💾 Archived View for clemat.is › saccophore › library › ezines › 2600 › 2600_1-8_djvu.txt captured on 2021-12-03 at 14:04:38.
View Raw
More Information
-=-=-=-=-=-=-
2600 Magazine - Volume 1, Number 8
2600 — August, 1984
— ' ’ — —
JflW if prtlifM MfUJilv byJBdS EhftEd PFC |$t5. 1 TIC. jrictaM^Nrywpiiiatiwt. Su**ri]*»«i rtlhillB- 1 pr.H-tcmrihi. II pr h ack iwe;
DwrK»)JI3.S6-l jar. Vritow: MCI Upk aSHUNDBED; U*: WJWPSfl.
VOLUME ONE, NUMBER EIGHT
4
BUT HOW DOES IT WORK?
How much do you [tally understand about the way your telephone
works? Probably not as much as you should. Considering the amount
of time moat people spend on the contraptions, this is really quite a
disgrace. Ask questions and make an effort to learn and you 11 be the
exception to the rule, which k basically: “Safety k Stupidity, '‘Read on.
W faring
Assuming a standard one-line Tone, there are usually 4 wires that
iftM out of the feme set- These are standardly colored red green,
yeUow, and black. The red and green wires are the two that are actually
hooked up to yotu central office (CO)- The yellow wire is sometimes
used to ring different femes on a party line (i.e., one number, several
families — found primarily in rural areas where they pay less for the
service and they don't use the fone as much), otherwise the yellow is
usually just ignored. On some two-line foues, the red and green wires
are used for the first fume number and the yellow and black are used for
the second line. In this case there must bean internal or external device
that switches between the two lines and provides a hold function {such
as Audio Shack's outrageously priced 2 line and hold module).
In telephony, the green and red wiresare often referred to as tip |T)
and ririg(R), respectively. The tip is the more positive of the two wires.
This naming goes hack to the old operator cord boards where one of
the wires was the tip of the plug and the other was the ring (of the
barrel).
A rotary feme (a.k a. dial or pulse) will work fine regardless of
whether the red (or green) wire isconnected to the tip (+}or ring H- A
touch-tone# font is a different story, though, it will not work except if
the tip(+) is the green wire. (Some of the more expensive DTMF fortes
do have a bridge rectifier which compensates for polarity reversal,
however.) This, is why uoderceitain (non-digital) switching equipment
you can reverse the red and green wires on a touch-tone# for* and
receive free DTMF service, Even though it wont break dial tone,
reversing the wires on a rotary line on a digital switch will cause the
tones to be generated.
Vokagen, Etc.
When your telephone is orvhook hung up) there are approxi-
mately 48 volts of DC potential across the tip and ring- When the
handset of a fane h lifted, a few switches close which cause a loop to be
connected (known ns the local loop") between your fore and the CO.
Once this happens, DC current is able to flow through the fone with
less resistance. This causes a relay to energize which causa other CO
equipment to realize that you want service. Eventually, you should end
up with a dial tune. Thisabo causes the 48 VDC to drop down into the
vicinity of 12 volts. The resistance of the Impulse drops below the 2500
ohm level, though POC I ice reed telephone equipment must have an
off 4XKtk impedance of 600 ohms.
As of now, you are probably saying to yourself that this is all nice
and technical but what the hell good is the information. Well, also
consider that this diop in impedance is how the CO detects that a fone
was taken off hook (picked up), to this wfiy + they know when to start
billing the calling number. Now what do you suppose would happen if
a device such as a resistor or a zener diode waA placed On the c ailed
parly Is line so that the voltage would drop just enough to allow talking
but not enough to start billing? First off, the calling party would not be
billed for the call but conversation could be pursued. Secondly, the CO
equipment would think that the fane just kept on ringing. The Telco
calls this a “nO‘flo"(toU fraud to he more specific) white phone phreata
affectionately call this mute a black box.
How These Bgsai Are thrift
It “s really surprisingly easy to build a device such as a black box. If it
wtrerrt for theamazingly high morals inherent in todays society, you'd
most certainly see more of them in use. Only two parts are needed: an
SPST toggle switch and a IOJOOO ohm (10 K) Vs. watt resistor. Any
electronics store should stock these parts.
A person would then cut 2 pieces of wire (about 6 inches long) and
attach one end of each wire to one of the terminals on the switch. Then
the IC5CC (standard desk fone) would be turned upside down and the
cover taken off. A wire would be located and disconnected from its
terminal. The switch would then be brought out the rear of the forward
the cover replaced. Labelling the switch usually corner next, A position
where one receiwK a dial toot whcti picking up is marked “NORMAL'*.
The other side is, naturally, "FREE* 1
Making Them Wofk
When phriends e ah (usually ala prearranged time), the person with
the black box quickly lifts and drops the receiver as fast as possible.
This stops the ringing (if not it must be done again) without starting the
billing. This must be done within less than one second. The phone can
then be picked up with the switch in the “FREE" position. Most phone
phreaks are wise enough to keep their calls under 15 minutes im length,
greatly minimizing the odds of getting caught.
Some interesting points: (I ) If someone picks up an extension in the
called party^ house and that fone is not set for “FREE 1 *, then hilling
will siait. {2) An old way of signalling a phriend that you want to call
him is to make a collect call to a non-existent person in the house. Since
the phriend will (hopefully) not accept the charges, he will know that
you are about to call and thus prepare the blackbox (or vice versa). (3)
The phone company can detect black boxes if they suspwl one on the
line. This is done due to the pretence of AC voice signal at the wrong
DC level! (4) The blade box will not work under ESS or other similar
digital switches since ESS does not connect the voice circuits until thf--
fone is picked up (and billing starts). Instead, ESS use s an^artificitt
computer generated ring.
Rbtfitti
To inform a subscriber of an incoming call, the telco sends 90 volts
(PK) of pulsing DC down the line (at around 15 to 60 Hz; usually 20
Hz). In most femes this causes a metal armature to be attracted
alternately between two electromagnets thus striking 2 bells. Of
course, the standard bell (patented in 1878 by Tom A- Watson) can be
replaced by a more modem electronic bell or signalling device.
Also, you can have lights and other similar devices m lieu of (or in
conjunction with) the bell. A simple neon light (with its corresponding
resistor) can simply be connected, between the red and green wires
(usually Ll and L2 on the network box) so that it lights up on incoming
calls.
Be advised that 90 VDC can give quite a shock. Exercise extreme
caution if you wish to further pursue these topics.
Also included in the ringing circuit k a capacitor to prevent the DC
current from interfering with the bell (a capacitor will pass AC and
pulsing DC while it will prevent straight DC from flowing — by storing
it)-
Another reason that telcos hate black boxes is because ringing uses a
lot of commotvcontrol equipment in the CO, which use a lot of
electricity. Thus the ringing generators are being tied up while a free
call is being made. Usually calls that are allowed to “ring** for a long
period of time will be construed as suspicious. Some offices may beset
up to drop a trouble card for lopg periods of ringing and then a “no-no"
detection device may be placed on the line.
Incidentally, the term “ring trip" refers to the CO process involved to
Stop the AC ringing signal when the calling fone goes off hodk.
h is suggested that you actually dissect fonts to help you better
understand them (regardless of whether or not you want to build anw
devices). It will afro help you to better understand the concepts here
you actually prove them to yourself. For example, actually take tht-
voltage readings on yanr fone line (any simple multi-tester (a must)
will do). Pbreaking and/or teaming is an interactive process, not a
passive one!
(Any questions on the above? Write us and weli try to answer them,}
1-41
1
PRIVA CY LOST
r^-
The Rise of ihe Computer State
by David Burnham
wf foreword by Walter Cronkite
Vantage Books $6$5 paperback 273 pp.
Several yean ago on -Surly Minutes^ segment was presented where
all of the checks that one person had written In h» lifetime were
examined, and then a fairly accurate portrait of the person V life was
painted by the discrete bits of information, Information like (hit is
called transactional information and we leave huge amounts of it
behind as we livr our lives, whether in tons of paper or megabyte* of
data.
In The Rise of the Computer State, David Burnham says that an
event as demonstrated by the Sixty' Minuses team could happen and
many similar ones do occur. He surveys many of the ways that
computers and technology cam be used to intrude upon our privacy; the
governmental mandates, for such intrusion; and how, in ^ocral,
computer abuses have affected history,
Burnham begins with a review of computer history and the
importance of computers on our lives- While always implying a global
connection, he concentrates upon the United States where "industries
engaged in the processing of information,.- now generate about half the
GNP.” Later Burnham brings up legal points which are supported by
examples- He also discusses legislative battles and presidential direct-
ives both for and against the public good. Overall, The Rise of the
Computer State reveals in technical and ethical terms how dose we ate
to Orwell technocracy.
Christopher Evans, a psychologist and computer scientist said that if
during the 30 years from 1945 to 1975, the automobile had developed
as fast as the computer* the Rolls Royce would cost $2,75, would have
—^enough power to push the Q.E. 1] across the Atlantic, and would get 3
r million miles to the gallon.
The computer has that amazing ability to quickly and efficiently
move and sort through vast amounts of information, and this is why
they are being used in all aspects of society including the FBI, police,
banks, phone companies, and credit companies. They are used by most
businesses for payroll, personnel, inventory, accounting. They are used
by most government agencies including the IRS, FBI, CIA, SSA,
NSA, HEW,FRB. and a large number of others, In fact, he devotes an
entire interesting chapter on the National Securely Agency (NSA)
which was obviously written before The Puzzle Paiace, a rather
thorough examination of the NSA, was published. (A future issue of
2600 will look at the NSA.)
Computers are used to compile lists, store data, pay employees,
transfer funds, make airplane reservations or phone calls, com-
municate, write letters, address envelopes, detect incoming ICBM^
price goods at supermarkets and department stores, tell time, and keep
track of America's airplanes and trains to prevent them from Craslung.
There are literally millions of things computers can do to benefit
humankind.
But the most amazing or these computers are controlled by big
government or a few corporations. Transactional information about
our lives is often bought and sold and traded without our permission.
In bank computers lie copies of the checks we wrote. In our hospital
computers are our medical records. I n many States, computer files are
kept on all prescriptive medicine. In many law enforcement computers
lie arrest and conviction records, often incomplete or inaccurate as
Burnham points out.
- Our movements can be kept track of by looking at our phone
charges, airline, bus, train, and car rental records, or our gas receipts.
- In Pittsfield. Mass., people’s buying habits are computerized and
compared to the special dose of commercial* that are sent to only their
■ F- ^ .televi&tan sets. If we get supermarket credit cards, then every item, all
of our individual buying habits, can be examined,
- Information from the JWemsus was used to round up Japanese
into concentration camps. If another thoughtless government wanted
to do something again, it wont be hard,
- In Los Angeles there is a registry of "undesirable” tenants that can
be accessed for a fee. The information is often just heresay or the
opinion of a past landlord. If the information is negative, the potential
tenant U turned down.
■ The FBI pouetsea the fingerprints of 66 million people in its
crinuniL or civil iderrtificatioa files.
Burnham brings up the topic of criminal records a lot— about how
past arrests and convictions can follow a person, even if a case is
dismissed, Thk information is available to law enforcement agencies
government personnel departments, and private companies. These
databases of criminal records, which only one out of every live state*
have ever checked for accuracy, were created in order to apprehend
criminals. But if these records are used to keep suspected criminals or
ex-cons out of governmental and private jobs and thus keep them
unemployed, these people art practically forced to return to crime.
By cross matching files, politicians can locate key groups to appeal
to in order to makedecnioru or win elections. By cross matching file*,
likely suspected comm musts can be systematically tortured, or
customers for a new store can get junk mail designed just for them.
In the casi'anything-berione chapter, we are left to hope that some
laws or presidential orders are Created to stop cross matching of
information between government agencies. There are example* where
things are done (and undone again} in an effort to preserve privacy, but
as we ree much information about u * is public. Until recently, the
sdcctivt service wax aware of who got free ice cream from Farrow 3
1 2600 , p. 1-45). It wcn\ be long until all of the Flintstone vitamin
peddler* will be buying up the list of the cabbage patch parents from
Coleco. Companies are always buying information about us to pin an
economic advantage. Business controls money and hence information.
This information gives them direct power and often a marketable item.
TRW and Other lesser known credit companies sell information to
other businesses for about a buck a report, but to check your own
record in order to see if the report is accurate costs $12. Mailing lists
pass hands tike stocks on Wall Street.
But are wc threatened now? When it comes to criminal records;] RS H
and credit stuff the info is being used widely. The federal government is
tightening up on documents it makes public. But often Mr. Burnham is
telling us what ix possible which is not tar from the actual. He doesn^
stress the importance that the Freedom of Information Act had which
is being gutted by the Reagan Administration.
What Mr. Burnham could have done to make his case even mare
effective is to include actual examples of the vast personal data and
create a small autobiography based on his own credit history, bank
records, FBI files, criminal records, motor vehicle records, college
records, and other similar sources He could have gotten some expert*
to examine all of his transactional information and then compare it to
himself. But iiH all right for Burnham not to do this, because he
suggests to us that such a thing can be done.
Burnham goes on and on citing legal abuses, privacy intrusions, and
political and economic manipulation. The book read* like those old
TRW adt- "Imagine a day when.. ."and it ends the same way: That
day ix today. Write to ux— well tell you all about ft " Burnham tells us
almost all about "it" too. He does not mention the danger to a
computer state where a disgruntled employee or little kiddie at a
terminal can crash a huge system permanently, or a clever sad ist can
create a viral program that can spread throughout a database and wipe
out fiie after file! Burnham does not mention the technological
pioneers who hack and explore and understand the world that is
approaching and encroaching and who warn others of the danger. M r.
Burnham would appreciate the work of some of the people like that,
just as we can appreciate the warning* in his book about the power of
the technological elite.
77rr Rise of the Computer State represent* one of the many books
that should be read to prepare for the future as well a* the present. Mr.
Burnham has managed to condense an immense amount of inform-
ation on the power and threat of computers and data colletiing
agencies. His book is well researched, but he needs that extra
something to retain the sympathy of those who have "nothing to hide”
and the interest of those who cannot relate to terms like "dchumant*
zatioa”and "values”. The Rise of the Computer State startles one with
a slap Of hidden reality, and this is what we need now.
ABC
2
MNO
6
OPER
1
OPER
0
Big Brother No Longer Watching Miami
AUOcilLEj f'fCMi
City officials who stirred up visions of George Orwell s ^Big
Brothry” when they instated video cameras todettci street crime have
decided the project wasn't such a good idea after all.
So three yean and almost $300,000 later, the city has abandoned its
“Television Police Protection* system, saying it failed to record one
crime.
The city had the cameras installed in February 1$82 but for
numerous technical reasons the system wasn^t turned on until that
June.
The project called for 20 cameras to be mounted on a rotating basis
in 100 camera bousing; mounted on poles, thus keeping criminals off
guard.
Another larger camera was mounted atop a !4-**ory building on
Lincoln Road to sweep the length of both streets fora broad overview.
But the system had trouble. *Wc had continual maintenance
problems with constant adjustment of the microwave, " Police Chief
Kenneth Classman said. One civilian made so much fuss about police
watching the monitors and not patrolling the streets that the depart-
ment look police off the project. Another problem was in lack of
interest from civilian volunteers assigned to watch the monitors. Many
[bites, even the few working monitors went unwatched.
Computers Seized as Summer Games Begin
IVm.H PnW'Wiv
The home computers of four Huntsville, Alabama teenagers were
seized by the FBI last month afteran illegal tap into NASA computers.
The unauthorized taps, according to the FBI, destroyed records and
blocked scientists from using the computers. The FBI seized computers,
printers, floppy disks, and software that allegedly were used to tap into
two computers at NASA^i Marshall Space Flight Center. They
contained iu classified information, according to NASA officials.
Cecil Mok, special agent in charge of the FBI k Birmingham office,
said an investigation is continuing He said no charges have been filed,
but may be later.
House: Hacking is Bad
r^vnbined hrCTnft«jrafc
h
The House of Representatives has voted 395-0 for a bill that would
make it a federal crime to gain access to computer memory banks
without permission. The legislation would combine the attack on
hackers with an attempt to slop those who manufacture or posses
fraudulent credit cards or me someone's credit card number without
his or her knowledge
More PC JrV, Less Z-IOOls for Soviets
n»Nt* l imk Vm*
The United States, 13 NATO allies and Japan have jointly agreed to
impose broad, rw w export controls on the salt of small computers and
sophisticated telephone equipment to nations of the Soviet bloc; The
agreement comes after iwo and a half years of difficult negotiations,
. The accord, which was reached at the urging of the US .expands the
existing NATO embargo on the sale of large sophisticated computers
to include smaller models that Could have military applications. This
means that many of the more expensive personal computers now
available at retail outlets in the United Slates will be subject to capon
controls m the futurc-
Also, The agreement sets maximum lewis of technological sophisti-
cation for digital switching and other telephone equipment supplied to
the Eastern bloc by Western corporations.
The Reagan Administration took the most restrictive line throughout
the embargo review talks, diplomats say, with the Europeans and
Japanese advocating a more liberal approach to trade wiih the
Communist world. The U,S,, though, did agree to liberalize the sale of
some less advanced computers to the Eastern bloc countries in return
for joint Western restrictions on the sale of certain powerful email
computers.
In addition, the Western powers have undertaken to ban the export
of “ruggedized” computers, built to withstand rough treatment and
thus suitable for battlefield use. -
Federal Express Offers “E-Maii”
Tint
Memphis-based Federal Express, which pioneered next-day private
postal service, is now promising even greater speed with ZapMail. its
long-awaited version of electronic mail. Fora* little as $25 fora missive
of five pages or less and up to $50 fora maximum of 20 pages. Federal
Express will zap letters and documents acres the U,S, within two
hours. Unlike other outfits, Federal Express does not require its
customer* to use computer keyboards to enter messages. Instead a
courier comes and picks it up, lakes it to a Federal Express office,
where clerks feed it into a document tCarmCr for Iransimsskm over land
lines. At the receiving Federal Express office, a laser printer will spew
out copies for couriers to deliver immediately. [No, this is mt
electronic mail in the bona fide sense.) The firm even vows to give full
refunds if documents are late.
ITT Wiping Out Fee
AMuUud Prtti
On September I . Il l will drop the monthly service fee in charges
users of its Ibng-di&t&ncc telephone service. The fees currently are $5 a
month for residential customers and $10 a month for business users,
JTT also said it would introduce discounts for high-volume callers, and
said its residential customers would be able to reach any telephone in
the continental United Slates. Previously, only iTT's butinCH
Customers had nationwide calling. ITT is ranked eighth among long-
distance carriers with about 125,000 customers.
800 Directories Now Available
A. FViCrtJly Irfpm^kwi Oprarfw
Starting in the middle of September AT&T will at last start offering
directories to toll-free numbers. Previously, the only way to gel such a
directory was through scanning, trashing, or buying ■ directory printed
by an outside company. There are two versions being offered. One is
for people and sells for $6.25 while the other is for businesses and sells
for $G75, 1 nfo can be had by calling B0Q2424634. if that doesn't work
from yrvur area, call 8005551212 and demand an explanation. Billing
won^ be done through your phone bill, as one might expect. 44 We donlt
hare that kind of capability yet," they said to us.
Ice Cream Chain Aides Selective Service
lteTfewYiwkTimn
The Selective Service System has defended its iae of a mailing list
compiled by a national chain of ice cream Stones to advise young men
that they were liable for draft registration.
However, the government will be returning the computerized list of
167.000 names to the company.
Alexander Hehmeytr, executive vice president and general counsel
of Farrell^ Ice Cream Parlor Restaurant, a chain of almost 100 ice
cream stores, said both he and the company were H upscl and outraged"*
by this *aci of big brother government,"
For many years the retail outlets of Farrell^ have had customers fill
out a birthday form so that they would gel birthday cards from the
company entitling them to free ice cream sundaes. The Selective
Service bought the Farrells list in 19G3 from a list broker in New
Jersey. Last October, the system began using the list to malt 1 300 to
3,500 warning cards a month to young men whose listed birthdays
indicated they were about to turn IJt,
Besides commercial lists, the Selective Service relies on state
agencies thal license driven and the Defense Department, which
compiles a list of high school graduates..
1-45
3
BE NICE TO YOUR TELCO
Over the years, some bad things have happened to my
telephone. Once a silly caller terminated his call but did not
hang up. 1 calfed the phone company (New Yorit Telephone)
from a neighbor's phone, but they said they were unable to do
anything- They said they could not even tell me where the
caller"? phone was located. Acting on a hunch., I cruised my
neighborhood looking for pay-phones. 1 found the phone 1 was
interested in, but it was in a locked building, and I clearly saw
the receiver dangling. The next morning 1 was able to hang up
the phone, and my phone service was back to normal.
Another time the clever sewer workers hauled out my trunk
and knocked out my phone. It was restored, but l was not
getting any incoming service after that, The ever more clever
phone man came over, dialed the Automatic Number Iden-
tification, and ki and heboid I had a new number. They fixed
that too.
My phone company has been generally nice to me even
though 1 played some jokes on them. 1 suggest you do not do the
following, as 1 have done in the past:
• Fold, spindle, and mutilate your billing card.
READER FEEDBACK
DoitJMW:
Here^ the latest info on phone scramblers.
Phone scramblers/ descramblers area type of device which
allows one to communicate over the phone without anyone
being able to hear your conversation in between the source and
destination of the call. They are perfectly legal to own and
operate, but there is oik catch.
(The following information wa* obtained from a phreak who
worked with an cx-ClA agent — to verify the validity of this
statement.) The CIA, working in conjunction with AT&T, has
the right to legally tap up to 60Q phone lines in the U.S. The way
that they are able to do this is that Bell Telephone can ^test"
your line any time it likes to see if it is working in proper order.
Under the new ESS telephone system, finding scramblers;' de-
scramblers is very easy and once yoriart found, an instant file is
generated on both the sender and the receiver of the call. They
(CIA) will also do their best to try and crack your scrambler
code. I have been told that they arc extremely good at this. My
advice to those of you out there thinking about building such a
device is to seek other ways and for those of you currently using
them to stop. Using these devices is simply waving a flag to
AT&T and CIA saying, **l\c got something important to say,
and I don't want you to hear it."
Agent Orange
Dear Agent:
Thanks for the info and for the warning. While youVe most
probably correct about the powers that be taking a strong
interest in any person using such a device, it seems absurd that
we should have to constantly live in fear of having our privacy
stripped, simply because we desire a little privacy t
We face some real problems in the near future if surveillance
continues to grow and not enough is done by individuals to
curb it. Technology is a deadly weapon for anyone..
Sta y a live, awake, and ind ignant— y ou can 1 ! lose^Thanks for
writing.
Dtw2606:
1 just had a horrible experience. As a faithful subscriber to
this magazine, I keep all of my copies in a special loose-leaf
book. This comes in very handy because they're not scattered
all over the house, like most other thing* 1 possess. But last
week, l dropped my loose-leafbook on the floor and of course it
opened, scattering all of the pages here and there. Now, t have
no trouble piecing together the first page of each issue, but I
can't remember where the other ones belong, since they don't
have any dale on them! Can you help me piece them back
- Punch extra holes in it to increase your bill 110,000 or
more,
■ Cross out the line of numbers in magnetic ink at the
bottom of your bill or check.
- Make out your check to a penny less or a penny more than
what is due.
- Order as many free phone books for as many areas as
possible.
- Older phone books for obscure areas covered by private
phone companies.
- When you have free checking, pay with more than one
check (10 or 30 per phone bill, for example).
- Write with thick black marker the word ffUOi at the
bottom of your check where the space for memos is located.
These activities cause the phone company to put more work
into serving you. It causes them to process your bill by hand, to
spend money printing and mailing phone books, and to read
your unfriendly message. Don * do this or vour rates will go up,
(Please contact 2600 tM MEDIATELY if you know of other
abuses currently making the rounds.)
together and take steps to ensure that this tragedy doesn’t
reoccur in the future? Thanks.
Miserable In Philadelphia
Dear M1P:
You\e raised a very good point, one which we overlooked
completely. While most of our stories are essentially timeless",
it does help to know whena certain article was printed. For this
reason, we have begun (as of this issue) to number our pages in
manual format. For instance, this is page 1-46 which means
Volume 1 1 Page 46 of the year. We hope this eases the suffering.
As far as previous issues, we will be coming out with ^summary
sheet towards the end of the year which well send to all ^
subscribers. Well try to get yours out early. And if anyone else
knows of something we\e overlooked or wants to make a
suggestion, please write.
Dear 2640:
I'm working on a book that gives the hackers 1 viewpoint and
explains why he /she penetrates computer systems, 1 believe
that even though I’m currently incarcerated, 1 could get a
publisher to publish such a book
To get this viewpoint I need help. L need the input of people
who are active— the more the better. I also need the views of
people who trash systems too. AIU Vcever seen is the viewpoint
of the law enforcement agencies, media, business, and hackers
that are caught etc, etc. etc. It 1 * time your views were heard.
What I would do is just edit letters etc. sent to me and use
these as basis for the book. By edit 1 mean pick the ones to be
used in their. entirety.
People interested in helping me with this can write to me
under handles or pen names at the following address. Do not
use your real name or address as nty ntaii is censored by officials
here.
John Gregg
Box IM
Marion, 1L 62959
A CORRECTION
In our last issue, we erroneously gave our MCI Mill ID as
2600. We didn’t think there would beany problem in obtaining
that ID, but there was. TV MCI Mail computer apparently
can ’t handle all-digit usernames. Our MCI Mall ID therefore, is, '
26HUNDRED. Write to va there or a tow mailing addrea or-,
our mew telex address, all of which are listed om page one.
(Especially write to us if you can think of any new ptaeslo have
an address!)
1-46
2600
page®
'■■"V
ZOl
2 02
203
204
203
306
207
208
208
212
213
214
215
216
217
218
219
301
302
303
304
305
306
307
306
309
312
313
314
313
m
3ie
319
401
402
403
404
405
406
407
406
409
412
413
414
415
416
417
418
4 IS
501
502
503
304
505
506
507
181
512
513
514
515
516
517
516
201- 676-7070
202- 364-96Z0
203
204-
205-
206-
617'
303-
415-
516"
213-
214-
412-
614-
217-
402-
317-
301-
412-
303
304-
912-
306-
303-
402
217-
312- 768
313- 223
314- 726
510-471
519-
504-245
402-345
617-787
402- 345
403- 425
812-784
405-236
303-283
-763-
-849-
-988-
382-
7B7 j
■293-
■546-
471"
>301’
■696-
■633-
■464-
-525-
■ 345 -
■265-
■534-
■ 633 -
-283-
- 344 -
7B4-
-347^
■2S3“
'345-
■525"
-6615
■0900
■7000
-9000
■5300
■2333
-0116
B1U
■3255
■8711
-5600
-7000
■0600
-4634
-1168
■5600
2333
9041
0440
2878
2333
-0600
'7000
■9600
8680
7142
-9111
l=3i§3
-5330
-0600
-5300
-0600
-2632
-0440
-6121
-2333
415-543-6374
713-820-41 1Z
412-633-5600
617-787-5300
608-252-6932
415
416
314
514
614
405
502
503
>4
i3
546-
922-
726-
297-
464-
236-
583-
■241-
0107
6686
7142
5151
2345
6121
2861
3440
0
3
506-648-3041
402-345-0600
206-382-8000
512-826-2501
014-464-2345
514-267-5151
402-345-0600
518-471-0111
313-232-6690
516-471^9111
518
601
602
603
604
605
BOB
607
609
609
612
613
614
615
616
617
616
619
701
702
703
704
705
706
707
708
709
712
713
714
m
717
71B
719
601
602
803
604
905
906
807
808
809
612
813
914
615
BIG
Bi7
BIG
619
901
902
m
803
806
607
908
609
912
913
914
915
916
817
816
819
416-922-6686
G01 -961 -0877
303-293-2333
617-767-3300
♦CLOSED 3/62
102-345-0600
502-503-2861
516- 471-81 1 1
414- 252-6032
201 -G7G-7070
402-345-0600
416-922-6686
614- 4B4-2345
615- 373-3781
319 = 989=8188
402-345-0600
415- 546-0110
804-747-1411
012-704-9111
416- 922-6686
415-546-0107
402-345-0600
713-820-4112
213- 501-3255
mm-m
412-G33-5600
518-471-6111
303- 293-2333
517- 7B7-5300
912-704-0440
304- 344-6040
415- 546-0118
512-828-2501
416- 822-6688
212-334-4336
212- 334-4338
317-265-4B34
813-226-7871
412-633*5600
217-525-7000
816-275-2762
214- 698-9711
213- 501-3255
514-207-5151
6 1 5-373-5791
902-421-4110
tt«*«N/A#****
912-704-0440
#»**N/A*****
313-223-8680
#***N/A*****
812-764-0440
§ 16-275-2702
18-471-6111
512-628-2501
415-546-0118
403-236-6121
912-784-0440
Mtojutm
Wtkmtw
Jtttofiff
YOUR
( Bermuda On 1 v 1
1-47
5
200
210
2Z0
230
!7(
201 „
211 „
221 ..
231 „
241
251 ..
261 ..
271
201 „
_ 202
_ 212
_ 222
_ 2*2
_ 252
. 262
:»
203
213
223
233
243
253
263
::: III ~
2M 245 ZC9 _. 207 209 709
Z14 ... Z15 ... 2lG _ 217 ._ 218 ... 219
224 223 ZZ9 227 — 228 — 229
234 ... 233 „ 239 ... 237 ... 238 239
244 245 248 247 248 _ 249
254 233 239 237 _ 258 ... 259
294 293 299 297 _ 298 299
82::: SI — IS n: S7 — IS =
zao
300
310
320
330
340
350
m
370
300
390
400
410
420
430
+40
450
460
470
400
4S0
500
Sit
530
530
540
550
560
570
291
202
293
294
ZB
296
297
298
209
i . _
301
302
303
30+
305
306
307
300
M M M
309
j.
311
32 :
^,— Ui
312
322
— ^
313
223
—
314
324
—
315
325
—
m
—
$
—
310
320
—
E
MW*-
331
352
333
■ — ■■
23+
335
336
337
338
MMM
338
jmwmWm mm
341
2+2
m
344
3+5
340
WH
347
J >M
340
MMW
349
35:
352
353
354
355
336
. _
35 7
350
339
361
3GZ
263
364
,
305
.MM
366
MM
367
^ M t
368
—
389
mwm
371
372
373
374
375
376
■ ; ■
377
370
379
MMM
361
362
363
204
385
m
MBiM
397
MMM
388
—
309
MMM
291
401
—
392
4C2
—
393
403
—
$
■ - —
395
405
—
396
406
—
$
— -
300
(00
—
39}
400
419
“
4i:
412
413
4H
415
_ _LM
416
+17
410
MM
421
422
423
424
423
™T 1 ■ #
426
427
m M M
420
-m
428
MMM
431
432
433
434
433
436
MMM
437
♦38
43E
MMM
4+1
4+2
447
444
445
446
JUB-M
447
440
MMW
449
MMM
451
452
453
45+
4B
=__M
456
MMMi
457
430
459
MMM
+61
462
463
+64
495
406
jt.jm.wm.
467
■HMM
460
463
MMM
471
472
473
474
475
476
470
478
MMM
481
462
403
434
405
406
467
MMM
406
■TMM
409
a-MM
£ 91
492
(S3
mJmMmJU.
434
495
496
W IT-
497
—
406
499
MIT —
501
m
503
mLmJU aJH
504
505
506
MM rw
307
LB.
500
—
509
MMM
511
512
513
514
315
_
516
517
519
M MB|
518
MM.M
521
522
523
524
525
■
52)6
MMM
527
320
329
-LM.
53i
532
533
534
535
336
537
530
539
MMW
541
542
543
544
545
546
MMM
547
VMM
340
349
alJiftl
551
561
571
500
301
500 _
59 1
601
fill
BJM^ MW.
621
630
621
6+0
641
650
651
660
g 70 —
661
SB
5 BO
690 __
G91
691
552
552
572
502
592
G02
s;2
sz:
632
642
052
553
503
573
503
593
603
613
£23
m
643
653
m
574
594
594
S£tt
61*
624
634
644
654
” I" ^ ”1 567 HI
575 .
505 .
595 .
£05 _
£15 -
625 .
655 _
645 .
£55 _
„ 576
5S6
.. 536
.. BOS
£16
KG
636
„ 646
.. 656
557
567
577
507
587
507
617
627
637
647
657
578
556
590
600
518
626
638
640
659
___ 579
... 500
599
— 609
_ 619
___ 629
___ 630
649
™ E59
700
710
720
730
740
750
760
770
700
790
800
810
8Z0
830
050
600
070
SBC
090
900
910
930
930
940
950
ETCH
990
731
741
751
761
771
761
761
901
m
021
031
941
051
be:
071
061
981
801
Til
621
£31
0*;
051
961
971
-QA*
981
■ MM
■Ji
DEM.
__ j—
DBiJ
U1
DD1
ut
ev«r
1$
— — LM
III
—
tnr t
\r
- —
uw
—
UMU
IM
_j
662
593
694
695
1
696
697
599
699
702
■LL M M
703
_
70+
705
706
MM.
707
MMM
709
709
712
713
714
715
■
716
717
719
719
MMM
^
722
ja _l m
722
72+
•JIMM
725
726
MM.
727
MMM
720
.MM
728
MMM
732
733
.
734
735
736
737
73S
TBM-.
738
__ |Jl
74Z
743
744
745
746
.
747
M"I" —
740
748
^
752
753
75+
755
756
757
750
756
702
703
764
705
766
767
760
7©
772
773
774
775
.
77S
....
777
770
773
MMM
702
763
704
795
766
707
798
799
7K
793
764
795
796
707
798
709
902
603
904
605
806
u
007
■
009
MMM
809
M.M
012
£-3
8:4
815
816
017
018
819
A I 1 ■■
022
023
m
025
£6
927
028
MMM
829
022
033
934
035
936
B37
639
639
942
_l aa.
0+3
&U
045
846
847
048
849
■ ■ TT
052
053
954
655
056
957
_4__
950
053
982
063
664
065
886
867
068
809
■ MM
072
373
974
975
' ■
976
977
S3
M-ii-to-
079
082
003
384
605
886
987
ess
809
982
093
88+
0S5
896
B87
see
899
31
902
903
904
903
906
807
90S
809
913
314
915
916
— 1-J-W
917
sie
619
922
923
MMM
624
925
MMM
926
MMM
827
MMM
920
929
A M J_
ja u.
632
933
934
J _ _
93?
936
937
930
939
942
MMM
c ui
u r
M. M
944
945
946
847
.
gift
urC
949
--
352
962
—
953
963
954
964
— r +r -r
fi
—
i
:
^7
—
950
960
—
959
SS9
—
.. _
972
973
974
975
876
877
970
979
382
983
904
m
806
887
988
90S
LM .
992
MM.
993
MMM
994
. . M
995
MMM
yOD
.MM
987
- ■
098
Sfifl
The HmktrsGukkio Ansa Cotk
C — CmriMT Office
E - Etedronfc or Dfcit*l Office
S — Step Office
A - AT* I
G — GTE
1 — ITT
N — Northern Telecom
■
Ehrtt Completed
1-48