to something.
ME: Is that why you no longer go to TAP?
AN: There's no reason to, I went there primarily to talk to Paul, I talk to
Paul anyway, why waste my Friday nights?
ME: He doesn't go anymore either.
AN: Yeah I know.
ME: Do you ever wonder about all the new people out there just starting out who
will never make it to any point worth mentioning. Since anyone who is any
good has more or less left?
AN: No I don't. I really don't care, anyone who has an interest will eventually
realize that the answers he wants can be found in just about any local lib-
rary. Not all the answers, but a start. Boards are a social medium, you go
there to talk to people, they don't serve any real purpose at this time.
ME: Question, do you, or did you ever run a board or boards?
AN: Yeah I did, it was more an excercise in programming then anything else.
Then I had a small board written in C up on my local Unix account, just
to see how it would work out. Multi-lines, etc. and about 20 megs
allocated to my use, it was amusing.
ME: Was this an open board?
AN: No, just friends.
ME: Will you ever run an open board again?
AN: I never did and I have no reason to, I will be a consultant for a company
starting next year, which will have a board up, on which I will be remote,
but it won't be a phreak board. Like I've said, I have no use for calling
one, even less use for putting one up.
ME: So what kind of board will it be?
AN: Some sort of multi-user mini-LAN. I don't really know, nor care.
ME: Are you still the Dungeon Master on one of the multi-user role playing
systems?
AN: Yes
ME: Is there anywhere you can be reached?
AN: It varies, I have account on CIS and STC on and off to see what's going
on in the sigs. I'm also going to be on Qantum-Net. (Amiga Developers sig)
ME: Speaking of which, how far did you get on the Amiga Phantom Access?
AN: On the Apple I have it to a point where it can run as a self-contained
expert system I can tell it what to do, and it can go off and do it
for a day, or a week. But as I said, it's essentially useless to me. I'll
probably finish the Amiga version sometime early in '86. C is C, and I can
write infinite libraries of functions, but I need information on hardware
interfacing, the manual's that come with the Amiga suck, the $100 hardware
manual is fluff. I should be getting the developer's pack in the mail some
time this week, that's RamWhack, a Debugger, several really necessary utils
& 3,000 pages. So that should end my problems.
ME: How do you find it?
AN: The Amiga? It's a nice toy, however the OS has some serious problems, the
keyboard is lousy, the monitor sucks. But overall in hardware I'd give it a
7 on a scale of 1 to 10, 1 being a C64, 10 being a Xerox Dandelion, Apollo,
or Sun wrkstn. It's amazing FOR THE PRICE. But otherwise, as I said,
a nice toy, nothing more.
ME: Will it include some kind of normal terminal program?
AN: Yeah, Terminal program with buffer's, macro's. Only not AE type of macro's
more like a shellscript that can take variable occurances into account and
act upon them. Terminal emulation, Xmodem, Ymodem, Kermit, B Band, Vidtex
and a X.PC & MNP, for the CCITT22, etc.
ME: How do you find it? 2400 baud that is?
AN: Well 2400bps is not that big a deal, you need perfect lines, if you don't
have them then you either get garbage or X.PC or MNP kick in, correct it,
and slow the effective speed down. It's more of a fad then anything else,
it's not going to overtake 212, I mean look at TeleByte 10,000bps, then
someone else has 19,200bps and it just goes on and on, I doubt anything
will replace 212 as a standard in the US. For file tranfers it will just
keep getting faster and faster with specialized equipment.
ME: By the way, on a completely different topic, are you back in school yet?
AN: No, Possibly in Jan. of '86, probably in Sep. '86. And if everything goes
the way I want it to, then I'll quit in Dec. And never return.
ME: Why would you quit MIT?
AN: Why not? No-one's left there, Richard is gone (RMS), everyone else is gone,
I wouldn't be there to have fun at this point, but rather to pick up a
degree.
ME: I wondred about that, why not pick up a degree? Correct me if I'm wrong but
from what i've been told you graduated high school when you turned 16, and
managed to get 1580 on the SAT. Why throw it away?
AN: Throw what away? Why get a degree? to throw onto a resume' and to get a
dead end 30-40k a year job working for someone else, no fucking way.
ME: 30-40K doesn't sound bad to me.
AN: It's not, but then again it's not much. And I have this thing about doing
underpaid work that makes my employers more money then I make. Forget it.
ME: So why go for those 3 months at all?
AN: Oh, the usual reasons. My father wants me to go, the moment I enter my
trust funds escalate and I get more money.
ME: So the only reason you're going is to get money?
AN: Yeah.
ME: Speaking of college, isn't Paul a Cal-Tech. dropout?
AN: Talk to him about it, No comment.
ME: Ok, just I've talked to some of the other people at TAP and heard that. I
understand if you don't want to say anything. What do you think of the
other people at TAP?
AN: I don't, no-one is there anymore.
ME: Can I just ask one thing about Mr. Xerox? From his messages that I saw on
the World of Cryton, he is very opinionated, going as far as to say that
LOD is garage, Blotto is a windbag and making degradory remarks about all
the other LOD members.
AN: Well Xerox knows what he's doing, if he knows them and says they're losers,
then they very well might be. I don't know them, so I can't really agree or
disagree with him.
ME: Well let me put it this way, I know it won't happen, but let's say that for
whatever reason you wanted to put together a group to accomplish any given
goal. Who would you want in it?
AN: Well it's not going to help you very much for me to answer it, since you
wouldn't be familliar with most of the people.
ME: Ok, just theoretically, who?
AN: Well, the people that you'd know: Paul and Xerox, then everybody else would
be local friends who have some particular specialties that would be useful.
ME: Such as?
AN: Ok, 1 person who knows locks, alarms, security systems, sensor's, and high
intensity lasers, one who designs computers and knows hardware perfectly,
one that's into explosives, detonators, acid's, nerve gasses, etc, Hum 3
people that fully comprehend a large range of micro's, 1 of my father's
programmer's, who doesn't have any moral or legal problems with dealing in
whatever situation might come up, and 2 other friends for various reasons.
ME: So 12 people including yourself. What about apprecntices or people to do
things for the group that you don't want to do yourself. Isn't it common
practice to get kids who are minor to pick up things like carded purchases?
AN: I have no comment's on that, except to say I don't card. What people over-
look is that I live in NYC and through friends have access to an infinite
number of lowlifes.
ME: You mean petty criminals?
AN: Not even that, just lowlifes. They don't cost anything material, one of
the things they most value is blue boxes & international codes so they can
call the motherland and talk to their parents or set up drug shipments or
whatever.
ME: So for some codes or a box they'll do anything?
AN: More or less, the only hard part is getting accepted in their little world,
I have no desire to, nor do I have to, since one of my friends is.
ME: So you have a large group of people willing to do anything. Must be great.
AN: To an extent, but not really. Most of them are complete idiot's, not able
to memorize anything. However the upside is that the only thing they care
about is where their next fix is coming from, so give 10 codes and they'll
do anything. Give them a gram of dust and they'll kill their mother.
ME: Are you serious?
AN: Well no, the going rate to hit someone is 2 grams of coke, or $200, which
is the street price for 2 grams of coke. One of their ongoing jokes is how
white people go out and spend $20,000 on a profesional assassin to kill
their annoying wife for alimony or something and he fucks it up, when they
could go to the local street corner and have a junkie do anything for 200
bucks. Which is true.
ME: And your involved in this?
AN: Nooo, I never deal with them, I dont hate anyone or want anyone killed,
they're just a large group of people that can be cheaply brought for any
service you want done, they are hardly professional, but can carry boxes
as well as anyone else. Personally I find them pathetic, but what do I
care.
ME: Ok, makes sense. Well is there anywhere you can be reached?
AN: Not really, the people that I want to talk to have my #'s. I don't call any
boards. So.... Well I'll be reachable in Feb. '86, on 1 board in nyc. But
until then, anyone who really has to reach me can leave a message with
someone who knows me, a lot of my friends aren't that hard to reach.
ME: Ok, thanks a lot for your time!
{}
Some things that need to be said. All the (,{,< or whatever,are my own comments
not made by the people who were tlkin. Many of these conversation happened over
a longer time period. The one with Lord Digital lasted about 10 minutes of real
time, but as you can see the file is a lot longer. The one's with Chesire and
Tuc lasted about 3 minutes each. I have longer tapes of Tuc, but he didn't have
too many interesting things to say at the time. I also have many of Paul Maudib
which will cover part 2 of this file. This will be out as soon as I get some
more time to type it all in. Alltogether I have about 5 hours of tapes of convo
s with 50 people. I also have more tapes of Tuc and Lord Digital. If anyone is
interested in all of this, then I will type them up as time permits. Everything
has been typed in as accurately as possible. But some parts have been cut, you
obviously can't walk up to someone and start questioning them just like that,
all the small talk has not been included, just the interesting parts. But
remember, text files have a way of getting HUGE. The actualy convo with Lord
Digital lasted 10 minutes, what has been transcribed here would have taken
less then 4 minutes of real time. The other 2 took about 45 seconds each. So
this is a lot of typing to do for me. But if people show enough interest then
I will be willing to do it. I also have about 20 hours of conferences. Some
of them are total wastes of time, but some of them are interesting. I am also
willing to type these up, but mostly they are just a large group of people
yelling and screaming about nothing. Not exactly interesting reading. I also
want to point out that none of the people on any of the tapes knew that I
was making recordings, since I don't go to TAP anymore they can be just as
mad as me as they want to. I don't really think any of them would care, with
the exception of the 950 kode kids who don't like being exposed for being the
losers that they are.
{} (C) 1985 by The Infiltrator. All right's reserved. {}

View File

@@ -0,0 +1,292 @@
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
^* *^
^* Tap.Interviews II *^
^* The Infiltrater *^
^* *^
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
Ok, I might as well reveal myself to you all now. I am really Sharp
razor of LOD fame. In this file I am interviewing Lex Luther, we can
get to see what the REAL Lex is like. Here we are:
ME:Hey Vinny, whats up?
AN:Hey dude, whats that? Hey, thats a nice walkman let me see...
ME: <SLAP> NO! Get away from it. I... sorry... its just that I'm
protective about my walkman...
AN:Ok, I understand.
ME:So Vinny, tell me about yout latest files.
AN:You want to know about my files! $Ok!$I typed in 183 more$manuals into $LOD$
$text-files. Some$preety good stuff$to.
ME:Um, how come when you talk with all these '$'s?
$AN$:$And I'm gonna$type 54$more...What? oh, sorry, I always get like that
when I talk about my ELITE files... So what were you saying?
ME:Ok, I understand, anyway whats going on in LOD lately?
AN:$LOD$!Well$ we... oh... sorry... um, LOD is doing fine, we have created
our own little world of Elite BBSs. All of them are LOD only, you should see
the incredible info, so many codes! And we have succeded in populating
these ELITE $LOD$, um I mean Elite LOD boards with complete know-nothings.
ME:Sounds preety Elite. Oh shit, my walkman... hold on.. *&&%^&*PIYHIOYB
C)*UAJHFD"LF.... ok, fixed it... So, is LOD's Public relations going?
AN:Elite... Totally ELite, everyone loves us, its great... people who know
A LOT more than us, tell us everything they know about phreak/hack, all
we do is out them through our filter to get info out of them... Its Elite...
ME:Cool, I've heard a lot of rumours going around lately about your
accomplishments, could you tell me about them?
AN:Well to start with, some people are trying to take away my credit for
inventing the blue box. I mean, you think Joe Engressia did it by himself?
He was fucking blind! I told him what to do. Of course, I gave ole'
Al Bell that idea about using acid to the get the telephone to work.
Of course, that never could have happened if I hadn't invented the light
bulb, I don't know why I gave Edison the credit... You know those rumours
that I wrote all of Shakesphere's works aren't true. Lets just say I
dictated... I don't know though, sometimes I think I should have given
my military advice to the turks instead of Alexander the Great... About
the pc world though, the Woz and I are good friends, I did him a favour
once, gave away a computer I had invented, but I didn't like to much,
some thingy with a 6502, um... Apple 2 I think he called it. Of course
after that I went on and made that other computer, the one with the
8088, uh, pc something they called it... And then -
ME:OK! Enough, I'm running out of tape - uh, I mean time, I gotta go...
I have some typing to do...
AN:Oh, really? on what?
ME:Oh, just a little file, you know...
$Well$dudes$you$just$read$a$very$Elite$interview$!!!
And now an interview with Executive Hacker, of CEO
ME:Hey dude, how's The Chief Executive Officers?
AN:Well, we just wrote some more about our opinions on everything
technical, ever....
ME:Oh, I hear you've been kinda out of the BBS world except to release your
files?
AN:Oh, well, not really, we stay in touch...
ME:Hey, by the way do you have Ultima IV docs?
AN:Haha, very funny.
ME:What do you mean "very funny"?
AN:I meant no one even has Ultima IV, much less the docs, when do you think
it will be released?
ME:um, exec, Ultima IV has been around a few months.. seriously...
AN:WHAT?!?! You're kidding?!?!?!
ME:Look, forget it, back to our discussion, I heard you were running a board
on Tele-cat software?
AN:Ult. IV!? released? What? Oh, I think The Byte should be releasing
version 1.0 of that program soon.
ME:um, exec, its... oh forget it. You said you stayed in touch, with who?
AN:Oh, no one special... well, actually Corprate Criminal... and... no one.
ME:Oh, Corprate Criminal of CEO?
AN:Yes
ME:So, who else is in CEO?
AN:Corprate Criminal.
ME:And?
AN:ME.
ME:And?
AN:Well, thats about all.. in fact, that is all.
ME:Ok, I gotta run now, nice talking to ya...
AN:Later, is Ult. IV really released yet? forget it.
ME:later...
Ok, in case you're too stupid, what I am trying to say is that LOD is a group
of egotistical fools, and CEO, even though they know a lot(all 2 of them)
don't know whats going on...
later...
Don't you just love the Elites? I do, in fact, I love them so much that:
--------------------------------THE ELITE FILE---------------------------------
June 2nd, 1986
Ok, I have just read the "SpecElite 1980-85" disk and I writing partially
in response to it, but also because the things I am going to say have been
building up inside me for a long time.
To start, "The Doc", who is the sysop of SpecElite claims to be "Elite" all
over the place. He tells us of the hard way to "Eliteness" and how he finally
learned the ropes of Piracy. Very funny. The first thing I would like to
establish, before I go any further is that Piracy is not a "skill" not a
"talent" and takes no effort. Kraking is another matter and takes a slight
amount of skill, but to call Aes and Cfurs and "distribute warez!", which
is what most of out present "Elites" do, means nothing. The Doctor has no
programing skills, no hacking talent, and no phreaking knowledge, his main
claim to fame is that he used to run a kool cat-fur/Pirate BBS(he claims it
was the first!HA!). It is so easy to become Elite now, with all these low
I.Q. new warez kids running aroung, who are looking for pirates to ass
kiss it is relatively easy to build up a following. Now I won't get into
the "To spot a rodent look for 'K00l' and 'C0dezz'" syndrome which so
many people writing rodent files are doing, seriously its the people that
concern themselves with that type of thing that are assholes (then why am
I wasting my time doing this?).note:here "Elite", means Elite Pirate,
not Elite phreak. I would also like to mention that people
that make garbage wares, (ie: take-1 movies, parrot songdisks, and other
no-skill/talent necessary items) are the lowest, they are just out to get
their name better known in piracy. And, whatever you do, don't respect me
for writing this...
Lets take a case that just came to my mind...
for instance, "Monty Python" of 516. Monty started out in Oct. 85(yes! 85!)
as "Hockey Nut". Wow, he was a total moron, posting about snoppy and whatnot
on boards. Ok, so then he changed his handle to "Monty Python" and put
up The Flying Circus Ae, which later became a BBS. Monty had his BBS up for
a few weeks, when he decided he was ready to be *ELITE*. Ok, his board had
been pitiful, with D&D games, etc. Well, the Elite board was even worse,
the new user p.w was NONE. Ok, this was an Apple-net, what is the usually new
-user login? Exactly, but Monty insisted that it was a p/w he had put in.
In fact he actually posted on boards "New user p/w:None". Well he met Taran
King of the 2600 club (No way associated with 2600 magazine), and got in
(it was because he was a sysop). Anyway, to make a long story short, he
got on a few phreak board, was on Stronghold East *ELITE*, and posted a
notice retiring from the "phreak world". As far as I'm concerned he was
never in it. Back to SpecElite though, I know you were all iritated by
the 'SpecElite [###-###-####]' well the # is 213-391-6835. who cares...
Anyway I am supposed to be telling what I think about modems, eh... In my
*ELITE* opinion, if you put up a transfer board, and especially an "Elite only"
transfer board(cough, cough, Blackwater..) you are an asshole. Pirating is
total crap, every lose loves to post his theory on why the wares stopped
flowing, who cares? I got my modem in June '84, now back then... well actually
when I think about it it sucked. It was when all the k00l California pirates
were emerging and when pirating was at its peak. Today, its a lot worse
and lible to become more so. All these Elite boards are popping up all over
all "$LOD$: Invitation only".HA! SpecElite is the worst, to get on you have to
"know someone from the Spectrum." I talked with the doc, and he knows NOTHING!
What should I talk about now... hm...
Why don't I talk about my hometown scene for a while, NYC... I believe a lot
of you have heard of TAP meetings, Chesire Catalyst, the same guy who
founded TAP mag., holds them(call 212-JOY-LILY for more info). Anyway, Today
, as you have probably heard from "TAP.INTERVIEWS" the meetings have
degenerated, Chesire is a tired old man, Broadway Hacker, who is an
obnoxious slob anyway, stopped going, the "950 codes kids" Ninja NYC
and his pals have mostly moved on, thought NYC still attends. Ok Ninja
is, at 17 yrs. old, a complete criminal, the guy has stolen everything you
can think of, I'd love to see what he has hidden under his bed... The
two Sigmunds Frauds also attend(they are partners) one is an skinny
asshole who has an earing and the other I never spoke to, but he is the one
who supposedly does all the bbs calling. There is also some friend of
Ninja's who works for Northern Telcom. Ok, then there is Number 6, this guy
is about 40ish, but from what I have heard is AWESOME, really knows boxes,
etc. is supposed to be working on some new box which traces calls.
There is some young guy with a French accent who always smiles, and
some middle aged fag who is always talking. Then there is MARK! Yes Mark,
though he tries to be friendly, people try to stay away. He works as
a Camera man, but is working on his locksmith license (knows EVERYTHING about
lockpicking). He is slightly (very) unbalanced mentally, and always very
confused. He is teased constantly but tolerated. There are also a few
less important people, such as "Sid" some greasy kid who is proud to have
had a $1700+ fone bill because he thought he was using a divertor.
Right now, they are generally a motley bunch. Also they get kicked out
of restaurants frequently now, and are now down to meeting at Burger King.
<SIGH> How pitiful... Another thing about NY, you guys have all heard of
Lord Digital? And Phantom Access? Well LD used to have a cult following
in NY, it was very funny, you should have seen some of the rumours,
such as the "screamer" an apple-cat program that could blow up another
modem by emiting a 9600 baud carrier, sure... Also He and Paul Maud'ib
got killed a few times, arrested, went bankrupt, made a fortune, and several
other minor things... About Phantom Access, ok by now we have confirmed
that it does exist, only whoever has it isn't giving it out, I don't have it,
and I dont' know anyone who does. I can't understand how it wasn't given out!
What kind of rodents kept it secret? Well don't fret I am going to write
my own hacker/scanner, etc in C language (LD would be proud, he supposedly
loves C). Ahh... What I really want to say any how is that unless you
really love computers and telephones, I mean are really dedicated to them, then
I hope your modem blows up. The age of Hackers has passed because everyone
has gotten a computer to use for word processors, etc. I am very young and
I really love programming and learning about computers and when I look to
find kindred spirt, I find the likes of "Monty Python". I still have more to
say though. I would like to talk about Phrack, TWCB, Stronghold East, Private
Sector, 2600 and some other things.
Actually, all I have to say about TWCB, is that they are child molesters,
who promised to re-publish TAP, but are in jail now so it doesn't look to
likely that they will. They got busted for carding, and are incredible
delinquents. I also talked to Bootleg, and he said that are never ever
going to publish TAP, they were never serious about it in the first place,
and are just a bunch of stupid kids.
Also, Phrack really sucks, if any of you know anything about anything
technical you know that the plagerize ALL their stuff off Telephony magazines
and books, and they don't understand the stuff themselves. It great to read
if you want to end up feeling very melancholy about life. They also reject
anything original and not plagerized (I know from experience). Also Taran
King is a loser, his father beat him up and the police had to drag him
away, nice work. His board, Metalshop Elite(ha!) is awful, I am on it
, and its really sad. Another work of Fart is Stronghold East, the
Sysop, the "Equilizer" is scared to touch his board, "The Slayer" runs
it for him, and won't let anyone on who he thinks doesn't know about
the latest PBX, or whatever rodent nonsense. I said I would talk about
2600 magazine, well it sucks, it never was any good, Private Sector sucks
also. Many people don't know this, but PS always did suck, I have buffers
of it and it was mostly "codes" messages (ie: "Got sum metroz?").
Their only merit is that they are very militant about phreak's rights, and
sysop's rights to have what they want on their boards, nice work in that
respect. As for phreaking on the Private Sector, forget it, its garbage...
Some other boards worthy of mention, are The Inner View, and The Jailhouse,
I chose these because they are prime examples of shit. To begin with, The Inner
View (617-632-9330) is ALL codes, people ask such burning questions as:
"Can I make Blue Box tones with my micromodem?" "Does Sprint really Trace?"
,"How do you start a Confrence?" and "Is Coca-Cola a good contraceptive?"
The Sysop takes it all very seriously and has even selected a panel of 7
people to judge who is c00l enough to get on the board.
Another doozie is The Jailhouse(305-788-6354), on this one, you get post
only access to the phreak subs (their are 5. why? don't ask me, the sysop
is a turd). You have to post some of "The latest phreak info" first to get
read access. Obviously the sysop has been mislead, what he wants is PBX's
so he can start confrences. He doesn't understand that a phreak board consists
of a technical disscussion of telephony, not "phreak info".
Also, The Speed Demon Elite (415-522-3074) is another good one, the
sysop devoted half the bbs to music, has a limit of 10 messages per
sub, and calls it "Elite only" <<SIGH>>
I could on for ages, if you really want to see what goes on, call some
of the BBSs in NYC, wow! What GARBAGE! Its all warez!1!11! and my
favorite: The War Board! How many of you have seen a war board? This
invention was a step backwards for homo sapien...
Here people prove themselves at "ragging". Many people consider this a
skill, I had the pleasure of d/loading the e-mail volume from a board called
the forge, and while looking through it, I saw some very intresting things.
People were having disscussions through e-mail about who was good at wars.
somewhere along the line, rodents have picked up the idea that you can "win" a
modem war. How? Its hard enough to fight one, I mean what do you do? Throw
names at each other, well actually, if you really want to know, thats exactly
what you do. <<SIGH>>. I have seen people I thought were cool actually take
modem wars seriously, its amazing, let me tell you about a real encounter I
had with some loser. Somehow, he decided he wanted to "war" with me. So
he posted a message declaring war. Well when I didn't bother to respond,
he got even more excited, and started his "ragging", well for a few monthes,
this guy actually, in his own demented mind thought he was "hurting" me
by posting on the war board, that I really cared, he simply couldn't
believe me when I said I don't care, he still thinks I'm scarred of his
"ragging" abilities(after all he might rag me out dude!).
Hmm, what else do I have to say. The Infiltrator, author of
TAP.INTERVIEWS, some think he is actually Sharp Razor, ah that brings
me to my next subject, LOD... As we all know, LOD stands for Legion
of Doom, and was founded by Lex Luthor. I won't go into the whole
shpiel about their history, I assume you've heard most of it. Anyway,
I will say that they started their own little world of know-nothings
and made it Elite, they and TKOS will be the basis for the next Elite group
, but I shouldn't leak about that now. LOD's main claim to fame is that
Lex types up shitloads of manuals and plasters LOD all over them. Getting
published in 2600 every other month probably helps also. Another emerging
group CEO, isn't as ridiculous as LOD, I mean the memebers know a lot, and
write intelligent stuff, the only problem is, as far as I can tell its made
up of 2 people! Executive Hacker, and Corprate Criminal, not much of a group
even if these 2 do stack up better than the entire LOD. I think I should say
now, before I forget, that if you want to get in touch with me, post a
message about it on Draco Tavern (707-745-5805), you get instant validation,
so thats why I'm using it for mail. Something funny which relates to LOD,
I should tell you about, is a a very funny case of people impresonating
Lex and King Blotto. The Weseal (alias Nap. Bonaparte, John Mulligan)
was running a board, when I called up, said I was Lex, and offered to
take over the board and make it Elite. I called pretending I was
several LOD members, including Blotto, and I even sent him tc //+ software
which was ready for him to put up. The sofware had LOD, written all over
it, and the kid actually put it up. As far as I know, it may still be
up, call at 212-535-2389.
well, by now I am draging this a bit to far, I would just like to say that
Adventurer's Tavern always sucked, it was a shit pirate board, even on my first
call back in early '84, it was nonsense. Sherwood Forest ][ was a great one,
very huge, and very easy to get on. I remember some rodent Disk Raper thought
that they were running the board on a black box, 'cuz the # didn't show up
on his bill, funny...
later
The Infiltrator - Ok, I admit it, I'm not really The Infiltrator(HEHE!)...
p.s: I just wannt scream and shout, I have so many stories to tell, about
so many people, the modem world was immense but not always intense,
Atom: Write a 1985 loser file, please...

View File

@@ -0,0 +1,495 @@
Hello people! Ever remember reading a file and seeing this?:
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
^* *^
^* Tap.Interviews II *^
^* The Infiltrater *^
^* *^
^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^*^
Well, welcome to the sequel! Actually, originally Tap2 was just the second
half, you may remember after the interviews I started with "The Elite File",
well this is part II! Now lets formally introduce this file:
%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%The Elite File II%/%/%/%/%/%/%/%/%/%/%/%/%/%/%/%
Written, Produced and Directed by Dead Lord. Starring The Doc and the whole
t0tally Elite crowd from SpecElitePosers.
-------------------------------------------------------------------------------
Introduction:
Now that that's settled I can get right into the writing. As you know I wrote
Tap.Interviews II also, and before I get into this I'd like to excuse myself
for it. Actually I found out that Taran King is actually a pretty cool and
together frood. There were also a lot of rumors going around about a
conflict between myself and Tap, don't believe it, right now I'm on good terms
with many of them. Now, let me make apparent the general gist the rest of the
file will take. I am throughly pissed at piracy, The Doc, and his whole
SpecElite Nonsense, so I will be devoting the rest of this file to rewording
that concept as many different ways as possible, without you actually noticing
the redundancy. It will be quite a task, but I think I can do it. <WISH ME
LUCK!>.
The kind of main body of the file type of secton:
Well, here we are in the main body kinda bit, so I guess I'd better start
talking so I can get in everything I have to say before it gets to be the
conclusion already. You see, I read that Elite's Anyonymous thing a few
monthes ago and it really pissed me. I reread it a few days ago and it sparked
renewed intrest on my part to write a response. This is a bit late, but
the 'ware' never got much distribution anyway so most people didn't see it(I
hope). From talking to people who have been on the Spectrum, talking to The
Doc himself, and reading his little files, I've come to throughly deplore him.
Why? Well The Doc is a firm believer that he is elite and a firm believer in
the theory of "Eliteness by Association". He believes himself to be "Elite"
even though he's never done shit that matters. Lets look at how k-radical
his history of SpecElite is, take special note of The Docs writing style,
I'd estimate it to be around the 2nd grade level...
HISTORY OF THE SPECTRUM BBS
---------------------------
It all started back in 1980 when I put up: 'The Doc's Domain'. It was
a Networks based bbs. Well, in fact, it was Pirate's Mountain. I modified to
my own likes and put it up. Road Runner (the creator of Pirate's Mountain)
obviously got upset, and told me to take it down. I gradually learned more
and more about bulletin board systems.. Doc's Domain was somewhat popular.
It was public, and all the losers were on. I thought it was kool at the time;
however, I soon learned what the 'pirate world' was all about. The people
back then who I associated with were, Micro Ghoul, Tim Tam, the Saint, Green
Manalishi, Snack Attack, the Hoopty, the Swami, Road Runner, and the I.C. Tim
Tam was the one I respected the most. But the biggest influences of my 'road
to eliteness' was Snack Attack and unfortunately, Green Manalishi. I soon got
in my first club which I think was I/N/T/E/N/S/E.. Chief Okoboji and Midway
Hawker were the ones who put me in. Midway Hawker was really cool, and was
the biggest influence in getting me in. Soon after I/N/T/E/N/S/E, Green
Manalishi and I became good friends. He formed a group called the
Incorrigibles and put me in, under one condition...only if I put up an
incorrigible based system with other cool users. This was the beginning of
the Spectrum ELITE. I was very happy to get accepted to a group of elites
such as Ali Baba, the Saint, the I.C., the Cog, etc..etc. Now to make a long
story short.. After Doc's Domain went down I put up a gbbs system for
the first time. I started from original gbbs dos 3.3 and modified that sucker
as best as I could. I got the name, the Spectrum from Philadelphia 76'ers
arena.. then my friend pushed me to use that for a bbs. I did, and it turned
out to be very successful. The public spectrum went okay.. I do not remember
all of it. Soon, I got in Incorrigibles and changed it to SPECELITE. This
was gbbs based (No Modules back then). Pretty wierd. I then learned more
aboud 'm0dz' and soon the SpecElite became one of the most modified gbbs's in
the country. I then got the idea for basketball and this is what really made
the specelite genuine. I soon had many, many cool users and of course all
this time it was private. At one point (the Peak of the SpecElite).. I was
getting 63 new messages a day (63 was the average!) I think the highest was
75 or something. One Eye, and the Cog were my most active users at the time.
My best poster was the Camel Jockey (I'm almost sure). My computer then
burned out, and I had to take the board down for a month or so.. Soon the
Black Market elite was formed and that bbs became somewhat popular. (Of
course Black market started public also - Contact Night Owl for the history of
BME). I then went on a long summer vacation to Hawaii and the board was down
for quite long time. Black Market Elite became very popular and SpecElite
was falling. I then came back, and put the board back up. It went pretty
good. For a long time, it was SpecElite and Black Market Elite...and during
all this, the Tavern Elite had always been up. I guess SpecElite was the 2nd
elite board ever up. When the SpecElite had 63 new messages a day, I believe
at that time, it was the best board in the country. Well, I soon put cat-fur
in my bbs, an became somewhat of a 'pirate'. Then the elites were dying all
of a sudden. And I took down the board..put up a pubic system called the Dark
Realm and made some money and also thought it was a pretty cool bbs. I soon
got really sick and tired of the local losers so I put the SpecElite back up.
When it did go back up.. it was some-what semi-elite. And soon it was crashed
for the first time. I also was getting sick of computers anyways, so I put up
my retirement notice on the Tavern, and there seemed to be the END of the
SpecElite, and me! What happened then? Well I had a better life
without all the computer crap. Well, tragedy struck.. My girlfriend broke up
with me, my boss fired me, and tennis season was over. What was I to do? I
was bored off my ass. I then figured.. I want to call some board see what's
going on with the 'pirate world'. However, my modem was not working, so I
immediately borrowed a modem from a friend (which I have now). He never uses
it, so therefore I think I will have it for awhile. I then started calling
around.. I decided, 'what the hell?' and put the SPECELITE back up.. Calling
it SpecElite //, the Next Dynasty. This is where I am today. I figure the
SpecElite // should be up for quite a long time, since it's going pretty
well... Even if I get a job, girlfriend, and play some sport.. I believe I can
handle running a board. This new board is ProDOS based, and really is easy to
run. I guess that's just a brief summary of the Spec history and me. Hope
you liked
it..
the Doc/Elites Anonymous/SpeCrue
author of the Spectrum Bulletin
board systems. (Dos 3.3, ProDOS).
Wow! Talk about going around in circles. The Doc must have taken his board
up and down more times than anyone. A basic analysis of the above is that
The Doc is outlining everything he's every done with his modem, and we are
supposed to somehow think of him as a model. He then has the gall to proclaim
his board to be the greatest at certain times and to be the second elite board
ever. Wow! But wait, there's still more! The Doc also tells us about how
he 'learned about the pirate world' and got into his local bunch of 13-year
old kids who had modems group. What we are looking at here is a prime
example of someone who holds the 'pirate world' in respect. Let me tell you
what the 'pirate world' is then, just so we can get our definitions straight.
You see, the pirate world is a bunch of kids who can't program(The Doc), can't
hack(The Doc) and don't know the first thing about Telecom(The Doc). So what
is it that these kids do with their modems? How do they live out their
wargames fantasies when they have no skill, talent or motivation? Easy! They
can get the latest wares and be a pirate! Some of them even go on to read
the much revered 'Kracowitz krakfiles' and become what they worship most, a
kraker! Everyone loves krakers, thanks to these highest of the high in our
little 'pirate world' all the elites can get the latest wares! Oh what a
blessing they are! Its a shame that though a few krakers have gone on to show
actually proficiency in programming, to krak a game 95% of the time's a snap.
5% of the time you are even required to know some assembly language!!! Now,
I can understand, despite its simplicity, holding those who krak games as
"Elite", but most of the denziens of the 'pirate world' can't(The Doc), most
are just new wares kids who run around bragging about their association with
XYZ Kraking group. Most of the discussion has become "Well the Bunnymen are
having a war with DG over who will release Ultima XVII. Since I distribute
for LSD, I blah, blah, blah...". Lets look at this next bit of text, oh, and
by the way if you're wondering how I got these files off the disk, after five
minutes of poking around, I realized the the VTOC had been moved to track $11
from track $0B. Real tough protection as you can see, just move it back.
The Doc is extremely proud of his koolness, and says so, lets take a look at
some of the choice bits from the next part, which is The Doc's biography of
'The Untouchables'. I've left out all the nonsense about the different
members, I'm going to analyze each of the paragraphs as we go along:
The Untouchables was formed by
Damien the Dreaded and Zero Page. They
met on Pirates Inn which was the third
pirate board in existance! (The first
and second were: Pirates Harbor, and
Pirates Cove).
[ Ok, so he starts out with a little bit about his heroes, Damien and Zero Page
and how they met on the third pirate board in existance. Ok stop point.
WHAT? What is a pirate board first of all? A board that allows discussion of
software piracy? Couldn't be, Pirates Inn (and incidentally Pirates Harbor
and Pirates Cove) weren't the first with that. Hmm, I guess he must mean
they were the third board to use 'pirate' in the name. Yes, thats a definite
possibility, I'll concede that Pirates Inn was a major groundbreaker for
bulletin boards because it was the third to use 'pirate' in the name. What
a distinction!<SIGH!>
Ok, lets scan down to the next line: ]
When the club died out, the 1200
Club was just starting up. Many quit
and went into phreaking.
[STOP! What now? "Many quit and went into phreaking." Hmm, lets look at that
again, "Many quit and went into phreaking." What are these little kiddies
talking about? Do they know? I think that what they may be trying to get
across is that after they dropped kraking, many of the ex-members took up an
interest in telecommunications. Hmm, I don't think that authors know what they
are talking about, and it rather seems that they are as I suspected ignorant
pirates. "Many quit and went into phreaking." Hmm, like they just said,
"Hey! I don't think I'm going to get my power trip from pirating any more!
I'll be a kool phone phreak and everybody will love me even more! yah! I can
start confrences and learn about awl the koolest ma bell info! Hmph! Next
paragraph: ]
At that time, everyone was cool,
there were no losers. Everone gave each
other wares and everyone was respected.
[ No losers? You were around weren't you? "Everyone gave each other wares and
everyone was respected." What the hell is that? To me this means a bunch of
pre-teens calling each other great and trading games, this is nonsense!
Next Line: ]
Damien said "If everything was the
way it used to be, I would get back
into it." Who wouldn't blame him!
[ Now that's the worst, This Damien misses the old days even though the 'old
days' were just like the new days only then didn't realize what losers you all
were. None of these elite people have accomplished anything, including this
Damien fellow, so why does he miss the old days? grrrr! ]
---------------------------------------
[ The Ice Man - The Doc - The I.C. ]
[ SpecTacular Pirates Inc. <C> 1985 ]
The Spectrum Elite.......[###]/###-####
And the end I thought was especially interesting as it shows you exactly how
much of a pudnick The Doc and his buddies are. Well I can understand how
he misses the old days, lets take a look at some of his own examples of what
the old days were like:
The following messages are from the board, 'Pirates Mountain'. These we
re some of the pirates of way back then (1981-1983).
---------------------------------------
Compiled by: the Doc/Elites Anonymous
[21] - <=-WARES-=>
[ MESSAGE FROM ]: SOFTWARE SNOB
NEW:
NOW IN:
DONKEY KONG
FAT CITY
GUMBALLS
ROAD PIZZA
BOUNCING KAMUNGAS
HOMEWORD
REPLY TO:
SOFTWARE SNOB
LOOKING FOR GOOD GRAPHICS SPORTS GAMES.
-=-THE-=-
=-=SEA=-=
-=-DOGS=-
[22] - NMI CARD
[ MESSAGE FROM ]: THE LEECH
ARE ANY OF U INTERESTED IN GETTING AN
NMI CARD, A BLUE BOX, OR OTHER INTERE
STING HARDWARE DEVICES DESIGNED SPECI
FICALLY FOR CLANESTINE COMPUTER ACTIV
ITIES...... IF SO, LEAVE E)MAIL TO TH
E LEECH AND IF U SEND ME A S.A.S.E. E
NVELOPE, I WILL SEND U SCHEMATICS, PA
RTS LIST, AND INSTRUCTIONS FOR FREE.
LEAVE ME E)MAIL FOR DETAILS.
THE LEECH
[23] - -_]WARES[_-
[ MESSAGE FROM ]: TIM TAM
[PREFERRED USER]
OK I GOT-
THE NEW SAM
UPSIDE DOWN SAMMY LIGHTFOOT
PICKADILLY PAIR
HOMEWORD
SHORT-CUTS
INTELLECTUAL DECATHLON
PRO TOUR GOLF (OLD)
SARGON /// (OLD)
OLD---BOUNCING KAMUNGAS,PACMAN,ROBOTRON
AQUATRON
NEW-- DONKEY KONG
LOOKING FOR THE NEW ONES!!!
FLASH!!! BEYOND BELIEF WILL BE BACK
UP TUESDAY NIGHT (22ND),24 HOURS FOR
NOW ON,6 BOARDS,NEW FEATURES,AND MORE
CALL 213=377=6568 STARTING TUES.NIGHT
LEAVE MAIL TO
==== ====
<>IM <>AM
T.R.A.D.E.
VOTE FOR ME!!!!
WHOD KNOW MORE ABOUT RUNNING A BOARD??
[24] - WANTED***WAREZ
[ MESSAGE FROM ]: MOD MAN
DOES ANYONE HAVE A --GOOD-- COPY OF
TRANSEND ///, MINE IS MESSED UP!!!!!!!!
T H A N X !
---------------
- -
- <<< MOD >>> -
- -
- >>> MAN <<< -
- -
------------------------------
- VOTE FOR ME -
- AND I'LL BE -
- THE BEST,I'L-
-L PROTECT THE-
-BBS FROM BEIN-
-G CRASHED<><>-
---------------
[25] - LOCKSMITH 4.1 PARMS!
[ MESSAGE FROM ]: MOD MAN
I HAVE OBTAINED ALL THE LOCKSMITH 4.1
PARMS AND ALL THE COPY II+ PARMS!
THEY MAY BE ON THE <<<G>>>FILES SOON
BUT IF YOU WANT THEM SOONER LEAVE <E>
MAIL FOR....
---------------
- -
- <<< MOD >>> -
- -
- >>> MAN <<< -
- -
---------------
-------------
-----------
---------
-------
-----
---
-
VOTE FOR MOD MAN FOR BOARD PRES!!!
I'M THE BEST GUY FOR THE JOB!!!!!!
[26] - RANDAMN!!!!!!!
[ MESSAGE FROM ]: MR. BIT
YES FOLKS IT'S CRACKED AND I GOT IT.
AND IT'S PRETTY GOOD SO LEAVE E-MAIL
IF YOU WANT IT.
ALSO:
FLYING COLORS
NEW S.A.M.
PICK A DILLY PAIR
SHORT CUTS
ETC.
BYE.
[27] - =/H<>H WARES\=
[ MESSAGE FROM ]: THE WARE-WOLF
NEWEST FROM: THE WARE-WOLF &
//\HI-RES<>HIJACKERS/\\
=TROMPERS
-COVETED MIRROR
=DONKEY KONG
-SHIFTY SAM
=AQUATRON
-APPLE CAT NW II
=FAT CITY
-DROL
CALL: [THE WARE-HOUSE]<-
301-587-0363
TO TRADE...
[>> THE WARE-WOLF <<] OF
//\HI-RES<>HIJACKERS/\\
---------------------------------------
Yes, what a golden time that was. Well, at least everyone respected everyone
else and gave them wares... right? Hmm, if that's an example of what The Doc
considers the 'golden era' then he IS a loser. I mean how many of out there
can see that these messages were written by stupid suburbanite kids who were
bored? C'mon, raise your hands, lets take a headcount. Hmmm, that's most
of ya, what I expected. Let's take another case of little kids taking modems
and boards too seriously. Here we have a small essay by The Reaper on what he
thinks the modem world should be. I'd like to note that he is a good friend
of The Doc and they share a lot of views in common:
It seems that most of you users have come to realize that the word "Elite" no
longer holds the same aura that it once had in the past. Partly true, you
have stumbled across one of the major issues regarding the world of computer
pirating today.
[ Ok, we will soon see what exactly this idiot thinks elite means, here we see
him apply 'elite' directly to pirating even though there is nothing worthy
of it in pirating, or anything else for that matter ]
I can remember the days of two years past, the days when pirating was
thriving and when I was just entering this realm of silicon sorcery. I wanted
so badly to have the label "Elite". Why? I guess it was partly due to the
obvious ensuing ego trip and partly just for the hell of it. It turned out
that my mentor, Chief Okoboji, had taken an interest in me - at a friend's
request. One thing led to another and I was started on my way in the pirating
world. A few months later and a number of connections afterwards, I began to
be labeled as "Cool", "Elite", etc. It was great. An ever aging veteran now,
I am considered to be an "elite" by those worthy to ajudge a person as such. ]
When I was working towards "elite", the system in effect was one of
seniority, one where the elites were the teachers and the losers were the
students. In the past, loser meant a novitiate or tyro user and elite meant
one who knew the wires. To become elite, you were first a loser, you got a
chance and you worked for what you wanted out of your hobby. Today, this
system has failed - partly because of the vast number of "trendy" losers.
These new users are here to gather fame and an ego trip (as all of us are),
but some are legitimate in their desire for knowledge (as the elites are).
The system has failed because there are so many people. We need to get an
organized system to handle all the new applicants - one which screens very
well. I say cut the losers, teach the disciples who really wish to learn and
keep the elders alive; for in the end, our quality and quantity will damage
us. The losers get busted and the elites suffer. Make it not easy for new
"trendies" to attain levels previously available only to those who deserved
them, the problem will be solvd, and we will remain intact. You do not see a
fresh employee of IBM become Vice President overnight! Consider that.
[ The Reaper : The Chosen/Ware Lords ]
Ok now that was idiotic. He mentions elite a number of times, but fails to
give any definitons. His seniority example is a poor one, does he consider
the fact that someone has hung around for four years a virtue? And what's
this teach the disciples who want to learn? Learn WHAT for God's sake!!!
What do people like The Reaper have to teach! Nothing! Absolutely Nothing!
What he considors an Elite is someone who's been around long enough to be
let on elite pirate boards and gets new wares. Where's the skill? An ever
aging veteran? of fucking WHAT? What did you ever do Reaper? What do you
know that makes you an elite pirate? And I haven't the foggiest idea of these
'worthy to judge the elites', who the hell are you talking about? Do you mean
people who are still playing with their pirate-toys after a few years of it?
An infantile bunch if you want my opinion.
And about the days when piracy was thriving, if I may step into your little
'pirate world' for a moment and compare it, in the 'old days' it follows logic
that you would have been much unhappier, since the way your precious wares
wares were distributed was through individual trades. Today 10 times the
number of people get new wares, and faster because there are huge cat-furs
all over the country for quick distribution. If the ultimate goal of piracy is
quick distribution of wares then you should be happier now, no? But of course
the ultimate goal of piracy is for a bunch of kids to put on their superhero
outfits and for a bit be the high, mighty and powerful people they wish they
were. Its just a power trip for people who have no inherent talent for
Computers, and no motivation to learn. Why don't you get a life and
not just vegatate on boards and involve yourself in petty things like
wares. According to The Reaper the critera for being 'cool' and 'elite' is
just a lesson in making a good impression to other bored little kids on
bulletin boards.
Another subject I'd like to touch upon, is that in The Doc's little file,
he included info about many of his users on his board. The list of users to
choose from is impressive, the only problem is that about 1/5 of the total are
actually available, if you pick someone from the list who is not on the disk,
you are shown the message:
No information available at the present moment. Information will be available o
n future data disks..
This gets extremely annoying as you may imagine. For many of the people
who ARE included on the disk, the content is "Joe Pirate is from the 123 area
code (gongeyland, RV) and was one of my best users." This would then be
followed by one or two of Joe Pirate's posts on SpecElite which would be
something like Joe's latest sector edit, and would tell us nothing about the
elite(and I use the term 'elite' facetiously) in question. One of the more
interesting of out friend The Doc's little pieces in on 'Incognito',
Basically the Incognito's data consisted of his 60+ sector rag file on
'leeches' [ another one of those silly pirate-words ] The file is stupid, and
so Incog. The asshole posts he'll never get busted 3 weeks before he gets
busted! Real smart guy there Doc...
===---
Well that's all for this file. This file was written in September, '86.
Everything after the "===---" was written on 16th Dec, '86. Files to look for:
The Direct Connect Story:Chronicles of Mischief(Tentative title)
and my Rebuttal to Fall of The Modem World, which is as of yet untitled and
will be about 150-300 sectors, all about Tap, facts about elites, and buffers
of them. It will be my personal Version of Tap.Interviews I&II, Elite File
I&II, National Enlightener, and Fall of the Modem World all tied together.
Bye for now!
Dead Lord
thanks: Hungry Hacker
Executive Hacker(the real one)
Ford Prefect

View File

@@ -0,0 +1,982 @@
$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$
- -
$ Tap.Interviews.III! $
- The Saga Continues! -
$ $
- $A New Beginning$ -
$ April 91st, 1987! $
- -
-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-$-
Hiho! the text file series to end all text file series, in scope, breadth, wit,
originality and great wisdom. IS BACK! Before I start, here's our ElIte Phreak
MC: Live Lord, to tell you about this latest and greatest installment. Hit it
Live!
{Any simularity between persons in the ElItE phreak/hacker and pirate domains,
is totally off base. By the by, NO this file wasn't converted from prodos to
dos, but we're sticking with the elite filename seperater "." anyway!}
LL: You know I wouldn't miss this for the world dude! I want to state for the
record that I DIDN'T write Tap.Interviews.II, that was a lie! Someone hacked
into all my accounts and uploaded it and I was under demonic possesion at the
time I wrote it and didn't know what I was doing and I'm not responsible for
anything that was in it and the people I ragged on really like me, we're best
friends now and they're cool and please just don't kill me ok? and.. {cut}
ME: Getting carried away are we LL? Let's stick to the agenda ok?
LL: Can I have my mom back now?
ME: No! Not yet, after you're all done maybe I'll swing something.
LL: Sigh, ok dude. As I was saying: It's not my fault! But whoever DID write
Tap.Interviews.II was a genius, compare it to the real, I mean original Tap.
Interviews. How many times does THAT make you laugh? huh? Not once by god! I
made a vast improvement, I mean whoever wrote it made a vast improvement over
the original. Didn't you laugh? I did! Chris did and you gotta respect anyone
who would fill up 2 sides of a disk with his opinions on everything right? I
sure do, in fact in the near future I hope to fill up more than two sides of
a disk with my opinions, maybe even 4 or more and.. {cut}
ME: Shall we get on with it?
LL: Fuck you, you're cramping my style.
{Live Lord's mom begins to scream as her hair is set on fire.}
LL: Ok goddamnit, fucking OK. Here is the slightly changed format that will
be used in Tap.Interviews.III. Since there will be so many people interviewed
I will be LL: {instead of the time honored ME:} and the person I'm talking to
will be their initials: {instead of the time honored AN:} After I get done
with the EliTe phreak/hacker interviews, Elven Magician will come on as MC for
the pirate interviews. There is also a special prize for the person who can
figure out who's writing Tap.Interviews this time! I'll give you 2 hint's! It's
not the real Infiltrater {just as well, Tap.Interviews.I wasn't funny!} and
it's not me! The prize will be a 3 week fun filled vacation to scenic Pigs
Knuckle Idaho, the town made ElItE and famous because Lord Analog said it's
name in Tap.Interviews.I {can you imagine? the ultra ElItE one himself saying
that? It gives me such a rush}. Which was the only funny thing in there. But
that's not all! Skip Avatar & Captain Rooney will be your tour guides and The
Shitman's mom will be your personal escort for the entire length of your stay!
Put some pancake makeup on her and she's as good as new! Who could ask for more
than this!??!?! Enough of this, on to the interviews!
First up is the elitest of the elite, that god cast into mortal form himself,
the {C}reator {see where his ego's at} of Ethereal Access, that preppie turned
mental patient, the greatest living arguement yet that AD&D does cause Satan
worship, anti-social behavior, total personality reversal and possible brain
damage, the dude who has surpassed eliteness and found a new state of mind
beyond it, the supre.... {cut by editor}: Lord Analog!
LL: {Struggling to keep from fainting from the excitement}. Shit! It's great to
meet you! My entire life is based upon yours, I think you're as elite as anyone
will ever get. Except, I gotta say I was very dissapointed when Ethereal Access
leaked out and ended up being real! What kind of a joke is a real program?
LA: la de da.... lalalalalala.... la de da.... Hear that? echo's from space are
flashing by as we speak. Woooooshhhhhh, wooooooooshhhhhhh. Can you hear the
Loons? wooooooooshhhhhhhhhhhh wooooooooooooooooo..... {cut}
LL: Yeah I hear them! great sounds, should tape it and it would replace Floyd
in a second. Let me just take this moment to tell you how great Ethereal Access
is and give you a compliment.
LA: Oh grow up, when I want your opinion I'll give it to you, not only that,
I'll have it tattooed to your forehead. Now shut up, you're disturbing the
wooooooosh woooooosh of interstellar space you idiot.
LL: Sorry, cheez, I'll never compliment you again, I was just impressed, the
manual, I meant softdox, that came with it were really nice too. Big, uh total
in their completeness, stupendessly large.... Reminded me of War and Peace.
LA: Being the well read, well versed, all around know it all of all things
that I am, I've heard of War and Peace. Some kind of short story wasn't it?
I remember reading it during a commerical one day.
LL: Uh........ right, you got it......... about 4,000 pages.
LA: Yeah, a short story. The 666.666.666 Ethereal Access docs come in at just
under 12 million pages, when I revise them they'll be available on cd.
LL: Sounds great, I must read them some decade when I'm stuck in the house with
nothing to do.
LA: They're written in a combination of Latin, Hindi, Chinese and German, with
a technical Russian translation available upon request. Did I mention the new
and improved Sanskrit fontset? No I don't think I did, let me tell you about
it. It......... {cut}
-- more --
LL: Sounds awesome. But world is waiting for your opinion of Skip Avatar. Come
on you can tell me!
LA: No I can't, you saw how I avoided the direct question about Minimal Element
when The Instigator asked me that in Tap.Interviews. If I don't want to answer
a question, it's my divine right to give you a 12,000 paragraph answer that
totally avoids the question! Like when I say something like "His life doesn't
have to meet with my approval" or "he knows many people who know what they're
doing, so if he knows how to do something or not, doesn't matter, because he
knows enough people who know what they're doing, when they're doing it, how to
do it and wax cars, chew gum, walk and do the hoola-hoop at the same time" I'm
practicing what I preach and lying in a very low key way.
LL: Can you translate that into one sentence?
LA: They both suck.
LL: Thank you, see that wasn't so bad! I only have one or two more questions to
ask.......
LA: Oh very well. What is it that you wanted?
LL: I wanted to know if you might consider making a user friendly version of
Ethereal Access that can be used without so many arcane commands and maybe a
little simpler to understand. And maybe put 5 minutes of work into translating
some of your source codes, or if you really don't care, telling someone to
give them all out, or even give them out yourself. The great guy, I meant
dipshit, who leaked it out, compiled it and the editor got lost along the way.
Some of the parts and docs are missing too. Will you do anything to help us
out?
LA: No
LL: No?
LA: Yeah, No. Any other questions?
LL: What exactly does the "[RL19XCQBLT0*^++--99E9946]" function in Sub-Sub-Sub-
Module-Template B9137A do? I don't get it.
LA: Pretty elementary actually. Let me give you a simple explanation of it, so
that even you can understand it: That function compares the current Dow Jones
average, squares it by the speed of light, divides that by the # of people who
died in Ethiopia today, subtracts that value from the tempeture in NY minus the
Tempeture in California, sqaured to the 4th power, wherin n*7-nl, whereas n=the
total circumphrence of the earth and nl=the annual rainfall in the outback and
puts the end result into the $ZZ(99) array for computations in the strobing
matrix. When the Matrix strobes to the red zone it means your toast is ready.
Got it?
LL: Um.....
LA: Told you it was pretty simple, any other questions?
LL: Um..... any new mods in mind for version 7.0?
LA: Sure! I have a few lined up ready to go. There's the new temporal hack
modification {note full spelling of modification, never, ever, abbreviate
modification to mod. Don't even think about it} that makes use of the flaws
I found in Einstein's theories, it's not bad, right now I have it where I
can finish hacking before I start. That's ok, but it needs some work. I also
plan to work on a user interface that will give you something to do while
the system is running, like a mini motion picture that is a graphic
representation of all the easy, moderate and complex actions taking place
during every nanosecond of use.
LL: Sounds amazing! What does it look like? Must take a lot of memory!
LA: Actually it takes very little memory, see theres the graphic representation
of the system being invaded, it's a little white bunny. Then there's the
graphic representation of Ethereal Access swooping down on the little white
bunny, it's a large, black, armor plated mass, with a set of jaws 3 light
years wide and saliva dripping down some really wicked looking fangs about
to eat the little bunny rabbit. It gets sort of old after seeing it 4 or 5
thousand times, so I add little effects like blood dripping and things like
that. You know, to make it more cheerfull looking.
LL: Oh.... sounds user friendly. I must admit I'm a little confused about a few
more things. Could you explain one more time, just how OCC dial theory works,
why did you invent it and what are the benefits? I don't get it.
LA: Well, see.. Let me draw an analogy for you. Let's say the OCC is this huge
9000 ton blue hedgehog named Arnold ok? Ethereal Access is represented by the
gaps between galaxies in conjunction with the rotation of the zodiac and the
bisecting meridians of the event horizon on a black hole. Now if the azimuth
can be eqaully divided by infinity, thereby.... {cut}
LL: I appreciate you taking the time to clear that up for me. Enough on the
Ethereal Access questions, now I want to ask you some questions about you!
LA: Say.... haven't I heard this before? Hey! what's that rectangular bulge
under your jacket huh? If it's a walkman I'm going to cut off your head and
feed it to the devil, he lives in my attic. I have this thing against people
carrying walkmans you know?
LL: No! No, nope, nope, never! I hate walkman's too, shitty things. Heh, ha,ha
ha,ha.... it's.... it's a paperback book! That's it, a paperback book! No
walkman for me, nope nope nope. That's what I wanted to ask you about a
little, what's this thing about unreality and um... how to say it.... well,
your fast approaching mental breakdown?
LA: Reality isn't real, nothing at all is real, the only things that are
really real are the real things you really believe to be real. So if Guido
the Knife says the voices made him do it, maybe they did! Just because you
can't hear the voices doesn't mean they aren't there.
LL: Do you hear the voices?
LA: Sure all the time! How do you think I come up with all this stuff? I just
stop making the effort to hold on to reality and let my mind roam. Where would
we be without the ability let our minds wander? Or is that a lyric? Anyway I'm
working on a even more modified Ethereal Access 7.0, called Astral Access 66.6,
with it you can do a direct batch hack of astral mainframes and have access
to everything that ever existed, will ever exist, or might ever exist, period.
It's in the planning stage right now, so I expect it'll be.... 5 or 6 hours
before I get the finished version all done an. {cut}
LL: But.... er...... th..
LA: .ee so when the plutorus humocus is in aligment with the death star and
sidereal timeline 94.brt is fluctuating at 23 kilocycles with the amperage set
to the nexus of sominus, it feeds the dog.
...............................................................................
We break now for a brief commerical to help pay the bills. This commerical has
nothing to do with anything else in this interview and shouldn't be taken to
mean that it does.
Hi! Peppy the Pusher here to tell you about a brand new miracle product! Are
you a little on the rotund side? Do your clothes come from Omar the tent maker?
face it, are you FAT?
Now there's hope! no more eating 10 pounds of cucumbers! no more sensible meal
plans! Eat all you want! anytime you want! yes that's right! all this and more,
all you have to do is add our miracle product to each meal! or take it during
snacks, instead of snacks, anytime at all!
What's the name of this miracle product you ask? {as well you should} Available
NOW! supplies are limited so order your shipment of BLOW today and watch those
unwanted pounds and unused brain cells slip away like magic!
Just look at what BLOW has done for the ultra elite Lord Analog! It's turned
him from a little on the chunky side, normal, everyday, preppie on the way
to being some kind of corporate exec, into the new and improved Lord Analog,
whose mind went out to lunch {heh heh get it?} one day and never came back!
Instead of using a butcher knife on steaks, you too will get the urge to
drive it through people's skulls! I sure as hell wouldn't want to be close
friends with him {or anywhere within 50 feet of him}, but he sure does look
good now doesn't he? Remember "It's better to look good, then to feel good"
brought to you as a joint effort of the better mental health clinic and Mort's
embalming service, to help retain that sleek and sexy look right into the
grave before the maggots eat you {and what's left of your brain!}
{Editor breaks in} Peppy, you said you weren't going to do this.
So I lied! buzz off! this is my ad space!
All this and MORE MORE MORE! Order NOW!!!!
BLOW is a product of Cocaine labratories, a wholly owned subsidiary of Crack
industries. "Crack - get a piece of the rock!"
Now back to you Don Pardo!
...............................................................................
{we continue with the interview all ready in progress}
LL: Sounds real good, but how can I run it if I don't have the hardware?
LA: Oh it's not too complex this time, all you need is a Cray6 with a MacIV
acting as a intelligent printer buffer, hooked to a apple //e acting as an
intelligent modem, hooked to a sun workstation, acting as a intelligent
tab aligment machine, hooked to a F-15 that's acting as a intelligent power
supply, hooked to a.... {cut}
LL: Silly me, I thought it would be complicated this time.
LA: No, I decided to keep is simple.
LL: How do you feel about the trend you started in Tap.Inverviews? Many people
have taken it as the bible of truth for the online domain. Everywhere you see
people quoting entire sentences out of it {like me for instance} and a almost
complete change in peoples attitudes to elite boards. How do you feel about
starting this?
LA: I don't care.
LL: You don't care?
LA: No.
LL: Anything else to say about that?
LA: No.
LL: What do you do to relax when you aren't........ aren't........ well aren't
doing whatever it is that you usually do?
LA: I like to take large amounts of acid and write weird poetry while thinking
about the implications of what would happen if inner space became outer space
and infinity was finite, while listening to Led Zeppelin and Doors albums.
LL: Uh yeah....... sounds very relaxing.
LA: It is.
LL: I was just wondering, when's the last time you wrote a complete sentence
that someone without a degree in English could understand, without looking up
words in a dictionary?
LA: Funny you should postulate such an occurance, I do beleive I wrote such a
sentence back in 1982, yes I recall it fondly myself, simple, to the point,
and people understood it. Can't have that now can we?
LL: No, I guess not.
LA: Well there you go.
LL: You're one of the elitest people to ever hit the modem domain, but you
aren't on any boards where anyone can reach you. What's the use of being elite
if none of your followers can find you? If they can't find you, they can't
kiss your ass, like me for example. I've been trying for years and when I got
so tired of never finding you, I just started impersonating you on a few boards
for laughs. What's wrong with you anyway?
LA: I think I'm insane, but don't hold it against me.
LL: You think?
LA: What?
LL: You think you're insane?
LA: Are you trying to imply something?
LL: Um.... dude....
LA: Because if you are, then you can be the next ritual sacrifice. I don't care
about anything, I can get out of any jail, I just disintegrate my atomic
structure and reintegrate it wherever I want to be, I don't care, I don't care,
I don't care about you or anyone else! Or is that a lyric again? and al ..{cut}
LL: No! I didn't say that, I meant that.... um.... th..
LA: I have Adolf's brain in a jar you know. He talks to me sometimes.
LL: Heh, he. hah ha.... uh.... that's cool. uh.... I think I should be going
now. It's........
LA: See I worked out this theorem about matter and light, for example let's
say you sqaure infinity and subdivide it by the total refraction of a purple
cow and then.... {cut}
LL: Heh hah, look at the time!
LA: So you see, this consitutes conclusive proof that I can dissapear at will,
the only problem is reapearing, but I think I can figure that out too. So when
you take a mutliple of rk2-b and apply it to the intronsic streams present in
the dna/rna coding, you dissapear! like this! {Poof}
LL: Ha, heh, ho.... good trick..........
LL: Hello?
LL: Heh, well how about that! Great interviews wasn't it? Heh, um.... ah....
Let's move onwards now.
Next up we have that hulking hunk of masculeinity, the "man" who isn't afraid
to tell people he's sensitive by wearing eye shadow, the first elite phreak /
hacker ever to wear eye liner and blusher, the future hardcore mega-star just
waiting to be discovered in the back alley's of some dead town in Ohio, the
only person who cried when he found out newsweek was almost bankrupt, that 5'4"
towering inferno of great info ....{cut again by the editor}: King Blutto!
LL: Heh, ha.... hey.... looking............ thin...... yeah very thin..... kind
of pale too, or is that makeup? {moving away from Blutto in case he has the
unspeakable disease}
KB: Are you trying to imply that I'm a heterosexual you brat, rodent, wimpgeek?
LL: Nooooo, nope, nononononono. I never said you were a heterosexual.
KB: Are you calling me gay? chickenshit! I'll drink your blood for that you you
you you {steam coming out of ears} you you rodent, geek, brat, wimp!
LL: Uh.... no. I never for a second thought you might be straight, I meant gay,
I'm sure you'll take the fashion world by storm someday. Nice hair.... blue
offsets your mascara nicely.
KB: Thanks for the compliment, I now declare you one of my subjects, so when I
open all my messages in exactly the same way on every system {Impersonators
start taking notes} like this "To all my subjects:" you can be a offical
subject of mine too!
LL: Always looking for an oppurtunity to kiss ass, thank you.
KB: Anytime, I'll even throw in some tickets to see our band play over at the
65 and over Bingo reception tuesday night. We're called King Blutto and the
Cathedral choir boys.
LL: I'm really in your debt now, but before I get in too deap, I'll have to
pass on those tickets, my Iranian diplomacy class meets that day.
KB: Are you trying to say I have no talent you rodent, leach, geek, wimp, brat,
chickenshit?
LL: Oh nooo! nope, nononononono. Uh huh, I'd love to see you and your band get
out there on the stage and........ and.... and do whatever it is that hardcore
bands do, throw up into the audience was it? no, don't tell me, let it be a
surprise! What I really wanted to ask was a couple of questions about you!
KB: Oh! that's different. Would you like a autographed autobiography? 8X20
glossy fit for framing? our latest demo cut of this song I wrote called "I
woke up one morning lying in a alley in a pool of slime", a King Blutto fan
club button? A signed copy of......{cut}
LL: Um.... I only wanted to talk to you about your elite board and elite
friends and elite wares and all around eliteness.
KB: Sure! I ran a elite board, it was the most secure board that was ever run,
Richard Sandza is a close personal friend of mine, don't rag on him or else you
will feel my wrath!
LL: What was so great about your board?
KB: I ran it.
LL: Um.... ok.... Oh yeah! I wanted to ask you about Bluttoware! I remember
your opening message used to say you were a elite pirate too. I can go for
that, I'm serious now, when I think of the pirate greats, the names that
come to my mind right away- King Blutto, Mr. Canon, Krac0ritz, Disk Rider,
yeah, in that order in fact.
KB: See? Told ya i was elite!
LL: Yeah, I can see how wrong I was thinking you were just another loudmouth
24 year old with the emotional development of a 10 year old kid. By god, you
are elite after all!
KB: I know.
LL: Well.. we have some of Lord Analog's accomplishment's, Lex Loother told us
everything he ever did in the last installment and I'll be talking to him next
anyway, so what.... um.... h...... th...... what have you ever accomplished, in
phreaking/hacking that is I mean. What did you do or write or invent or
contribute, or anything, um....
KB: I got a 2 word mention in newsweek
LL: Uh yeah, I know. So did a bunch of oth......
KB: But they were rodent, geek, wimp brats, I'm not!
LL: I can see where you're coming from. Anything else you've ever done?
KB: I Invented the Blutto box!
LL: But it's not real and it doesn't do anything an....
KB: That's what people said about Ethereal Access! See how wrong they were? I
have built a Blutto box, it's in my pocket right now, I can blow up the entire
phone system whenever I want!
LL: Think I could take a peek?
KB: Well.... ok! Look!
............
! !\.!
!.......!..!
! !
! Ti{ Ta{! !
! !
! Mints! !
!..........!
LL: Um, Blutto...... it looked like a box of tic tac's..
KB: Good disguise huh?
LL: Yeah.... you really think of everything. Anything else you've ever done?
KB: I discovered Qourom-P conferencing.
LL: But that was another joke, just like you and Dull Gillette telling everyone
that ROTL ports are really REMOB's and....
KB: You wimp, geek, brat, rodent, leach! Wasn't that funny?
LL: Um.... it was a riot, but what have you done that's of any worth, that's
real?
KB: Teletrial! The best idea ever invented and I thought of it myself!
LL: Yeah, amazing invention, the whole world took notice that time.
KB: I know.
LL: Uh yeah, I hear you're also very mad about the Molecule calling you a loser
in his Famous Losers of 1984 file, anything to say about that?
KB: That chickenshit, rodent, wimp, geek, I'll drink his blood for that! I hate
rodents who make loser lists. What a rodentish thing to do!
LL: Blutto........ didn't your board have one of the first online loser lists?
KB: What does that have to do with anything? Those were people I called losers!
Who the fuck does the Molecule think he is? Calling me a loser?
LL: But you did the same thing, in fact you're the first elite to ever spend
more time ragging on people than copying books into text files. You started an
entire trend, an..........{cut}
KB: Are you trying to say something rodent?
LL: Not really, just a thought.
KB: Good, why don't you shut up before I drink your blood!
LL: Ok, but what did you ever accomplish though?
KB: Didn't I just tell you rodent?
LL: Yeah I guess you did. We'll get back to this at some other time {or maybe
never if I can tactfully forget it}. Now what about these things Mr. Canon
said about you being a terrible programmer and the Goonif saying the same thing
in the National Enlightener's?
KB: I'm the best programmer ever you wimp, rodent, leach, lose, geek! How can
you say I'm not? Why look at what I've programmed! I changed the print's on
GBBS for Bluttoland and I made a arcade machine game with Prof Xavier in my
elite pirate days! Don't my accomplishments speak for themselves?
LL: Can't argue with it KB, they sure do. Anything to say about Bluttoland
being crashed, inited and uploaded all over?
KB: Fucking rumors spread by rodents! not true!
LL: Anything to say about the same thing happening to your current base BBS
Christ's Cathedral, being crashed, the entire confidential userfile and
software downloaded, packed and re-uploaded to every cat-fur around?
KB: That never happened, another rumor.
LL: Blutto, this happened in Sept of 86! this is not the far gone past that
you can rewrite to suit yourself and....
KB: You rodent wimp geek! dare to question me? I..
LL: Blutto, I have the software myself! I've seen it an....
KB: What does that have to do with anything you chickenshit geek? I'm telling
you it never happened, what are you going to believe the proof or me?
LL: Now that you've put it back into perpective for me, I'm sorry, I should
never have questioned you. Please forgive me my king.
KB: Much better rodent, bow and kneel.
LL: Thank you.
...............................................................................
We pause now for another commercial message!
Peppy the Pusher here again to remind you all that you don't have to be
overweight to enjoy BLOW! You can be right at your ideal weight and use BLOW
anyway! The emacipated look is in! 130, 120, even a 110 pounds are within your
reach! Add some make up and you'll look like a walking corpse too!
If you don't go for the sleek and sexy look, how about the almost dead look!
be a trend setter! don't let others dictate your style! almost dead is very
very in!
King Blutto also offers his endorsement for BLOW! with 2 mega elites using it
how can you go wrong!
Elite's use BLOW! If you want to be elite you should too!
Peppy the Pusher also endorses Coverguy eye shadow! For that strung out look
so popular with junkies!
...............................................................................
{back to the interview all ready in progress}
KB: Better watch it or I might drink your blood or tattoo celtic runes into
your forhead.
LL: Oh no! Not this again, didn't I just have one of these conversations?
KB: {drawing a pentagram and lighting candles}
LL: What is it with you people? Are you just pagan's or what's wrong with you
guys? Everywhere I turn you "elites" are doing or saying something that 18th
century housewives might have come up with. Does using MCI fry your brain
after x amount of phone calls or something?
KB: {humming, setting up skulls at the 5 points}
LL: Uh.... oh my, look at the time again, really must get going now. Thanks for
this interview, it's been.... h........ uh.. it's been great! yeah.... great!
KB: {something that looks suspicously like the graphic representation for
Ethereal Access eating bunnies, starts to materialize in the pentagram}
LL: {discretion being the better part of valor, your valiant MC starts to run}
Next up we have the human xerox machine: Lex Loother!
{editor's note: "Where's the intro"?}
{{I can't do one, he doesn't have a personality. He just types.}}
{Oh...... ok, go on}
LL: Before we start I'd like to know if you have any dark hidden secrets like
everyone else does, tell me the truth, does the devil live in your attic, or
do you talk to the moon or draw pentagrams? {Editor's note: Not wanting to
confuse our readers, Live Lord will continue as "LL" and Lex will be "L$"}
L$: No, no time, no time. I haven't left my room in 6 years, so many things
to type and so little time.
LL: I understand! Did you know that there are these new machines called
optical scanners that copy books directly into text files now?
L$: Wha.... oh.... no! you mean I'm obsolete?$$$$$$$$$$$$$$$$
LL: You could make the machine put a $$$$$$-=} Lex Loother {=-$$$$$$ at the
front and back of every page for you.
L$: $hey$! $t$h$a$t$'$s a $elite$ idea$!
LL: Lex...... you're doing it again.
L$: $what$? $oh$ $orry.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
we pause for another commerical message!
Peppy the $E$l$i$t$e Pusher $ay$ If you've already gotten to the 98 lb geek
look, we have another miracle product that helps you gain weight! No more
sand kicked in your face down at the beach! Even if you never leave the house
and have never been within 50 miles of a beach, you'll still appreciate the
results!
This brand new wonder product is called "Hashish!" Yes Hashish! Whenever you
want to pass up dinner and type up some manuals instead, take some of our
Hashish and in a few minutes you will get the urge to eat everything in
sight!
If you never leave the house and don't know where your nearest foodmart is
located, ask mom to stock up on munchies beforehand! It's always $elite$ to
plan ahead!
Lex Loother is so found of Hashish that in another few weeks he'll be ready
for our alternate miracle product BLOW!
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
{back to the interview all ready in progress}
LL: Anything you want to say?
L$: Me you mean?
LL: Yeah
L$: No, I $think I $almost covered it in my $last talk with $you,$ except $for
$that $time $when $I $parted $the $red $sea $and $what $about $that $time $I
$invented $the $airplane $a$nd..
LL: Thanks Lex, time for the next interview!
L$: Of course I told Openheimer all about atomic power, if NASA had listened to
me that disaster never would have happened, Lee Iacocca took my financial
advice when he was a stuggling immigrant shining shoes and$....
LL: Uh.... yeah. thanks again lex! bye!
L$: ..a$n$d$.$.$$.$.$}$.$.$.$ L0D/L0H$ 4$$$$$$$ Wait! what year is this? Is
there still daylight outside$?$$$?$?$$?$?
L$: ?$h$e$ll$$$o$?
L$: H$e $w$asn't $elite$ anyway$$$$
$$$$$$$$-=} Lex Loother {=-$$$$$$$$
$ $
$$$$$$$$$$$$$L0D/L0H$!$$$$$$$$$$$$$
$ $
$$-=} In ca$e you forgot this {=-$$
$ $
$$$$-=} wa$ the Lex Loother {=-$$$$
$ $
$$$-=} interview$!$!$!$!$$$$ {=-$$$
$ $
$$$$$$$$-=} uploaded by {=-$$$$$$$$
$ $
$$$$$$$$-=} Lex Loother {=-$$$$$$$$
$ $
$$$-=} & the Legi0n 0f D00m! {=-$$$
$ $
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$ $
$$$$L0D$L0H$L0D$L0H$L0D$L0H$L0D$$$$
$ $
$$$$$.... {cut}
{cut by editor, we're running out of room}
Next is that elite pirate turned elite cracker turned elite phreak turned elite
hacker turned elite god in mortal form too. Lord Analog's spiritual equal, that
smooth talking, game playing, egotistical, talented, inventor of everything
that ever was, m.. {cut by editor's}: Mr. Canon!
LL: You're still alive!
MC: Sorry, but I can't talk to you.
LL: Why not? what's wrong?
MC: You're not worthy of my notice.
LL: Hey! Lord Analog talked to me!
MC: He must have thought you weren't real.
LL: I'm as real as you or him!
MC: We're not real.
LL: Uh.... not this again, please!
MC: I refuse to soil myself by engaging you in coversation. Here's to crime!
{Mr. Canon pulls out a uzi and smiles. It looks like your elite mc is on the
run again.}
LL: Next up I have the originator of 20 part text files series, the first
person to copy manuals and not give credit, {Lex Loother always gives credit!}
a human word processor even before Lex, th.... {cut}: BIOC Agent 000!
LL: Great to see you Bioc! What have you been doing with yourself for the last
two years?
B0: Life is tough, I'm still working at the same restuarant as a waiter LL.
LL: You mean to say that BIOC Agent 000, speed typist extraordinare, can't find
a better job then working as a waiter?
B0: There aren't that many jobs out there that only require you to copy books
into text files you know, it's hard to find that kind of specialized work.
LL: I know the feeling, you think it's easy to find work when your only job
skill is having make-believe conversations with nonexistent people?
B0: I can see where you'd have problems.
LL: But we're not here to talk about my problems, we're here to talk about your
problems Bioc, so let's get on with it. You are almost the ideal elite you know
that? You had a big name, giant following, fame, rodents worshipping you and
through it all, you never did anything besides copy manuals, make 500 line
copies of magazine articles, copy books on unix and become the first person
to ever have a signiture 9 lines long. What happened, why'd you leave?
B0: My boss threatened to fire me if I kept coming in late for work, so I had
to stop being elite and take more time to be a better waiter.
LL: Oh...... You are also a typical elite in the way you buried your past the
moment you became famous. The average person who thinks of Bioc, thinks of
"your" Basics of Telecom files, they don't think of the Bioc who was a
member of APRA a Apple distributors club that lasted for 3 weeks or the Bioc
who really used to own a Timex or the Bioc who got thrown off 914 boards for
being such a pain in the ass for other users. Hardly any at all would remember
the Bioc who had 30 message wars with Big Brother and the rest of the SF ][
members all over the general section either.
B0: I know LL, I've done a good job in the PR department. Even better then LOD
if I do say so myself.
LL: You sure have, in recognition of that, I've decided to do you a favor!
B0: What's that?
LL: I'm mentioning your name! Not being elite anymore you might not know it,
but you aren't even legendary anymore, if it wasn't for me bringing you back
into the spotlight right now, your alias would have sunk into the limbo of
people who used to be elite but don't exist anymore! A select few are destined
for eternal eliteness because of their great notiriety, or some great things
they've done or said or written or all 4, but Bioc, you never said anything or
wrote anything or did anything! You're like Lex, you only copied things and Lex
is the one remembered as the human xerox machine, I'm afraid you've sunk into
obscurity!
B0: No! it can't be, being elite was the one thing in the world I had going
for me. I had 5 sides of files out when Lex and his $'s were a gleam in some
future computer owners eye! It just can't be.
LL: It's true Bioc.
B0: No! nononononono I can't accept that. I'm much better at typing then Lex
ever was, I'm Bioc, the man with a 9 line signiture! That was my idea too!
nobody ever did that before or since then! I can't be forgotten. Wait! I have
it, I'll be the first elite to ever kill a interviewer! Yeah that's it!
LL: Now Bioc, wait a minute, It's not my fault you're not elite anymore and....
B0: Attack!!!!!!!!!!!!!
LL: {Your elite MC runs out of the soup kitchen doing 80 as a frenzied former
elite runs after him with a steak knife}
LL: I've had it! all these arrogant, self centered, hostile scumbags are
giving me a headache! {Editor's note the "arrogant, self centered, hostile,
scumbags" have no relation to our interviews} This is the last elite
phreak/hacker interview I have left before turning this over to Elven Magician.
Good riddence and furtherm.... {Live, are you forgetting your mother?}
LL: Fuck the stupid bitch. I never liked her that much anyway, ever since she
took away my modem for 3 weeks when I got that F, set her hair on fire the
bitch deserves it!
LLM: {Live Lord's Mother} You little shit! I knew I never should have given you
a Apple Cat! Networkers aren't good enough, Smartmodems aren't good enough and
this is how you repay me you, you, you, you can just forget that //GS! and I'm
sick of all your.... {cut}
LL: Ok stop sniveling mom, I'll do the last interview already. I'm not eating
any more brussel sprouts when this is over, you can count on that.
LL: The last interview is a double feature with those masters of the blue box,
those big time larceny experts, those credit card abusers who know what the
score is, those 2 former LOD members grown up and nowhere to go but down, those
examples of what happens to elite phreaks and hackers who "grow up and enter
the real world" {to borrow someones line}, those finely tuned theft machines,
the.... {cut by editor}: Mark Tabs and Karl Lenin! {MT & KL}
LL: How's jail treating you guys?
MT: It's not that bad. It's even taught us a lot about ourselves, we're engaged
to be married next week!
KL: Oh stop it you!
MT: Don't be so shy! you're the best! even better then that big one Tito from
cellblock 12!
KL: Heh, I know it dear!
LL: Um...... if this is private I can leave.
KL: No, stay, you're kind of cute!
LL: Uh............ thanks, yeah thanks. I appreciate it. {moving away again}
MT: What did you want to ask us?
LL: If you guys are or were, so good, how come you're in jail?
KL: Good question, got anymore?
MT: I agree, excellent question. Next question?
LL: What are your plans when you get out of jail?
MT: We want to get a big house together overlooking the city dump, with nice
pink frilly curtains and settle down and have children.
KL: Yup! that's what we want. I can get a job with AT&T as some kind of
operator or something, should be making almost 4 dollars a hour!
MT: Don't stretch the truth dear, you know were lying got us last time, you
know that 4 dollars is before taxes!
KL: I know, but true love conqours all!
MT: So true!
...............................................................................
Peppy the Pusher says: Remember to use Close Contact Condoms for safe sex!
Better to be safe then sorry! For all your abnormal needs, use CC's, I meant
CCC's! Peppy the Pusher sells them and Mark Tabs and Karl Lenin recommend
them! How can you go wrong?
...............................................................................
{back to the interview all ready in progress}
LL: Uh, yeah...... I can see that. You look happy, really happy. Anything you
want to say before I go throw up, I mean close up these interviews?
MT: Read a bunch of manuals and elite files and learn all you can about how
the phone network operates! Then you can grow up and become a unsuccessfull
credit card thief like me and Karl!
KL: He's right you know! It's a long hard {giggle} road to the top, but once
you're there, you'll never turn back!
{Karl and Mark together}: Stay elite, eat your brussel sprouts and remember
that safe sex really works! From here in jail, to all you aspiring auspicious
{good word don't you think? read my elite files for more uses of auspicious}
elites out there, take it from us! stay elite!
LL: Thanks guys, I know this has turned my life around, most disgusting thing
I've seen since I saw that black boy in scared straight.
LL: I survived! another day another paycheck, hey EM get your ass out here,
it's your turn.
EM: What? What's going on? I haven't been around much since the Tavern went
down, what's going on?
LL: How should I know, elite pirates are your department.
EM: No they're not, pirates are totally different from phreaks and hackers, in
that field you have about 5 names that go on forever, who might not be total
losers, but they say and do so many strange things, that they're always
newsworthy. With pirates, if they're any good, they're nothing to rag on, since
pirates don't have personalities and never say anything. What can you do, make
fun of the border color they chose for the latest crack?
LL: I don't see much difference, you just described both Bioc and Lex.
EM: They choose bad colors?
LL: No, they never say anything or do anything besides copy manuals.
EM: What about all the rest?
LL: What rest? that leaves about 4 with notiriety up the ass and they worship
the devil or the ozone layer or themselves or all three and are psychotics
anyway, can't get too near them.
EM: There are only 4 or 5 phreaks and hackers total? what about all the rest?
LL: Those 4 or 5 are the ones who have at least reached some new depth of
original behaviour disorder and done something, I don't know what, but
something, in their chosen field, so they got a lot of press.
EM: Like what?
LL: I don't know, don't ask me all these questions.
EM: What about all the rest?
LL: They have attitude problems without having anything to back up their claims
of eliteness, they mostly read phone magazines and then think they know all
there is to know. There are a few thousand of those.
EM: What do you call them?
LL: Some people call them posers, some people call them rodents, some people
ignore them which makes them mad since they feel they should be getting some
kind of recognition for being elite.
EM: That's who I write about! It's not so different after all! There are 8 or 9
good pirates, they're boring people, you can fall asleep listening to them
drone about autosync bytes and how exciting their new clear screen routine is,
or what awesome protection some 10 sided, 95 track, new ware has, but they have
some kind of real claim for eliteness! The rest are called new warez kids, the
equivalent of your posers or rodents.
LL: I was wrong then, you write about new warez kids, not pirates, what
difference does it make? get on with it so I can go home and watch Max Headroom
already.
EM: Go then and leave me to my work, only thing that isn't right about that is
the title new warez kids, some of them are in their 20's, I tried to bring
this to light on the Tavern but it went down too soon. There are new warez men
out there and it's not a pretty sight.
LL: So write about them and leave me alone already! bye!
EM: Take care and stay elite!
LL: You bet and you too!
LLM: Eat your brussel sprouts dear!
LL: Shut up mom, I knew I should have left you there.
{Kontinyood in part 2! Don't miss a single action-packed word!}

File diff suppressed because it is too large Load Diff