💾 Archived View for clemat.is › saccophore › library › ezines › 2600 › 2600_1-8_djvu.txt captured on 2022-01-08 at 14:16:04.

View Raw

More Information

⬅️ Previous capture (2021-12-03)

-=-=-=-=-=-=-

2600 Magazine - Volume 1, Number 8 


2600 — August, 1984 


— ' ’ — — 

JflW if prtlifM MfUJilv byJBdS EhftEd PFC |$t5. 1 TIC. jrictaM^Nrywpiiiatiwt. Su**ri]*»«i rtlhillB- 1 pr.H-tcmrihi. II pr h ack iwe; 
DwrK»)JI3.S6-l jar. Vritow: MCI Upk aSHUNDBED; U*: WJWPSfl. 


VOLUME ONE, NUMBER EIGHT 



4 


BUT HOW DOES IT WORK? 

How much do you [tally understand about the way your telephone 
works? Probably not as much as you should. Considering the amount 
of time moat people spend on the contraptions, this is really quite a 
disgrace. Ask questions and make an effort to learn and you 11 be the 
exception to the rule, which k basically: “Safety k Stupidity, '‘Read on. 

W faring 

Assuming a standard one-line Tone, there are usually 4 wires that 
iftM out of the feme set- These are standardly colored red green, 
yeUow, and black. The red and green wires are the two that are actually 
hooked up to yotu central office (CO)- The yellow wire is sometimes 
used to ring different femes on a party line (i.e., one number, several 
families — found primarily in rural areas where they pay less for the 
service and they don't use the fone as much), otherwise the yellow is 
usually just ignored. On some two-line foues, the red and green wires 
are used for the first fume number and the yellow and black are used for 
the second line. In this case there must bean internal or external device 
that switches between the two lines and provides a hold function {such 
as Audio Shack's outrageously priced 2 line and hold module). 

In telephony, the green and red wiresare often referred to as tip |T) 
and ririg(R), respectively. The tip is the more positive of the two wires. 
This naming goes hack to the old operator cord boards where one of 
the wires was the tip of the plug and the other was the ring (of the 
barrel). 

A rotary feme (a.k a. dial or pulse) will work fine regardless of 
whether the red (or green) wire isconnected to the tip (+}or ring H- A 
touch-tone# font is a different story, though, it will not work except if 
the tip(+) is the green wire. (Some of the more expensive DTMF fortes 
do have a bridge rectifier which compensates for polarity reversal, 
however.) This, is why uoderceitain (non-digital) switching equipment 
you can reverse the red and green wires on a touch-tone# for* and 
receive free DTMF service, Even though it wont break dial tone, 
reversing the wires on a rotary line on a digital switch will cause the 
tones to be generated. 

Vokagen, Etc. 

When your telephone is orvhook hung up) there are approxi- 
mately 48 volts of DC potential across the tip and ring- When the 
handset of a fane h lifted, a few switches close which cause a loop to be 
connected (known ns the local loop") between your fore and the CO. 
Once this happens, DC current is able to flow through the fone with 
less resistance. This causes a relay to energize which causa other CO 
equipment to realize that you want service. Eventually, you should end 
up with a dial tune. Thisabo causes the 48 VDC to drop down into the 
vicinity of 12 volts. The resistance of the Impulse drops below the 2500 
ohm level, though POC I ice reed telephone equipment must have an 
off 4XKtk impedance of 600 ohms. 

As of now, you are probably saying to yourself that this is all nice 
and technical but what the hell good is the information. Well, also 
consider that this diop in impedance is how the CO detects that a fone 
was taken off hook (picked up), to this wfiy + they know when to start 
billing the calling number. Now what do you suppose would happen if 
a device such as a resistor or a zener diode waA placed On the c ailed 
parly Is line so that the voltage would drop just enough to allow talking 
but not enough to start billing? First off, the calling party would not be 
billed for the call but conversation could be pursued. Secondly, the CO 
equipment would think that the fane just kept on ringing. The Telco 
calls this a “nO‘flo"(toU fraud to he more specific) white phone phreata 
affectionately call this mute a black box. 

How These Bgsai Are thrift 

It “s really surprisingly easy to build a device such as a black box. If it 
wtrerrt for theamazingly high morals inherent in todays society, you'd 
most certainly see more of them in use. Only two parts are needed: an 
SPST toggle switch and a IOJOOO ohm (10 K) Vs. watt resistor. Any 
electronics store should stock these parts. 


A person would then cut 2 pieces of wire (about 6 inches long) and 
attach one end of each wire to one of the terminals on the switch. Then 
the IC5CC (standard desk fone) would be turned upside down and the 
cover taken off. A wire would be located and disconnected from its 
terminal. The switch would then be brought out the rear of the forward 
the cover replaced. Labelling the switch usually corner next, A position 
where one receiwK a dial toot whcti picking up is marked “NORMAL'*. 

The other side is, naturally, "FREE* 1 

Making Them Wofk 

When phriends e ah (usually ala prearranged time), the person with 
the black box quickly lifts and drops the receiver as fast as possible. 
This stops the ringing (if not it must be done again) without starting the 
billing. This must be done within less than one second. The phone can 
then be picked up with the switch in the “FREE" position. Most phone 
phreaks are wise enough to keep their calls under 15 minutes im length, 
greatly minimizing the odds of getting caught. 

Some interesting points: (I ) If someone picks up an extension in the 
called party^ house and that fone is not set for “FREE 1 *, then hilling 
will siait. {2) An old way of signalling a phriend that you want to call 
him is to make a collect call to a non-existent person in the house. Since 
the phriend will (hopefully) not accept the charges, he will know that 
you are about to call and thus prepare the blackbox (or vice versa). (3) 

The phone company can detect black boxes if they suspwl one on the 

line. This is done due to the pretence of AC voice signal at the wrong 
DC level! (4) The blade box will not work under ESS or other similar 
digital switches since ESS does not connect the voice circuits until thf-- 
fone is picked up (and billing starts). Instead, ESS use s an^artificitt 
computer generated ring. 

Rbtfitti 

To inform a subscriber of an incoming call, the telco sends 90 volts 
(PK) of pulsing DC down the line (at around 15 to 60 Hz; usually 20 
Hz). In most femes this causes a metal armature to be attracted 
alternately between two electromagnets thus striking 2 bells. Of 
course, the standard bell (patented in 1878 by Tom A- Watson) can be 
replaced by a more modem electronic bell or signalling device. 

Also, you can have lights and other similar devices m lieu of (or in 
conjunction with) the bell. A simple neon light (with its corresponding 
resistor) can simply be connected, between the red and green wires 
(usually Ll and L2 on the network box) so that it lights up on incoming 
calls. 

Be advised that 90 VDC can give quite a shock. Exercise extreme 
caution if you wish to further pursue these topics. 

Also included in the ringing circuit k a capacitor to prevent the DC 
current from interfering with the bell (a capacitor will pass AC and 
pulsing DC while it will prevent straight DC from flowing — by storing 
it)- 

Another reason that telcos hate black boxes is because ringing uses a 
lot of commotvcontrol equipment in the CO, which use a lot of 
electricity. Thus the ringing generators are being tied up while a free 
call is being made. Usually calls that are allowed to “ring** for a long 
period of time will be construed as suspicious. Some offices may beset 
up to drop a trouble card for lopg periods of ringing and then a “no-no" 
detection device may be placed on the line. 

Incidentally, the term “ring trip" refers to the CO process involved to 
Stop the AC ringing signal when the calling fone goes off hodk. 

h is suggested that you actually dissect fonts to help you better 
understand them (regardless of whether or not you want to build anw 
devices). It will afro help you to better understand the concepts here 
you actually prove them to yourself. For example, actually take tht- 
voltage readings on yanr fone line (any simple multi-tester (a must) 
will do). Pbreaking and/or teaming is an interactive process, not a 
passive one! 

(Any questions on the above? Write us and weli try to answer them,} 


1-41 


1 


PRIVA CY LOST 


r^- 

The Rise of ihe Computer State 

by David Burnham 

wf foreword by Walter Cronkite 

Vantage Books $6$5 paperback 273 pp. 

Several yean ago on -Surly Minutes^ segment was presented where 
all of the checks that one person had written In h» lifetime were 
examined, and then a fairly accurate portrait of the person V life was 
painted by the discrete bits of information, Information like (hit is 
called transactional information and we leave huge amounts of it 
behind as we livr our lives, whether in tons of paper or megabyte* of 
data. 

In The Rise of the Computer State, David Burnham says that an 
event as demonstrated by the Sixty' Minuses team could happen and 
many similar ones do occur. He surveys many of the ways that 
computers and technology cam be used to intrude upon our privacy; the 
governmental mandates, for such intrusion; and how, in ^ocral, 
computer abuses have affected history, 

Burnham begins with a review of computer history and the 
importance of computers on our lives- While always implying a global 
connection, he concentrates upon the United States where "industries 
engaged in the processing of information,.- now generate about half the 
GNP.” Later Burnham brings up legal points which are supported by 
examples- He also discusses legislative battles and presidential direct- 
ives both for and against the public good. Overall, The Rise of the 
Computer State reveals in technical and ethical terms how dose we ate 
to Orwell technocracy. 

Christopher Evans, a psychologist and computer scientist said that if 
during the 30 years from 1945 to 1975, the automobile had developed 
as fast as the computer* the Rolls Royce would cost $2,75, would have 
—^enough power to push the Q.E. 1] across the Atlantic, and would get 3 
r million miles to the gallon. 

The computer has that amazing ability to quickly and efficiently 
move and sort through vast amounts of information, and this is why 
they are being used in all aspects of society including the FBI, police, 
banks, phone companies, and credit companies. They are used by most 
businesses for payroll, personnel, inventory, accounting. They are used 
by most government agencies including the IRS, FBI, CIA, SSA, 
NSA, HEW,FRB. and a large number of others, In fact, he devotes an 
entire interesting chapter on the National Securely Agency (NSA) 
which was obviously written before The Puzzle Paiace, a rather 
thorough examination of the NSA, was published. (A future issue of 
2600 will look at the NSA.) 

Computers are used to compile lists, store data, pay employees, 
transfer funds, make airplane reservations or phone calls, com- 
municate, write letters, address envelopes, detect incoming ICBM^ 
price goods at supermarkets and department stores, tell time, and keep 
track of America's airplanes and trains to prevent them from Craslung. 
There are literally millions of things computers can do to benefit 
humankind. 

But the most amazing or these computers are controlled by big 
government or a few corporations. Transactional information about 
our lives is often bought and sold and traded without our permission. 
In bank computers lie copies of the checks we wrote. In our hospital 
computers are our medical records. I n many States, computer files are 
kept on all prescriptive medicine. In many law enforcement computers 
lie arrest and conviction records, often incomplete or inaccurate as 
Burnham points out. 


charges, airline, bus, train, and car rental records, or our gas receipts. 


compared to the special dose of commercial* that are sent to only their 

■ F- ^ .televi&tan sets. If we get supermarket credit cards, then every item, all 
of our individual buying habits, can be examined, 


into concentration camps. If another thoughtless government wanted 
to do something again, it wont be hard, 


be accessed for a fee. The information is often just heresay or the 


opinion of a past landlord. If the information is negative, the potential 
tenant U turned down. 

■ The FBI pouetsea the fingerprints of 66 million people in its 
crinuniL or civil iderrtificatioa files. 

Burnham brings up the topic of criminal records a lot— about how 
past arrests and convictions can follow a person, even if a case is 
dismissed, Thk information is available to law enforcement agencies 
government personnel departments, and private companies. These 
databases of criminal records, which only one out of every live state* 
have ever checked for accuracy, were created in order to apprehend 
criminals. But if these records are used to keep suspected criminals or 
ex-cons out of governmental and private jobs and thus keep them 
unemployed, these people art practically forced to return to crime. 

By cross matching files, politicians can locate key groups to appeal 
to in order to makedecnioru or win elections. By cross matching file*, 
likely suspected comm musts can be systematically tortured, or 
customers for a new store can get junk mail designed just for them. 

In the casi'anything-berione chapter, we are left to hope that some 
laws or presidential orders are Created to stop cross matching of 
information between government agencies. There are example* where 
things are done (and undone again} in an effort to preserve privacy, but 
as we ree much information about u * is public. Until recently, the 
sdcctivt service wax aware of who got free ice cream from Farrow 3 
1 2600 , p. 1-45). It wcn\ be long until all of the Flintstone vitamin 
peddler* will be buying up the list of the cabbage patch parents from 
Coleco. Companies are always buying information about us to pin an 
economic advantage. Business controls money and hence information. 
This information gives them direct power and often a marketable item. 
TRW and Other lesser known credit companies sell information to 
other businesses for about a buck a report, but to check your own 
record in order to see if the report is accurate costs $12. Mailing lists 
pass hands tike stocks on Wall Street. 

But are wc threatened now? When it comes to criminal records;] RS H 
and credit stuff the info is being used widely. The federal government is 
tightening up on documents it makes public. But often Mr. Burnham is 
telling us what ix possible which is not tar from the actual. He doesn^ 
stress the importance that the Freedom of Information Act had which 
is being gutted by the Reagan Administration. 

What Mr. Burnham could have done to make his case even mare 
effective is to include actual examples of the vast personal data and 
create a small autobiography based on his own credit history, bank 
records, FBI files, criminal records, motor vehicle records, college 
records, and other similar sources He could have gotten some expert* 
to examine all of his transactional information and then compare it to 
himself. But iiH all right for Burnham not to do this, because he 
suggests to us that such a thing can be done. 

Burnham goes on and on citing legal abuses, privacy intrusions, and 
political and economic manipulation. The book read* like those old 
TRW adt- "Imagine a day when.. ."and it ends the same way: That 

day ix today. Write to ux— well tell you all about ft " Burnham tells us 
almost all about "it" too. He does not mention the danger to a 
computer state where a disgruntled employee or little kiddie at a 
terminal can crash a huge system permanently, or a clever sad ist can 
create a viral program that can spread throughout a database and wipe 
out fiie after file! Burnham does not mention the technological 
pioneers who hack and explore and understand the world that is 
approaching and encroaching and who warn others of the danger. M r. 
Burnham would appreciate the work of some of the people like that, 
just as we can appreciate the warning* in his book about the power of 
the technological elite. 

77rr Rise of the Computer State represent* one of the many books 
that should be read to prepare for the future as well a* the present. Mr. 
Burnham has managed to condense an immense amount of inform- 
ation on the power and threat of computers and data colletiing 
agencies. His book is well researched, but he needs that extra 
something to retain the sympathy of those who have "nothing to hide” 
and the interest of those who cannot relate to terms like "dchumant* 
zatioa”and "values”. The Rise of the Computer State startles one with 
a slap Of hidden reality, and this is what we need now. 



ABC 

2 


MNO 

6 


OPER 



1 

OPER 

0 



Big Brother No Longer Watching Miami 

AUOcilLEj f'fCMi 

City officials who stirred up visions of George Orwell s ^Big 
Brothry” when they instated video cameras todettci street crime have 
decided the project wasn't such a good idea after all. 

So three yean and almost $300,000 later, the city has abandoned its 
“Television Police Protection* system, saying it failed to record one 
crime. 

The city had the cameras installed in February 1$82 but for 
numerous technical reasons the system wasn^t turned on until that 
June. 

The project called for 20 cameras to be mounted on a rotating basis 
in 100 camera bousing; mounted on poles, thus keeping criminals off 
guard. 

Another larger camera was mounted atop a !4-**ory building on 
Lincoln Road to sweep the length of both streets fora broad overview. 

But the system had trouble. *Wc had continual maintenance 
problems with constant adjustment of the microwave, " Police Chief 
Kenneth Classman said. One civilian made so much fuss about police 
watching the monitors and not patrolling the streets that the depart- 
ment look police off the project. Another problem was in lack of 
interest from civilian volunteers assigned to watch the monitors. Many 
[bites, even the few working monitors went unwatched. 

Computers Seized as Summer Games Begin 

IVm.H PnW'Wiv 

The home computers of four Huntsville, Alabama teenagers were 
seized by the FBI last month afteran illegal tap into NASA computers. 
The unauthorized taps, according to the FBI, destroyed records and 
blocked scientists from using the computers. The FBI seized computers, 
printers, floppy disks, and software that allegedly were used to tap into 
two computers at NASA^i Marshall Space Flight Center. They 
contained iu classified information, according to NASA officials. 

Cecil Mok, special agent in charge of the FBI k Birmingham office, 
said an investigation is continuing He said no charges have been filed, 
but may be later. 

House: Hacking is Bad 

r^vnbined hrCTnft«jrafc 

h 

The House of Representatives has voted 395-0 for a bill that would 
make it a federal crime to gain access to computer memory banks 
without permission. The legislation would combine the attack on 
hackers with an attempt to slop those who manufacture or posses 
fraudulent credit cards or me someone's credit card number without 
his or her knowledge 

More PC JrV, Less Z-IOOls for Soviets 

n»Nt* l imk Vm* 

The United States, 13 NATO allies and Japan have jointly agreed to 
impose broad, rw w export controls on the salt of small computers and 
sophisticated telephone equipment to nations of the Soviet bloc; The 
agreement comes after iwo and a half years of difficult negotiations, 

. The accord, which was reached at the urging of the US .expands the 
existing NATO embargo on the sale of large sophisticated computers 
to include smaller models that Could have military applications. This 
means that many of the more expensive personal computers now 
available at retail outlets in the United Slates will be subject to capon 
controls m the futurc- 

Also, The agreement sets maximum lewis of technological sophisti- 
cation for digital switching and other telephone equipment supplied to 
the Eastern bloc by Western corporations. 

The Reagan Administration took the most restrictive line throughout 
the embargo review talks, diplomats say, with the Europeans and 
Japanese advocating a more liberal approach to trade wiih the 
Communist world. The U,S,, though, did agree to liberalize the sale of 
some less advanced computers to the Eastern bloc countries in return 


for joint Western restrictions on the sale of certain powerful email 
computers. 

In addition, the Western powers have undertaken to ban the export 
of “ruggedized” computers, built to withstand rough treatment and 
thus suitable for battlefield use. - 

Federal Express Offers “E-Maii” 

Tint 

Memphis-based Federal Express, which pioneered next-day private 
postal service, is now promising even greater speed with ZapMail. its 
long-awaited version of electronic mail. Fora* little as $25 fora missive 
of five pages or less and up to $50 fora maximum of 20 pages. Federal 
Express will zap letters and documents acres the U,S, within two 
hours. Unlike other outfits, Federal Express does not require its 
customer* to use computer keyboards to enter messages. Instead a 
courier comes and picks it up, lakes it to a Federal Express office, 
where clerks feed it into a document tCarmCr for Iransimsskm over land 
lines. At the receiving Federal Express office, a laser printer will spew 
out copies for couriers to deliver immediately. [No, this is mt 
electronic mail in the bona fide sense.) The firm even vows to give full 
refunds if documents are late. 

ITT Wiping Out Fee 

AMuUud Prtti 

On September I . Il l will drop the monthly service fee in charges 
users of its Ibng-di&t&ncc telephone service. The fees currently are $5 a 
month for residential customers and $10 a month for business users, 
JTT also said it would introduce discounts for high-volume callers, and 
said its residential customers would be able to reach any telephone in 
the continental United Slates. Previously, only iTT's butinCH 
Customers had nationwide calling. ITT is ranked eighth among long- 
distance carriers with about 125,000 customers. 

800 Directories Now Available 

A. FViCrtJly Irfpm^kwi Oprarfw 

Starting in the middle of September AT&T will at last start offering 
directories to toll-free numbers. Previously, the only way to gel such a 
directory was through scanning, trashing, or buying ■ directory printed 
by an outside company. There are two versions being offered. One is 
for people and sells for $6.25 while the other is for businesses and sells 
for $G75, 1 nfo can be had by calling B0Q2424634. if that doesn't work 
from yrvur area, call 8005551212 and demand an explanation. Billing 
won^ be done through your phone bill, as one might expect. 44 We donlt 
hare that kind of capability yet," they said to us. 

Ice Cream Chain Aides Selective Service 

lteTfewYiwkTimn 

The Selective Service System has defended its iae of a mailing list 
compiled by a national chain of ice cream Stones to advise young men 
that they were liable for draft registration. 

However, the government will be returning the computerized list of 
167.000 names to the company. 

Alexander Hehmeytr, executive vice president and general counsel 
of Farrell^ Ice Cream Parlor Restaurant, a chain of almost 100 ice 
cream stores, said both he and the company were H upscl and outraged"* 
by this *aci of big brother government," 

For many years the retail outlets of Farrell^ have had customers fill 
out a birthday form so that they would gel birthday cards from the 
company entitling them to free ice cream sundaes. The Selective 
Service bought the Farrells list in 19G3 from a list broker in New 
Jersey. Last October, the system began using the list to malt 1 300 to 
3,500 warning cards a month to young men whose listed birthdays 
indicated they were about to turn IJt, 

Besides commercial lists, the Selective Service relies on state 
agencies thal license driven and the Defense Department, which 
compiles a list of high school graduates.. 


1-45 


3 





BE NICE TO YOUR TELCO 

Over the years, some bad things have happened to my 
telephone. Once a silly caller terminated his call but did not 
hang up. 1 calfed the phone company (New Yorit Telephone) 
from a neighbor's phone, but they said they were unable to do 
anything- They said they could not even tell me where the 
caller"? phone was located. Acting on a hunch., I cruised my 
neighborhood looking for pay-phones. 1 found the phone 1 was 
interested in, but it was in a locked building, and I clearly saw 
the receiver dangling. The next morning 1 was able to hang up 
the phone, and my phone service was back to normal. 

Another time the clever sewer workers hauled out my trunk 
and knocked out my phone. It was restored, but l was not 
getting any incoming service after that, The ever more clever 
phone man came over, dialed the Automatic Number Iden- 
tification, and ki and heboid I had a new number. They fixed 
that too. 

My phone company has been generally nice to me even 
though 1 played some jokes on them. 1 suggest you do not do the 
following, as 1 have done in the past: 

• Fold, spindle, and mutilate your billing card. 

READER FEEDBACK 

DoitJMW: 

Here^ the latest info on phone scramblers. 

Phone scramblers/ descramblers area type of device which 
allows one to communicate over the phone without anyone 
being able to hear your conversation in between the source and 
destination of the call. They are perfectly legal to own and 
operate, but there is oik catch. 

(The following information wa* obtained from a phreak who 
worked with an cx-ClA agent — to verify the validity of this 
statement.) The CIA, working in conjunction with AT&T, has 
the right to legally tap up to 60Q phone lines in the U.S. The way 
that they are able to do this is that Bell Telephone can ^test" 
your line any time it likes to see if it is working in proper order. 
Under the new ESS telephone system, finding scramblers;' de- 
scramblers is very easy and once yoriart found, an instant file is 
generated on both the sender and the receiver of the call. They 
(CIA) will also do their best to try and crack your scrambler 
code. I have been told that they arc extremely good at this. My 
advice to those of you out there thinking about building such a 
device is to seek other ways and for those of you currently using 
them to stop. Using these devices is simply waving a flag to 
AT&T and CIA saying, **l\c got something important to say, 
and I don't want you to hear it." 

Agent Orange 

Dear Agent: 

Thanks for the info and for the warning. While youVe most 
probably correct about the powers that be taking a strong 
interest in any person using such a device, it seems absurd that 
we should have to constantly live in fear of having our privacy 
stripped, simply because we desire a little privacy t 

We face some real problems in the near future if surveillance 
continues to grow and not enough is done by individuals to 
curb it. Technology is a deadly weapon for anyone.. 

Sta y a live, awake, and ind ignant— y ou can 1 ! lose^Thanks for 
writing. 

Dtw2606: 

1 just had a horrible experience. As a faithful subscriber to 
this magazine, I keep all of my copies in a special loose-leaf 
book. This comes in very handy because they're not scattered 
all over the house, like most other thing* 1 possess. But last 
week, l dropped my loose-leafbook on the floor and of course it 
opened, scattering all of the pages here and there. Now, t have 
no trouble piecing together the first page of each issue, but I 
can't remember where the other ones belong, since they don't 
have any dale on them! Can you help me piece them back 



more, 

■ Cross out the line of numbers in magnetic ink at the 
bottom of your bill or check. 



what is due. 


possible. 


phone companies. 


check (10 or 30 per phone bill, for example). 


bottom of your check where the space for memos is located. 

These activities cause the phone company to put more work 
into serving you. It causes them to process your bill by hand, to 
spend money printing and mailing phone books, and to read 
your unfriendly message. Don * do this or vour rates will go up, 
(Please contact 2600 tM MEDIATELY if you know of other 
abuses currently making the rounds.) 


together and take steps to ensure that this tragedy doesn’t 
reoccur in the future? Thanks. 

Miserable In Philadelphia 

Dear M1P: 

You\e raised a very good point, one which we overlooked 
completely. While most of our stories are essentially timeless", 
it does help to know whena certain article was printed. For this 
reason, we have begun (as of this issue) to number our pages in 
manual format. For instance, this is page 1-46 which means 
Volume 1 1 Page 46 of the year. We hope this eases the suffering. 

As far as previous issues, we will be coming out with ^summary 
sheet towards the end of the year which well send to all ^ 
subscribers. Well try to get yours out early. And if anyone else 
knows of something we\e overlooked or wants to make a 
suggestion, please write. 

Dear 2640: 

I'm working on a book that gives the hackers 1 viewpoint and 
explains why he /she penetrates computer systems, 1 believe 
that even though I’m currently incarcerated, 1 could get a 
publisher to publish such a book 

To get this viewpoint I need help. L need the input of people 
who are active— the more the better. I also need the views of 
people who trash systems too. AIU Vcever seen is the viewpoint 
of the law enforcement agencies, media, business, and hackers 
that are caught etc, etc. etc. It 1 * time your views were heard. 

What I would do is just edit letters etc. sent to me and use 
these as basis for the book. By edit 1 mean pick the ones to be 
used in their. entirety. 

People interested in helping me with this can write to me 
under handles or pen names at the following address. Do not 
use your real name or address as nty ntaii is censored by officials 
here. 

John Gregg 
Box IM 
Marion, 1L 62959 


A CORRECTION 

In our last issue, we erroneously gave our MCI Mill ID as 
2600. We didn’t think there would beany problem in obtaining 
that ID, but there was. TV MCI Mail computer apparently 
can ’t handle all-digit usernames. Our MCI Mall ID therefore, is, ' 
26HUNDRED. Write to va there or a tow mailing addrea or-, 
our mew telex address, all of which are listed om page one. 
(Especially write to us if you can think of any new ptaeslo have 
an address!) 


1-46 


2600 


page® 


'■■"V 


ZOl 
2 02 
203 
204 
203 
306 

207 

208 
208 
212 

213 

214 

215 

216 

217 

218 
219 

301 

302 

303 

304 

305 

306 

307 
306 
309 

312 

313 

314 
313 

m 

3ie 

319 

401 

402 

403 

404 

405 

406 

407 
406 
409 

412 

413 

414 

415 

416 

417 

418 
4 IS 

501 

502 

503 
304 

505 

506 

507 

181 

512 

513 

514 

515 

516 

517 
516 


201- 676-7070 

202- 364-96Z0 


203 

204- 

205- 

206- 
617' 

303- 
415- 
516" 

213- 

214- 
412- 
614- 
217- 
402- 
317- 
301- 
412- 
303 

304- 
912- 
306- 
303- 
402 
217- 

312- 768 

313- 223 

314- 726 
510-471 

519- 

504-245 

402-345 

617-787 

402- 345 

403- 425 
812-784 
405-236 
303-283 



-763- 

-849- 

-988- 

382- 

7B7 j 

■293- 

■546- 

471" 

>301’ 

■696- 

■633- 

■464- 

-525- 

■ 345 - 

■265- 

■534- 

■ 633 - 

-283- 

- 344 - 

7B4- 

-347^ 

■2S3“ 

'345- 

■525" 


-6615 
■0900 
■7000 
-9000 
■5300 
■2333 
-0116 
B1U 
■3255 
■8711 
-5600 

-7000 
■0600 
-4634 
-1168 
■5600 
2333 
9041 
0440 
2878 
2333 
-0600 
'7000 
■9600 
8680 
7142 
-9111 

l=3i§3 

-5330 
-0600 
-5300 
-0600 
-2632 
-0440 
-6121 
-2333 



415-543-6374 
713-820-41 1Z 
412-633-5600 
617-787-5300 
608-252-6932 


415 

416 
314 
514 
614 
405 

502 

503 

>4 
i3 


546- 

922- 

726- 

297- 

464- 

236- 

583- 

■241- 




0107 
6686 
7142 
5151 
2345 
6121 
2861 
3440 
0 
3 


506-648-3041 

402-345-0600 



206-382-8000 

512-826-2501 

014-464-2345 

514-267-5151 

402-345-0600 

518-471-0111 

313-232-6690 

516-471^9111 


518 

601 

602 

603 

604 

605 
BOB 
607 
609 
609 
612 

613 

614 

615 

616 
617 
616 
619 

701 

702 

703 

704 

705 

706 

707 

708 

709 

712 

713 

714 

m 

717 

71B 

719 

601 

602 

803 

604 

905 

906 

807 

808 
809 
612 
813 
914 
615 
BIG 
Bi7 
BIG 
619 

901 

902 

m 

803 

806 

607 

908 

609 

912 

913 

914 

915 

916 
817 
816 
819 


416-922-6686 
G01 -961 -0877 
303-293-2333 
617-767-3300 
♦CLOSED 3/62 
102-345-0600 
502-503-2861 

516- 471-81 1 1 

414- 252-6032 
201 -G7G-7070 
402-345-0600 
416-922-6686 

614- 4B4-2345 

615- 373-3781 

319 = 989=8188 

402-345-0600 

415- 546-0110 
804-747-1411 
012-704-9111 

416- 922-6686 

415-546-0107 




402-345-0600 

713-820-4112 

213- 501-3255 

mm-m 

412-G33-5600 

518-471-6111 



303- 293-2333 

517- 7B7-5300 
912-704-0440 

304- 344-6040 

415- 546-0118 
512-828-2501 

416- 822-6688 
212-334-4336 

212- 334-4338 
317-265-4B34 
813-226-7871 
412-633*5600 
217-525-7000 
816-275-2762 

214- 698-9711 

213- 501-3255 
514-207-5151 
6 1 5-373-5791 
902-421-4110 
tt«*«N/A#**** 
912-704-0440 
#»**N/A***** 
313-223-8680 
#***N/A***** 




812-764-0440 

§ 16-275-2702 
18-471-6111 
512-628-2501 
415-546-0118 

403-236-6121 
912-784-0440 



Mtojutm 

Wtkmtw 


Jtttofiff 

YOUR 


( Bermuda On 1 v 1 


1-47 


5 


200 

210 

2Z0 

230 

!7( 


201 „ 
211 „ 
221 .. 
231 „ 
241 
251 .. 
261 .. 
271 
201 „ 


_ 202 
_ 212 
_ 222 

_ 2*2 
_ 252 
. 262 

:» 


203 

213 

223 

233 

243 

253 

263 


::: III ~ 


2M 245 ZC9 _. 207 209 709 

Z14 ... Z15 ... 2lG _ 217 ._ 218 ... 219 

224 223 ZZ9 227 — 228 — 229 

234 ... 233 „ 239 ... 237 ... 238 239 

244 245 248 247 248 _ 249 

254 233 239 237 _ 258 ... 259 

294 293 299 297 _ 298 299 

82::: SI — IS n: S7 — IS = 


zao 

300 

310 

320 

330 

340 

350 

m 

370 

300 

390 

400 

410 

420 

430 

+40 

450 

460 

470 

400 

4S0 

500 

Sit 

530 

530 

540 

550 

560 

570 


291 


202 


293 


294 


ZB 


296 


297 


298 



209 

i . _ 

301 


302 


303 


30+ 


305 


306 


307 



300 

M M M 

309 

j. 

311 

32 : 

^,— Ui 

312 

322 

— ^ 

313 

223 

— 

314 

324 

— 

315 

325 

— 

m 

— 

$ 

— 

310 

320 

— 

E 

MW*- 

331 


352 


333 

■ — ■■ 

23+ 


335 


336 


337 


338 

MMM 

338 

jmwmWm mm 

341 


2+2 


m 


344 



3+5 



340 

WH 

347 

J >M 

340 

MMW 

349 


35: 


352 


353 


354 


355 


336 

. _ 

35 7 



350 


339 


361 


3GZ 


263 


364 

, 

305 

.MM 

366 

MM 

367 

^ M t 

368 

— 

389 

mwm 

371 


372 


373 


374 


375 


376 

■ ; ■ 

377 



370 


379 

MMM 

361 


362 


363 


204 


385 



m 

MBiM 

397 

MMM 

388 

— 

309 

MMM 

291 

401 

— 

392 

4C2 

— 

393 

403 

— 

$ 

■ - — 

395 

405 

— 

396 

406 

— 

$ 

— - 

300 

(00 

— 

39} 

400 

419 

“ 

4i: 


412 


413 


4H 


415 

_ _LM 

416 


+17 



410 



MM 

421 


422 


423 


424 


423 

™T 1 ■ # 

426 


427 

m M M 

420 

-m 

428 

MMM 

431 


432 


433 


434 


433 


436 

MMM 

437 


♦38 


43E 

MMM 

4+1 


4+2 


447 


444 


445 



446 

JUB-M 

447 



440 

MMW 

449 

MMM 

451 


452 


453 


45+ 


4B 

=__M 

456 

MMMi 

457 



430 


459 

MMM 

+61 


462 


463 


+64 


495 



406 

jt.jm.wm. 

467 

■HMM 

460 


463 

MMM 

471 


472 


473 


474 


475 


476 






470 


478 

MMM 

481 


462 


403 


434 


405 



406 


467 

MMM 

406 

■TMM 

409 

a-MM 

£ 91 


492 


(S3 

mJmMmJU. 

434 


495 


496 

W IT- 

497 

— 

406 



499 

MIT — 

501 


m 


503 

mLmJU aJH 

504 


505 


506 

MM rw 

307 

LB. 

500 

— 

509 

MMM 

511 


512 


513 


514 


315 

_ 

516 


517 


519 

M MB| 

518 

MM.M 

521 


522 


523 


524 


525 

■ 

52)6 

MMM 

527 



320 



329 

-LM. 

53i 


532 


533 


534 


535 


336 


537 



530 


539 

MMW 

541 


542 


543 


544 



545 


546 

MMM 

547 

VMM 

340 


349 

alJiftl 


551 

561 

571 


500 

301 

500 _ 

59 1 


601 

fill 

BJM^ MW. 

621 

630 

621 

6+0 

641 

650 

651 

660 

g 70 — 

661 

SB 

5 BO 

690 __ 

G91 

691 


552 

552 

572 

502 

592 

G02 

s;2 

sz: 

632 

642 

052 


553 

503 

573 

503 

593 

603 

613 

£23 

m 

643 

653 


m 

574 

594 

594 

S£tt 

61* 

624 

634 

644 

654 


” I" ^ ”1 567 HI 


575 . 
505 . 
595 . 
£05 _ 
£15 - 
625 . 
655 _ 
645 . 
£55 _ 


„ 576 
5S6 
.. 536 
.. BOS 
£16 
KG 
636 
„ 646 
.. 656 


557 

567 

577 

507 

587 

507 

617 

627 

637 

647 

657 


578 

556 

590 

600 

518 

626 

638 

640 

659 


___ 579 
... 500 
599 
— 609 
_ 619 
___ 629 
___ 630 
649 
™ E59 


700 

710 

720 

730 

740 

750 

760 

770 

700 

790 

800 

810 

8Z0 

830 

050 

600 

070 

SBC 

090 

900 

910 

930 

930 

940 

950 


ETCH 

990 


731 

741 

751 

761 

771 

761 

761 

901 

m 

021 

031 

941 

051 

be: 

071 

061 

981 

801 

Til 

621 

£31 

0*; 

051 

961 

971 

-QA* 

981 


■ MM 
■Ji 

DEM. 

__ j— 

DBiJ 

U1 


DD1 

ut 


ev«r 

1$ 

— — LM 

III 

— 

tnr t 

\r 

- — 

uw 

— 

UMU 

IM 

_j 


662 


593 


694 


695 

1 

696 



697 



599 



699 




702 

■LL M M 

703 

_ 

70+ 


705 


706 

MM. 

707 

MMM 

709 



709 



712 


713 


714 


715 

■ 

716 


717 


719 


719 

MMM 

^ 

722 

ja _l m 

722 



72+ 

•JIMM 

725 



726 

MM. 

727 

MMM 

720 

.MM 

728 

MMM 



732 



733 

. 

734 



735 



736 


737 


73S 

TBM-. 

738 

__ |Jl 



74Z 



743 



744 



745 


746 

. 

747 

M"I" — 

740 


748 

^ 


752 


753 


75+ 


755 


756 


757 


750 


756 



702 


703 


764 


705 


766 


767 


760 


7© 



772 


773 


774 


775 

. 

77S 

.... 

777 



770 


773 

MMM 


702 


763 


704 


795 


766 


707 


798 


799 



7K 


793 


764 


795 


796 


707 


798 


709 



902 


603 


904 


605 


806 

u 

007 

■ 

009 

MMM 

809 

M.M 


012 


£-3 


8:4 


815 


816 


017 


018 


819 

A I 1 ■■ 


022 


023 


m 


025 


£6 


927 


028 

MMM 

829 




022 


033 


934 


035 


936 


B37 


639 



639 



942 

_l aa. 

0+3 



&U 



045 



846 



847 



048 



849 

■ ■ TT 



052 



053 



954 



655 



056 


957 

_4__ 

950 


053 



982 



063 



664 


065 



886 



867 



068 



809 


■ MM 

072 


373 


974 


975 

' ■ 

976 


977 


S3 

M-ii-to- 

079 



082 



003 



384 



605 



886 



987 



ess 



809 




982 


093 


88+ 


0S5 


896 


B87 


see 


899 


31 

902 



903 



904 



903 



906 


807 



90S 



809 







913 


314 


915 


916 

— 1-J-W 

917 


sie 


619 




922 



923 

MMM 

624 



925 

MMM 

926 

MMM 

827 

MMM 

920 


929 

A M J_ 

ja u. 

632 



933 


934 

J _ _ 

93? 


936 


937 


930 


939 



942 

MMM 

c ui 

u r 

M. M 

944 



945 



946 



847 

. 

gift 

urC 


949 


-- 

352 

962 

— 

953 

963 


954 

964 

— r +r -r 

fi 

— 

i 

: 

^7 

— 

950 

960 

— 

959 

SS9 

— 

.. _ 

972 


973 


974 


975 


876 


877 


970 


979 




382 



983 



904 


m 


806 


887 


988 


90S 


LM . 

992 

MM. 

993 

MMM 

994 

. . M 

995 

MMM 

yOD 

.MM 

987 

- ■ 

098 



Sfifl 




The HmktrsGukkio Ansa Cotk 


C — CmriMT Office 
E - Etedronfc or Dfcit*l Office 
S — Step Office 

A - AT* I 
G — GTE 
1 — ITT 

N — Northern Telecom 

■ 


Ehrtt Completed 


1-48