💾 Archived View for clemat.is › saccophore › library › ezines › 2600 › 2600_3-6_djvu.txt captured on 2021-12-03 at 14:04:38.
-=-=-=-=-=-=-
$2 JUNE, 1986 VOLUME THREE, DUMBER SIX Computer Crime Review The National CeuteT U>r CoiupuUi Crime DaLa. purveyors of fWt'ipiLl^r CiilYLC: W\vtn:r'i , IlTiVT: ;i V iimh-leJ U. Statistical report e n t i 1 1 ed Cot i ; p ui < • r Cr it tie, C 'ornpu t cr Sea i r i ly, a t \d Co mpuier Ethics. This ncpwt, (]jc 1ir$c stuctl one, reviews measura ble trends in Computer crime and tom putci use. It docs this using graph ic regn CSCrUin ion^ 10 pmscui i.ts iflfoitriulibfl accompanied by brief introductions. The National Center for Computer Crime Data's (NCCCD) report is an v.soclkrit guide tor those who are selling computer policy around the country in industry, in government, and through user groups. It provides some empirical basis for the 'War Clamc-Lsh’ attitude that is usually eaten by the computer i Lid* [Vile facets of computer pow‘er — suimety industry and government. In a form that can easily be dialed by the illiLerales, I he repeal includes seemingly irrelevant data (to cnmpirtci users) that, in fact, provide* background that the illiterates (toed. This is especially true for I In: graphs of world wide semiconductor CO ilium pi ion, COrrlpuler sales, projected jijhoi populal ion growl h. and an undocumented map of federal communication networks . ' I hese all add to the message that sve all know: "Computers am important, Ck*OSl tHril'd beiiHlii bini f*-.r ►■n\"S>Triim ( , .T.rO r„*. One of the NCCCD Report '* not iceable coticl usions is- tlia I Ihe amount of computet eriuie has increased, that few are punished for it. that we are becoming more aud more dependent upon computers, a od that there is little awareness of security, relevant laws, and security procedures. This information, taken t w o-d i me n s i cua Lly , says that we ► should make many strong computer-oriented laws 10 protect our national itilcresi a War Games response. Taken another way, tlie TepOrl loll* US that computers are becoming a more significant part of society and are being taken for granted as is television, and os such, we should act Cautiously when passing computer law*. M computers a re becoming so in i i i nsie in American and international life, we must think twice before legislating them , Stealing is had. but KBS's and commercial database*, have entered the realm of our F'i rst A intendment rights to free speeeh. and this is the most precious th iilg wo have, Perhaps our attention m the subjecl of COmpUtd crime should be di awn more toward i ndustry. What are they doing with the information that they sdOie? Why i* then darn so easy 10 steal? Should rltey be more responsible to those who are dragged along with Ihe burden thal they cariy? If rliey want your ertd it history, bank statements, arrest record s. and other Transactional data* sn badly, why (Sony they take rare of it once they have it? Lcmputer Laws nllect both the user and industry, but are sponsored only by industry. By Lobbying for legislation, industry gains its semblance of scenriiy from laws and Jaw enforcement agencies who k n u w nothing about telecommunications and computers. Industry must do its parL to strengthen its integrity against attack from a computer criminal and not depc ad on laws to do tire job. As world powers (who is it who sa id "k now I edge is powe r'?), companies often do not accept their responsibilities. An example that is usually cited is the case of GTE-Telema il on Telenet. W hen Telcma ij was breached hack in I hackers said. Tr was sn easy rhat I could not resist." At that time all new 1 elemai I accounts had a default password ol the letter "A". A full six mouths Ifllcr (even 0s people were being indicted}, the default password was the same. By allowing th is sltuat ion to cordinuc (they were even aware of the I rouble four months before comport Cl's were suievd i I1 October. 1 9 SSl), J elemail 's real intent ions and real commitment to computer security were displayed. It is possible that this really reflects a lack of communication between CITE administrators and G [ L' ptogra mmeri. Telenui i I was concerned enough to involve the I HI, make headlines, but not concerned enough to rectify the situation, On a system as hip a* '! -elemail . it i s almost enmina I to lia VC a one-letter passwoid. If wo think abou l COmpti tens us mere than just tools, as in the rase of JJHS 's, we real ire 1 hat wc have to p roc red witSi caul i on when it comes to computer law*. Anarchy will not restill if we do not move fast , because it ln'i s a Iw^iy* been a crime to steal money a nd government secrets. I he results In the report were d pawn from iitfomwitiOit from [ ,10 prosecutors ' offices in states w ith computer crime laws. A mujor conclusion of the report is that computer Ct ime has boeit "dcmoeiatlAXl", lL Th<: Memos-ratirulion' of computer crime does i:01 mean Ltuil we no longer have to fear computer geniuses, just that we cannot I ini it our focus to 1 hem. Like every cl her type of crime compute! crime will ultimately reflect Ihe culture that surround* plir computers. ” Computer crimina fcs are noi just hackers, but are employers, consultants, and programmers. The most useful part of the report is the summary of all the provisions of the 45 state com putcr crime law-, in an easy tu read rablc . TheNCCCD isa rereareh institute which studies all facets of computer crime. It. was created to help answer legal, recnrily. accounting, moral, and technological 4U1S.-I ion* dial com pu ter. crime poses. 1 1 publishes 1 he CompukrCrima; L^lw Reporter, a collect ion of current computer legislation, and other pu bLieatious. C&n\pi(H T r Crime, Computer Security, Computer Etirics, Jay Bioo 1 1 1 Beck cr . FdiSt) f . A va iia h iV/b.im ihr iV(V (iom/lQrnt cr for C&tttpuiCrCfimf Dii<afori 28 aiZTtttt :V. C-Qfuirrjga Suite 2 ! id. Los A w:!?!., California 9 m$- Cati( 2 l 3 ) 8 SQ 4 SQ 9 for information. How To Hack A Pick " •• lu ' i town: thing to Pick in $k V and feel Is probably UNIX. ft.;th are hi*, complex operating systems this! are mi-grit tiny dvwn to tite microcomputer world after having hern developed and refined on minicomputers. Penh systems art sophisticated and vtr\' jsowerfnl am! hash rend to produce vehement partisans. One of tin.- big differences, though, h that UNIX partisans tend to be programmers, especially systems programmers. Pick's- partisans tend to be users and apphetit ions programmers. Of the two systems, UNIX is the more p m«. i erfu l for se ter it\fic at id eng ini -cr 1 , 7 , 1 ; app he a it mis. Pick , by its structure, fy better adapted for business and managerial app Sita t tom, ti\d Pick is hardly perfect, Strut tured programming purists shudder over the fact that Pick's, cm/y high-level language Is an extensively reworked version of BASIC. The present release is Multiuser but not multitasking., and rather lacking in communications capability. Some of the UNIX-type concepts, -uch as pftes and jitters, which are becoming widely available on other operating systems r are not fully developed in pick. Software hackers generally dislike Pick because it it difficult to get inside the system and play with a (BYTE magazine October !Q#4) The issue of security on F h iek is not often considered, because 1 hero is a hti ost no kku ril y on Pick, 1 1 is therefor tr. wrt casv lo eraok a Rick system. Once a nser has gained Recess ton system, lieonpenisr irtfc.fllicd.atti. Mast people have not heurd of the Kick operating system, but there ait now 60 ODD sites ?0 tin hi bytes of data, and -1W.OOO usets. What is Pick, mid who cares"? I he Pick operating sysLem contains many more functions 'h.a,n [post. It has an English like no up ru eed u ra I query language, II compiled SASIC language, a JCL-Like procedure Language culled PTCQC, and a Cuictmund Einc interpreter called Terminal Control Language jftCL). Pick runs on microcomputer* (IBM PU-XT) and mainframes (IBM MSn, d3 , x f- clc ) However most Pick implementations 41 re on minicomputers with five to fifty terminals. These Are the mosl vulnerable 10 cracking, because Ifiey often have auLcj-answer telephone modems, Once a Crackei has a logon prompt from a Pick .system, hs can continue tryi rtg to login until he fl nds 4 t valid use t- number and password. The system wilt not hang up after repeated in ili.i ret. Fasswoids- are almost always upper ease lettcs, and often short. 'There is always an account called SYS FR( K 5 on every Pink system Jliis Is also the host account to crack, betause it has operator access to the system, Perusing Data A ttcr crack ine the SY£pR(X ] password, you ca n drop out of the menu to FO ., Tr there is no explicit option u-n Lhc menu, the command 'TCL 1 " usually works. Type SORT ONLY DICT SV STEM J rom 1 CL. and a list of all aece/iiu I $ un the system is displayed , E"o pet a d i redory of the Dies on any account, tvpe ”3 rs I ^facormnO' < . To look through the items in the tiles. vii U mtist first make a pointer untie file in SYSPKOCi. Tvpe “SET- FILE {acCdurU) (file) 1 ". Then type “COPY QH 1 .F *"and when the system says ,l TO;L hit a carriage return. (.'riching (he System AIL that has to he done In crash any Pick system it to type control break until a "’'"prompt is displayed, Type "6.074". Then, is displayed, (hen type H, .FF". All' inputs are teimi nated by carriage returns, Disabling the System AL! Pick systems can, be destroyed and rendered useless hv the comiiumd "UE.FAR-FlLE DECT SYSTEM" I he September and October L'JfW issues of Byte nijigfnrine give a good Overview 0 f J "ick. The Operating system, has a unique d£ila model and file structure. which is a bit comp heated 10 explain in ibis limited space. Some books have also been published On Pick. There arc Pick user societies and publications which would provide phone numbers for gaining access. Tu addition, many Pick vendors have on-line client sysinn photic number lists— masking a vendor's machine is a gold mine. Pick vend urs include Ultimate Corp,. MclJoncl Dougtass SolIwh re Systems, General Automation, Pick Svstems Inc, and Dntamcdia, Richard (Dick) Pick is alive and well in California. There 4 ire also softw 4 iTe houses which specialize in Pick, And Lhey have Pick clients loo. Users include R-Marc International and Harvard University. nothing new in computer underground The Computer Underground. By- hi Harry. Available through Uwmpatiu s Unlimited, 1 14.9$ by .lohn Drake The Computer Underground Appears to be an excuse to publish text hies. The book runs a Lone; 257 pages of computer printout. Et irs <1 Aided up into what M £ Earry has written a tid what he has downloaded off a BBS, ’his is About a one 1o twenty rAtio P s also unfortunate that nearly tveryhexiv who writes about hacking spends so much time dwelling on lhc obvious "this is a , modem, . .there are A hits., .you connect it to a phone Line,.." Fven Out of the Inner Circle hy Bill Land ruth tales Lnlo this I rap. Tlwre is not! L ing in Harry's writings that any self- respecting hsclMr/ phone phreak doesn't already know. ‘ W8S Ituping for real research like extensively tracing the fKfiinuing of phone phreak in* through Captain Crunch, Ahbie Hoffman,; and TAP to the present, with soijk interesting interviews with hackers And phreakers. The only thing lie seems in have Annually done was to poll peopEc through a BUS. His analysis ot the results are also prettv obvious lo anyhodv involved. He tlien proceeds 1.0 plot oul the old flow chart of a search inn, mid hacking program. The rest nl the 257 pages are printouts of text Dies. Harry seems to (iAVe a prcoceupalion with ARE 5 A Not Lind lists of dial poi ts . J here is an abundance of blank space, particularly when a section cuds at the top of a page. A few of the text lilfo are typeset and nicely plated in the Center of I lie page. The rest of The Computer Underground is mere printout, nnj even in don ble-emphasize mode. This is clearly not one of Loompan ics . 1 better releases. ARC 2 New York’s Computer Law T»-. ^ V..-I Tin-.-- Public Phone Secrecy He/ itoI Wnetlv IvVas New York Slate legislator have reached agreement on anew computer crime law. I tie biEI would create the new crimes of unauthorized use of comparers, computer Irespussing. and ttiitlpuLer tampering, El would also make it a evince In use in to r m a: i on stored "by cn ni pul cr wT i I e corr i mi t L i n g other crimes, sneVi as forgery or tliCCI of business records. Although 40 ulliersUtLes have al ready approved similar In w\, legisliit ion in New Y ork is considered a majo r step i n stemming computer crime in this country S iflCtt there a re no such laws in N ew Y cut. prosccuto rs must try to apply related law in eases isivolvi hr com pi Hers, A run jot provision of the biLI . wh ich is expected to pass the sULe Legislature and take effect ncxr November, expands the legal definition of “ writ leu inst re munis" and “business records'" to iuolutlc computer data and programs: Under this change, penalties of up to fom years in prison or fS.QOG in fines would be imposed lor these otlciises. tarrlpd mg with computer data while trying rn commit a felony: making unauthorized duplications of computer material that deprive the owner of a I least 52,500:. tapping into legally confidenl ibil computer data. Tlic Sill would also create several misdemeanor eliargds, punishable by up to one yea i In jail or lines. of up to !> 1 ,(OJ, to address lo^-level computer. abuse. Because many computer crimes occur across stale litres. the h: II includes a provision « I lowing New York State to prosecute an offended In anothei }.lalc who taps into a computer in New York. 56,829 Phone Bill I bv Ihrt.M- ■ L tuViii I The ht-yen r-old retired insurance agent was quite surprised when he received a phone lul I for SfiJ^.fiO TEiq | 3 1 poge hil I was from ( f l“H Spr ini . The man said i,hul "the calls that E made p.tc nn the IJDth page for ^.9 49, " At lastcuunt the total on his account had risen 1.0567,594,02, u. Sprint spokesman said, with 1 .200 calls placed in one 24-hour period. Sprint has a security rtepailre.eu I that rtlOiuloTumonthlybills and stalls i live si iga t i ng wh e n there is a fantastic clumgo in use, The man's previous hi I’.s were abdU t &20 . In this cate, however, security did not cancel his code until three weeks after they noticed the increased usage. Big Computer Crime Pays Mi Jr-flir al Out of I he discoveries of a new stud y shows I hal when it cornea to compute r scams, I he big-t ime crime pays. Two-th irds of the companies pa n Lei pat inrr in the su rvey mi id ttmi they tend to punish tow-leveE employees accused of committing mium computer crimes w3u le letting the major offenders go free . “The cardinal rule seems to he: Thou sEialt not sLeai sum 13," says Joseph OlDonogbuc. a Mercy College sociology professor who conducted the suivcy, Ttie companies, he said, would mther keep major heists quiet than punish suspected offenders foul risk publicity about lax seen i ii.y, O'ETanoghuc warns that this perception could lead to “four or five people pulling a billiem^ollar heist, it's merely a matter of knowing how the terminal wcuks.” New Jersey Bell has imposed a veil n T secrecy on Lhe locations of its public phn ncs, fearing, tha L pu blicizing that i n formal ion would unduly expose them to vandalism, Hanover’s Township Committee was required lo pass, a resolu lion at a recent meeting, agreei ng lo such non-d use Loin re as a condition for installing its 91 i emergency dialing system. Alter die measure was approved, a non-ptussed Mayor Sal lannaeconc risked a reporLer in the audience. "‘Can you bclievu that they won't lei ns toll people where the public phones aieT Capitol Hill Hacker Tl rN't.*! Yrik I jv.> Jeilrt ifer K u iper wns wmk ing la tc ar her computer terrmnn I in tlicotllcc et' ReprtSuiituliw Eid Zschau of California on M a roll 2 when sEic hca rd a beep that told her someone had entered Lhe Computer system from an outside telephone Line. Twenty minutes Inter, hci dOmpulcr screen went blank. When service was restored, copies of more than 200 letters sent to COUSlil vents and information on [nailing addresses had d isappearqd . Foul days luLer, stalf workers for Representative John McCain nf A rbonu i o Id the police ( hey had d ^covered that SOnj&Oii.e outside their office bad reached into McCain’s Computer and destroyed hundreds of letters and mailing add r esses over the lunch hour. Bolh or 1 liese representatives are Eicpublk.'Liui und both are see s ing Senate seats th is Novcrnhc r. These were uppa rcu tly 1 he lirsl computer break-ins on Capitol Hill, where eomputeni are increasingly being used, especially for record-keeping and answering mail. lL Rveiy office on Capitol U ill can he broken into in Lh is way and the iilec deleted. El enn bring the work that a mem her of C lofigrcss does lo <i comp lete halt.” said 7seh;i.u , [We Nid no idc-fi it was this easy to grind the government Lo a holt, folks.' Stcpticn A. Armstrong., vice president of Micro Research, the company that provides COcnpulens and related equip] -Cut lo more tha n 1 50 mein bent o: Congress, inetud i ng they, 1 two, said tlu'U whoever broke into the computers ""wou ld have to have a pnsswn rd and I wo y curi Ly codes to pet in .” Citibank Money Games lv Nr'j Y.vf Tiv« “You added funds... Nnvember E X ,.liMJ,(K>njC>50.fX5" If you have ever dretuned uf opening, y out monlhly bsnkittg statement to find a trunsactieui Like that, you tan probably feel I EiC (Jtcitement Nelson Nash felt wltcn he d id j list that. Y nu ean also loci his hearr breaking when he read down a few li nes more. Or, the very same day. Citibank recorded a withdrawal of S60,«:O,0>0.OO. '"1 i.i sou I ly check my Lmlaaee cvciy day or two ” he ta id .‘"If! hud been m town a nrl soen tbi 1 1 had Sfsth mi llinn , I woulrl lm ^ Utken the money iri unmarked bills and escaped f Hut a Oitifs;inii spokesnsan countered, “Eveil Jind il been on Isis, record for several hou rs, and Emd lie checked hiskalaneeand tu n to his branch , it would not have been given to h im, Il would have EsSn questioned. People don’1 keep $60 million in then' checking accounts.. 11 [Bur keep an eye on your .wvilue.t account btilitnorsll 3-13 LETTERS OF THE MONTH Dear 26m : Cfi i) ('Lr'iy of v l. :■ i.j r gOCd JjilOnC ph iVni k l Fidel'S wtl .0 iim: w'ill in fr tb explore Lhe British telephone system contact me :i1 my address in London? [f you wanted to mate a long distance call in Loudon, you could Fill the operator, and- BS her and die riiipht jusi pul yourtall through for nothing. This method only works if you get through to a happy operator. When phoning the international operator In London, lie or she asks for your number and (he international number, The Operators in uur country are very stupid. You could Hfi tlieet all day long and they would think 1 hat the fall tlvey received is a (me call, not a false call. Dot International operator can he reached hy phoning an '.nward lor 1 endon a nd 0 1 1^5 is the number which cun reach her. Another thing I like doing Li what you folks over there call scanning. [ spent hours scanning phone lines tor interesting (hi ogs a nd 1 only came up with one number; 200020. After I he last digit has finished, depress the hoobswiteh [the Ihing. that yon res; your telephone on). Depress it frn lvdf a second, then bring tL up again. You should hear the central office switching yon through to I h is wei i d number, K rep listcui ng to the phone line and after about 2G seconds you will heur a one second tone burst. 1 don't know what (o do after that. The cellular telephone system is good in our country, bur 1 luiven) had time lo explore it . Tlw niuiiber foif ii is 010836 filial includes- the London dialing code — the Gra-1 0 is nol needed when outside Kngland). Twiligtil ^onc The I'hieaker 12 Bam Way, Wembley Par k h Middlesex HA9 9NW London, England I>car3SCfl: 1 n response i n police L 'kl lug" BBS 's , why nol get one nf I ho.se hooks that list siolen and expired cralii csitfs (they arc issued weekly or bi-weekly). Type the cuutents into a disk and dump ■Id megabytes of burned credit card numbers into these cc<p I raps Id spring Ihem safety. If it comes in trial, tell the liny whcTC you got them and watch the DA blush and the jury laugh . If I he cops had any sense, dud is wliai ihey would dump into anv svstem collecting credit card numbers. JN Illinois Dear JY; Good idea, hut haw many of its tire witting to go through wit }. l ; fa* a *.\p euti * and fr> J i 1 rarra s sr> j en i at ‘h a ine h a uied in to a court of law first tomaketi DA blush! A ad what happens if the jury Hitt no sense of humor? Since w-c Va n at especially fond of credit card frstud,. we have no objection to people posting whatever numbers came into their heads or even > andom eemputer- generi, tied num bari, Thai way, the 'criminals are confused, the author it it -s a re c on fuse d. an d dew oc nyc.i ■ is soft for a hide vl ft lie longer. Dear 2ASB\ In the Deccutbcr I9S* issue of 2£00.. you mention in the article on the "Scariest Number in the World" that the phrenk rceogflisiod thal Ihc mmihcr was non-suped, using a technique that ‘‘experienced phreaks know? I’d like (O (JCua-ider myself (ilk experienced phneak, How do 1 tell? Don't say. “JusL try calling ii from 41 pay phone" because aU long distance uon-snped numbers won’t go (Ji rough withuut paying (the damned TSPS payphone console won’t respond to rcusOu) Local non-sasped numbers work though (for the payphone repair). Another method is hy calling and if it doesn't appear on youi neat bill it ain't suped. !"his hus several draw bite ki, cause if i( is, well then, TY/e gnt a one minute call to Australia oil my bill. Alsu, waiting a niunth to find out ain't tlsat expedient. Lord Peter Wirasey Deyr LPW; These days, this point is open rtf debate. Many phone phreaks can hear al! k i/tds of Hide sounds that teif them things die average person doesn > ewn think about. One phreak. h-,? kntnv am ted whene^r n phene tod fa routed through Finridu fust hy the sounds he hears? Some phreaks aiso eiabn they t ii?r fall if (t adl is supervised fi.e., oylwrer} an the hiding computer) by the sounds ihsh are made when the i a fled party picks up- Generally, if no click 1$ heard when they pick tip or 'L-frert a recording comes an. the fail fa thought tv be "non* suped " or free Hut exceptions abound. For one thing, many new elect rente switches {Fieri f tern Telecom's DMS-IW, for one) hatch, make any natxe \cher< they arc picked tips, ff you were to tall someone v.ho had one of those, you might mistakenly ihink the call wasn't supervised, llten there are alternate long distance companies that have been known to charge people far calls that were never completed. Flame companies aren't able (or willing) to recognise that a busy signal nr a ring fa different from the merry chimes of human speech. Ami not only are tiart-su/md numiwrs not always free, but free numbers area V always non- Suped! Take g>X> numbers they do .rkr.iv-' up on a billing compel! er somewhere in man ) ■ eases- You're simply not lulled for them. An operator is usually able to tell you if the tall you are p iat tng is b illab ie I tut she Op era t or has t ,;> pia cc the call t> i find this out 1 7?iif can he a t hailenge. to say the very least. Dear 2(/tM: Wbtii ha ppciicd to the 2600 phone bon'«: ,f IIhjw well is your rmiiliiig lisi protected agjinst ^i^ttic by au thtir [tics? I>r. William Wainwright Dear WW: There is a small phone guide- (the 26(5(1 Fhun Book) in existence that is available on manv F IfS's, 77k r ft fame Sector ifil l.it-tef-fl I) included You run also get a copy through our reader bid fat hi board, which is up Friday and Saturday nights, from midnight to noon. Eastern time at our office number ic!f>75!26t..S.i\. Many of these numbers- have already been printed , r n met issues, hut if you want a full printout of thedfsilor so Interfiling nurnfam-i, sera! us h2.fh. Ry the way, wc always need more numbers-, so please send us wind vou vc got, Our mailing list is only sear; by Twenty Six Hundred. It will not be sold, lent to , itvrr. or turned over to anyone. That fa our policy. We dan V heiicrr-e the authorities pose any thn-at in that depursmerit, especially S b tie so many different kinds, of fsc-opic read this magazine. DcarJZlJW: 1 would like to take tins time to thank you for your commend a hit work . Il\ istople 1 ike you that make me proud to say I’m an American. 3 wanted to get ihis niesv/ige to you as soon as possible. I represent only a small part of the kiTge world nf computer antics, which consists of plireakCfS, hackcrSL and pirate rs. Upon the receipt ni this message, please discard (a small atom bomb will do iltc ti iek) and forget ever receiving it. Thank you. John Smith murker Dear JSJL Don 7 worry. jV has been destroyed (continued on page- F-i If) 1V44 The 2600 Information Bureau. 300-342-1 143 000-342-1 119 8QQ-368-1017 eoo-36a-lt>ia 800-62 1 -4562 SOO-52 7-2007 000-527-2351 300-343-2903 000—527—201 1 BOO-368— 1 040 BOO-221-2000 900-271-2014 300-424-5900 BOO— 424— 6200 800-343-6400 000-22 i-7733 900-221 -72 *0 BOO OPERATOR LOUD TONE TEST # TEST ft 77777 300 BAUD CARRIER CALL AMERICA LDS CREDIT AUTHORIZATION ATT I NFC SYSTEMS THA RESERVATIONS EX TENDER PBX □DD SERVICE PBX WITH RECORDING CARRIER BANK OF NY 0OO -323-2005 300— 323-“3 1 07 800— 323— J 146 800-323-4279 B00-323-4297 000-323—1 1 51 B00-323-43I3 000-323-4376 800-323-4377 BOO-323-4462 BOO— 323— 0021 BOO— 323— 0039 000-523-4298 800-323-4354 BOO-526-2O0O 000-342-1 105 000-342-1100 CARRIER CARRIER CARRIER-LIKE SOUNDS ASKS FOR 7 DIGIT ACCESS CODE LO DIVERTER PBX CARRIER CARRIER CARRIER TRY THIS' PBX SPECIAL OPERATORS special OPERATORS "YOU'VE GOT EQUIPMENT PROBLEMS?" TONE TONE 000-331-1323 SPECIAL AT&T SERVICES DIRECT CONNECTION TG FRENCH OPERATORS ! ! IWE THANK THE SUPPLIED US WITH THIS NUMBER AFTER WE REQUESTED MANY READERS WHO IT LAST MONTH.! SOO— 222-0300 AT&T TOLL-FREE WAKE-UP SERVICE* YOU ARE LULLED TO SLEEP BY THE PEACEFUL SOUNDS OF GEORGE WINSTON AT PIANU AND AWAKENED BY YOUR PLEASANT AT&T REPRESENTATIVE IN THE MORNING. (CALL LATE AT NIGHT AND IGNORE INITIAL VOICE MESSAGES. > BOO-555-8 111 AT&T ALTERNATE TOLL-FREE WAKE-UP SERVICE, FDR THOSE WHO PREFER TO LISTEN TO CHEERY MUZAC WHEN THEY FALL ASLEEP. AN AT&T REPRESENTATIVE WILL AWAKEN YOU IN THE MORNING* (CALL LATE AT NIGHT AND IGNORE INTIAL VOICE MESSAGES. J 2600 (ISSN 0749-3851) Editor and Publisher Twenty Six Hundred Associate Editors Eric Cor I ay Dftirtd Ftudenmnn Executive Director Helen Victory CnrtO&nist Don Holder BBS Operator Tom Blidh Junk Mail Receiver Richard Petrovich Writers: Paul Ealev, Mr French. Emmanuel Gold ace in, Chaster Holmes. The Kid & Company, Lex Luthier, Lefd Phreaker, Mine Salerno, The Shadow, Siltni Switchman, and the usual anonymous bunch. 2-5&J 5 publisiied by 2600 Enterprises. Inc.. ;in nlcjnrnraivnarv orftgnizaiiorv ANNUAL SUU&RRIPTIQN RAILS: 5-1 2, iftdrvklufll, 930, corjwrmn; -6 JCJ. LIFETIME SUBSCRIPTION 9-260. SPONSORSHIP: 52600 JACK ISSUES: S2 «ech. indlvISJOV ^enrh, wrpqrate; Fj~ - « auv v i l heV- MAKE CHECKS PAWI F TO- ?GCO Enrtrsprisns, Inc. V.HITE TO ZtfOS P 0- Hi-i* TtT2 . Middle fctand. IVY 1 1 SEJ-0752. rtU-PHOKF- iy,TV|7£1 2600. PEWATE SECTOR BPS' 1201)36(5-4431 . ADVERTISING DEPAITTMENT: P.O. Bo* 7fj? . Mirtclln bland, NY U 9630762. Cdll R>r reias ARTICLE 9UFiM.tS$I 0N Ah 0 LLTTETtS: P.O. Bex 00. IWiddln Island. NV [1:1953 -0093. VJe readily aCMp’ BftlClSS. laitnrs, clipping:!, artwork, anil data c ur publ CSMion POSTMASTER This is pnytrlrr mail. jViVWv knew why aid Mr. FerfOtson suddenly got a 373 , 060 phone bill. 3-45 RESOURCES G L I □ h IFroi E-D*pu4*r Cmu, Coiputfr Security, CaipuSsr Ethi-sF S£f 0 Ssr ed wjttl CtmiuHerSetuNty, Computer Elhigs, and Ccrtilicatlcn or Computer Ajfwjjean Har AssocUtiun 7«k Force inn Computer Crinw, taoa M. St, STY, VVafthino'un DC vr V SsreiaS' * WHn,mts ' 12U Avenue of :hc ^ NY AmcL-Jcao Soeisty for [nduiLria: SmiritV 1 , National Computer Security Commitl*- i«sv c> m nr r Suile 1200, Arlington, VA 22259 (703.) 523-5000. * -, Lbai N . Ft. Myer A^ociAUan Sat Cm ria* Mafihiiiwy, Special Interest Group on Security Audit ami Cmtrgl Snectel [ntepcst Group on Computers and Society, 11 W. 42 Si , Ky in®* (2H', ftrfl ?W " ' ” P fcLI Cng]d C, - Jltc - S50 Colt Jtond. Rollins Meadow*, IL 60Mft yoKton Compute? society, Social Impact Group, 1 Center P Liza, Boston, MA 02106 [6i?\ SC7-3OS0 r f orSoaa! Responsibility, P.O. Pom 717, Palo Alto, CA 94301 ( 4151 . 132 - 377 S Computer Security Institute, 43- Boston EYist Road, MorthJtwKJugh, MA 01532 iiYtyj S 45 . 31 K 0 rAn Ala " a B™“t Association, P.O. Heim 1*711, Standard. CT0S905 |2lTA 9*70500 EDP Auditors Associabon, 373 Schmate Read, Carol Stnssm, IL 6 Dl ($7 (312) *K 2 -] 2 (JP ]'RE SodaJ Jjnpsct Group, o'o F.A Futfan. 117 Washington R.d., IX t 5 burgh, Pa 15 22 1. acujite Awodafton, P.O. to-: 7192b, Los Angeles, CA 50071 ( 2 1 : 5 ) 4SfrSal6. (3]™-^^' " ^ Cg,mptltcr ^“fcwionals, 35 E. Wacker Or, Chicago, EL *1*01 APditDfi '’ " ,59 Mai1talvd Av *' Bmr £lt& - Altamonte Springs, FL S27Dt !SS) t SS!™£ er tsrCl 3 m i ,l,1crCficYlL - 2 ™' N- Cahuenga Blvd , Los Angeles. CA Publ icaltpps Conccmeif with CnmpnlerEtliJes, Computer SMiirih, Computer Crifite: 2U^ l A57 erCDnllB] ^ U:iTtCTLy ' 26 WajfhLT »Etan Ave., .East Malvern, Victoria 3145 Australia (p.?J Computer Fraud and Sawrity Bulletin. Hscvicr International Bulletin*, 52 Vanderbilt Ave NY lijmj Computer C rntic Digest, 70432 Wtmsatt Road . Springfield, VA 2215L-4P7J (?Z"i\ 94l„fiflQ0 Compute* and Security, Elsevier Intematronp! Bulletin*. 52 Vanderbilt a VC NY 11017 Compute* and Society c:o ftirh^rd Rosenberg, Department Mathematics, Statistics and Cornet mg Science, DaUwmste University, 1 Ialitex N .S., Canada B3K 3J5 Wwtsm*'''**' C,:,nip,J ^ r ^ ,rUTil} ' L ‘ ,ititutr ' 45 Pwt R*»d, XvTtheorcay].., MA 01532 Computer Security Alert, 500 N. E. Spanish River REvd., # ft, Bnra Eaton, 1X33431 (3053 0P:-54lT Computer Security Digest, 711 W Ann Aibot Trail, Suite 4, Plymouth, ML 4ai7?:{313j 454^757 S;™ j n Computing *700 N. CaRuenga BLvd., #2113, L 01 AngeLes, CA Wyfi (213i SSJ CWl Da, a JYixessing Auditing Report, Bus ftS, Mtddlevdle, Ml OTBi 1 ^ (2l)i ) 33'-3<i J| >i ™4n-S?|° ma1 “ n TrjininS Ccntei EnCl U2S0 Ec S pr IJa «» Dr -. Suite 17, ftestFn. VA 22EIVO En formation Security Monitor, Durran ( Houap, ft Herbal Kill, London FCER STB England rail 27 ft-im t^KHut Edmtificatiori News, O. Bon : lfllfi. Washington, DC 2030B " J ^ S { ) V ['nvaey Journal, P.O. Boh fift-bl, Washington, DC 20Oftl f2d2'i S47^S6 f: Processed W(! Jld, So Suitor St., ^ft29. San Francisco, CA 94104 . React, ci'O Mike MrGnlJough, 90 £. 7lh St.. biYlDOW. Seftirity' Audit and Control Review, r.'o ACM, 11 W. 42 M , NY lOIRS. 260ii Bux 752. Middle Ldarid, N”Y 11953, SdL’rpfts Qj liilontialfon aloul CtunpuEer Elhicu Courses; r?| Ahj ^ & e 3ap r: tmd n en ^ F Schooli - ot Hank. New jemev, A dir, mistral ton Building, f a Branoh. Ave., Pad Bonk, NF 07701 (HI!) • S42-4954. " r -! ,! r f 1 : ' = 'T J r E lJJ 1 1 i>: -! ' F nJv f rSi tM Dcpartmwrt "t Philosophy EJir.ftojo, PA li:444 iii-t;. 732-24M ■x i: ' >12-^23.' EqUdLt ^ 0JCCL Ljwtl ‘ rw HaD ^ -■ dcri,: ^' ’JntveriLty of California, Berkeley, 0\ S4720 Montgomery County Pub lie Schools, E?m;kvilk, MD Jnhn Snapper, Illinois Institute of Technology, Chicago, EL 6IJ6tft $12) 567-.KL7, Corsullante and Researoliers Prouidrrtg Infcrm alien lor this Report- Kevin FLDgerald, 2b Washington Ave., Eait Malvern, Victoria 3145 Australis (03) Si-3737, Joan Mai-LiLUL'i,, Bonrdscan, 1W05 W, McNLdiuls, Delioit, Ml 4f32i9 (3l3l 534-1 aiy... Dflnn PiiJfw SKI rntemationa., 353 Ravenswond Ave ,. Menk. 3’irk, CA 94025 |41S'- h59-237ft n u '/ u A J T r ' r Oology Ari^ma Sta to Univcrsttv fSffii 9b.5.fi3L] Dr U-r-ch Sieher; innsmucrior Slrasse, 22 "SCO Freiburg [.Brag., West Germane 07*] 44 14 at S^en^^'^Sft 3 ' 311 lNflrt0nni CoKrteil hj J ’ !rev,!5,t ’on r AiLasmirren l'S-lE3 21, Bnx-koc’m, ^gl?n n d«V|i™ PPliBd Sy5t ^' Ud " B'MWiiais St.. Manchester M5 2 EC Chari ? 5 H- H.1II0M,, Boards ! -j •; s » f-T^T 77 77- ” T — 1 ^ .1-46 r HD A " Fl 1 u m a Wm "I Tui Fat' 1 Rnlk'lm l!inr..1s 11 Lj r i'v : Puhn Mi ft;'ir!sl. B i> J rd S C i rv Packer ^ur-i^d Fid turned tcn^ultajit....) H SVSTEClflTJCflUV SPEAKING Hands Across Telenet 'l > * + %,rp > YmiI I rm In order to accomplish Hands Across America lout month. fjriL a nationwide network of technology Erad to he f aimed to coordinate the event. viO fifiim »e aren't a. viable entily,’'®mpla.iired AIL.’. Patsoiiv. president and eh ,cf neem h* $1 ^bufowestem'k publ kh : ng ami ^Iv.eh still intends to public its "Clone Book" I his fall. H, lr\ sum awfully convenient for this to happen slow." tic noted Ti> i heir attempt to comhat hunger. Hands Across Amcridi Organized millions of people to donate money, buy T -shirts und hold hnn.dk '■Three or four years ago this event could not have been done,' 1 said l-red S, Drov, the national project director of Skmds Across America, "‘Computers, TV. telephones, teleconferencing dir technology has to eomc together. ” Nie fogisiics of keeping tmek of millions of people and the millions of dollars they have pledged wor ld have been overwhelming without computer power and communications networks, which permit the gathering, .storage, and transmission of inform.;! I ion. I he process recpii itxl stogperin a amounis oi' dale mimes and addresses, route' assign men I s. directions, amounts of donations and credit card numbers, to name bm a few. In addition organisers had to k^-j track of detniSssueh os Local pemii^WEUcrsuppti&s, and the ava i.labiJitv of medical facilities, As a result of the Hands project, they have developed a database system that hits the potential ta coni rot future nationwide fund-raising campaigns with pinpoint accuracy. GTE Telenet CanuniiiiicatiruiA donated its 237,000 mile-, of computer network and overseas satellite hookups to the Hands project. Over this network, a wide variety of computers- can v:nd information back and forth as high speed, 1 he Sou roe, an i ntornvi tion system . joined with GTE Lo offer i!s fiO.iXNJ me m be ns free compufor access to information about foe Hands project. Kiev Calling Clogged V.’j >s'i I nJi.,1 In the Wilke oi' the recent nuclear plant accident in Chernobyl, the volume of telephone talk heing made to ilic Soviet Union lias tripled, a spokesman for AT&T Internal ionnl said. All calls from the United Slates to the Soviet Union ;iT e rented through the AT&T International Operation Center in Pittsburgh . A II these tails have ro go t brciugh operators i n the Soviet Union. A fot of times well htwe a let of attempts, bin not CumplctimisAifod Rick Ri avail of AT&T-I, A I & I no longer has. direct-dial service to the Soviet Union. Rccaiii* of the unusual volume, cutlers must wait several hours On reservations for calls to Moscow and Kiev. A i &1 cannot employ any more personnel to pm I he cal Is through, because "iherc it no puint in having SO American operator trying to gd calk through to only two Soviet operators,’" Rrayal] said. Nynex Bumps Southwestern Bell ■£ riAnd Shj S “‘A clerical error,” caused l he omission of Southwestern Hell’s New York olficc numbs: from the hi lest edition of i.he Nynes Manhattan Yellow Rages. Southwestern Hell of St. Louis planned Lu pu bl ish ili own Vfonhullan Yellow Pages directory lhat would compete directly with Nynex. In total, i hree listings for Southwestern Retl were; "aacrdemaUy’" dropped; its Yellow Pages; Ad-Vent; a graphics ope i nt ion; and the Silver Pages . a national <1 jrectorv for the elderly. I f adveii isera can't find us in ! he |'N yneji'l Yellow Pages, 1 hey Slock Market Crash likAV-aill Options trading i>n the London Stock Exchange ceased fora d n y recently following foe crash of a new elect rmi ic tradi ng system. Thy crush has caM a pall over the Stock Exchanged Automated Quotes system . wh ich will be used for sha re trading itl .er the fXtober deregulation til finaiseial services m London 1 -:e foiled system consists of five TRM PC ATs linked Luge the r by ei network, with an addilional AT as network controller, “Ed Quinn Cell Site” I'V, T'Oi.y Pell Atlantic Corporation's, cellular telephone division has hi'en re wo rd mg top employees by nami ng a cel I site afo? r there. A p iK|ue bca i in t, t he employee S name adonis i he site, which is usually I itl I* more than un antenna lower next In a ^iragc- sived building housing n cel lulu i phone relay. Two employees ei month will be recognized , which means thill R-e J A i la nt ic has two years wort h of honors to dole out and more sites Eire being built every dov So far (here's Susan Sclufoii Iter cell s He, K athy Schaefer cell site, a nd Ed Quinn o ell She. dinners get to choose their own dte, Let's Move To France! UrSW-Yrri. I r,\-. Tn Eiurrita.. France, people dial " ri 0r-^S-62’ 1 to reach the world’s only “televideocltib." that offers each .subscriber a choice of more (ban 2.000 video cassettes So look nt on their videcvpjtone, a combination television and telephone. This sammei, un estimated J.Sk) Biarritz houses will be equipped wilh foe tabletop machine that incorporates a television screen and a movable video camera. Thev will he hooked to ail underground web of optica! fibers trial can carry [fi times I he amount of informat inn as is normal coaxial cable" This project weis started foree years Ago by President Mitterrand istid provides for the wiring of all major french towns and cities by 1 be end of the «uLu rv wh ik a t the same ( ifoe estahlisJimu E' ranee e’is the world IcEiderin this technology. By the end oi 1 98,81 3 . 1 million homes are ex pe tied to be connected to Optical liber • systems. In RiHTritE, videophone owners cun see each other as tlio.- dim. and can walk around wdh a hand-held camera 1 ram-milling pictures fo a friend. They can dial into'! blevidcoclub, rcquesi ei film and weilo!i it on (heir home screen. Or t1i*y can choose among! 12'ieEevisipii channels: mid can switch to larper screens elsewhere in their homes; or select one of six slerco rEidio stalions Or the;' con plug into viv.iul data brinks Einrl sifi huge amounts of information, from train ssSiedtiks in ihe ktesl smek market priees. A: Ihe locnl hospital, <lfv.-c.rs can call L] p paticijlV rne d Lea I records and N-ruys on a videophone dtiring eonsu lla i ions and sick children can follow clamw in the local s< hool from Eiome. li arntz also has several pay videophones in kiosks on the stioct . At present, a single videophone costs .£ 3,000 L1 nd sscxpecled <0 fall to SfiOO for a town of 3iXJ.bOO houses. Watca iug an hour-and ,1 ei IJ-fong li hn un video cassette now costs about S5. M7 Call The Private Sector BBS! The official bulletin board of 2600 is available for you to calif NOW RUNNING ORIGINAL SOFTWARE ON A 20-MEG PC WITH THESE SUB BOARDS: Telecom Digest Medio/News Networking Info Retrieval BD5 Advertising ® Computer Law • Telecom • Compurer Security • User Suggestion* • Radio Common, Connect with the famous Private Sector BBS and participate in interesting and intelligent talk on telecommunications and computers. 201 - 366-4431 ( 300 / 1200 ] SHOCKING BOOKS!!! COJJSUMrftTROlVLCS CO- — - The National Clear inp,- ticmve 3ee Survival automation — - S(?t SHOCK]MC SUR- VIVAL PUBLICATIONS — Electronics, Computer!, Energy, Weapons, Security, MeriicnL, FionncLY ■ irpiun irvpj! ( I ir'L tONb UOLOR LSOKtS 'If'Jaji:- ™ : ? Da it* Btwei) i? i O ( I , LLLJ’: IONL RECORDER INTERFACE (Tap 0. Si-rink P.Lmii) I.&] ( I COtMt'DTLK PblftfiAKlNG If (Comptrtrr Crmes tr. Abusrj) <SL>1 ( I AliiCHUTi: COMFUTEK SECURITY (Unbreakable CLtOerti Mar vf Sea-ii-liy r-tchnlgoei; J] ,660 ComeSl) C2(J) i ) + IRU-PC/CMnpjcililo niiY wi.Cn Programs, CIphcrtcKt (Sb!I) ( | CfiYTT ANALYSE TECHNCQUW tCrypTjnalyiW Frommi) ($JSr 4 ) h IBkH-PGj'Cv-npPttfele Di-^i WiL’Ii Fine- Program! ($JC) ( i AUVUMATIC i Ell ek maCHlnes (ATM y»w k . ,01 n i k :i ) (Ji =■] ( !• CKiiiMT CAR 10 SCAMS I Many Credit C-srC R p-Q[t v) (SGI ( '.■ llLMt SOtVLCli MANUAL 11 (Repair, Maintain T I -n ?7> i =0 ($??( ( \ TUSK Dacvc TUTORIAL SI (Theory, Facts, Many Tips] ($ J ?) ( } PTtCNTF.R Jt RjQTTUK MANUAL I] (Inter Ihiirjj. Repairs!- ($J ?') ( J SUPER GI^irJKWC METHOD IFclrit Glbbens ChenpUtSG) ( >TEOtJ GONADS IFil-l- P.le^irjfiif - Ci.iiide- Mag.ee tie Ways) tS-S-il < i STOPPING DOVBH MFIRltS (Frim EUr-e. - liukte Load Ways} (is] ( J Klt-LIft METERS (he™ EJeelrR- M-rierr. 'furlt, lirritr Mih I Li) CJl;i ( a LJOL H.A LE GAS Jr V ATE ft NpWmI Cut? Free W9WrM$7f ( ^GASFCr ALL 1 (Free GH-XL-slinH-; Frim Dhiu:'! Fi ih L] i'S ] II ( I- VOtATEX GENERATOR (Cw>k H„hi - ft a Fll-I,' i„ K . Pants) fit) ( >TV DECODERS * CONVERTERS I.D.tih.Ilt , On--.:. Fla,wKSs) ( i VOICE DlSGUlSER. (TCttliy DuhmVw Yapr PKsnr V-ni^relJ fit) I. '/ EieC'LHOMACnETiC &ft WNBLASrER IEM 5vpflr-Wd*po„J ( >]1EAL ri-iiSELF U (pfnvtrn EM H^lir^ Mu iIkkIO (Ja) ( > POLYGRAPH DEFEATS (He* TIh^ ffertt; WrrthiwlLj &LO> ( a J [Kill VOLTAGE DEVICES Cyl^m*r.jj J^iyiiiri; ftliALixJ KlO> ( J SURVIVAL CU^SJt AMMO (Fu]l-AutttCermnriierti.j Tj^sJ (5 10) ( ] SILENCE IS GOLDEN (Silererers - Cl etip it E-'y) (ifJ < ‘t MtXiCLR, HAR1ST - OlE! (Slirr* BlimirdleT P|*-iO i?C) ( J LnTLMATlL JUSTICE (Timer, Uetenator, iKPiter PJarn] (VJ ( ) SLCW.LT & ALTERNATE JDLN L lTlES 'IPiVr hjl L-r n-r- 1 10 ( J E!'NTAL r.O'Jlj'MLIiT (Del«c Ti Tiere. ,V-i(ea ^e Or- icri) (Sil ( ) STTALTK TLOINDLOCY iStcalih Your Vehicle or Plarel 6> | ) SFiDPC.inTH IM^iy Specking Methods) (S-Yl ( ) AIJTD L‘LV ir! A.’JfJ, EIP-OPPSI (Hew to L-tat lhe bysie-nl' ■! i ) I ) THE ^GCIDFINGER* (Ncwr-F^ rnus Mcul Dd-cciecaKS^) ( ) riLf-SLLKWOOfr’ iCln ip: Eindplf, Flk^iivn Tlud. Debtor) (^ ( ) SUPLR-SOHVJVA1 CA'l'AlOG (Free with all br-dert- J?G+? li!) By John J. V/LI I in mr,. CDS J fiD MENUVKLS", y hlj:i:. (ton-LT NMSlJ cs lY&IOiaOr], . AKG TiiJkkhow.t Scsr^orm. lUKOFFal orders etvr-r $yj r PJeme add 5% bhip/hrcil (Ji min). No' credit ^oL-tJ lor EduceitLnnni pijrpQfrfli Only. JDJ1 L?E5GL'N7 Dfi., A IAMCK 30 RDO, MM. 05310 ConsumerJron/cs Co, LETTERS {cant in wed from pagt • S - 44 J Dear 'ZfifKI-. Enjoyed yijur artide on inobiLt p'nonrs (ApnL 1 9f!(V;. — romiridi rut of the old TA P which E miss, OiK CObltUCiH on the Ei'd nf (lw( anide '^JuTt you refer to the I CC c-iitchinv up. In my urea we have three enpLneers for a many state area nr,-d they cover ham radio, CR no more, broadcast, publyt saJcty, microwaves,, etc. Rd cite itlca? They won^l bother you wilhoul 0 tnl of COtnpLfi ints. '] he en>ea to look out for are the phone corr. pan .aeon s-qsiad . Re careful hut don’t swea f rite FCC for a feu- testi do watch for 1 he plimie company who is very sensitive to any d isiupt inn of their revenue. Seafiul] DearJfifW: Kstw can [ he Like Captain Midnight? Elow about an AM carrier-current pirate radio sluiLOti? v\ Dear P\: W<> can ir tell you whai to do oXoLtiy. btfl wc •vnr vtr >h»l it involves iftgemfrfyj iTteukitress, inteNigentx, persistence, and u youthful spirit. Mix together you shovM torn? m/j with bvmelhing hvrtinvhik. TViiW (iff mriTjy A M i'Qtfiff-t'atfWnt fti/Vfc fudiv SUdkfns in existence. TuO many of ihem try so sound lib: respsiur AM it as ions and Low ptopk notice any if ling different. DearififWt Your 2f\W> mapaainc is great! I realty enjoy ii Your article on mobile phones was rnct-l interestinj! Pm very interested in Lhis area, and Look forward to any future art ides on it such as vvhat uwke&nd modelof two-way radio is best (arid cheapest) to use, or what Tedio is best (and cheapest) tn just listen in on calls. Dear 2600 : l have something interesting to report about RC’l. RO is another one of the long-distance telephone companies. They USC OpIiCi'il liber n el works that have been laid aloiie railitKid 1 racks around the oountrv. If you are near where their cables ran , there is a s ign that telfcs yon what to dd ifyou wHh to d ig tl>c Cables up. f he bijnis give a luc;ilion which is the initials of the slate you a re in and a number which is us.ua lly less tlva n 1 00C Y ou simply eult ant! yon get an KCt operator who may chat with you for hours about cahle sites around rite enunny. S]i^ can give you fable luca I ions, and she might want to know if you plan on digging a few cables- up. RLgjtt Traci. Itear RejtkrX; }>.y r it jittaify happened. We So si Stack o arse ires of the different: bciwccn Flush and SystemftkoUy Speaking and acridentalfy mixed then? np ftptt month. We regret she error. EQUIPMENT SccuiiLy, Privacy, Police Surveillnuce, Countcmncasiitcs. Telephone BOOKS Pin ns, Secret Reports, Forbidden Knowledge fu:an S2Q.m FOR i.A RG£ CATA 1.0(1 ASfti ONF. YkdR VPiWtX SHERWOOD COMMUNICATIONS , PKilmonf Crunmisns 27Sf) Phi I merit Avenue Suite flCOKT Huntingdon Vidlcy, PA I'&CXKj