💾 Archived View for clemat.is › saccophore › library › ezines › 2600 › 2600_1-10_djvu.txt captured on 2022-01-08 at 14:19:50.

View Raw

More Information

⬅️ Previous capture (2021-12-03)

-=-=-=-=-=-=-

2600 Magazine - Volume 1, Number 1 0 



Jdftl wpuUiahed bv I tin Em*!****. Ik., tndara^i^^miwi. Suhwi^imiftiDb,- Hi i ™ *. «, 

SUM - I yuar. "<^2, MWdklitaiid.NV IliU-msi HCJ Mill 3 SHUNI»ED;"tl.K t.Mjnwa 


ptrlHcL nr. 

AH ilOTSJUi* 


VOLUME ONE, NUMBER TEN 


getting caught: hacker’s view 


Deep down, every hacker wants to get caught- Computer 
hacking isn't really the same as killing or stealing, after all You 
need at least a lit tie brains to be able to hop around on the 
corporations* DECsystcms nr to know the ARPANet better 
than your own PC So if and when you get caught, you wind up 
getting a little bit of credit for having some brains. Most people 
exaggerate and call you a genius! Who can resist this, type of an 
ego boost? 

So when the FBI came knocking at my door early this spring, 
it seemed like the beginning of an adventure. It was me they 
were after! 1 had done something to deserve national attention! r 
At Em 1 didn't know what it was they wanted. They came to 
my house before I was a wake and showed my mother the search 
warrant. 113 never forget the tone in her voice when she called 
me that day. “You T d better come down here right away," she 
said, sounding very worried and pissed off at the same time, l 
knew something was up when 1 heard that. 

So then I came downstairs and saw what was happening. J 
was very calm throughout the whole thing— l even kept my 
sense of humor. After 1 figured out which of my many "pro- 
jects “they wen: interested in, 1 showed them where al! the good 
stuff was hidden, “tio tell the world," I said, 

I had been hacking for about a year. 1 seemed to pick up 
things incredibly fast and before I knew it, I was buried inside 
the weird world of phones and compute rss. In this case, I had 
been running a huge corporation's mainframe for them for a 
few months, This computer had so much data in it that I could 
find out (and change) just about anything paychecks, profit 
margins, telephone numbers, you name iir 1 had lots of fun. 
My friends used to come over late at night and watch me 
explore. Nobody they knew had ever been able to do anything 
like that and it seemed pretiy amazing. Then War Games cam t 
out and J turned into a sort of cult figure in my neighborhood. 
But it was OK nobody knew exactly what l was doing. 

Even my patents didn't seem to mind that much, ibey'd 
shake their head&and wonder what Lind of mischief I d get into 
next. Most people (grown-ups* Lhal is) seemed to act exactly the 
same. And my friends were all into it as something fun and 
rebellious 

So now that 1 was caught, I expected the fun to continue. My 
parents would be outraged that a mischievous kid was being 
hounded by the feds while murderers and presidents were roam- 
ing free. And of course, my friends would slick by me morethan 
ever. We were pretty tight. 

For about a day, that's exactly what happened. My name got 
in a] I the papers, I was on a few news shows, and nobody really 
understood anything. I suddenly became popular at school. 
Everybody seemed to agree that it wasnlt fair for them to come 
to my house and take away my two computers just like that. 

Then, after the initial shock, people's moods started to 
change. My parents were the first. They suddenly got mad at 
me. '‘What a stupid thing to do!" I remember those words. "If 


you don't care about yourself, at least think about what you're 
doing to your family," and so on. They also said that 1 never 
listened when they told me to knock it off, which was totally 
false, since they never really seemed to care at all 

But a II that didn't upset me. After all, parents are supposed to 
say those kinds of things. I knew they really cared, so it didn't 
matter what they said. 

It wasn't until a few mane weeks that the really bad stuff 
started happening. The feds began calling my friends and tried 
to scare them into saying incriminating things about me. They 
told them they'd be in just ns much trouble if they didn’t say 
anything. \ could tell something was wrong when a II of a sudden 
nq one was talking to me. People ] used to hang out with 
suddenly seemed uneasy when 1 was around. 

Then the feds starred calling me. And I could tell from the 
pointed questions they were asking, that someone J trusted had 
told them a lot. Much more than they had to. U wasn't Like they 
had just cracked and said* yes, he did this and that. They 
volunteered information! , 

I iried to figure out why someone would do 1 his- -no om 
knew had any grudges against me. 1 didn't really have any 
enemies^ They must have thought that telling everything was 
for my own good. The feds had probably told them that l was 
really sick and needed help and lhal only the truth would set me 
free. Could that have been it? 

It might have been. But th^rc was definitely more than that. 
When the feds started scaring my friends, lhat was my fault. At 
least it seemed that wav to on friends. A couple of them gnt so 
scared that their families hired these big, expensive lawyers. 
And that was my fault, too. even though I knew they were being 
ripped off. 

So what did I get out ol the whole thing? Well, nobody trusts 
me anymore- people are even Afraid, lo 3ct mu use their phone. 
IVc gotten a reputation as someone who doesn't care at all 
aboui hts friends, otherwise how could l have pul them in such a 
spot? Everyone in town knows that 1 did something had to some 
corporation somewhere, but nobody understands how much of 
a game the whole thing seemed at the lime. The newspapers 
were never really interested in my side and nobody else seems, to 
be either. 

Maybe this is good in a way, because 1 found out that mo$i 
people value friendship less than their own safety. As soon as 
the pressure is applied, they Jose all feeling for you. Then they 
trick themselves into believing that you were always a had seed 
from the start. They do this so they won't feel guilty about the 
way they shafted you. But there were a couple of others who 
did n't desert me because they knew who I really was. If it wasn't 
for them* I might have just jumped off a building one nigL"""N 
That's how bad it makes you feel sometimes. 

Yes, l^rti through hacking. Let the professionals do it they 
can't gel hurt like 1 was. 

Name withheld by request. 


i 


VITAL INGREDIENTS 

SWITCHING CENTERS AND OPERATORS 




Every switching office in North America (the NPA aystem) u 
issipcd ar office name and class. There are five citUW of offices 
numbered I through 5. Youf CO is most likely a class 5 or end office. 
Al l Lon^-D^taivce {T oil) calls are switched by a toll office which can he 
a class 4, 3, 2 , Or t office. There is also a 4X office called an intermediate 
point- The 4X office is a digital one that can have an unattended 
exchange attached to it (known as a Remote Switching U nit — RSU). 

The following cha rt will List the office number name, and how many 
of those office* existed in North America in I9SI . 


Ch» Name Abb. 

I Retfonal Center . , - RC . 

J SectkraaJ Center SC . 


# Emitting 

■ h + 1 ■ h 11 

67 

, . . . . 230 
. , . 130 


3 ♦ ♦ , , . . Primary Center PC + 

4 TollCemer TC * 

4P * * , . . Toll Point TP 

4X Intermediate Point IP 

5 End Gflk* EO 19,000 

R RSU ....►♦<<,► RSU 

When connecting a call from one party to another, the switching 
equipment usually tries to find the shortest route between the Class 5 
end office of the caller and the Class 5 end office of the called party. If 
no inter-office trunks exist between the two parties, it will then move 
u p to the next highest office for servicing (Class 4 ). If the Class 4 office 
car not handle the call by send ing it to another Class 4 or 5 office h Li will 
be sent to the next office in the hierarchy (3). The switching equipment 
first uses the high-usage interoffice trunk groups. If they arc busy il 
guc* to the final trunk. groups On the next highest level. If the call 
cannot be connected then, yon will probably get a reorder [120 IPM 
( Interruptions Per Minute! signal— also known as a fast busy]. At this 
time, the guys at Network Operations are probably going berserk 
trying u> avoid the dreaded Network Deadlock fas seen onTVI). 

It i* a Iwi interesting to note that 9 connections in tandem is called 
ring-arourd-the-rosy and it has never occurred in telephone history. 
_^J'hLK would cause an endless loop connection fan interesting way to 


The 10 regional centers in ihe United Slates and the 2 in Canada are 
all interconnected. They form the foundation of the entire telephone 
network. Since there are only 1 2 of them, they are listed below: 

Ct*&* I Regional Office Location NPA 

h h ^ - ♦ < 214 

Wayne, PA 215 

Denver 4T - 303 

Reglm Nq. 2 SPl -4W [ Canada \ ► ♦ 306 

St. Louis 4T + 31 4 

Rodulilc, (p A . . + . . ■ 1 . . . . + 1 r t 1 1 ■ ■ ■ * . ■ ■ ■ ■ 404 

Ptttsburih 4F, . . . P h + H ■ ■ ■ - ■ ■ 41 2 

Montreal No. I 4 AETS [C*n*tfe*| 504 

Norwich, NY - 607 

San Bernardino, CA , > - - ,. hP + .. 714 

Norway, IL - < . r ► < < <IS 

White Plains 4T, NY 914 

I n t he Net work, there A re three major types of switch i ng equ i pment 
They arc known as: Step. Cros*har, and tSS. Check past and future 
issues of 26fX) for complete details on how these systems work. 

Operator* 

Another uml ingredient of the Network i* the telephone operator. . 
There a re ma r v d iffercnt k Lnds. What follows is a discussion of some of 


the more common ones 


opposed to This Shitty Phone Service)] Operator is probably the hitch 
for bastard lor the phemale liberation ists) that most of us are used to 
having to deal with. 

Here are her responsibilities: 

I) Obtaining billing information for Calling Card or 3rd number 
calls. 

2} Identifying called customer on person-to-person ca Ils. 

3} Obta ining acceptance of charges Oh col lett ea lb. 

4 ) Identi fy i ng ca King numbers. This on I y happen* when the ca Hi ng 
^jiumbcr is nol automatically recorded by CAM A (t’eniralired 
\utomutic Message Accounting! and forwarded from the local office, 
.his could be caused by equipment failures (AN IP Automatic 
Number Identification Failure) or if the office is nol equipped for 
CAM A (ONI Operator Number Identification). 

|| once had an equipment failure happen to me and the TSPS 


operator came on and said, ‘‘What number are ^ucalling/raffl. r Out 
of curiosity, l gave her the number to my CO, she thanked me, and then 
1 was connected to a conversation that appeared to be between a 
frameman and his wife. Then it started ringing the party I originally 
wanted to call and everyone phreaked out (excuse the pun). 1 
immediately dropped this dual line conference!) 

You shouldn’t mess with the TSPS operator since she Acnous where 
you are calling from. Your number Will show Up on a ID-digit LED 
read-out fANI board). She also knows whether or hot you are at a 
fortress tone and she can trace calls quite readily. Out of ail of the 
operate^, she is one of the mo si dangerous* 

• INWARD Operator. This operalor assist* your local TSPS f 1 ^)") 
opera! or in connecting calls. She will never question a call as lopg as 
the call is wilhin her service area. She can only he reached via other 
operators or by a Blue Box, From a BB. you would dial 
KP+NPA+I2I+ST for the INWARD operator that will help you 
connect anv trail* within that NPA only. 

• DIRECTORY ASSISTANCE Operalor, This is the operator tha! 
ynti arc connected to when you dm 1 41 1 nr NPA-555-I21 2. She doe* 
nut readily know where you arc calling from . She d oes not have access 
to unlisted numbers, but she docs know if a n unlisted number exists for 
a certain Listing. 

There is also a directory assistance for deaf people who use 
Teletypewriters (TTY Si). If your modem can transfer BAUDOT (45.5 
baud- the Apple Cat can), then you can call him 1 her up and have an 
interesting conversation. The number is EQO-H55-I 155. They use the 
standard Telex abbreviations such a_s <1 A for Go Ahead - They tend to 
be nicer and will talk Ifmj^r than you r regular operators . A iso, they arc 
more likely to be pereuaded to give more information through the 
process of "social cngtn« ring 1 ". 

Unfortunately, they dcmll haw access to much, I once bullshitted 
with tine of these operators and I found out that there ate two such DA 
offices that handle TTY. One in in Philadelphia and the other is in 
California. They have approximately seven operators each. Must of 
the Tl " V operators seem to th ink t he i r job i s boring. L'hey a Iso fed they 
are underpaid; They actually call up a regular DA ti 10 process your 
request no fancy computers here! (Other operators have access to 
their own DA bv dialing KF*NPA+ 1 31+ST (MF). 

The TTY directory assistance, by (he wav', i* still a free call, unlike 
normal DA. One might be able to avoid beingcharped for DA calls by 
using a computer and modem at 45.5 baud. 

• CN/A Operalor, CN ■ A operators do exact K the opposite of what 
directory assistance operators a re lor. You give them the number, l hey 
give you the name and address ( (.’uscomcr Nam*' Address). In my 
experiences, these ope ralora know more than ihe DA operators do and 
thev are more susceptible to “social lingi necring . " 1 1 is possible lo 
bu LKh it n CN A ope ra 1 or fo M he NON -FI ? B D A n ( i.e , , you give them 
the name and th ey give you the unlisted number). This is due to ihe fact 
that they assume you arc it fellow tom piny employee. The divestiture, 
though . has itsu tied i n the h rva k - up ot a lew NON - PU B *t \ and policy 
changes in C’N A. 

• INTERCEPT Operate*. I he intercept operator is the one that you 
air connected 10 when there a re nut enough recordings available or the 
area is not set up m tell tou that the number has been disconnected or 
changed. They usually say. ’‘Whiit number did you dial?” This is 
considered to be the lowest operator Lifeform since 1 Hey ha te no power 
W'halstv^icr and usually know very little. 

• OTH ER Op#raiors, And then t kn.- ani t he: M ob i Ic, Sh ip-to-Shore, 
Conference. Marine, V-crifv. “Leave Word and Call Back/ Route and 
Rate {KF+HOtl* 14 1 * 1 2 12+ST new number as a result of the break- 
up). and uther special operators who have one purpose ur another in 
the Network. 

Problems with an Operator*.* Ank to *peak to their supervisor. ..or 
belter set. ihe Group Chief (who i*the highest ranking official in any 
office}", the equivalent of the Madame in a whorehouse (if you will 
excuse the analogy ) 

Some CO\. by ihe wa> . have bu^ in them thai alto* you to use a \ 
or a 0 as the 4th digit when dialing. (This tends to happen mostly in 
c rossha n and it d oesn T work consi*ten ilyT'l his cna hies a ca Her to call 
special opera torn and other internal telco numbers without having to 
use a blue box. Kor. example. 4I5-I2I-ISI I would get you a San 
Fra nciscoAlak land INWARD Operator. 

/The uktnv vvo.i ftikcti from Basic f eloeLMnm un icat i«ns Part IV. 
written hr Sh 7 ( ' Atft'ftr fMJ.} 




I 


MNO 

6 


OPER 

o 

— * -J 


OPER 

o 





NSA Wants Better Phones 

The Nr* ViMt l's^n 

The National Security Agency is proposing that the 
Government and industry be equipped with as many as 500,000 
telephones that can be secured against interception. 

The agency is convinced that the Soviet Union and the other 
nations are obtaining important intelligence from United 
States telephones. 

Although cloaked in secrecy, a program like the one the 
agency proposes could cost hundreds of millions of dollars. 
Under the proposal, production of the secure phones would 
begin in two years, 

The number of secure telephones currently used by Govern- 
ment agencies Is classified information. But the Carter 
Administration said there were 100 such phones in the 
Government and it planned to buy 1 50 more. The cost of each 
phone then was £35,000. The Reagan Administration has 
bought an unknown number of additional secure phones. 

“Anyone making a phone call to the West Coast or Boston 
from the Washington area has no idea how the conversation 
will be transmitted," an NSA spokesperson said- Tt might go 
via fiber opt ics, conventional cable, microwave towers or one of 
the 19 domestic satellites. Ef it is going via satellite you can 
presume the other guy Is listening to It," 

Oh No, Not Again! 

AnaLUuInl Pr^j : : 

The House passed a bill on September 17 by voice vote that 
would make it a Federal crime to gain unauthorized access to or 
tamper with computerized medical records. 

Victimized by Crime Computers 

IV Vnrk. I 

Police officers went to an apartment in New Orleans looking 
for a woman named Vera Davis, who was wanted for theft and 
forgery. Although the woman who answered the door identified 
herself as Shirley Jones, they arrested her anyway, A police 
computer listed Shirley Jones as an alias used by the forgery 
suspect. That was two and a half years ago. 

According to her attorney, Mrs. Jones, who was oner 
advised by a sherifTs deputy to change her name to avoid future 
arrests, is one of a growing number of people in New Orleans 
who have gotten in trouble with the law because of inaccurate, 
outdated, or misused information in police computers. 

The New Orleans computers are part of a national network. 
From a local terminal, a computer check can be run through the 
National Crime Information. Center in Washington, operated 
by the FBI, in less than a minute. 

The New Orleans case, said Robert Ellis Smith, publisher of 
Privacy Journal, a newsletter that reports on privacy cases from 
Washington, DC, is “symbolic of a larger national problem, an 
incredibly high rate of inaccuracy" in criminal records and “an 
inordinate amount of mistaken identity cases in the criminal 
justice information systems." 

Sears Satellite Network 

The American Satellite Company has signed a contract with 
Sears, Roebuck and Company to construct arid operate a 


private communications system linking corporate offices of 
Sears and its subsidiaries in 26 United States cities. Thif would 
be the largest private system ever developed capable of offering 
ftiJL-motion video teleconferencing- 

Loopholes Around Wiretap Laws 

H* New TbH W in] 

Senator Patrick J. Leahy t Democrat of Vermont, has 
that he will seek, legislation to improve protection of privacy by 
closing gaps in Federal wiretapping laws. 

He and Severn) experts said at a Senate Judiciary subcom- 
mittee hearing that it was unclear, for example, whether 
existing laws permitted Government officials or others to 
intercept electronic mail* or even ordinary telephone oalh sent 
by computer or microwave technology, without a warrant. 

“There are tremendous holes in communications privacy 
today, "testified Ronald L. PLesser. a Washington lawyer who 
has long specialized in information privacy issues. 

The experts at this hearing testified that private interception 
of electronic mail and other messages carried through telephone 
networks may nut violate Federal law. 

IBM is Buying Rolm! 

Tl»t ■*!(*» t-wk Tbtki jjfrt ipan| 

. IBM has said that it will buy the Rolm Corporation, in a 
move that will heighten the competition between the world’s 
largest computer company and AT&T. The price? SI ,25 billion. 

TBM wants It all, it needs it all,* 1 said Bather Dyson, editor of 
Release 1.0, an industry newsletter. "They have a biological 
urge to grow." 

Most analysts, however, said that IBM bad realized — 
perhaps belatedly — that it greatly needs to strengthen its 
offerings in telecommunications switching equipment. 

Rolm. founded in 1969 as a maker of military computers is 
now a leading maker of private branch exchanges, systems that 
control both voice and data communications over the 
telephone. 

9! 1 Suspect Hung Up 

'nwNrw Vnrfc F-iw 

A notorious hoax caller who has plagued 91 1 switchboards 
for three years has been nabbed reporting another bogus crime, 
police say. 

Cops say the suspect — who they have been unable to 
identify — made more than 500 false reports ranging from 
strangulations in progress to rapes and shootings of police 
officers. 

He was arrested at a Penn Station pay phone while telling a 
91 1 operator he had just raped and strangled his girlfriend with 
her pantyhose. Thai was the fabricated crime he reported most 
frequently, according to police. 

“He called every day of the week at all hours, “ said Sgt. 
Stephen McDonald, 

“He was causing a lot of problems and the 91 1 people were 
really Looking for him," said Officer James Espied ra who 
collared the hoaxer. 

According to McDonald, news of the hoaxers capture was 
jubilantly received by 91 3 operators: “There was a lot of 
cheering." 

In the words of Lapiedra, "He was surprised he was caught," 

1-57 


3 




LETTERS FROM THE 

Dtir 2600: 

I am currently involved with the Crystal Palace BBS, 
formerly OS UN V (hopefully yon have heard of it). The system 
is down now for some software mod ification^ and many people 
have tried to persuade me into changing the purpose of the 
board, which is telecommunications and other related fields. 
The crackdown on this type of BBS is starting to become 
overwhelming. This is what my inquiry is about. After reading 
my first copy of your newsletter, 1 was elated with the quality 
and content of information it had! Referring to the front page 
article (July 1984, page 1-37), “Loot Out, Hels Got a 
Computer!" 1 agree that the ami-computer hysteria has gone 
and is going to go too far! 1 am interested to know what exactly 
iN an illegal BBS message and what is not. Do I have to monitor 
the system 24 hours a day, 7 days a week? Am I responsible for 
every message posted on the board? L know that these are 
questions that everyone wants answers to and can^t find. As I 
see it the BBS is just another form of newsletter, so why ate they 
picking on us?! I do, however, realize that some messages are 
quite illegal like: cred it ca rd tf*s and the like, but the information 
on how to gel those #'s is not i llegal ( right?). Any information 
on this subject would be greatly appreciated. 

Crystal Palace 

Dear CP: 

What is a BBS? You know the answer, we do, and a good 
many of our readers also do. The problem is that the people 
who go around passing laws and raiding homes don^t have the 
slightest idea what a BBS really is. All they care-about is the fact 
that a computer is involved somewhere along the line. And 
computers, they say, can do anything in the world. But what's 
so ironic in 1 he case of a BBS Is the fad that the Computer is just 
Muring messages //The exact same effect coukf be accomplished 
on a physical bulletin board, inside an auditorium, or in 
everyday conversation. Bui you don't see these things being 
outlawed because people would never stand for that kind of 
repression (we hope). Computers are easy targets because the 
average person doesn't understand them al ail. By making 
people think that itY actually illegal to wrile something d own 
and pass it along tool hers, the authorities ate taking one great 
big step towards total contFdb 
We agree that a BBS is really a nother form of newsletter. We 
don it agree that messages containing cried it card fr'sare Illegal in 
any sense. (They are boring, though, and practically useless to 
anyone except fraud investigators.) It's the actual use of these 
numbers I hat constitute* fraud, not the simple act of passing 
them around. If a cop on the street overheard you giving 
numbers to a friend, could hr arrest you? l,etb hope it hasn't 
reached this stage. 

We're currently working on getting some pone legal 
i nforma I ion concerning this su bject so t hat we can address your 
questions better. In the meantime, though, we hope your board 
and the many others like it amtmd the world won't he 
intimidated by these scare tactics. You can talk about whatever 
the hell you want. But it's still illegal to commit the crimes 
you're talking about. 

If enough of you guys stood up for your rights out in the 
open, this wouldn't be such a problem. You might actually wind 
upsa vipg an importam part of democracy fora few more years. 

By the way, readers, if youYe running a BBS that talks a bom 
these things or know of one that does, send in the name and 
phone number for our Hot 100 list which will be published 
soo fi. Make sure the BBS you're sending iiqnffto be publicized 
and try to include a reason or two why your BBS is better than 
most. Check the front page for our addresses. 

Received your August issue, and enjoyed it. A number of 
comments... 

I ] Does anyone know what happened to TA P ? 

2) There is a newsletter called the Contser Letter, available 
lor free from Ross Engineering Assoc., 7906 Hope Valley 
f’ourt. Adamstown, MD217IO. Lots of good information, bui 
:hey want a tetter requesting ihe newsletter on leiterhead and 
dentifying your interest in communications security (one can^t 
k too careful these days!). It^ always interesting to know 

1 - 5 * 


OUTSIDE WORLD 

what's happening on the other side... 

3} What works against an ESS switch? Black boxes are ok, 
but more modem equipment seems to be coming in rapidly, 
blowing our older techniques off the air! 

Hie Animal 

Dew Animal; 

For info on TAP > consult our September issue, page J-52. 
We hate repeating ourselves nit the time. 

Thanks for the sample copy of Comsec letter h looks 
interesting and we're looking into reprinting some of the good 
stuff. Readers: feel free to send us anything that looks like it 
might be interesting to us. Lt usually is. 

ESS switches and black boxes are dealt with extensively on 
page 1-43 of our August issue, as you probably know. The only 
thing we can suggest to counter an ESS is ingenuity. There's 
always a way to get around anything. 

Dear 2600: 

t really enjoy your publication! It seems you guys are not a 
bunch of wimps who are so damn paranoid that the feds are 
going to catch you. Anyway . what types of back Issues do you 
have? I received my first issue, which is Volume I, Number 9. 
What are the context of the back issues? I ‘m looking for one 
having to do with loops, sprinting, back ingout sprint/ mci s, or 
anything similar. Also, any arpanct. 1 archnet stuff? 

ltd 

Dear kd: 

Welt be publishing a guide to our hack issues that should be 
out right in time for the Christmas rush. Just about all of the 
topics you mentioned have already been covered and they all 
will be co vered in the future. Wc accept articles and information 
from anyone. 

You’re quite correct in saying that we're not paranoid. We 
have nothing to be paranoid about because we're not doing 
anything wrong. 

Dear 2600: 

Though it may seem like only yesterday ihai computer crime 
first caught the nation's fancy, it has been on the mmd of state 
legislators for quite some time. With the recent passage of 
computer crime laws in Maryland. Iowa, Connecticut, and 
Hawaii, the number of states Jacking computer crime laws ha^ 
fallen to seventeen. I he law* of the other33 have beervcollecte^ 
in a new reference work published by the National Center for 
Computer Crime Data, and called 77 m* Computer Crime Jjjn] 
Reporter. In I he course of compiling the text* of all the state' 
computer crime laws on the books^ editor Jay BloomBecker 
found that.a number of states had hills or the books for years 
without anyone noticing them. 

The book, 200 pages plus two updates, is available for $45 
from 'the National Center for Computer Crime Data, 4053 
J.F.K. Library, California State University at Los Angeles, 
53 5 1 State University Drive, Los Angeles. CA 90032. 

In addition, the National Center will begin publishing a 
newsletter devoted to moral* and ethics in computing. Its name 
is Conscience in Computing. 

There are schools teaching computer ethics, no matter how 
ma ny a re not . There a re professionals questioning their roles as 
computer scientists and asking a bout the social impact of their 
work. There are computer bulletin boards which support ethics 
discussion groups. 

Conseience in Computing will he a monthly newsletter, 
subscriptions costing SIR annually. Work exchanges a|Eow 
reader* to become subscriber* by convincing others to 
subscribe, reporting news of conscience in computing, or 
working out an individual contract with the National Center. 
Interested people can write to Ihe above address. 

The Niltoatil Center Tor Computer Crime Data 
(The National Center for Computer Crime Data a a nonprofit 
research organizaf ion at Cuiifomia State University tit Los 
Angeies.) 

Whoopsee 

In our tut issue* we forgot to mention that in our August issue, 
we forgot to mention that the front page story (“But How Does 
It Wort?") came from the desk of BIOC Agent 003. Better late 
than never. 


4 



2600 






ONTA 


wm* 

^SsS^. 


PS>*~ ,- o*rj. 

i 



■S^S^S 51 

'igs*-' 

J Now YorkTelephon* 

;' n *'fe J K w i, "» 

-v ‘''"Sirs '‘'"^C’’"’ 

J j -^ 


«" -TT" ■» ;? «. 



J 

'"Wkm 


. w. 


■* ^ 4*< J 






' '■«<** 



.T.*- : 


■"t'H ™.. “ -» i'j. * r,- H rj- 

. H .1 Hq tjl ,H * tj l , Al 1 j h T ^ hl l -H- 

&■£$.£& 
E^-CC** 


■■‘'l- „.. ** W, 


f*h | j^i 


■■At-,- h,,,.. • | 3r v * 

V "*41 ,. ■ *’ J •H.tto, ^ ^IfL 

r " ,l v-Tr** 1 ^ 

““ Aw^C*^ 

,"’"■ /..z.'“' ^Tjy^ 

'^nm ^ J„ ,. n 



“J 1, rilV 






From th« t£mK of 003 


ING 



"JTr. -1 

‘*-*53 


p , . -: 


page 5 



Security 

ss close as your fingertips 


CORPORATE. SECURITY 

Diraclcr Corporals Ssctinly 
Jt- ft i MMbar 212-395-0505 

SECURITY STAFF 

SflCU^Ly Suptrv^tf 

W F Mcd*My . .£l2-3fl!i-M28 

SiCuriCy Minagar 

R F. Jotraan £12-395-0552 


Mew Vohk city reDiON 
Security Mimggr 

W-ffr-Bre**- .212-395-4159 


N*w York C>1y Wh( 

Security OlliCf 212-3»5-Q«15 

Security Sjo«tvr»r 

JL P. PHi* 2l?-3M-Kl5 

H«Hr Yotk CEty East 

Bacmrly attic* . 2T2-291-9017 

Security Suo«vi»r 
C JL Hauls'll 212-523-9953 

H STATE REGION 

Suburban 

Secmily fJin^g^r 

JL JL Ferrari 9TJ-0&9-9&49 

MitfStam 

Secu^y OINce 914-993-93&5 

S*Cufny &jp*rviur 

H ft Z apr &14-6W-WW 

Long island 

StCuniyOrikCt , . . . 5ifi-294-DZT0 

Sacijrity Si4D&rvisor 

. R. H. tamtwrwn , , 515-29443722 

UPSTATE 

Security Office 510-449-3250 

Stcufiiy Supurvisor 

T. A. P#o4>:Ci 510-449-S442 

S*curity Uarugar 

T.JDofan 515-449-7224 

I« 


HWl 'i***40>H I4a*i.i* ■ 
U4 U*im H*A -+ M* 
■*^jb lw iwa* tmi ■! ^ 
tai^ Jif ia|M 14 n a «adi m k 
l|l#L -^IMillMU 

M^dlUwO-*^ MTfr4i4.NI 
pwi^l dvn MN MW H1H 

m ■“** F" .I.YIV i* “N 

Tl«M UH 

-jmi •rtrrt*. n(fr*i 

Jfl 4 11 " U»W)*^( 

' ^(ij|_V n| jtfiM iii pun 

-JfN.V OJ Hlf] | jm 

,i| 4 «iai 4 w awd ^1 




Mja 4 « --Tl|r ' >| iu^ 

inii ..unhnj *m» b<tfr 
pua ifriHl hr^H-un. 
ppi4iNf| Ain^Jiaiu u-: || 
■pfcprtdvi J! 'dU frdj( F* 
-tqnd i)«waa v sfr) frAN* 
— HI "T’^F " fc IT' ™ ~ '*> 

ini iftnil Hit AiHf 'i4unj> 

H,** -»i»i*!ui ■ pu;j i* 
II. Ati****'< fr-f4) 


HinaB^.1 > ^Bar*q^iliriJvi 
«1M|. WMI1. (.Iiup H APf lilk, 

■jJZLti 

'JWK JiN 
s.’iaii^apafvh ii*n^ n> p^i \.11-| 

wAhla-ihri pua km puHiiBt 

■4 i d Am *U -IMV^I 
ji> iM^ni iv w xn rm-ii 

l i iua«iBwiun.')i'n]Hnii 

|u^u-t ^l.T*'** au;p 
w>i^N|L>A »uja 41 pv-H. 
^|^.>KQnd uipbu uM|nan> 

ml I k I M 1 1 1 1 V 1 LIE iw* J(IJ 

ppwuu 
■MU amp ** HPW4HM^U4**! 
W| V* »d U* 1 HH itn Ftl 


TOLL FRAUD 

Ton Fraud OlhCB 212-22 M764 

Sdcunty Su£ii"Mi»r 

H. F G^lfrQKwr .212-2^1-5944 

SccuAty hian*9nr 

JL S- Whitman 2T2-395-0W7 


On *HHtn4l. hclHJaya and oul of 
n&u rt ctM lha loKowmj Hltpnont num- 
ban to duaip aumanct. t 

CuiBdmar Sirwca Bureau 
Naw 4x4 Cily ftc9*vi iiS 3K H71 

U«tSUt* 914-390-5900 

U"9 Wind 51E-742-3030 

StCuMy Ollica 

Uoataba 519-449-3250 


■ULLOINS PftOTECTIDH 
□MANIZAHON 


Qmrd C wn iii i n wi 

N*w Itrk Cfly N*Q«r 

W J. Blue mat 212-3 

Sul* Rsg*oh 

H. K Athldtah 914-9 


.212-394-3400' 


914-994 -9253' 


■iVOtf (fliphfliwjiumJrj 

wuurdAa ca«td co*KWftuf*s martffi 

tit bwt&tiQ pfm'KMm. 


5 


• Humm-rtim-mm, Tholes ttw 

tone—your "go ohtod" 
,nol to stort dialing. Please 
wait for it 




after you 
finish your 
C&Jt j . . . . 


sure to replace trie receiver 


Try Ond'Plus Dialing. 

•Telephone cords and water 
don't mix. A wet cord can put 
your telephone out of order. So 
please keep your telephone 
cord away from sinks, valves, 
steam and other places where 
water might get on It. 


DIAL CAREFULLY! 
Avoid wrong numbers 
by first checking the 
number and them 

DIAL EACH DIGIT 
CAREFULLY! 


Dj al - a- Discount , Dial - H-Y Du reelf 


£ 


'u 


HEN ANSWERING THE 

TELEPHONE, always identify yourself 
your firm, or your department. 


^ ■ I 




IF YOU RE 
NEW IN TOWN 


mtt 

, *e< 

s? 





V 


% 




The wheel the* 
lets you roll 
around town 
without leaving 
home. 



Jus! spin the dial an4 you ra 
laRmg to tnc pharmacist. Son n 
ioairi and r&acn your insurance 
mart. Or chat wun a friend acre 53 
town. Count on it any lime — 10 
save you ltnn& ana 1 raveline. 
5ave£ mOrt^y. too. Wha! e SO 
doe 5 so muc rt yo [ c-dsTs & 3 1 itt -e ? 



when ybu r re owejr \Z-f 

from your office 
-who'tf answer r ■ \ 

U \<0; .■ 


1 


your phone? 


_*+ ' " * 



hiii* 


iM" 

S«l ^Tfltp Irene imwwriq 
iimirt" pogM irt ihii ' ^ 

rfjffrtflryt 



y 

when 

to get personal? 

SlitlofHHUIbfl riln m 
■Iwjyi cheaper, io you 
thouAd VH perwm-to-per- 
nn wily when you want to 
liiklo ■ parUeuwr pirty* 


shop the YeMow Popes 


•Party-liners — don't forget the 
other fellow needs the tele- 
phone too. 


• For better service, don't trans- 
fer a call to someone else it you 
car take care of it yourself. 

1-69 


NOT SORE 
OF THE NUMBER 


Youll save time 
and trouble 
if you took 
in the directory 



Save lime . . telephone. 

When you're on the go . . . 
you're as close to home or 
office a? the nearest public - 
telephone booth fry It end 


6