💾 Archived View for clemat.is › saccophore › library › ezines › 2600 › 2600_1-10_djvu.txt captured on 2022-01-08 at 14:19:50.
View Raw
More Information
⬅️ Previous capture (2021-12-03)
-=-=-=-=-=-=-
2600 Magazine - Volume 1, Number 1 0
Jdftl wpuUiahed bv I tin Em*!****. Ik., tndara^i^^miwi. Suhwi^imiftiDb,- Hi i ™ *. «,
SUM - I yuar. "<^2, MWdklitaiid.NV IliU-msi HCJ Mill 3 SHUNI»ED;"tl.K t.Mjnwa
ptrlHcL nr.
AH ilOTSJUi*
VOLUME ONE, NUMBER TEN
getting caught: hacker’s view
Deep down, every hacker wants to get caught- Computer
hacking isn't really the same as killing or stealing, after all You
need at least a lit tie brains to be able to hop around on the
corporations* DECsystcms nr to know the ARPANet better
than your own PC So if and when you get caught, you wind up
getting a little bit of credit for having some brains. Most people
exaggerate and call you a genius! Who can resist this, type of an
ego boost?
So when the FBI came knocking at my door early this spring,
it seemed like the beginning of an adventure. It was me they
were after! 1 had done something to deserve national attention! r
At Em 1 didn't know what it was they wanted. They came to
my house before I was a wake and showed my mother the search
warrant. 113 never forget the tone in her voice when she called
me that day. “You T d better come down here right away," she
said, sounding very worried and pissed off at the same time, l
knew something was up when 1 heard that.
So then I came downstairs and saw what was happening. J
was very calm throughout the whole thing— l even kept my
sense of humor. After 1 figured out which of my many "pro-
jects “they wen: interested in, 1 showed them where al! the good
stuff was hidden, “tio tell the world," I said,
I had been hacking for about a year. 1 seemed to pick up
things incredibly fast and before I knew it, I was buried inside
the weird world of phones and compute rss. In this case, I had
been running a huge corporation's mainframe for them for a
few months, This computer had so much data in it that I could
find out (and change) just about anything paychecks, profit
margins, telephone numbers, you name iir 1 had lots of fun.
My friends used to come over late at night and watch me
explore. Nobody they knew had ever been able to do anything
like that and it seemed pretiy amazing. Then War Games cam t
out and J turned into a sort of cult figure in my neighborhood.
But it was OK nobody knew exactly what l was doing.
Even my patents didn't seem to mind that much, ibey'd
shake their head&and wonder what Lind of mischief I d get into
next. Most people (grown-ups* Lhal is) seemed to act exactly the
same. And my friends were all into it as something fun and
rebellious
So now that 1 was caught, I expected the fun to continue. My
parents would be outraged that a mischievous kid was being
hounded by the feds while murderers and presidents were roam-
ing free. And of course, my friends would slick by me morethan
ever. We were pretty tight.
For about a day, that's exactly what happened. My name got
in a] I the papers, I was on a few news shows, and nobody really
understood anything. I suddenly became popular at school.
Everybody seemed to agree that it wasnlt fair for them to come
to my house and take away my two computers just like that.
Then, after the initial shock, people's moods started to
change. My parents were the first. They suddenly got mad at
me. '‘What a stupid thing to do!" I remember those words. "If
you don't care about yourself, at least think about what you're
doing to your family," and so on. They also said that 1 never
listened when they told me to knock it off, which was totally
false, since they never really seemed to care at all
But a II that didn't upset me. After all, parents are supposed to
say those kinds of things. I knew they really cared, so it didn't
matter what they said.
It wasn't until a few mane weeks that the really bad stuff
started happening. The feds began calling my friends and tried
to scare them into saying incriminating things about me. They
told them they'd be in just ns much trouble if they didn’t say
anything. \ could tell something was wrong when a II of a sudden
nq one was talking to me. People ] used to hang out with
suddenly seemed uneasy when 1 was around.
Then the feds starred calling me. And I could tell from the
pointed questions they were asking, that someone J trusted had
told them a lot. Much more than they had to. U wasn't Like they
had just cracked and said* yes, he did this and that. They
volunteered information! ,
I iried to figure out why someone would do 1 his- -no om
knew had any grudges against me. 1 didn't really have any
enemies^ They must have thought that telling everything was
for my own good. The feds had probably told them that l was
really sick and needed help and lhal only the truth would set me
free. Could that have been it?
It might have been. But th^rc was definitely more than that.
When the feds started scaring my friends, lhat was my fault. At
least it seemed that wav to on friends. A couple of them gnt so
scared that their families hired these big, expensive lawyers.
And that was my fault, too. even though I knew they were being
ripped off.
So what did I get out ol the whole thing? Well, nobody trusts
me anymore- people are even Afraid, lo 3ct mu use their phone.
IVc gotten a reputation as someone who doesn't care at all
aboui hts friends, otherwise how could l have pul them in such a
spot? Everyone in town knows that 1 did something had to some
corporation somewhere, but nobody understands how much of
a game the whole thing seemed at the lime. The newspapers
were never really interested in my side and nobody else seems, to
be either.
Maybe this is good in a way, because 1 found out that mo$i
people value friendship less than their own safety. As soon as
the pressure is applied, they Jose all feeling for you. Then they
trick themselves into believing that you were always a had seed
from the start. They do this so they won't feel guilty about the
way they shafted you. But there were a couple of others who
did n't desert me because they knew who I really was. If it wasn't
for them* I might have just jumped off a building one nigL"""N
That's how bad it makes you feel sometimes.
Yes, l^rti through hacking. Let the professionals do it they
can't gel hurt like 1 was.
Name withheld by request.
i
VITAL INGREDIENTS
SWITCHING CENTERS AND OPERATORS
Every switching office in North America (the NPA aystem) u
issipcd ar office name and class. There are five citUW of offices
numbered I through 5. Youf CO is most likely a class 5 or end office.
Al l Lon^-D^taivce {T oil) calls are switched by a toll office which can he
a class 4, 3, 2 , Or t office. There is also a 4X office called an intermediate
point- The 4X office is a digital one that can have an unattended
exchange attached to it (known as a Remote Switching U nit — RSU).
The following cha rt will List the office number name, and how many
of those office* existed in North America in I9SI .
Ch» Name Abb.
I Retfonal Center . , - RC .
J SectkraaJ Center SC .
# Emitting
■ h + 1 ■ h 11
67
, . . . . 230
. , . 130
3 ♦ ♦ , , . . Primary Center PC +
4 TollCemer TC *
4P * * , . . Toll Point TP
4X Intermediate Point IP
5 End Gflk* EO 19,000
R RSU ....►♦<<,► RSU
When connecting a call from one party to another, the switching
equipment usually tries to find the shortest route between the Class 5
end office of the caller and the Class 5 end office of the called party. If
no inter-office trunks exist between the two parties, it will then move
u p to the next highest office for servicing (Class 4 ). If the Class 4 office
car not handle the call by send ing it to another Class 4 or 5 office h Li will
be sent to the next office in the hierarchy (3). The switching equipment
first uses the high-usage interoffice trunk groups. If they arc busy il
guc* to the final trunk. groups On the next highest level. If the call
cannot be connected then, yon will probably get a reorder [120 IPM
( Interruptions Per Minute! signal— also known as a fast busy]. At this
time, the guys at Network Operations are probably going berserk
trying u> avoid the dreaded Network Deadlock fas seen onTVI).
It i* a Iwi interesting to note that 9 connections in tandem is called
ring-arourd-the-rosy and it has never occurred in telephone history.
_^J'hLK would cause an endless loop connection fan interesting way to
- rally screw up the Network).
The 10 regional centers in ihe United Slates and the 2 in Canada are
all interconnected. They form the foundation of the entire telephone
network. Since there are only 1 2 of them, they are listed below:
Ct*&* I Regional Office Location NPA
h h ^ - ♦ < 214
Wayne, PA 215
Denver 4T - 303
Reglm Nq. 2 SPl -4W [ Canada \ ► ♦ 306
St. Louis 4T + 31 4
Rodulilc, (p A . . + . . ■ 1 . . . . + 1 r t 1 1 ■ ■ ■ * . ■ ■ ■ ■ 404
Ptttsburih 4F, . . . P h + H ■ ■ ■ - ■ ■ 41 2
Montreal No. I 4 AETS [C*n*tfe*| 504
Norwich, NY - 607
San Bernardino, CA , > - - ,. hP + .. 714
Norway, IL - < . r ► < < <IS
White Plains 4T, NY 914
I n t he Net work, there A re three major types of switch i ng equ i pment
They arc known as: Step. Cros*har, and tSS. Check past and future
issues of 26fX) for complete details on how these systems work.
Operator*
Another uml ingredient of the Network i* the telephone operator. .
There a re ma r v d iffercnt k Lnds. What follows is a discussion of some of
the more common ones
- TSPS Operator. The TSPS [Traffic Service Position System fas
opposed to This Shitty Phone Service)] Operator is probably the hitch
for bastard lor the phemale liberation ists) that most of us are used to
having to deal with.
Here are her responsibilities:
I) Obtaining billing information for Calling Card or 3rd number
calls.
2} Identifying called customer on person-to-person ca Ils.
3} Obta ining acceptance of charges Oh col lett ea lb.
4 ) Identi fy i ng ca King numbers. This on I y happen* when the ca Hi ng
^jiumbcr is nol automatically recorded by CAM A (t’eniralired
\utomutic Message Accounting! and forwarded from the local office,
.his could be caused by equipment failures (AN IP Automatic
Number Identification Failure) or if the office is nol equipped for
CAM A (ONI Operator Number Identification).
|| once had an equipment failure happen to me and the TSPS
operator came on and said, ‘‘What number are ^ucalling/raffl. r Out
of curiosity, l gave her the number to my CO, she thanked me, and then
1 was connected to a conversation that appeared to be between a
frameman and his wife. Then it started ringing the party I originally
wanted to call and everyone phreaked out (excuse the pun). 1
immediately dropped this dual line conference!)
You shouldn’t mess with the TSPS operator since she Acnous where
you are calling from. Your number Will show Up on a ID-digit LED
read-out fANI board). She also knows whether or hot you are at a
fortress tone and she can trace calls quite readily. Out of ail of the
operate^, she is one of the mo si dangerous*
• INWARD Operator. This operalor assist* your local TSPS f 1 ^)")
opera! or in connecting calls. She will never question a call as lopg as
the call is wilhin her service area. She can only he reached via other
operators or by a Blue Box, From a BB. you would dial
KP+NPA+I2I+ST for the INWARD operator that will help you
connect anv trail* within that NPA only.
• DIRECTORY ASSISTANCE Operalor, This is the operator tha!
ynti arc connected to when you dm 1 41 1 nr NPA-555-I21 2. She doe*
nut readily know where you arc calling from . She d oes not have access
to unlisted numbers, but she docs know if a n unlisted number exists for
a certain Listing.
There is also a directory assistance for deaf people who use
Teletypewriters (TTY Si). If your modem can transfer BAUDOT (45.5
baud- the Apple Cat can), then you can call him 1 her up and have an
interesting conversation. The number is EQO-H55-I 155. They use the
standard Telex abbreviations such a_s <1 A for Go Ahead - They tend to
be nicer and will talk Ifmj^r than you r regular operators . A iso, they arc
more likely to be pereuaded to give more information through the
process of "social cngtn« ring 1 ".
Unfortunately, they dcmll haw access to much, I once bullshitted
with tine of these operators and I found out that there ate two such DA
offices that handle TTY. One in in Philadelphia and the other is in
California. They have approximately seven operators each. Must of
the Tl " V operators seem to th ink t he i r job i s boring. L'hey a Iso fed they
are underpaid; They actually call up a regular DA ti 10 process your
request no fancy computers here! (Other operators have access to
their own DA bv dialing KF*NPA+ 1 31+ST (MF).
The TTY directory assistance, by (he wav', i* still a free call, unlike
normal DA. One might be able to avoid beingcharped for DA calls by
using a computer and modem at 45.5 baud.
• CN/A Operalor, CN ■ A operators do exact K the opposite of what
directory assistance operators a re lor. You give them the number, l hey
give you the name and address ( (.’uscomcr Nam*' Address). In my
experiences, these ope ralora know more than ihe DA operators do and
thev are more susceptible to “social lingi necring . " 1 1 is possible lo
bu LKh it n CN A ope ra 1 or fo M he NON -FI ? B D A n ( i.e , , you give them
the name and th ey give you the unlisted number). This is due to ihe fact
that they assume you arc it fellow tom piny employee. The divestiture,
though . has itsu tied i n the h rva k - up ot a lew NON - PU B *t \ and policy
changes in C’N A.
• INTERCEPT Operate*. I he intercept operator is the one that you
air connected 10 when there a re nut enough recordings available or the
area is not set up m tell tou that the number has been disconnected or
changed. They usually say. ’‘Whiit number did you dial?” This is
considered to be the lowest operator Lifeform since 1 Hey ha te no power
W'halstv^icr and usually know very little.
• OTH ER Op#raiors, And then t kn.- ani t he: M ob i Ic, Sh ip-to-Shore,
Conference. Marine, V-crifv. “Leave Word and Call Back/ Route and
Rate {KF+HOtl* 14 1 * 1 2 12+ST new number as a result of the break-
up). and uther special operators who have one purpose ur another in
the Network.
Problems with an Operator*.* Ank to *peak to their supervisor. ..or
belter set. ihe Group Chief (who i*the highest ranking official in any
office}", the equivalent of the Madame in a whorehouse (if you will
excuse the analogy )
Some CO\. by ihe wa> . have bu^ in them thai alto* you to use a \
or a 0 as the 4th digit when dialing. (This tends to happen mostly in
c rossha n and it d oesn T work consi*ten ilyT'l his cna hies a ca Her to call
special opera torn and other internal telco numbers without having to
use a blue box. Kor. example. 4I5-I2I-ISI I would get you a San
Fra nciscoAlak land INWARD Operator.
/The uktnv vvo.i ftikcti from Basic f eloeLMnm un icat i«ns Part IV.
written hr Sh 7 ( ' Atft'ftr fMJ.}
I
MNO
6
OPER
o
— * -J
OPER
o
NSA Wants Better Phones
The Nr* ViMt l's^n
The National Security Agency is proposing that the
Government and industry be equipped with as many as 500,000
telephones that can be secured against interception.
The agency is convinced that the Soviet Union and the other
nations are obtaining important intelligence from United
States telephones.
Although cloaked in secrecy, a program like the one the
agency proposes could cost hundreds of millions of dollars.
Under the proposal, production of the secure phones would
begin in two years,
The number of secure telephones currently used by Govern-
ment agencies Is classified information. But the Carter
Administration said there were 100 such phones in the
Government and it planned to buy 1 50 more. The cost of each
phone then was £35,000. The Reagan Administration has
bought an unknown number of additional secure phones.
“Anyone making a phone call to the West Coast or Boston
from the Washington area has no idea how the conversation
will be transmitted," an NSA spokesperson said- Tt might go
via fiber opt ics, conventional cable, microwave towers or one of
the 19 domestic satellites. Ef it is going via satellite you can
presume the other guy Is listening to It,"
Oh No, Not Again!
AnaLUuInl Pr^j : :
The House passed a bill on September 17 by voice vote that
would make it a Federal crime to gain unauthorized access to or
tamper with computerized medical records.
Victimized by Crime Computers
IV Vnrk. I
Police officers went to an apartment in New Orleans looking
for a woman named Vera Davis, who was wanted for theft and
forgery. Although the woman who answered the door identified
herself as Shirley Jones, they arrested her anyway, A police
computer listed Shirley Jones as an alias used by the forgery
suspect. That was two and a half years ago.
According to her attorney, Mrs. Jones, who was oner
advised by a sherifTs deputy to change her name to avoid future
arrests, is one of a growing number of people in New Orleans
who have gotten in trouble with the law because of inaccurate,
outdated, or misused information in police computers.
The New Orleans computers are part of a national network.
From a local terminal, a computer check can be run through the
National Crime Information. Center in Washington, operated
by the FBI, in less than a minute.
The New Orleans case, said Robert Ellis Smith, publisher of
Privacy Journal, a newsletter that reports on privacy cases from
Washington, DC, is “symbolic of a larger national problem, an
incredibly high rate of inaccuracy" in criminal records and “an
inordinate amount of mistaken identity cases in the criminal
justice information systems."
Sears Satellite Network
The American Satellite Company has signed a contract with
Sears, Roebuck and Company to construct arid operate a
private communications system linking corporate offices of
Sears and its subsidiaries in 26 United States cities. Thif would
be the largest private system ever developed capable of offering
ftiJL-motion video teleconferencing-
Loopholes Around Wiretap Laws
H* New TbH W in]
Senator Patrick J. Leahy t Democrat of Vermont, has
that he will seek, legislation to improve protection of privacy by
closing gaps in Federal wiretapping laws.
He and Severn) experts said at a Senate Judiciary subcom-
mittee hearing that it was unclear, for example, whether
existing laws permitted Government officials or others to
intercept electronic mail* or even ordinary telephone oalh sent
by computer or microwave technology, without a warrant.
“There are tremendous holes in communications privacy
today, "testified Ronald L. PLesser. a Washington lawyer who
has long specialized in information privacy issues.
The experts at this hearing testified that private interception
of electronic mail and other messages carried through telephone
networks may nut violate Federal law.
IBM is Buying Rolm!
Tl»t ■*!(*» t-wk Tbtki jjfrt ipan|
. IBM has said that it will buy the Rolm Corporation, in a
move that will heighten the competition between the world’s
largest computer company and AT&T. The price? SI ,25 billion.
TBM wants It all, it needs it all,* 1 said Bather Dyson, editor of
Release 1.0, an industry newsletter. "They have a biological
urge to grow."
Most analysts, however, said that IBM bad realized —
perhaps belatedly — that it greatly needs to strengthen its
offerings in telecommunications switching equipment.
Rolm. founded in 1969 as a maker of military computers is
now a leading maker of private branch exchanges, systems that
control both voice and data communications over the
telephone.
9! 1 Suspect Hung Up
'nwNrw Vnrfc F-iw
A notorious hoax caller who has plagued 91 1 switchboards
for three years has been nabbed reporting another bogus crime,
police say.
Cops say the suspect — who they have been unable to
identify — made more than 500 false reports ranging from
strangulations in progress to rapes and shootings of police
officers.
He was arrested at a Penn Station pay phone while telling a
91 1 operator he had just raped and strangled his girlfriend with
her pantyhose. Thai was the fabricated crime he reported most
frequently, according to police.
“He called every day of the week at all hours, “ said Sgt.
Stephen McDonald,
“He was causing a lot of problems and the 91 1 people were
really Looking for him," said Officer James Espied ra who
collared the hoaxer.
According to McDonald, news of the hoaxers capture was
jubilantly received by 91 3 operators: “There was a lot of
cheering."
In the words of Lapiedra, "He was surprised he was caught,"
1-57
3
LETTERS FROM THE
Dtir 2600:
I am currently involved with the Crystal Palace BBS,
formerly OS UN V (hopefully yon have heard of it). The system
is down now for some software mod ification^ and many people
have tried to persuade me into changing the purpose of the
board, which is telecommunications and other related fields.
The crackdown on this type of BBS is starting to become
overwhelming. This is what my inquiry is about. After reading
my first copy of your newsletter, 1 was elated with the quality
and content of information it had! Referring to the front page
article (July 1984, page 1-37), “Loot Out, Hels Got a
Computer!" 1 agree that the ami-computer hysteria has gone
and is going to go too far! 1 am interested to know what exactly
iN an illegal BBS message and what is not. Do I have to monitor
the system 24 hours a day, 7 days a week? Am I responsible for
every message posted on the board? L know that these are
questions that everyone wants answers to and can^t find. As I
see it the BBS is just another form of newsletter, so why ate they
picking on us?! I do, however, realize that some messages are
quite illegal like: cred it ca rd tf*s and the like, but the information
on how to gel those #'s is not i llegal ( right?). Any information
on this subject would be greatly appreciated.
Crystal Palace
Dear CP:
What is a BBS? You know the answer, we do, and a good
many of our readers also do. The problem is that the people
who go around passing laws and raiding homes don^t have the
slightest idea what a BBS really is. All they care-about is the fact
that a computer is involved somewhere along the line. And
computers, they say, can do anything in the world. But what's
so ironic in 1 he case of a BBS Is the fad that the Computer is just
Muring messages //The exact same effect coukf be accomplished
on a physical bulletin board, inside an auditorium, or in
everyday conversation. Bui you don't see these things being
outlawed because people would never stand for that kind of
repression (we hope). Computers are easy targets because the
average person doesn't understand them al ail. By making
people think that itY actually illegal to wrile something d own
and pass it along tool hers, the authorities ate taking one great
big step towards total contFdb
We agree that a BBS is really a nother form of newsletter. We
don it agree that messages containing cried it card fr'sare Illegal in
any sense. (They are boring, though, and practically useless to
anyone except fraud investigators.) It's the actual use of these
numbers I hat constitute* fraud, not the simple act of passing
them around. If a cop on the street overheard you giving
numbers to a friend, could hr arrest you? l,etb hope it hasn't
reached this stage.
We're currently working on getting some pone legal
i nforma I ion concerning this su bject so t hat we can address your
questions better. In the meantime, though, we hope your board
and the many others like it amtmd the world won't he
intimidated by these scare tactics. You can talk about whatever
the hell you want. But it's still illegal to commit the crimes
you're talking about.
If enough of you guys stood up for your rights out in the
open, this wouldn't be such a problem. You might actually wind
upsa vipg an importam part of democracy fora few more years.
By the way, readers, if youYe running a BBS that talks a bom
these things or know of one that does, send in the name and
phone number for our Hot 100 list which will be published
soo fi. Make sure the BBS you're sending iiqnffto be publicized
and try to include a reason or two why your BBS is better than
most. Check the front page for our addresses.
Received your August issue, and enjoyed it. A number of
comments...
I ] Does anyone know what happened to TA P ?
2) There is a newsletter called the Contser Letter, available
lor free from Ross Engineering Assoc., 7906 Hope Valley
f’ourt. Adamstown, MD217IO. Lots of good information, bui
:hey want a tetter requesting ihe newsletter on leiterhead and
dentifying your interest in communications security (one can^t
k too careful these days!). It^ always interesting to know
1 - 5 *
OUTSIDE WORLD
what's happening on the other side...
3} What works against an ESS switch? Black boxes are ok,
but more modem equipment seems to be coming in rapidly,
blowing our older techniques off the air!
Hie Animal
Dew Animal;
For info on TAP > consult our September issue, page J-52.
We hate repeating ourselves nit the time.
Thanks for the sample copy of Comsec letter h looks
interesting and we're looking into reprinting some of the good
stuff. Readers: feel free to send us anything that looks like it
might be interesting to us. Lt usually is.
ESS switches and black boxes are dealt with extensively on
page 1-43 of our August issue, as you probably know. The only
thing we can suggest to counter an ESS is ingenuity. There's
always a way to get around anything.
Dear 2600:
t really enjoy your publication! It seems you guys are not a
bunch of wimps who are so damn paranoid that the feds are
going to catch you. Anyway . what types of back Issues do you
have? I received my first issue, which is Volume I, Number 9.
What are the context of the back issues? I ‘m looking for one
having to do with loops, sprinting, back ingout sprint/ mci s, or
anything similar. Also, any arpanct. 1 archnet stuff?
ltd
Dear kd:
Welt be publishing a guide to our hack issues that should be
out right in time for the Christmas rush. Just about all of the
topics you mentioned have already been covered and they all
will be co vered in the future. Wc accept articles and information
from anyone.
You’re quite correct in saying that we're not paranoid. We
have nothing to be paranoid about because we're not doing
anything wrong.
Dear 2600:
Though it may seem like only yesterday ihai computer crime
first caught the nation's fancy, it has been on the mmd of state
legislators for quite some time. With the recent passage of
computer crime laws in Maryland. Iowa, Connecticut, and
Hawaii, the number of states Jacking computer crime laws ha^
fallen to seventeen. I he law* of the other33 have beervcollecte^
in a new reference work published by the National Center for
Computer Crime Data, and called 77 m* Computer Crime Jjjn]
Reporter. In I he course of compiling the text* of all the state'
computer crime laws on the books^ editor Jay BloomBecker
found that.a number of states had hills or the books for years
without anyone noticing them.
The book, 200 pages plus two updates, is available for $45
from 'the National Center for Computer Crime Data, 4053
J.F.K. Library, California State University at Los Angeles,
53 5 1 State University Drive, Los Angeles. CA 90032.
In addition, the National Center will begin publishing a
newsletter devoted to moral* and ethics in computing. Its name
is Conscience in Computing.
There are schools teaching computer ethics, no matter how
ma ny a re not . There a re professionals questioning their roles as
computer scientists and asking a bout the social impact of their
work. There are computer bulletin boards which support ethics
discussion groups.
Conseience in Computing will he a monthly newsletter,
subscriptions costing SIR annually. Work exchanges a|Eow
reader* to become subscriber* by convincing others to
subscribe, reporting news of conscience in computing, or
working out an individual contract with the National Center.
Interested people can write to Ihe above address.
The Niltoatil Center Tor Computer Crime Data
(The National Center for Computer Crime Data a a nonprofit
research organizaf ion at Cuiifomia State University tit Los
Angeies.)
Whoopsee
In our tut issue* we forgot to mention that in our August issue,
we forgot to mention that the front page story (“But How Does
It Wort?") came from the desk of BIOC Agent 003. Better late
than never.
4
2600
ONTA
wm*
^SsS^.
PS>*~ ,- o*rj.
i
■S^S^S 51
'igs*-'
J Now YorkTelephon*
;' n *'fe J K w i, "»
-v ‘''"Sirs '‘'"^C’’"’
J j -^
«" -TT" ■» ;? «.
J
'"Wkm
. w.
■* ^ 4*< J
' '■«<**
.T.*- :
■"t'H ™.. “ -» i'j. * r,- H rj-
. H .1 Hq tjl ,H * tj l , Al 1 j h T ^ hl l -H-
&■£$.£&
E^-CC**
■■‘'l- „.. ** W,
f*h | j^i
■■At-,- h,,,.. • | 3r v *
V "*41 ,. ■ *’ J •H.tto, ^ ^IfL
r " ,l v-Tr** 1 ^
““ Aw^C*^
,"’"■ /..z.'“' ^Tjy^
'^nm ^ J„ ,. n
“J 1, rilV
From th« t£mK of 003
ING
"JTr. -1
‘*-*53
p , . -:
page 5
Security
ss close as your fingertips
CORPORATE. SECURITY
Diraclcr Corporals Ssctinly
Jt- ft i MMbar 212-395-0505
SECURITY STAFF
SflCU^Ly Suptrv^tf
W F Mcd*My . .£l2-3fl!i-M28
SiCuriCy Minagar
R F. Jotraan £12-395-0552
Mew Vohk city reDiON
Security Mimggr
W-ffr-Bre**- .212-395-4159
N*w York C>1y Wh(
Security OlliCf 212-3»5-Q«15
Security Sjo«tvr»r
JL P. PHi* 2l?-3M-Kl5
H«Hr Yotk CEty East
Bacmrly attic* . 2T2-291-9017
Security Suo«vi»r
C JL Hauls'll 212-523-9953
H STATE REGION
Suburban
Secmily fJin^g^r
JL JL Ferrari 9TJ-0&9-9&49
MitfStam
Secu^y OINce 914-993-93&5
S*Cufny &jp*rviur
H ft Z apr &14-6W-WW
Long island
StCuniyOrikCt , . . . 5ifi-294-DZT0
Sacijrity Si4D&rvisor
. R. H. tamtwrwn , , 515-29443722
UPSTATE
Security Office 510-449-3250
Stcufiiy Supurvisor
T. A. P#o4>:Ci 510-449-S442
S*curity Uarugar
T.JDofan 515-449-7224
I«
HWl 'i***40>H I4a*i.i* ■
U4 U*im H*A -+ M*
■*^jb lw iwa* tmi ■! ^
tai^ Jif ia|M 14 n a «adi m k
l|l#L -^IMillMU
M^dlUwO-*^ MTfr4i4.NI
pwi^l dvn MN MW H1H
m ■“** F" .I.YIV i* “N
Tl«M UH
-jmi •rtrrt*. n(fr*i
Jfl 4 11 " U»W)*^(
' ^(ij|_V n| jtfiM iii pun
-JfN.V OJ Hlf] | jm
,i| 4 «iai 4 w awd ^1
Mja 4 « --Tl|r ' >| iu^
inii ..unhnj *m» b<tfr
pua ifriHl hr^H-un.
ppi4iNf| Ain^Jiaiu u-: ||
■pfcprtdvi J! 'dU frdj( F*
-tqnd i)«waa v sfr) frAN*
— HI "T’^F " fc IT' ™ ~ '*>
ini iftnil Hit AiHf 'i4unj>
H,** -»i»i*!ui ■ pu;j i*
II. Ati****'< fr-f4)
HinaB^.1 > ^Bar*q^iliriJvi
«1M|. WMI1. (.Iiup H APf lilk,
■jJZLti
'JWK JiN
s.’iaii^apafvh ii*n^ n> p^i \.11-|
- L||. Jt P*F*J! "W « »«iai
wAhla-ihri pua km puHiiBt
■4 i d Am *U -IMV^I
ji> iM^ni iv w xn rm-ii
l i iua«iBwiun.')i'n]Hnii
|u^u-t ^l.T*'** au;p
w>i^N|L>A »uja 41 pv-H.
^|^.>KQnd uipbu uM|nan>
ml I k I M 1 1 1 1 V 1 LIE iw* J(IJ
ppwuu
■MU amp ** HPW4HM^U4**!
W| V* »d U* 1 HH itn Ftl
TOLL FRAUD
Ton Fraud OlhCB 212-22 M764
Sdcunty Su£ii"Mi»r
H. F G^lfrQKwr .212-2^1-5944
SccuAty hian*9nr
JL S- Whitman 2T2-395-0W7
On *HHtn4l. hclHJaya and oul of
n&u rt ctM lha loKowmj Hltpnont num-
ban to duaip aumanct. t
CuiBdmar Sirwca Bureau
Naw 4x4 Cily ftc9*vi iiS 3K H71
U«tSUt* 914-390-5900
U"9 Wind 51E-742-3030
StCuMy Ollica
Uoataba 519-449-3250
■ULLOINS PftOTECTIDH
□MANIZAHON
Qmrd C wn iii i n wi
N*w Itrk Cfly N*Q«r
W J. Blue mat 212-3
Sul* Rsg*oh
H. K Athldtah 914-9
.212-394-3400'
914-994 -9253'
■iVOtf (fliphfliwjiumJrj
wuurdAa ca«td co*KWftuf*s martffi
tit bwt&tiQ pfm'KMm.
5
• Humm-rtim-mm, Tholes ttw
tone—your "go ohtod"
,nol to stort dialing. Please
wait for it
after you
finish your
C&Jt j . . . .
sure to replace trie receiver
Try Ond'Plus Dialing.
•Telephone cords and water
don't mix. A wet cord can put
your telephone out of order. So
please keep your telephone
cord away from sinks, valves,
steam and other places where
water might get on It.
DIAL CAREFULLY!
Avoid wrong numbers
by first checking the
number and them
DIAL EACH DIGIT
CAREFULLY!
Dj al - a- Discount , Dial - H-Y Du reelf
£
'u
HEN ANSWERING THE
TELEPHONE, always identify yourself
your firm, or your department.
^ ■ I
IF YOU RE
NEW IN TOWN
mtt
, *e<
s?
V
%
The wheel the*
lets you roll
around town
without leaving
home.
Jus! spin the dial an4 you ra
laRmg to tnc pharmacist. Son n
ioairi and r&acn your insurance
mart. Or chat wun a friend acre 53
town. Count on it any lime — 10
save you ltnn& ana 1 raveline.
5ave£ mOrt^y. too. Wha! e SO
doe 5 so muc rt yo [ c-dsTs & 3 1 itt -e ?
when ybu r re owejr \Z-f
from your office
-who'tf answer r ■ \
U \<0; .■
1
your phone?
_*+ ' " *
hiii*
iM"
S«l ^Tfltp Irene imwwriq
iimirt" pogM irt ihii ' ^
rfjffrtflryt
y
when
to get personal?
SlitlofHHUIbfl riln m
■Iwjyi cheaper, io you
thouAd VH perwm-to-per-
nn wily when you want to
liiklo ■ parUeuwr pirty*
shop the YeMow Popes
•Party-liners — don't forget the
other fellow needs the tele-
phone too.
• For better service, don't trans-
fer a call to someone else it you
car take care of it yourself.
1-69
NOT SORE
OF THE NUMBER
Youll save time
and trouble
if you took
in the directory
Save lime . . telephone.
When you're on the go . . .
you're as close to home or
office a? the nearest public -
telephone booth fry It end
6