💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › OCPP › ocpp07.t… captured on 2021-12-04 at 18:04:22.

View Raw

More Information

-=-=-=-=-=-=-

                     Ocean County Phone Punx Presents 
                                 OCPP07	
                              February 26, 1998
                      Last Updated  February 26, 1998
                                            
 

                               Contents 
                            Intro - Mohawk 
                       Phreak World News - Mohawk
                    Learning How To Phreak - Mohawk
                           Resource Bin - Mr. Seuss
                The AOL Problem Revisited - Editorial - Mohawk
                 Rural Output Devices - Neptunium Overkill
                            NXX Scanning - Mohawk
                       Reality - American Anarchist
                   Anarchy With Paging Systems - Mohawk
                         1-800 GUSWAG0 - Mr. Seuss    
                    Payphone Profiles Part 2 - Mohawk
                          Fighting Back - Mohawk                             
                              Busted - Mohawk
                               Letters
                                 News







Intro-Mohawk

		This is starting off to be a very interesting year for 

phreaking.  I'll talk more about that in the new section, "Phreak

World News".  About a week after Issue 6 was released, we had to 

move the webpage.  Not everyone knew about our new URL at

ocpp.home.ml.org, so a few people were left wondering where

the page was.  That should be our URL for a long time.  However,

your never sure what's going to happen, so you should get on the 

mailing list by mailing ocpp@hotmail.com.  

	The next issue which will be released on April 26th will

mark our 1 year anniversary.  It will be our biggest issue to date.

But before that issue comes out, there are a few things that need

to be cleared up.  First off, the OCPP is published on the 26th

of every other month.  The January issue was our first special 

issue.  Our next special issue will probably be in July.  

	Within the next two months, the site will be updated many 

times.  We hope to get more of the text file section back up.  We

will also redo the layout of some section on the site.  The 

alt.phreaking site will also be worked on extensively.  

	













.....The Staff of the OCPP.....


Mohawk.................Editor in chief

Mr. Seuss .............Technical editor/Head technical writer

Checkmate..............Staff writer

Phear..................Staff writer/Graphics

American Anarchist.....Staff writer

Punkroq................Editor

X-Logik................News editor

The Assassin...........The official hitman of the OCPP

V-Rok..................He just looks slick all day


















If you would like to become a distro site, mail: ocpp@hotmail.com


To be notified of any URL changes and issue releases, get on the 

mailing list:  ocpp@hotmail.com


Disclaimer and Copyright info is located at the end of the issue.















Phreak World News-Mohawk


	This is the first installment of Phreak World News.  PWN

will cover the news that is happening in the "scene".  We will mostly

be covering updates of websites and zines.  This is also where I'll put

updates of Matrix and any cons that might be going on.  If you would

like your new zine, new site, update, movie, con, or whatever, 

email:  ocpp@hotmail.com  



Headlines

Telephone Free Planet update

The Havoc Technical Journal and it's problems

PLA updates and AOLRIOT 98

The debut release of Security Breach





Telephone Free Planet update

	Telephone Free Planet has released what might be it's final 

issue.  Issue 6 was released on January 25th.  Keystroke had to finish 

editing this issue for unknown reasons.  The site says that TFP will end

in April. Issue 7 will come out in March or April.  My prediction 

looks to becoming true but I'm not at all happy about it.  You can 

visit the remains of TFP at:  http://tfp.nothing.org




The Havoc Technical Journal and it's problems


	It just keeps getting worse.  In the beginning of February, 

thtj.com went down.  It remained down till this day.  I thought that they

switched servers and I just didn't know about it.  I was proved very 

wrong on February 22nd when the long overdue Issue 19 was posted on

alt.phreaking

Here is the beginning of the post of that post:

--------------------
Hi.

THTJ 19 was almost ready for release on February 2nd; Scud sent me a
preview release, all that was left was for Scud to write the editorial
(a tribute to KungFuFox [cause he had died{sorta}]) and for me to edit
it. But then...

[20:51] *** Scud-O has quit IRC (Ping timeout for
Scud-O[mulder.clark.net])

He was never to be seen again.

Now, Scud has a habit of disappearing for a few days before and after a
new THTJ is scheduled for release, so I didn't worry much, until....

Session Start: Thu Feb 05 15:49:45 1998
<snip>
[15:51] <Jf_> dude...whats happened to www.thtj.com?!?!?!?
<Key-----> E-GAD&(&$#(*#@&$(*#@&(){body}amp;#@{body}amp;#(@*{body}amp;!@()$#@
<Key-----> !*($)#*@!
<Key-----> I DUNNO
<Key-----> BRB!#!#
<Key-----> strange

I thought things couldn't get any worse... until!!@#@!#@!


Session Start: Mon Feb 09 15:39:54 1998
<snip>
[22:30] *** alienphrk (b33r@204.164.105.242) has joined #phreak
[22:31] <alienphrk> oh fuck when is kff getting back?
[22:33] <alienphrk> this is so not cool

<KeyIdol> hi
<KeyIdol> he isnt!
[22:34] <alienphrk> KEY
[22:34] <alienphrk> dood
[22:34] <alienphrk> i need yer help
<KeyIdol> sure thing!
[22:34] <alienphrk> check yer msg

Session Start: Mon Feb 09 22:34:30 1998
[22:34] <alienphrk> uhmm..
[22:34] <alienphrk> i got a letter from a gov. offical
[22:34] <alienphrk> talking about lightspan2000 in one of the thtj
articles
<KeyIdol> tee
<KeyIdol> go on
[22:34] <alienphrk> hehe
[22:35] <alienphrk> they are going to sue me unless i take the thtj
issue of my page
<KeyIdol> maybe thats why www.thtj.com is down <-- clever, am i not?!
[22:36] <alienphrk> to stop distrobuting the issue
[22:36] <alienphrk> the guy came up to my house today
[22:36] <alienphrk> and handed it to my mom
[22:36] <alienphrk> im at private school so she called me about it
[22:37] <alienphrk> exactly
[22:37] <alienphrk> and then i take it off the page
[22:37] <alienphrk> they told me to delete it
[22:37] <alienphrk> off of my putah
<KeyIdol> IM THE ONLY ONE LEFT
<KeyIdol> FOX AND SCUD ARE GONE
<KeyIdol> ALIEN
<KeyIdol> IM NEXT TO GO
[22:43] <alienphrk> what issue was it in?
<KeyIdol> dunno
<KeyIdol> hehe!
[22:43] <alienphrk> damnit heh
[22:44] <alienphrk> found it
<KeyIdol> what one?
[22:45] <alienphrk> written by XiLiCoN
[22:45] <alienphrk> LiteSpan2000
<KeyIdol> errr
<KeyIdol> what issue :P
[22:48] <alienphrk> 16
Session Close: Mon Feb 09 23:22:56 1998

Scary, eh?!

The plot thickens later on, but I wun go into details. It seems that
some company is upset with Xilicon's article in THTJ 16; I doubt
any government agencies are involved.

So, since thtj.com is down and Scud doesn't come on IRC anymore
(even though I ping his static IP and nbtstat -a it and he is connected
to his ISP) I'll post THTJ19 here. THTJ 20 is due out in a week, but
since I don't have any articles for it yet, it probably won't be out
for a long time. You can still read TFP though, issue #7 should be
released sometime next month. http://tfp.nothing.org


-------------------------

	Until thtj.com gets back up, you can get all the issues of THTJ

at the OCPP at:  http://ocpp.home.ml.org  If you would like

to contact Keystroke to help him out with the THTJ and/or TFP

email him at:   Keystoke@thepentagon.com





PLA updates and AOLRIOT 98



	Finally some good news.  The PLA is still kicking ass after almost 

a year since they stopped releasing new issues.  Here is a mass mailing

that they sent out:


------------------

KPLA!
----
A few of us have made the final decision to go ahead and run with 
the idea of KPLA Internet Television so be expecting our 
mini-episodes to start appearing on phonelosers.org within the next 
six months. 

Basically KPLA will be the old 'zine in RealMedia format. You'll see 
instructional videos, practical jokes, cool music and a lot of really 
idiotic stuff. The nice guys over at http://www.freespeech.org have 
even offered us storage space for the streaming RealVideo files. 

Each episode will vary in length but probably average around 10 - 20 
minutes. We'll also offer the episodes on video tapes and/or .AVI 
zip disks/CD-ROMs for those of you who can't stand streaming 
RealVideo. If you have something you think would be worth 
contributing to the show, you can send videotape to PLA, 1013 
Kingswood Court, Celina, OH, 45822.

CGI Scripts:
-----------
I've started exploring the wonderful world of cgi scripting. If 
you'd like to download a few useful CGI scripts such as a web 
discussion board, a chat room or a logging utility, visit the 
FruitWare CGI page at 
http://www.phonelosers.org/FruitWare/scripts.htm . 

New to phonelosers.org:
----------------------
Here are a few of the newer features on phonelosers.org:

Screw the PLA! This page is a listing of 
people/organizations/whatever that have tried to end the PLA or 
tried to cash in on the PLA name. A recent experience with a company 
that sells hardcopy texts of PLA on the web motivated me to make 
this page. http://www.phonelosers.org/screw_us.htm

Private Investigator Links: If you're trying to get the goods on 
someone, this is the place to begin your search. A lot of web search 
forms are located here to locate people, businesses and just about 
everything else. Also, you'll find phone company homepages and links 
to real private investigators when you finally give up trying to 
find the guy yourself. http://www.phonelosers.org/pi.htm

Discussion Board: Fire up a discussion with other losers on our 
discussion board. This has a wide range of topics and usually you'll 
find plenty of morons just yelling back and forth at each other but 
it's kind of fun. http://www.phonelosers.org/FruitWare/

Other PLA Sites: As always, there's a slew of other PLA sites on the 
web, hopefully near your home town. The sole purpose of these sites 
are to help people find others who live around them and are into the 
same sort of computer & telephone shenanigans. Check out this list 
and see if there's a Loser in your hometown and if there isn't, 
create a page yourself! http://www.phonelosers.org/plasites.htm

New PLA GIFs Released!: In case you haven't noticed yet, there are 
now 12 PLA GIFs for your viewing pleasure. The latest one was 
released just a few months ago. Check them out on 
http://www.phonelosers.org/photos.htm
----------------------------------

	There is another AOL Riot being planned calling AOLRIOT98.  The

interesting thing is it is sort of a phreak riot.  For more details go to 

the PLA website at http://www.phonelosers.org   They aren't organizing it,

there just postin the info.




The debut release of Security Breach


	The first issue of Security Breach has been released.  You can get 

it at the OCPP at:  http://ocpp.home.ml.org  This zine looks to have

a lot of promise.  Issue 2 should be out soon.  The OCPP will be the 

official distribution site of Security Breach as they do not have

a website at the present time.  If you would like the OCPP to be a distro

site for your whether you have a website or not, email ocpp@hotmail.com

















Learning How To Phreak-Mohawk




	It has come to my attention that there are a number of people

that read this zine that don't even know a thing about phreaking.  That's

OK though and that's why we have a variety of articles, from newbie to

advanced.  However, none of our articles dealt with people that are

clueless.  Now I could sit here and talk about boxes and dumb crap like

every other beginner phreak text but the way I see it, you learn a lot 

better when you find stuff out yourself.  This article will teach you

how to search and learn.


Websites

	Websites are where you will get the bulk of your info and

they are the best place to start.  To find a website go to a search

engine and type in words like:  phreaking, hacking, redbox, wardial,

etc.  That will bring up a list of websites.  Click on each one until 

you find one with some phreaking stuff on it.  

	There aren't too many websites that have just phreaking stuff on

it so you will have to sift through a lot of hacking texts to get

to the phreaking ones.  Some of the stuff the search engine finds

will be a text file.  Download this but then go to the site it is on

to get more.  If the URL for the text file is:  

http://www.sss.com/jjj/redbox.txt, backtrack to sss.com/jjj/ and find

the page itself.  It will most likely be jjj/main.html or index.html

Once you find some texts, download everything.  You might want to 

download a few beginner hacking texts but that's up to you.  Now that 

you have downloaded everything you can, go to the links section on that 

page.  I suggest you bookmark this site so you can come back to it, 

especially if it has a lot of links.  Follow the links until you find 

another website with different phreaking texts.  Follow this process 

until you have a ton of texts.  Than read, read, read, and read some more.  

Once, you have an idea of what phreaking is about than you will be able 

to concentrate on what you want to learn about.  

	Because technology changes so often the methods of phreaking 

also change.  Many articles you will find were written during

the early 80's, or "the golden age of phreaking".  These are some of the

best phreaking texts you will find but they are very outdated.  There 

aren't too many texts that were written within the last few years.  But

that's where zines come in.  Phreaking zines provide some of the best

up to date info that you can ever hope to find.  Read every issue of

every zine you can find.  Most zines have letter sections where you can

write in and ask a question.  Some zines are to busy to answer you

personally.  I'm not gonna mention any names but there probably to busy

doing Hacker TV specials where they think there cool as shit cuz they

got 5 whole seconds of air time.  Some zines only release a few issues

and then close down.  That's why it's important to download all the issues

while you can.  In fact, that rule should be followed with all H/P

sites.  If you put off gettin some files from a site for a few days, it

might not be there tomorrow.


News Groups


	This is the place to go to once you know the basics of phreaking.

The best one to go to is alt.phreaking.  Other newsgroups are:

alt.2600, alt.2600.phreakz, alt.hack.nl, alt.hacker, alt.hacking,

alt.ph.uk, de.org.ccc.  

  Whether you just read posts and never respond or you become responsible

for half of the posts on there, newsgroups are a great way to learn and

keep in touch with what's goin on in the phreaking world.  When you first

get on to a NG you might want to watch for a while to see how

things work.  Each one is different and one stupid post can brand you

as a lamer.  I don't make these rules.  One thing to look for, is 

the FAQ if the NG has one.  Hopefully this will answer some of your

questions.  Once you get a feel for the NG and the people on it, you 

can post stuff like, I'm interested in learning more about XXX, anyone

got any suggestions?  



Bulletin Boards

	All the old timers, like myself, remember the good old days

of BBSing.  Remember FidoNet?  Now that almost everyone is on the internet

and underground BBS are pretty much a thing of the past.  However, their 

are some great BBS still out there.  These are a great (and free if their 

local) way to get files and meet people in your area.  How do you find BBS

in your area?  The best way to do it is ask on a newsgroup.  BBS

are pretty much self explanatory.  If you don't find any in your area,

you might want to call up a BBS that isn't in local.  You'll have to 

shell out some dollars (assuming your paying for it)  to call but

most all BBS have numbers to other BBS on them.  Write these numbers

down and call them up.  Repeat this process until you find one in your

area.  Like I said before, don't hold your breath.  

Meetings

	Check 2600 magazine to see if there are any meetings in your

area.  If there is, go to one.  If you go and say your new to phreaking,

you've been reading a lot, and you want to learn as much as possible,

they'll be glad to have you.  Everyone is always looking for phreaks

in their area.  As long as you don't go their and say you own your

own warez chatroom on AOL, you'll be fine.  If you find that their isn't

a meeting in your area, then post a message on a few news groups like:

Any meetings in the XXX area?? You should get a few responses.  If 

you don't get any, try again about once or twice a month.  If all else

fails move to New York City.  


	That should get you off on the right foot.  I went a little farther

than just how to learn about phreaking but I figured I'd help you guys

out a little.  















The Resource Bin-Mr. Seuss

	Ever been told to go look it up, but had no clue WHERE to look? 

This is a list of websites, newsgroups, and other places that has aided 

in my own research.


Websites


Bellcore Search: This should be really obvious. Info on very theoretical 
stuff, mostly switching. Bite your tongue if you come here because they let 
almost nothing by for free.
(http://www.bellcore.com/
BC.dynjava?PowerNavigationAndSearchPNASGeneralPowerNavigationAndSearch)

Telecom Archives: This page is an archive of the comp.dcom.telecom 
newsgroup. The FAQ is excellent, the articles are good and if all else 
fails you can post to the newsgroup. 
(http://hyperarchive.lcs.mit.edu/telecom-archives/)

Telecom Information Resources: This is simply a monstrous list of 
telecom/networking FAQs and sites. Don't bother unless you're looking into 
arcane topics and have a good working knowledge of the topic already; most 
people listed on this site never heard about PCMCIA.
(http://www.spp.umich.edu/telecom/technical-info.html)

PacBell Search: Surprisingly helpful, PacBell search will outline lots of 
InterLATA carrier information for you (including the law), COCOTs, and 
other sundry phone related info.
(http://www.pacbell.com/ir/search/index.html)

LexiCat Search Demo: This site is a REAL gem.  It offers a searchable 
index of terms (it cross references everything), as well as articles and 
reports on related topics. Warning: This is a demo for a product. After 
10 searches it resets itself and won't allow you back. Reload the page 
after every few searches or else.
(http://www.tra.com/cgi-bin/ft-LexiMot/ID=19970912152925603/lexi7800.html)

Blackbox Search: Try their search if you need info on LANs or direct 
connection. This is an online catalog, but you can still extract enough 
useful stuff to make going here worthwhile.
(http://www.blackbox.com)

Lucent: These people are pretty straightforward about what they offer. 
Lucent makes STUFF, unlike Bellcore which peddles information. Accordingly, 
Lucent will talk and talk and talk about their products.
(http://www.lucent.com/search/search.html)

Raytheon: These people unsettle me a bit. Raytheon is a blanket electronics 
firm that holds primarily DoD contracts. If you have a morbid interest in 
missile guidance you'll LOVE this site. They also hold contracts on 
encrypted voice switches used in the DSN.
(http://www.electrospace.com/business/telecomm.htm)

Lockheed Martin: Now controls NPA allocation (They bought it from Bellcore. 
Here ends an era.), and is happily distributing for free all sorts of 
useful information Bellcore used to sell for A LOT of money. This site 
lists all SACs, NPAs, and some stuff I didn't think was publicly available. 
(http://www.nanpa.com/)

555-1212: These people appear to be a low budget setup, but they offer an 
RBOC map (It only shows major providers. Local dialtone offices are not 
displayed), NPA lookup, telephone number lookup, etc.
(http://www.555-1212.com/)

Country/Area/City/Code/Decoder: Pretty self explanatory.
(http://www.xmission.com/~americom/aclookup.html)

International payphone index:
(http://www.cybercafe.org/cybercafe/pubtel/pubtel.html)

AT&T Toll Free Directory: I use the print edition for browsing in general, 
but this is a handy site to have around.
(http://att.net/dir800/)

Database America: This is the only Web based reverse directory in service. 
It's far from infailable, but it works often enough.
(http://www.databaseamerica.com/html/gpfind.htm)




Newsgroups


alt.dcom.telecom
alt.dcom.telecom.tech

These are the newsgroups where networking specialists hangout in their off 
hours to BS about work. Ask them questions, they will usually answer at 
length. I've received a handful of hostile responses, but only when I came 
right out and started asking about military phone systems (I got the answer 
anyway so I don't care).

comp.dcom.sys.nortel

A spinoff newsgroup for discussion of Nortel systems.




Printed Materials


Bellcore Catalog: Handy-dandy reference for acronyms and vague ideas. If 
you have the money to purchase the documents (they do take credit cards 
and personal checks) I would recommend requesting this catalog. It's free.

AT&T Catalog: I know it's there, it's usability is unknown. Better be good, 
$5 shipping.

Blackbox Catalog: Shiny and colorful, the Blackbox catalog looks neat if 
nothing else. Reading it will give you a decent idea of where the industry 
is at, and it will provide you with ANYTHING if you have the money (if it 
isn't listed they'll custom build it for you. Too bad i�m  broke). Catalog 
is free.

DMS Books: If you ever take an interest in Nortel's DMS line they distribute 
catalogs of software modules that have excellent descriptions of what the 
switches can do.

AT&T Business Buyers Guide. Printed toll free directory, it's really 
useful for simple browsing. I have no idea why I own one or how it came 
to my door, but it did. Any library will have a copy.

Graybar Catalog




Phone Numbers


Ameritech RespOrg: The only 800/888 reverse directory known to us at the 
OCPP. This service will also usually give a trouble reporting number, the 
POTS number the 800/888 terminates at.
(800-337-4194)



Mail


Tasty Bits from the Technology Front: Bulky title, great service. This is 
an automailer that sends out telecom/computer related information on an 
irregular schedule. Subscribe, it'll keep you informed about general topics 
and you can be conversational if nothing else. 
(http://www.tbtf.com/#autosub)
















The AOL Problem Revisited - Editorial - Mohawk


	In Issue three, I wrote an editorial talking about the

discrimination of people who use AOL.  Now that it's six months

later, I've come to realize that this problem isn't gonna stop.

The fact is, there are a ton of ignorant people in the world

and a lot of them are on the Net.  No matter what we do, we

can't change the stereotype that has been stuck to AOLers.  Some

people just love to stir things up.  This can be seen a lot in

Newsgoups.  Somebody will post something that is going to cause

controversy and fighting.  I guess some people just get off

on that stuff.  Instead of replying "Not all AOLers are lamers"

and stuff like that, just ignore them.  If they have a webpage, don't

go there. If they have a zine don't buy it or read it.  This kinda

sucks because I always support zines even if I don't like them.  

However, I'd rather see no zine, than a zine full of hatred and

ignorance.  



	This was posted on alt.phreaking.  This post inspired me to write

this editorial.

>I realy like AOL, it gives the lamers something to do rather than hack
>BBS's and keeps them from fucking with other systems on the net.  
>Imagine what all the bored oh-day k0de kiddie AOL w0rri0rz would do if 
>they didn't have AOL to fuck with.  They'd get an ISP account, start 
>reading bugtraq, and actually start learning something.  Then we'd all 
>be fucked cause the hacking rate on the net would "shewt threw the rewf", 
>the phedz would be called in, CERT would actually serve some purpose, 
>people would get busted, people would go to jail.  Everyone should get 
>down and pray that AOL never goes away. 



	This is my reply to his post.  It turned into a speech.

	Is this really necessary?  I'm sure most of you on AOL wanna write 

this guy back and tell him what an asshole he is.  I've expressed my 

opinion on this matter a number of times in many different forums.  I 

realize that this problem of judging people by what ISP they have is 

never going to end.  Writing/posting back saying "not all aolers are 

lamers" and shit like that only makes things worse.  Think about who your 

dealing with.  Most, notice how I say most and not all, of these people 

are fat, ugly, 13 year old kids who have no friends outside of cyberspace.

They get judged everyday in school by their looks and get their asses 

kicked day in and day out.  They are very ignorant and they are really

pissed off.  So what do they do?  They sit home all day, memorizing the in

and outs of UNIX, watch wargames 10 times in a row, sit on IRC for 14 

hours strait and they get qualified as a hacker.  Then they degrade people 

for not being as smart as them and for having a certain ISP.  The best 

thing to do in this situation, is just ignore them and be glad your not as

ignorant as them.  Judging people before you get to them is wrong no 

matter what the case is.  It's a cyber version of racism in my opinion and 

that really sucks.  If your one of these ignorant people, think for a 

second.  "I'm judging people because they look a certain way or they have 

a certain ISP". How stupid is that??  Where will that get you.   I've 

never heard of a girl not going out with someone because the guy had a 

certain ISP.  I never heard of someone gettin turned down because they had

a certain ISP.  Grow up already. You wanna talk about lamers.  Sure their 

are a ton of misinformed kids out there that ask stupid questions.  Just 

ignore them.  But who's more lame, some kid asking a dumb question or some 

kid being ignorant?




	I got so many emails telling me how much they liked the post, 

I figured I'd put it in this issue.  The following is just one of those 

emails.



From: MD	

I LOVED THAT SPEECH MAN....... MADE ME CRY INSIDE
      I AGREE WITH YOU 100%



















Rural Output Devices-Neptunium Overkill

INTRO:  
	This article is about, you guessed it: Output Devices in 

the country.  A fellow phreak and I camped out in the country and 

checked out the output devices there.  They have the tall greenish 

ones, and of course are not locked........our phone company is 

Ameritech: no, I don't live in NJ, so yours may differ but will 

probably follow the same idea.  Well, let's have some phun, shall we?


MATERIALS: 
 7/16 Hex Driver
Beige Box (See OCPP05 for more info)
Flashlight
<Editor�s note: locking pliers are a big help too>                      



PROCEDURE: 
	OK, unbolt it and remove the covers.  There should 

be 20 terminals total, 10 rows, two terminals in each row.  There 

should be a blue wire hooked up to the left terminal in the 6th row 

and a blue and white wire connected to the right terminal in the 6th 

row  <editors note: cross connect wires vary in color>.  Clip the red 

clip to the same terminal that the blue and white wire is connected to.  

Connect the green clip to the same one that the blue wire is hooked up to.  

If you have a dial tone,  good work.  If you don't have a tone, then your 

beige box is probably made wrong.  Here's a quick diagram:

             -----------------
            |  o            o |
            |  o            o |
            |  o            o | 
            |  o            o | 
Clip the    |  o            o |     Clip the
tip here------>o            o<------ring here
            |  o            o |
            |  o            o |
            |  o            o | 
            |  o            o | 
            -----------------

o = terminals


TIPS & TRICKS:  
	If you didn't get a dial tone there may be a few 

problems besides the beige box,  so try clipping onto the actual wires

and you might get a dial tone that way.  Warning while

participating in this expedition you may get a few small shocks, but

don't worry because it's only 6v.  Also make sure you are using the 

6th terminal, we didn't have much luck with the other terminals.  

<Editor�s note: Any terminals can be active. That he found only the 
sixth pair to be good is likely coincidence.>


Well, good luck.




<editor's note:  In New Jersey, these are found in neighborhoods that 
don't have telephonepoles.  Almost all of the neighborhoods that were 
built at the same time or developments as they're called, have these. 
These pedestal terminals (their proper name) take the place of most 
medium sized wiring cabinets. All cabling is run underground.> 
 



  
 

                                                                                                                                                                        








NXX Scanning-Mohawk


	Most of us are familiar with exchange scanning.  We scan for 

VMBs, terminals, test numbers, and so on.  However, most of us are

not familiar with scanning for exchanges themselves or, NXX scanning.

I don't know if anyone else has ever wrote about this subject before,

and if it has another name, but that's what I'm gonna call it.

	My theory is this:  In some areas, there are certain 

exchanges that are reserved for special needs.  These NXX's are kept

secret by not being published in any phonebook and they do not

serve the general public.  The main use for these is most likely 

government related.  Washington D.C. probably has the most of

the secret NXXs.  From what I hear, when you call most government 

buildings, you always get an operator.  I can't see this happening.  

I'm sure there are a lot of operator assisted numbers but not all.  

There has to be a few direct.  I have yet to prove any of these claims, 

so I am leaving it at a theory.

	Besides secret exchanges, you can also find a few test exchanges

and your local ANAC  (3 digit number you call to hear what number

your calling from).  I'm sure there is more out there that that but,

I have 5 mins of free time in each month so I have yet to look into 

this deeper.  

	How do you go about doing this?  Open up any wordprocessor 

program and type the numbers 00-99.  Do it neatly and in a row so you 

can fit 2 of these tables on a page.  Print out at least 8 of these 

tables. There are no NXX's that begin with 0 or 1 so label the first 

table 2, then the second table 3, and so on.
	
	Now that you have your nice little tables printed out, open

up your trusty phonebook.  Start with 2XX and go through the first 

NPA.  Cross out each NXX that appears in the phonebook.  Before you

start you should cross out all the N11 service numbers, 211, 311,

etc.  Also cross out, 500, 700, 800, 900, and 950. You should try

the service codes in your area because many places don't use them

for their intended purposes.  For example, 211 is a popular test

exchange.  Also, NXX's that are the same as the NPA's in that state 

are not aren't used so that you don't get confused when calling 

213-213-XXXX.  After that, about half of your numbers will be crossed 

out.  Now move  on to the next NPA and repeat the process.  To really 

cut down on time, use big NPA's and/or NPA's that are right next to 

each other. Once you have about 10-15 NXX's write them down on a 

seprate sheet of paper.  
	
	Repeat this process for all the NXX's.  This sounds like

a real bitch but I did it in about 20 minutes.  Now you have a list 

of numbers.  One of these should be your local ANAC (or the number

you call to hear what number your calling from) unless you live

an in area where ANAC's aren't reached as a plant test.  These

places use NXX-XXXX numbers for ANAC.  The rest of these

are either test exchanges, exchanges that are not being used,

and hopefully, secret exchanges.  

	This is where the scanning part of it comes in.  Take your

list of numbers and dial them up.  Try them with different NPA's

and different XXXX's.  Don't worry about calling long distance.

If any of these numbers work, it'll be worth it.  















Reality - American Anarchist


     The hacking and phreaking community. The active ones that belong to 

this community seem to have their own set of guidelines, rules, boundaries, 

and expectations. We have our beliefs and thoughts on the actions of the 

Feds (Federal Government) and Secret Service. We complete actions that many 

citizens find disturbing. We have the information in our possession that 

controls the outcome of tomorrow. 

     There is also the jail sentences that plague the nation. The anger 

that arises in the minds of the public. The terror that continues forth 

when a mishap has taken place. Welcome to reality.



                              The Beginning

     When the newcomers arrive and enter the hacking and phreaking 

community, they feel this warm "tingly" feeling inside of them. They are 

like a seven-year-old on Christmas morning. They jump at firsthand that 

they will learn a lot more than they are supposed to and that they will 

later use this mass amount of information to impress their friends.

     All neophytes have their way of receiving this information. Some may 

go straight to the search engines [which are always a plus for the 

beginner], or they ask around. They have so many questions that are 

unanswered and they will continuously ask until their benefits and 

answers are met. It seems that the information that is freely available 

(in some places), is a fantastic treat to the neophyte. The savor the 

"treat" and use it to their own benefit. Although, sometimes the beginner 

may seem that they know enough, this is absolutely not so. You can never 

learn enough.

     As time progresses, the neophyte has already had a wealth of 

information flowed into his brain. He has most likely subscribed to 

countless mailing lists and newsgroups. It is a normal routine for the

neophyte. When they awaken from their sleep, they check their mailbox 

(which most likely is congested with posts from his mailing lists and they 

check the newsgroups for the latest "hacker information". It seems that the 

newcomers do not yet understand what hacking and phreaking is all truly 

about, and what the hackers and phreakers of this world go through each and 

every day.

    It is common to where the "elite" stare down at the newcomers and 

ridicule them that they will never become as "cool" and "k-rad" as them. It 

is all around us, and disgusts a lot of us, but we have learned to tolerate 

a portion of it. The ones who consider themselves "elite" find it humorous 

to make the newcomers afraid and angry. They chortle and try to create the 

fact that the newcomers are useless and pathetic. But, weren't the "elite" 

newcomers once to get where they are today?



                              The Conflict

     As the Feds and Secret Service breathe down the necks of hackers and 

phreakers twenty-four hours a day, we began to ponder why they are so 

against us. The first point we consider is their incompetence. They do not 

yet [and probably will never] understand why we are the way we are. As 

every hacker and phreaker uses in their defense (which is actually true), 

is that we just want the information the Internet and computers bring us. 

When we hear about a particular, interesting bit of information about the 

Internet or computers, we jump at the first moment to get as much detail 

about it.

     The Feds and Secret Service do not take that into consideration. They 

do not seem to hear us when we try to make our point. They consider 

everything we have to say in our defense "pointless". They do not 

understand that the only way to find more information that is not freely 

available is to "hack" into systems and experiment with the telephones, 

phone lines, and telecommunications. Although, the Feds and Secret Service 

still seem to see us as "terrorists" and "highly dangerous".

     The public also sees eye-to-eye with the Feds and Secret Service. 

The parents of the hacker and phreaker teenagers do not listen to the 

complaints and defense that the sons and daughters try to tell to them. 

The parents seem to think that the teenage hackers and phreakers are not 

serious and that they are only "a kid". This enrages the teenagers. Many 

perform specific acts to try and prove to their parents and the public that 

they are just more than "a kid".

     Even though the parents do not see it, the children of this world are 

the most powerful [and most likely most intelligent] people on Earth. Many 

teenagers are teaching their parents about the Internet and computers and 

the parents and public still seem to think that they are just "a kid"!

     But, there are parents and adults that respect how a child and 

teenager lives and acts. They take their intelligence into consideration 

and support them anyway they can. This can bring a smile to a concerned 

hacker and phreaker.



                               The History

     Hackers and phreakers have came a long way. From MIT, the development

of UNIX, to the Kevin Mitnick saga. We all come from different countries, 

religions, and backgrounds. We think and act in different ways and share 

information with strangers. The technology we have today started with 

computers, and that was where the first "exploring" and hackers and 

phreakers appeared.

     "Hackers and phreakers run the planet", as some would say. "We 

control how the Internet works. We control what happens in tomorrow's New 

York Post. We control the lives of others." This may be true in some areas, 

but mostly they assume that since there are thousands of hackers and 

phreakers out there, that we can take over the planet. This also may be 

true, but it probably will not happen in the next few decades.

     Many of us have been thrown in a jail cell for a number of months [or 

years], and most of the accusations from the police and so called "crimes" 

that we commit are based on harmless acts.

     Let's take a look at Ed Cummings a.k.a. Bernie S. He was thrown in 

jail for having possession of modified tone dialer that was [and can] be 

legally purchased at a Radio Shack store and programming equipment. This 

got some of the public and fellow hackers and phreakers enraged. While in 

jail, he was brutally beaten by an inmate and was not put in maximum 

protection. As the story continued, he had to go through much pain, 

aggravation, that caused the ones who looked up to him to become even more 

incredibly furious. Later, a giant amount of cheers and gratitude arose 

when the notice of Bernies release spread. That relieved a lot of tension 

and anger in the Internet dimensions.

     As the Feds and Secret Service continue to prosecute harmless and 

innocent hackers and phreakers for an unlimited number of reasons. This 

yet again infuriates the hackers and phreakers who read and hear about it. 

The government sees no disturbance in this. Since we are just "pathetic 

little losers", we have no control of what events could follow because of 

the government's foolish acts and prosecutions.

     Hackers and phreakers have a long history and would take a 

country-size library to record it all. We all have our own beliefs, ideas, 

emotions, and thoughts. Maybe even one day, one of us could become 

president.



                                The Codes

     There are hundreds of codes in the hacker and phreaker community, and 

most of them are made up by a few people that the hackers and phreakers in 

the world live by, but the more official ones are listed here:

     Respect. This is a code that must always be taken into consideration.
     Hackers and phreakers come from many nationalities, religions, races,
     and backgrounds, and we each have our way of acting. Whether or not
     someone likes another or if one despises what another knows or has,
     respect should be first. We cannot quarrel each day for hours on that
     one person "doesn't use Linux so they are not k-rad", or that "he
     doesn't know how to hack DSS, so he must be a dumbass". Respect
     should always be in our mind and we should take the word into great
     thought and consideration.
     
     Trust. As some would say, "Don't trust everyone or everything you
     hear." This is mostly true. There will be ones who will worm their
     way out of something and lie to you either to gain your respect or
     your belief that what they say is true. But in some cases, trust can
     bring problems. If you are arguing with yourself on something that is
     yet to be decided if it is true or not, you will get aggravated and
     angry and get yourself into a tough spot. If you ask someone of their
     abilities and skills and do not trust them [even the are telling the
     truth], then you will gain the assumption that you cannot trust
     anyone. Trust is yet a very important factor in the hacking and
     phreaking community and should be taken close look at and understood
     thoroughly.

     Fear. This is very common in the hacking and phreaking community.
     Most of the fear arises in chat rooms. A group of combatants verse
     each other into "hacker wars" and continue the "war" until there is
     finally a winner. The "war" is usually between a group of cocky high-
     schoolers. The many of them usually show of their "hacking ability"
     by threatening the "opponent" and this is where trust usually comes
     in. The combatants base their trust on if the other is telling the
     truth about what he can do or what he will do to. Ones who have
     fairly not enough knowledge onto whether the other can really do what
     he is bragging that he can do, fear comes into the game. The neophyte
     would develop this sense of fear inside him thinking, "Oh damn! I
     don't want that to happen! I might lose my Internet account! Oh
     man!..." But the neophyte tries to avoid showing fear to make the
     other more dangerous and making the neophyte more vulnerable.

     Lamers. It seems that everyone of us belongs to a certain position.
     It seems that the "elite" continue to look down on the neophyte and
     think, "Oh god, another hacker wannabe wanting to be elite. Like that
     will ever happen! What a lamer!" It seems that if the neophyte does
     not know a certain amount or know something specific about something,
     then they would be considered a "hacker wannabe lamer". Many try to
     talk the "elite" into ceasing the ridiculous ways, but it is
     unavoidable. Everyone has their own beliefs and thoughts toward
     others, and since there are an incredible number of them, it stands
     to be unavoidable. The neophyte can take this rather serious and
     the neophyte might happen to panic from their own anger, that they
     might get reckless and start searching for ways to "destroy" the
     person who called them a lamer. But then, shouldn't we all think
     back? How did the "elite" get "elite" in the first place? Weren't we
     all neophytes once before?



                              The Forthcoming

     	The hacking and phreaking community will never fall. The community 

itself and the ones who belong to the long-time community will never 

disappear. The hacking and phreaking spirit will remain in those who are 

active in hacking and phreaking and the ones that have retired. We will 

always remember the trial and error some have gone through and the 

discoveries we have unearthed long ago. The old school ways will never die, 

as well as the new paths and treasures. Hacking and phreaking has

circulated all over the world since it began. There are those who use it

toward their knowledge and desire and those who use it toward their own 

mischievous ways. Either way, hacking and phreaking has it's own 

attitudes, beliefs, ideas, reflections, and point of views. Hacking and 

phreaking still have many hidden secrets that are left to find and we will 

just have to explore and wait for the new face of hacking and phreaking. 

















Anarchy With Paging Systems-Mohawk


	Phreaks would love to grab hold of a paging system and

do whatever they please with it.  Years ago you could say

"transfer me to extension XXX and then you'd be heard throughout

the store screaming weird crap and obscenities,  Nowadays, people

have become smarter and paging systems have become more sophisticated.

This article will teach you create anarchy with a paging system using

a very simple method that requires no phreaking knowledge whatsoever.

This method uses social engineering (SE) and is a great way to hone your

SE skills.  At first this might seem like it is rather lame but,

if you read it all the way through, you will be amazed at what you

can accomplished with very little effort.

	First of all, find one of those big home improvement stores.

The best stores to get are the ones with phones in every isle and

that are very busy.  Once you get that done, look in the phonebook

and get the number to the store.  Now, call the place up.  Ask to

be transferred to a certain department, it doesn't matter which one.

Then ask them to transfer you to another department.  Then tell this

department that you Joe Cool from department X.  Make up a story that

your a new employee and the phone is busted.  Ask how the paging system 

works (specifically, what to dial to page people).  They'll give you

some kind of code to access the system.  This can be anything from

a 1 digit code to a 5 digit code, maybe even more.  Ask some more

questions about how the phones in general work, extensions, accessing

outside lines, etc.  Write down everything.  BS with the guy a little 

just to look legit.  These places employ so many people that it is

near impossible for anyone to know everyone.  Ask him to transfer

you to the front desk, operator, or whoever controls the phone.  

Sometimes the customer service desk controls the phones.  

	Tell this person the same story.  Ask them how to work the phones,

access an outside line and from what phones you can access them.  

Basically, have the same conversation but go into more detail.  After

you got all the information you need, ask them to page someone for you

just to seem legit.

	Now you have to go to the store.  Don't bring your notes because

if you get caught, they will provide nice evidence to the cops.  Try

to wear an outfit similar to that of an employee's uniform.  That way 

you won't stand out when your on a phone.  Find a phone in an isle that's

not to visible and is not busy.  Dial the extension to get on the paging 

system.  

	Depending on how sick you are will depend on what you do.  For

a simple joke, page weird people to certain places.  Keep in current and

someone who everyone knows.  If I was doing this today I would say 

"will Monica Lewinsky please come to the oval office".  This will make

everyone in the place laugh and you probably won't get in trouble at

all.  That can be rather lame and is hardly worth all the trouble.  If

you wanna cause a mild riot and you're pretty daring, you can say 

"Attention all customers, for the next 10 minutes everything in the

paint department is free"  or something to that effect.  Can you

imagine the employee's reaction when they have a 100 or so people

demanding free stuff?  Make sure you leave the place and don't come

back.  Try not to look suspicious.  

	However, there are those people that are really, really twisted.

I advise none of you to actually do this.  I could care less if you

kill someone but I don't feel like being in court so don't do it.  Make

sure you have a getaway car handy for this one.  Get on the paging

system and say  "Attention all customers there is a bomb in the building,

do not panic.  We are experiencing problems with our fire alarm system

so we are asking you to slowly and calmly exit the building."  This will

cause a huge panic and a stampede that looks like the running of the bulls.

You'll probably kill someone cuz old people have heart attacks in 

situations like this.  This is also a great way to rob the place or the 

people there.  If you get caught you'll be in a lot of trouble.  Either 

way you'll probably make the news and you'll be ruining hundreds if not 

thousands of people's day at the same time.  And that's what it's all 

about isn't it?  Ruing someone's day.  Some of the more technical advanced 

might have found this article kind of basic and lame, but think about all 

the damage one person can do with such little effort.  That's the main 

point of this article.  
















1-800 GUSWAG0-Mr. Seuss


	MCI�s 1-800 GUSWAG0 is one of the most popular ANACs on the 

circuit. However, most users fail to question the extra information read 

back to them. This ANAC is the only one known to the OCPP that reads back 

ANI II information.

	The information read back is mostly used for internal auditing 

and can be ignored. The ARU ID identifies the audio response unit, the 

hardware that synthesizes speech. The line number identifies the hunt 

group trunk the call was routing on. The purpose of the call interactive 

number is unknown. The important information follows the prompt: "the 

ANI number is".  The first two digits are the ANI II digits, which 

identify the class of service of the calling party.


						ANI II Digits

    00
                 Plain Old Telephone Service (POTS) - non-coin service
                 requiring no special treatment
    01
                 Multiparty line (more than 2) - ANI cannot be provided
                 on 4 or 8 party lines. The presence of this "01" code
                 will cause an Operator Number Identification (ONI)
                 function to be performed at the distant location. The
                 ONI feature routes the call to a CAMA operator or to an
                 Operator Services System (OSS) for determination of
                 the calling number.
    02
                 ANI Failure - the originating switching system
                 indicates (by the "02" code), to the receiving office that
                 the calling station has not been identified. If the
                 receiving switching system routes the call to a CAMA
                 or Operator Services System, the calling number may
                 be verbally obtained and manually recorded. If manual
                 operator identification is not available, the receiving
                 switching system (e.g., an interLATA carrier without
                 operator capabilities) may reject the call.
    06
                 Station Level Rating - The "06" digit pair is used when
                 the customer has subscribed to a class of service in
                 order to be provided with real time billing information.
                 For example, hotel/motels, served by PBXs, receive
                 detailed billing information, including the calling
                 party�s room number. When the originating switching
                 system does not receive the detailed billing
                 information, e.g., room number, this "06" code allows
                 the call to be routed to an operator or operator services
                 system to obtain complete billing information. The
                 rating and/or billing information is then provided to the
                 service subscriber. This code is used only when the
                 directory number (DN) is not accompanied by an
                 automatic room/account identification.
    07
                 Special Operator Handling Required - calls generated
                 from stations that require further operator or Operator
                 Services System screening are accompanied by the
                 "07" code. The code is used to route the call to an
                 operator or Operator Services System for further
                 screening and to determine if the station has a
                 denied-originating class of service or special
                 routing/billing procedures. If the call is unauthorized,
                 the calling party will be routed to a standard intercept
                 message.
    20
                 Automatic Identified Outward Dialing (AIOD) - without
                 AIOD, the billing number for a PBX is the same as the
                 PBX Directory Number (DN). With the AIOD feature,
                 the originating line number within the PBX is provided
                 for charging purposes. If the AIOD number is available
                 when ANI is transmitted, code "00" is sent. If not, the
                 PBX DN is sent with ANI code "20". In either case,
                 the AIOD number is included in the AMA record.
    23
                 Coin or Non-Coin - on calls using database access,
                 e.g., 800, ANI II 23 is used to indicate that the
                 coin/non-coin status of the originating line cannot be
                 positively distinguished for ANI purposes by the SSP.
                 The ANI II pair 23 is substituted for the II pairs which
                 would otherwise indicate that the non-coin status is
                 known, i.e., 00, or when there is ANI failure. ANI II
                 23 may be substituted for a valid 2-digit ANI pair on
                 0-800 calls. In all other cases, ANI II 23 should not be
                 substituted for a valid 2-digit ANI II pair which is
                 forwarded to an SSP from an EAEO. Some of the
                 situations in which the ANI II 23 may be sent: 

                        * Calls from non-conforming end offices
                           (CAMA or LAMA types) with combined
                           coin/non-coin trunk groups.  
                        *  0-800 Calls 
                        *  Type 1 Cellular Calls  
                        *  Calls from PBX
                        *  Trunks  
                        *  Calls from Centrex Tie Lines

    24
                 800 Service Call - when an 800 Service database
                 location converts an 800 number to a POTS number, it
                 replaces the received ANI code with this "24" code
                 before returning the POTS number to locations
                 requesting ANI. If the received 800 number is not
                 converted to a POTS number, the database returns the
                 received ANI code along with the received 800
                 number. Thus, this "24" code indicates that this is an
                 800 Service call since that fact can no longer be
                 recognized simply by examining the called address.
    27
                 Code 27 identifies a line connected to a pay station
                 which uses network provided coin control signaling. II
                 27 is used to identify this type of pay station line
                 irrespective of whether the pay station is provided by a
                 LEC or a non-LEC. II 27 is transmitted from the
                 originating end office on all calls made from these
                 lines.
    29
                 Prison/Inmate Service - the ANI II digit pair 29 is used
                 to designate lines within a confinement/detention
                 facility that are intended for inmate/detainee use and
                 require outward call screening and restriction (e.g., 0+
                 collect only service). A confinement/detention facility
                 may be defined as including, but not limited to,
                 Federal, State and/or Local prisons, juvenile facilities,
                 immigration and naturalization confinement/detention
                 facilities, etc., which are under the administration of
                 Federal, State, City, County, or other Governmental
                 agencies. Prison/Inmate Service lines will be identified
                 by the customer requesting such call screening and
                 restriction. In those cases where private paystations are
                 located in confinement/detention facilities, and the same
                 call restrictions applicable to Prison/Inmate Service
                 required, the ANI II digit for Prison/Inmate Service
                 will apply if the line is identified for Prison/Inmate
                 Service by the customer.
    30-32
                 Intercept - where the capability is provide to route
                 intercept calls (either directly or after an announcement
                 recycle) to an access tandem with an associated Telco
                 Operator Services System, the following ANI codes
                 should be used:

                        30 Intercept (blank) - for calls to unassigned
                        directory number (DN)

                        31 Intercept (trouble) - for calls to directory
                        numbers (DN) that have been manually placed
                        in trouble-busy state by Telco personnel

                        32 Intercept (regular) - for calls to recently
                        changed or disconnected numbers 
    34
                 Telco Operator Handled Call - after the Telco Operator
                 Services System has handled a call for an IC, it may
                 change the standard ANI digits to "34", before
                 outpulsing the sequence to the IC, when the Telco
                 performs all call handling functions, e.g., billing. The
                 code tells the IC that the BOC has performed billing on
                 the call and the IC only has to complete the call.
    52
                 Outward Wide Area Telecommunications Service
                 (OUTWATS) - this service allows customers to make
                 calls to a certain zone(s) or band(s) on a direct dialed
                 basis for a flat monthly charge or for a charge based on
                 accumulated usage. OUTWATS lines can dial
                 station-to-station calls directly to points within the
                 selected band(s) or zone(s). The LEC performs a
                 screening function to determine the correct charging
                 and routing for OUTWATS calls based on the
                 customer�s class of service and the service area of the
                 call party. When these calls are routed to the
                 interexchange carrier via a combined WATS-POTS
                 trunk group, it is necessary to identify the WATS calls
                 with the ANI code "52".
    60
                 TRS - ANI II digit pair 60 indicates that the associated
                 call is a TRS call delivered to a transport carrier from a
                 TRS Provider and that the call originated from an
                 unrestricted line (i.e., a line for which there are no
                 billing restrictions). Accordingly, if no request for
                 alternate billing is made, the call will be billed to the
                 calling line.
    61
                 Cellular/Wireless PCS (Type 1) - The "61" digit pair is
                 to be forwarded to the interexchange carrier by the local
                 exchange carrier for traffic originating from a
                 cellular/wireless PCS carrier over type 1 trunks. (Note:
                 ANI information accompanying digit pair "61"
                 identifies only the originating cellular/wireless PCS
                 system, not the mobile directory placing the call.
    62
                 Cellular/Wireless PCS (Type 2) - The "62" digit pair is
                 to be forwarded to the interexchange carrier by the
                 cellular/wireless PCS carrier when routing traffic over
                 type 2 trunks through the local exchange carrier access
                 tandem for delivery to the interexchange carrier. (Note:
                 ANI information accompanying digit pair "62"
                 identifies the mobile directory number placing the call
                 but does not necessarily identify the true call point of
                 origin.)
    63
                 Cellular/Wireless PCS (Roaming) - The "63" digit pair
                 is to be forwarded to the interexchange carrier by the
                 cellular/wireless PCS subscriber "roaming" in another
                 cellular/wireless PCS network, over type 2 trunks
                 through the local exchange carrier access tandem for
                 delivery to the interexchange carrier. (Note: Use of
                 "63" signifies that the "called number" is used only for
                 network routing and should not be disclosed to the
                 cellular/wireless PCS subscriber. Also, ANI
                 information accompanying digit pair "63" identifies the
                 mobile directory number forwarding the call but does
                 not necessarily identify the true forwarded-call point of
                 origin.)
    66
                 TRS - ANI II digit pair 66 indicates that the associated
                 call is a TRS call delivered to a transport carrier from a
                 TRS Provider, and that the call originates from a
                 hotel/motel. The transport carrier can use this
                 indication, along with other information (e.g., whether
                 the call was dialed 1+ or 0+) to determine the
                 appropriate billing arrangement (i.e., bill to room or
                 alternate bill).
    67
                 TRS - ANI II digit pair 67 indicates that the associated
                 call is a TRS call delivered to a transport carrier from a
                 TRS Provider and that the call originated from a
                 restricted line. Accordingly, sent paid calls should not
                 be allowed and additional screening, if available,
                 should be performed to determine the specific
                 restrictions and type of alternate billing permitted.
    70
                 Code 70 identifies a line connected to a pay station
                 (including both coin and coinless stations) which does
                 not use network provided coin control signaling. II 70
                 is used to identify this type pay station line 
                 irrespective of whether the pay station is provided by 
                 a LEC or a non-LEC. II 70 is transmitted from the                                   originating end office on all calls made from these lines.
    93
                 Access for private virtual network types of service: the
                 ANI code "93" indicates, to the IC, that the originating
                 call is a private virtual network type of service call.
















Payphone Profiles Part 2-Mohawk


Intellicall

Astratel 2


	This phone is your normal Bell style payphone.  Nothing to fancy 

about the design.  They seem to be rather behind in the payphone business.

Some of the stuff they offer is pretty old.  The software that comes with

it gives you an example of how behind these people are.  They have 

pictures of their software on floppy disks.  I haven't seen a floppy

disk since high school.  The computer in the picture is old as dirt

and the software looks like the automated card catalog that libraries

use.  The only interesting thing this phone has is the way it protects

the owner from international coin call fraud.  When you place an 

international coin call the phone dials into the Intellicall network.

The call is then monitored to make sure that coins continue to be 

collected.  If the line gets screwed with, the phone disconnects

the call. 




Specs-

Operating temperature    -30 to 60 degrees C

Operating Humidity       10-90% relative

Line Powered

Weight    45 pounds

Processor     32-bit, low voltage


Memory-
RAM   1MB, upgrade to 2MB

ROM   2MB, upgrade to 4MB








Features-



Spanish and English voice prompts built in.  

The owner can program the phone to use either language or both.  I want 
to own a phone where their is no Spanish speaking people but have the 
phone programmed for Spanish only.  I have a sick sense of humor. 


Electronic Coin Handling System  (ECHS).

The ECHS consists of an anti-stuffing device coupled with the 
MARS MS16 electronic coin validator.  This eliminates coin jams and
coin chute stuffing.  This is done by capturing foreign objects 
inserted in the coin slot.  What happens is:  If it doesn't fit 
through the coin validator, it goes into this little trash can
like section for the technician to remove.  This is what got me 
into phreaking over 10 years ago when my dad showed me how to
stuff a payphone.  I never thought I'd be writing an article on
how it is being prevented.


211 automated customer refund service

This provides immediate customer service.  Callers dial customer service
and the operators give them another call.  They have a complete call
detail record to review the last transaction.  This is suppose to save
money by eliminating the process of mailing out 25 cent checks.  I can see
6 dollar checks but who goes to the bank with a 25 cent check?  Now that I
think about it, can you imagine the look on the tellers face when she
realizes you waited on line for 10 minutes for a quarter?  You get to 
phreak people out and get paid for it.  Now it would be 35 cents but
it's the same idea.  For an added kick, ask to have that it in one dime,
5 pennies, and 4 nickels.  


Coin collection alarms and cash box totals

This monitors for unauthorized entry and generates automatic call outs
during cash box collections to identify time of coin collection and coin 
total to make sure no ones rippin you off.  Alarm call outs are
generated that identify immediate service requirements such as full 
coin box, missing handset, low activity, coin jam, and system/software
problems.  I wonder if that payphone had an alarm when I took a bunch
of M-80's and, uh, nevermind. 

Service callout

Allows the service technician in the field to request a download of
rates and program the phone without the assistance of office personnel.



Options-


Coin handling

Can be fitted with mechanical or electronic coin mechanisms.


Intelli*star

This is Intellicall's patented store and forward technology.  It 
performs all functions associated with placing a 0+ phone call.  
0+ calls are changed to a 1+ call inside the phone.
This also lets you control your 0+ traffic so that you don't
have to rely on outside service providers.


Card reader options

Phones can be ordered from the factory with card readers.








Nortel
Millennium payphones


Millennium payphones are the top of the line phones.  You usally
see these phones in hotels and airports.  These phones have everything.
You can even have advertisements on the scrolling display screen.  As 
you would expect, they also have some of the most advanced fraud 
protection features.  





Millennium Desk Terminals

	The Desk phone series are found in hotels and large businesses.  

They don't use coins so it's a lot cheaper to run.  It's also harder to 

phreak cuz it validates the card instead of you typing in pin numbers.

The coolest thing about it is that it has a data jack so you can 

hook up laptop.  



Specs

Weight - 3.3 pounds

Operating temperature - 0 to 50 degrees Celsius
Non operating temperature - -40 to 70 degrees Celsius

Line Requirements - Standard analog loop with answer supervision
using battery reversal



Features


RJ-11 data jack

This let's the you connect a computer so you can access email and 
other services.


Self Diagnostics

This allows the phone to monitor it's operation.  But unlike other 
phones that just tells you what's going, this phone actually does
something about it.  The phone calls the nearest service center
when it needs attention.  That's pretty damn cool. "Yeah Joe, your
phone called me today.  Said somethin about some Phone Punx 
reprogramming the display screen".


Quick Access Keys

These are one touch keys that allow you to access security, local
businesses, and other services.  These keys can be programmed
to dial a free or a paid call.


Vacuum Fluorescent Display

This is what I talked about before.  The screen gives you instructions
on how to use the phone.  It can also be programmed to display ads.


Language Select Key

This key allows callers to choose the primary or alternate
language. The primary language is always English.  The primary
language can be either Spanish, French, or Japanese.  This 
changes audio and visual instructions.


Voice Prompts

Voice Prompts gives you dialing instructions.  The prompts are recorded
and not synthesized.


Next Call Key

This key makes it easy to place a multiple calls with the same card.
I guess it's a bitch to keep putting the card back in and setting it
back up.  You can also use this if you screw up when dialing.  





Specific Models of Desk terminals


M1351
Desk Terminal with Magnetic Stripe Card Reader

	This phone has a Magnetic Stripe Card Reader so the caller

can pay for the call with a credit card or a calling card.  


M1361
Desk Terminal with Multi Card Reader

	This phone has a Multi Card Reader so that the caller can use

a credit card, calling card, smart card, or cash card.  The smart

card and cash card are known as integrated circuit or chip card.

These cards are pre-paid cards and the phone subtracts the amount

of credit you used and stores the value on the card.    







Millennium Multi-Pay Terminals

	Multi-Pay Terminal is just a fancy name for a payphone that accepts

a variety of payment methods.  This phone looks like your normal 

bell style phone except it has a card reader, display screen, and 

all the other buttons that I will talk about.  Unlike the Desk 

Terminals, these phones except coins.  



Specs

Weight - 42 pounds

Operating temperature - -40 to 60 degrees Celsius
Non-Operating temperature - -50 to 70 degrees Celsius

Line requirements - Standard analog loop with answer supervision
using battery reversal.



Features

Multi-Pay Terminals have many of the same features that the 
Desk Terminals have.  Therefore, I will not add a description
of the similar features because I will just be repeating myself.


Language Select Key

Voice Prompts

Self Diagnostic System

Vacuum Fluorescent Display

Next Call Key

Quick Access Keys

Multi-Card Reader

Recessed Coin Slot

The Recessed Coin Slot can except all US coins including $1 coins.

Electronic Coin Validator

The Electronic Coin Validator is equipped with a sensor to prevent
the use of slugs of foreign coins




Specific Models of Multi-Pay Terminals (MPT)


M1231
MPT with multi card reader

	This phone accepts coins, smart chip, and magnetic stripe cards.

It can also accommodate future card technologies.


M1221
MPT with smart card reader

	This phone can accept coins and smart chip cards.


M1211
MPT with magnetic stripe card reader

	This phone can accept coins, calling cards, and credit card.















Fighting Back-Mohawk




Security and Fraud Newsletter
Frequency: 12 issues per year
Subscription Price: �645/US$1097

	This is proof that phreaking is a money making business.  Not

for us, but for the people trying to stop us.  Basically this guy gets

paid $1100 a year person for taking articles in different zines and

putting them in his own words.  Damn, if he gets only 50 people to buy

the newsletter that's about $55,000 a year.  Hell, I'm gonna quit my job

and sell articles.  Seriously though, I would never do that.  This

is almost like a scam in my opinion.  The following is a summary

of what the newsletter is about.




	Each month the S&F Newsletter uncovers all the latest issues, 

identifies problem areas and highlights the methods, products and current 

industry solutions to this prevalent problem, or so they say.  They 

show you how to combat fraud and to speed up the time that you 

detect it.  



Each issue covers:

Fraud Detection and Prevention 
Phone Cloning & Subscriber Fraud 
Card Forgery & Phone Breaking 
Standards & Imminent Legislation 
Privacy & Data Protection
Customer Care & Billing Issues 


They also give you:

Analysis - Find out how just how big the fraud problem really is 
Reports - Instances of Fraud, including prosecutions undertaken 
Competitor Information - Know what your competitors are doing to beat 
	fraud and find out how effective their strategies are proving. 
Product Reviews - keeping you informed about the latest and best telecoms 
	security products 



They claim that S&F newsletter will allow you to:

-  Stay up to date on the most effective ways of combating each type 
	of fraud 
-  Avoid being out-flanked by the fraudsters or overtaken by your 
	competitors 
-Find out what anti-fraud software is currently available 
	and in use by telcos world-wide 
-Discover what fraud detection packages will reap the best rewards for 
	your business 
-Keep informed on the grey areas currently being exploited by fraudsters 
-Spot the potential gaps in your procedures and systems before someone 
	else does







Corsair completes PhonePrint expansion for AT&T Wireless Services 

Fraud prevention system fights roaming fraud in Southern California and 
Las Vegas

	Corsair Communications, Inc. announced today the expansion of its 

PhonePrint* cellular fraud prevention system into three AT&T Wireless 

Services markets. 

	The system protects subscribers in Santa Barbara, Oxnard-Ventura, 

and Las Vegas. In 1995, AT&T Wireless was among the first wireless 

providers to adopt the Corsair system. AT&T Wireless began the recent 

expansion project to reduce exposure to roaming fraud in markets in 

Southern California and Las Vegas, Nevada. 

	"While our sister company in Los Angeles has used PhonePrint to make

serious progress in their fraud fighting efforts over the past two 

years, we had seen roaming fraud gradually increase in our adjacent 

markets," said Erin Cord, AT&T Wireless' director of business security 

for the Western Region. 

	"The cloners were being shut down in Los Angeles, and they were 

moving out to our markets to harvest numbers for use in L.A., as well as 

other major metropolitan areas. We implemented PhonePrint primarily to 

stop this infiltration of roaming cloners." 

	According to David Thompson, Corsair's vice president for marketing, 

the situation in California and Las Vegas is part of a trend, in which 

fraud is moving to smaller cities and suburban areas. "Even markets with 

no home fraud problem now have to watch their exposure to roaming fraud 

closely," said Thompson. 

	"There's no predicting where the cloners will turn next, nor when 

they'll do it. They can target a market and wreak financial havoc with 

amazing speed. Carriers understand the seriousness of this exposure, and 

they're protecting themselves now." 











Busted-Mohawk



Swedish police nab cannabis promoting hackers

	Two young Swedish hackers who turned a Swedish county's home page 

into an advertisement for pornography and cannabis and broke into the U.S. 

space agency's computer system have been tracked down, local media reported.

	After a year-long hunt, police in Umea in northern Sweden finally 

traced the two youths, aged 18 and 15, and seized their computers, the 

newspaper Vasterbottens Folkblad said on Wednesday. Police were quoted 

as saying no charges would be laid because no economic crime had been 

committed. 

	They said the older of the two youths was known to the authorities 

after his involvement in a case of illegal data entries and computer fraud 

two years ago for which an older youth was sent to jail. 













Letters-Mohawk



From:  DSto3133

I have read with great pleasure your posts and newsletter.  However, I 

tried to get the CNA division of Bell Atlantic for the 609 area code and 

the # that you had on the list doesn't work anymore.  I think it was 

201 xxx 7676 ( I don't have it right next to me at this moment)  Could 

you please give me the new #  I really need to do a look up on a non-pub 

# and the operators in this area have no clue what a FACS or MLACS or 

DPACS is.  I could use some help here.   Thanks for any you can provide.



<What the hell list is this?  I didn't post any CNA number on any 
list.  I don't know the NJ CNA number and I don't know you, so why would
I just give it to you?  I can't stop wondering what goes through
some people's mind when they write letters like this.>





From:  Ralph

How do I find the number to dial that will ring back the phone I'm

calling from?  I'm in area code 410.

<Read the article "NXX Scanning".>





From:  Rising Sun

First, I don't know if you use AOL as server space or as your primary 

ISP but I have never run into any one from AOL that has actually known 

what they are talking about. I would say I'll trust  AOLers a little 

more, but your what 1 out of 50,000,000 or something like that, but 

anyways its a great zine. In issue one, about turning your car into 

a phreaking unit, a good power converter for the car can be found at 

the shack. I think they discontinued them this year, but they run about 

50 dollars and have 4 sockets instead of 2. Also, i wouldn't recommend 

trying to run a pc off of a car battery for more then about 30 min, 

we had one running for about an hour and a half and out battery 

was DRAINED!!! We couldn't even turn the engine over (the look at the 

tow guys face when he saw the monitor in the back seat hooked up to a 

tower was worth the 30 dollar bill. Issue one is the only one I've read 

so far, any ways, me and a few buddies are starting a um, what the hell 

would you call this, kinda like a club I guess. We're calling it CIT, we 

want to get local chapters together and publish a zine, which is still 

in progress. I don't know where you are geographically, but we're in 

IL. If you would be interested in starting a local chapter kinda 

thingy would be kinda cool. We hold our meetings on the second or 

third saturday of every month (we have had two on the 2nd and two 

on the 3rd saturday, so its still kinda undecided), it keeps the 2600 

meetings and these pretty balanced. Our meetings have consisted of a 

few different things. The first meeting we went around and jumped into 

Amertich dumpsters and played with a junction box. The second we sat in 

a cafe and talked. The people that are attending are generally more 

phreaking related and not so much into hacking. I am just starting to 

make a web page for the group. We would like to have articles and 

what not written by us, and not stolen from other people. If you 

would like to maybe publish your articles in a CIT monthly\weekly\yearly\ 

what the fuck lets go for quarterly news letter zine kinda 

thing it would be cool. I dont mean this to come off like I'm trying 

to absorb the whole zine or anything.  Anyways its late, I kinda got 

to get going. Tell me what you think about all this.




<Well.  I have lost count, but this has got to be 45,608 time that
we have been asked to join something.  I think we have had more offers
that we do actual readers.  Don't get me wrong, we're flattered that you
invited us to join your um, uh, thing.  However, we have specific goals 
that we are trying to accomplish and since I am a control freak, I just
can't end the zine and write for another one.  The OCPP will remain the 
OCPP until I decide we have accomplished everything that we set out to
do.  When this will happen, I have no idea.  I doubt it will be anytime
soon though.  I am considering writing something for another zine.  It
will most likely be a rewrite of an article that was already in an
issue of OCPP.  I'm not going to say anything else about this cuz I don't
know if it's gonna happen.  If it does I'll be sure to let you guys know.
If I ever do end the OCPP I might consider writing for another zine.  
Keywords-might and consider.  However, don't let this discourage
anyone.  If I get the right offer I just might accept it.  Right now,
all I'm usin AOL for is email, OCPP wise anyway.  I use it a lot for
my band though on other accounts.  A lot of people that own clubs and
crap like that in the NY area are on AOL and it is a big help that
I am on it too.  Since there is only 11 or so million AOL members
that would make me 1 out of only 11 million. I am not the only
"non-lamer" on AOL.  There is a load of phreaks on AOL that know
a lot more than me.  If you've ever stopped by alt.phreaking you'd see
that half of the posts are made by AOLers.  I know a lot of phreaks
on AOL that are sorta in denial.  They use their Hotmail accounts to
send/receive mail and to post to newsgroups.  With all the ignorant people
out there I can't blame them, but I think you shouldn't hide that fact
that your on AOL.  I understand you have your reasons.>



From:  Sheepdog
Holy Shit! How the hell did a phreaker group come out of a shity place 

like Ocean County?!  It's great that you managed this but to my knowledge 

I wouldn't think possible.  Anyway add me to the list.



<That's my life story, proving everyone wrong.  What amazes me even more 
is that someone actually knows about Ocean County.>  




From:  Mr. N

I really like your zine.  I want to help you guys but I'm not much

of a writer.  Is there anything else I can do.  I'm just a begining

phreak so that's why.  I know a lot about hacking so I could write

about that if you want.  If I do write something, are their any 

benefit's that I would get?



<Thanks for the compliment.  Well there are many ways you can help out
us or any other zine for that matter.  Say if your talking about 
phreaking with someone, you could say "ever check out the OCPP, THTJ,
etc."  If you have a H/P/A website add a link to us and your other
favorite zines/sites.  Write us a letter (which you did) letting
us know what you like and dislike.  Let us know what you would
like to see done/covered in future issues.  The list goes on and on.
The more people that read the zine, the better it gets.  As far as 
benefits go, we already publish the zine for free.  There are
benefits though.  I don't even mention them to anyone most of the 
time and I'm not going to here.  The more articles you write, the 
more benefits you get.  I take care of my staff, they know that.>




From:  Crash Override

Hackers Unite!
Hack the Planet!
Take down the Gibson!


<This letter was sent to Mr. Seuss.  Hmm, do you think he might have
been influenced by the movie "Hackers".  I know it sounds really
farfetched and you probably think I'm on crack, but I think he's
seen it once or twice.  But then again, what do I know, I'm just the 
King of Nynex.>

















News



Headlines

Bell Atlantic introduces Name and Number Deliver Service 

Intersphere launches website for MGM's upcoming Interactive game, WarGames 

Bells go 0-4 in long distance requests with FCC

Bill Gates gets egg on face in Brussels 

Corsair completes PhonePrint expansion for AT&T Wireless Services 

FBI probing "hacking" of U.S. defense computers









Bell Atlantic Introduces Name And Number Delivery Service 


	Bell Atlantic-New York has taken the frustration out of 
phone calls that are never answered. 

	Callers can now leave their name and telephone number for the person 
they are calling when their call goes unanswered. This new Bell Atlantic 
service, known as Name and Number Delivery Service, is available to many 
customers on the east side of Manhattan; Long Island City and Astoria in 
Queens; the Kingsbridge section of the Bronx; and in the Bay Ridge and 
Canarsie sections of Brooklyn. 

	Those who use the service will be able to leave their name and 
telephone number for most Bell Atlantic customers in the New York 
metropolitan area -- Long Island, the five boroughs of New York City, and 
Westchester, Rockland and Putnam counties. 

Here's how the service works: 

	When a call is unanswered, callers hear a series of simple voice 
prompts, or commands, that will enable them to leave their name and 
telephone number for the person they are calling. Bell Atlantic's 
network will record the information and then call the number every 
half-hour for the next eight hours. No attempts to deliver the message 
will be made between 10 p.m. to 7 a.m. weekdays or 10 p.m. to 9 a.m. 
weekends. 

	When the call is finally answered, a recording will announce that 
someone was trying to reach them, and that Bell Atlantic is attempting 
to deliver that person's name and telephone number. The information is 
played twice. 

	The charge for the service is 75 cents for the caller. There is no 
charge for the person receiving the message. The service can be used by 
callers with either Touch Tone or rotary service. 

	"Despite the widespread use of voice mail and answering machines, 
many calls still go unanswered," said Rich McCusker, Bell Atlantic 
director of Messaging Services "This innovative service takes the hassles 
out of trying to reach someone. It's easy to use, providing our customers 
with greater control and convenience." 


	Where available, Name and Number Delivery Service is automatically 
on customers' lines. They do not need to call Bell Atlantic to order the 
service. If customers want more information about the service, or if 
they want the service removed from their line, they should call 
1-800-742-2220.





Intersphere launches website for MGM's upcoming Interactive game, WarGames 

	Intersphere Communications Ltd. Monday announced the launch of the 
newest website for client Metro Goldwyn Mayer, designed to promote the MGM 
Interactive game WarGames.  

	The site is created for the upcoming release, which is based on 
the very successful movie of the same name.  It can be found at 
http://www.wargamesmgm.com/.  This is the second site designed by 
Intersphere for MGM.  In October of this year Intersphere launched 
the site for the interactive game Return Fire II 
(http://www.returnfire2.com/).


	Created by Interactive Studios, UK and distributed by MGM 
Interactive, the strategy game builds on the hacker theme of the 
movie.  Players will experience up to 30 campaign-based missions 
scripted by the original producer and director of the motion picture.
High resolution SVGA display and a 3D engine will allow for full 
rotation of the playfield.  

	The playfield itself will feature six environments with real-time
weather, realistic sound effects and an intense soundtrack.  The game
will allow for both single and multi-player gameplay.  

	The site features game information, sound files from the movie 
and the opportunity to logon and register to receive e-mail as the 
site is developed.  Compelling graphic, copy and audio content 
provide users with an exciting preview of the upcoming game.  There 
are also links to the Return Fire II, Machine Hunter and MGM sites, 
as well as Mplayer.  

	Intersphere Communications Ltd. is a full-service advertising 
agency that emphasizes the use of the internet as a creative 
communication medium.  Company information can be found at their WWW 
site at http://www.intersphere.com/.  

	Intersphere Communications Ltd. is a wholly owned subsidiary of 
Interactive Gaming and Communications Corp., a publicly traded 
company on the OTC Bulletin Board under the ticker symbol SBET.  

	MGM Interactive, a unit of Metro-Goldwyn-Mayer Inc., manages 
creative development and production of interactive products for a 
variety of multi-media platforms, as well as talent and developer 
relationships.  

	In 1996, MGM Interactive released the critically acclaimed The 
Ultimate James Bond: An Interactive Dossier and Chitty Chitty Bang 
Bang's Adventure in Tinker Town.  In 1997, the company released the 
widely popular game Machine Hunter.  

	Metro-Goldwyn-Mayer Inc. is actively engaged in the worldwide 
production and distribution of entertainment products, including 
motion pictures, television programming, home video, interactive 
software, music, licensed merchandise, a 1,600-title library, a 
4,500-title home video library and a significant television library.

	The company's operating units include MGM Pictures, United 
Artists Pictures, MGM Worldwide Television, MGM Telecommunications 
Group, MGM Distribution Co., MGM Home Entertainment and Consumer 
Products Group, MGM Music, and MGM Interactive, among others.  

URLs:
War Games                        Intersphere Communications Ltd.
http://www.wargamesmgm.com/      http://www.intersphere.com/.

MGM 
http://www.MGM.com.





Bells go 0-4 in long distance requests with FCC

	The government rejected a Bell telephone company's plan to offer
one-stop shopping for local and long distance services in Louisisana.
The 5-0 Federal Communications Commission vote marked the fourth
time the agency has turned down a regional Bell telephone comapany's
request to provdide long distance service to its local customers.
No requests have been approved. As in the earlier cases, the FCC 
concluded that Bell South Corp. has not sufficiently opened its
local phone market to rivals, a condition for entering the
long distance business.






Bill Gates gets egg on face in Brussels 
                 
	Microsoft Corp. Chairman Bill Gates got a face full of custard pie 
during his visit to Brussels on Wednesday, organizers of the visit said. 
The attack took place as Gates, fresh from a visit with world and business
leaders in the Swiss ski resort of Davos, was about to attend a reception 
given by the Belgian Flemish community. 

	Organizers said five people, equipped with stocks of pies, appeared
to be involved in what was believed to have been a prank with commercial 
intent. Shortly after the incident, a caller offered to sell Reuters 
Television some film of the attack, from which Gates emerged spattered but 
seemingly unscathed. 
	A Microsoft spokeswoman said Gates was "surprised and disappointed"
but unhurt by the attack. "From our perspective it's very unfortunate that
anybody should have to go through this," said Erin Brewer from the 
company's Redmond, Wash. headquarters. She said Gates took some time to 
clean up and then went ahead with his planned speech on technology and 
education. 

	Brewer said she did not believe Gates or Microsoft would press 
charges.  She said the company understood the incident was the 
work of Noel Godin, a Belgian who has made a name for himself and a 
lucrative business out of hurling custard pies in the faces of the rich 
and famous. 

    	Asked whether Microsoft was concerned about Gates' security, Brewer 
said, "We look at this is an isolated incident. He does have 
appropriate security at all times."






Corsair completes PhonePrint expansion for AT&T Wireless Services 

Fraud prevention system fights roaming fraud in Southern California and 
Las Vegas

	Corsair Communications, Inc. announced today the expansion of its 
PhonePrint* cellular fraud prevention system into three AT&T Wireless 
Services markets. 

	The system protects subscribers in Santa Barbara, Oxnard-Ventura, 
and Las Vegas. In 1995, AT&T Wireless was among the first wireless 
providers to adopt the Corsair system. AT&T Wireless began the recent 
expansion project to reduce exposure to roaming fraud in markets in 
Southern California and Las Vegas, Nevada. 

	"While our sister company in Los Angeles has used PhonePrint to make
serious progress in their fraud fighting efforts over the past two 
years, we had seen roaming fraud gradually increase in our adjacent 
markets," said Erin Cord, AT&T Wireless' director of business security 
for the Western Region. 

	"The cloners were being shut down in Los Angeles, and they were 
moving out to our markets to harvest numbers for use in L.A., as well as 
other major metropolitan areas. We implemented PhonePrint primarily to 
stop this infiltration of roaming cloners." 

	According to David Thompson, Corsair's vice president for marketing, 
the situation in California and Las Vegas is part of a trend, in which 
fraud is moving to smaller cities and suburban areas. "Even markets with 
no home fraud problem now have to watch their exposure to roaming fraud 
closely," said Thompson. 

	"There's no predicting where the cloners will turn next, nor when 
they'll do it. They can target a market and wreak financial havoc with 
amazing speed. Carriers understand the seriousness of this exposure, and 
they're protecting themselves now." 






FBI probing "hacking" of U.S. defense computers


	The Pentagon and FBI are investigating intense, successful 
efforts by computer ``hackers'' this month to obtain information from 
U.S. military computers, a top defense official said Wednesday. 
	Deputy Defense Secretary John Hamre told reporters there was no 
indication that the electronic break-ins over the last two weeks were 
connected to a crisis over U.N. arms inspections in Iraq. He stressed 
that ultra-sensitive classified systems had not been breached. 
	Hamre said it was apparently the most intense such effort to 
date and although it might have been just a game, it was a "wake-up call"
on the vulnerability of government and corporate computers. "During the 
last two weeks the (Defense) Department has experienced a fairly 
heavy-duty cyber attack,"  Hamre told reporters.  "In this case, we have 
been working very closely with the attorney general and the FBI." 
	"We did not have any penetration of our classified networks," 
he said.  "The unclassified networks, however, were penetrated." 
	Hamre said the incidents had intensified attempts by the 
department to more quickly spot break-in attempts and catch those 
responsible. "It has dramatically accelerated the Pentagon's and federal 
government's plans to get on top of this problem,'' he said, stressing 
that sensitive data on personnel, payrolls and other information was often 
not adequately guarded by electronic "firewalls" in both corporations and 
the military. 
	Hamre said it was not yet known where the attempts originated. 
But he suggested they might be by amateurs in response to "contests" 
among hackers.  "There are hackers that enjoy just breaking into people's 
computers to see what they can see. And, of course, there is always a 
mystique about the Department of Defense," he told reporters. 
	"There are actually hacker clubs and there are hacker contests. 
And, in that sense, the Department of Defense is vulnerable."  But James 
Glave, a senior technology writer for "Wired News" - an Internet news 
service on the impact of computers on daily life - said he had seen no 
indication that there had been a recent hacking effort aimed at the 
Pentagon.  "I've scanned the Internet news groups where hackers meet 
and often boast about their accomplishments, and I haven't seen any 
bragging," Glave told Reuters. 
	Hamre declined to discuss details of the latest efforts or to 
reveal what information had been obtained. But he said the incidents 
appeared to be similar to previous attempts by hackers to show that they 
could get into protected systems.  "This has all the appearances of just 
being a game, somebody trying to get in so they can say they got it," 
Hamre said, adding such attempts were no joke to the government. 
	He said the recent incidents included attempts to set up 
electronic "trap doors" in software systems through which information 
could be siphoned.  Sophisticated amateur computer hackers have been 
previously convicted, fined and jailed for breaking into sensitive 
military and other government information databases. 
	The director of the super-secret U.S. National Security Agency 
said in October 1997 that the number of break-ins of Defense Department 
systems was increasing dramatically.  "I think it was, in many ways, a 
wake-up call," Hamre said Wednesday of the recent incidents. 











The OCPP is a free publication.  Copyright 1997, 1998.  All 
information in this issue is property of the Ocean County Phone Punx.
Nothing may be copied or reproduced.  Our staff and our ISPs are not 
responsible for your actions.  What you do with this information is
up to you.