đŸ’Ÿ Archived View for clemat.is â€ș saccophore â€ș library â€ș ezines â€ș 2600 â€ș 2600_1-9_djvu.txt captured on 2022-01-08 at 14:15:52.

View Raw

More Information

âŹ…ïž Previous capture (2021-12-03)

-=-=-=-=-=-=-

2600 Magazine - Volume 1, Number 9 



XtXt j. imhliihed- b|. *ftfl> ‘F'i I M!PK ISI.S-. I rif.. in ri«mr*>Mry oijunimtivfi Subw^ioℱ 1 Trai 1 - 15 — ft mCTTlk-. 5 1 p*f iuut. - 

wmn * I ' HI I -.m V, rne .Wtf . &m ?52. M«JJk hlnnd. *V I . M[ I Mail: hH UHDRED: TLX b« IW492B. 


VOLUME ONE, NUMBER NINE 


HISTORY OF BRITISH PHREAKING 


709 

m 

UK) 

UM 

151* 

1T»He 

I3ffi 

1500 

1620 

174ft 

IStift 

IWHi 

IMQ 

1020 

m 

7» 

m 

540 Hi 


by Ltfhor Mid The [.effri o* Doom _ 

In Britain. phreak inÂŁ goes hack to the early liftiK, when the technique of To 1 1 
A drop buck "was d iscovered. toll A was an OLdtiil^ near St . Paul* which muled 
■rails between London and the- nearby non-LundCfl exchanges. ThE tricli wis [0 
diaLdrt unallocalcd number, and [hen depress [he receiver — rekt for 'A srtiond. This 
(lashing initiated the “clear forward" serial, leaving the caller with iti open line 
into ihc I’dLI A exchange. He could then dial 01 ft. which forwarded hkrn to ibe 
trunk exdtangc- -at that time, the first long distance exiclangc in Britain — and 
follow it with ihe code for the dislant exchange to which he would be connected at 
no extra charge. 

The signals needed la control the UK network were published in the tnsiituihm 
of Post Qftce tjigineers JuUtWilznA reprinted ill the Sunday Times ISOct, 1975. 
(NOTE: the British Posl Office is the U -K- cqua^alertt of Mi Bell. ) 

The system is called Signalliog System No. 3 and it uses pain Of frequencies 
selected from 5 touts separated by 130lh. With lhal info, the phneaks made 
’iMecpers^oras they are called here in the U.S., blue boxes. The British, though. 
Utilize different MF tones than ihe U.5.. thus, your U.S. blue box that you 
smuggled into iheU.K. will not wwk, unles^ou change the frequencies. (In ihe 
early sewilifti. a simpler system based on different number of pulas with the 
same frequency (22&0Hz) was used, For more info oo that, try to gel ahold of: 
Atkinson's “Telephony and SySI^[n^T((h^fllo^y' , . 

Boxingm Focafpi Lands 

The following are timing and the frequencies for boxing In the U.X. and other 
foreign countries. Special (hank? to Peter Mclven for Ihc following Mia- 
BcHish “bleeper" boxes have the very same layout as U.S. bine hoses. The 
frequencies 91 nc different, though. They use IWO sets Of frequencies forward and 
backward. Forward signature senlodl by ihebteeperhpx. The backward signals 
f may he ignored (it s sort of hke using fuH dupkxl-The frequencies are as folk*: 

V - IhH. 

Kwd 
Bkwri 

For example, change the 900Hz: potentiometers In your box to iSflOHz.- Alt 
numben 1-0 ( 10) art. in the.samednderas map American fcwx. The ones after this 
are the ir cocks for operator 1 1, operator 12, spate 13, spitrtr 14. and 15. One of 
these is K P, one i probably 1 5 ) is Star l It wouH be loo land to figure out. The signals 
should carry >1 1 .SdBm +, 1 - ldB onto the Line: Ihe frequencies should be within 

parts of Ihe D.K. This would tfltode all signals ! to ft H* binary numbers: for 
instance, a five is 010 1 . There are six imervals-pcr digit, each 50ms long ora total of 
300ms. First is a Stall .pul*; Of 22M) for 5dms. Then, using ihe example of five 
(0101), there tea 50ms pause.a50ms pulse of I2B0.& 50ms pause, and a wim pulse 
of 2280. Finally, there is a 50ms pause that signals ihe end of the digit. '[Tie 
frequency inference on ihe 2280S tz is +/ -0.3%: ii isnntat ldBm. An idle line 
is signally by the presence yf a 3825 Hi tone for more than*50ms. This musi be 
within 4H z. 

Trance uses the same box codes as the U.S., wilh an additional 1900Hz 
acknowledgement Sdgnal,tt -8.7 +■'- 1 dBm per frequency. 

Sq+l uses, a 2 out of 5 mf code (same frequencies as U.S.). with a 1700Hz 
acknowledge signal. 

Other places using the I VF system are: 

Aiutnlk; 22SOHi +; -bH? 35m?, 1 digit at -6dB 

Gcrtmnj, France: ame is Auairalia; aba, some I VF systems in ihe UlC. 

SwIlHrlm): \ame as Australia, only it uses 3000Hz, nOl 2280. 

Sweden: same a> show, but ii 2400Hz. 

Spain: some pnrts use 1 VF with 25QQH2. 

rhere is one olher major system: the 7 VF System. Iti Ihis system, cflch d igit is 35ms 
iopg- The number is encoded in binary as with the I VF systeni . U sing the exampk 
of five (UlOl). here s how the American 2VF system was sent: 

2400 pulse, pause. 2CM0 pulse, pause. 2400 pulse, pause, 2040 pulse, pause. The 
digits and pulses are all 35ms long for a lofel uf 2ms ptrdigil. 
OlhercxHintncsareslill using a simitar high, '.kni, 1 pair with the saiil* limipp Stnw 
parts of Elily use Ihe I V F system with 2W0Hz; some use the 2V F system with 2040 
and 24Di>H i. ( same as original LJ ,S, )- The NethertftiH iiseia 2V F sysiem with 2400 
and 25Q0Hr pulses. With the 2Vh system, alE frequencies should be within 2Hz. 
Also, kre are flame specs for American phone equipment; 

Ohl Tnne: 35d+440H^, -17 J to -14.5 dBm, 1 [One. 

^ — L mr-Hook (ftOH )c t400*2MCN24SI)+26£iOf!) on/ off 5 I inks per second . 

Bgijj 480+P20Hz: slow busy: 0.5 + ' ■ 0.05 see = I period (about twkc a second), at 
-28.5 iu '22.5 dBm; tone 

Rifl{:44Dt4M)H; at -23. 5 to -20.5 dBm -tone. A Hug is modulated at 20 *1 ■ 3Hz. 2 
hk on, 4 sec off. 

Call Willing; 440Hz, on I second. 


R«£ftrdeT Com** + jct»: ’ J TOHt. beeps I S »C««l3 

MuMpNtrLkwRhi: san»e frequency and modulationas fin#, hut I uc«i, 2 SAC 
nff (twice as fast). 

Tfte the Somr 

In ihe eaHy days of British ptireaking. the Cambridge llniveraiy TiUn 
computer was usol to recsnl end circulate numbers fourel by ihe exhaustive 
doling of local networks. These number* were used tociwteacluin of links from 
local exchange to local exchange acrOfiS the country, bypassing the trunk druuiis. 
Because ihe internal routim codes in the UX networkire not the same as those 
dialed by the cablet, the phrcaki had io discover them by “probe and listen 
techniques, more commonly known in the U S, as scanning, Whal they did was pUI 
in likely signals and listen to find out if ihcy succeeded. The rasalia of scannihg 
were circulated to other phneaki- Discovering each other look time at first, bul 
ewntually ihe phreaks became organized, The H TAP" of Britain was called 
"Undercurrents" which embk; British phreaksto share the info on new numbers, 
equipment . ete. 

To understand what the British phreaksdid, think of the phmt network m three 
layers of lines: local, trunk, and international. In (he U.K., SuhBcriber Trunk 
DLs|1ti[ (STD), is the mechanism which ukes a call from the lual lines and 
(legjlimhttly}ÂŁlKvii4niLloa trunk or international level. The U.K, phretks figured 
ihelacallat trunk Icvcl^n be routed through any number of exchanges, provided 
that the right routing codes were found and used correctly. They itso had to 
dBcovcr how to gel from local to mink level either without being charged (which 
they did with a bktpcr box) or without using (STD). Chaining has already been 
mentioned but it requires lone stringa of digits and speech pit more and more 
faint aa the chain grows, just like it does when you stack trunks beck and forth 
across the V S, The way the annuity reps snagged the phreakt was to put a simple 
"nrintenneter" or pen register, as we rail it . on the HJipcct^iinc, which show? ?vcr 
digit dialed (torn the subacriberh line. 

Thi British prefer to get onto the trunks rather than chaining, One way was to 
discovee where local calls the trank? between neighboring (Khaqp, iiart a 
catln and stay an the trank instead of returning to the local lerel dn reaching the 
distant, switch. This npin required exhaiHlivt dbatuig and made more work for 
Titan; il also revealed "fiddles", which were inserted by Post OfHc* Engineers. 
What fiddling mean* ia that the engineers, rewired the exchanges for their own 
benefit . The equipment is modified to give access to a trunk without being charged, 
an operation which is pretty easy in Step by Step (SxS) ekdromochaiiiea! 
exchanges, which were installed in Britain even in the I970i. 

A famous British “fiddteT 1 ' revealed in the early 19710^ worked by dialing 173 
The caller then added the trunk code of I and the subscribers local number. At 
that time, most engineering tot services began with I7X, so the engineer* could 
hidt their fidd les in the nest of service wires . When security reps started searching, 
llu Tiddles were concealed by tcuKS signalling: “number urvobuinabk” or 
"equipment eoeapri"' which switched off after a delay. The necessary relays are 
small and easily hidden. ■ ■ 

There wasatiother aide to phieaking in the U.K, in the sixties. Before STD vA a 
widespread, many ‘'otdiiuiy" people were driven to occasional phmkutg from 
sheer frustration -31 the inefficicfU operator ran trolled trunk system. This came m n 
head during a strike about I%1 when operator* emild not be reached, haihnyg 
complicated was needed. Many operator* had been in the habit of reireating the 
codes as they dialed the requested numbers so people soon Iramed the numbers 
they ca Lied frequently . The only "trick " was to know which exchange* could be 
dialed through to p«4 an the trunk number, C&lfcr* also needed a pretty quiet 
place to do it. since timing icktivr to clicks w» important. 

The most famous trial of British phteaks ww rolled the Old Baily trial which 
started on3tk,i. L9T3. Whaithe phreaks did was dial a spare number at a local call 
rale but invulving a trunk to another exchange. Then they tent a "clear forward" to 
their local exchange, indicating to it that iIk cell wsi finished— but the distant 
exchange didnT realize this because the eallert phone wtu still off the hook- They 
now had an Open line into the distant trank cxchangeand they ml a “seize" signal 
(] ) which pul them an the outgoing lines. Since they figured out the codes, the 
world, wo* open to thera . All other exchanges trusted the local t ucha ngf to handle 
the hilling— they just interpreted the tone* they heard. Meanwhile, the local 
exchange caltacud only fora local ca II. The inve^ipwmdiscoiwti the phreata 
holding a conference somewhere in England surrounded by various phone 
equipment and bleeper boxes, also printouts listing^secrel “ Post Office codes. The. . _ 
judge said, “Some take to heroin, some take to telephones " For thrm phon 
phreakirtg was tUM a crime but a hobby to be shared with phdlaw enthusiasts ta 
disetussed with the Post Office openly overdimicr and by mail- Their approach and "" 
altitude to the world 'i largest computer, the global telephot» system, wa* that of 
scientists conduttityi: experiments or pragrammErs and engineer? testing programs 
end systems. The judge appeared to agree, and even liked them for phreaking 
codes to use from his local exchange! 


1-49 


i 


MORE ON TRASHING 

What to look for, how to act, where to go 


by The Kid & Co. and The Shadow 

An inspection of your local Telco office trash receptacles can 
reveal a wealth of documents of great interest to a telecom- 
munications hobbiesi. The font company doesn't expect anyone 
except maybe bums to paw through their refuse, and therefore 
often disposes some interesting materials. In all the instal- 
lations we have investigated, the Company doesn't shred or 
i nd rterale anything, M ost sites have theii r garbage in trash hags 
convenient for removal and leisurely inspection at home. 

A case in point. The authors of this article have been engaged 
in trashing for about three months, finding quite informative 
info, but when we escorted two phriends from the city on an 
expedition, we didnlt know the most efficient methods. They 
came out to the boondocks of New Jersey to inspect the wealth 
of AT&T and Bell installations in the region. They were quite 
expert at trashing, having more experience in the art, so we 
merely watched and copied their technique. 

Our first hit of the night was of an AT&T Information 
Systems office building. We gathered a large mass of manuals 
and binders. Then we moved onward to hit AT&T Communi- 
cations, the local business office, our central office, and another 
Bell site. After a successful session, we deckled to call it a night . 

We sorted the piles of garbage for things of merit. Our 
phriends garnered the majority of the really interesting items, 
but we salvaged several things of worth. This sorting session 
was conducted in the center of town, to the amusement of 
passers-by. It was interesting to explain to friends that passed 
by what we were doing. We BS’edan inquisitive young lady into 
thinking that we were a Local group of Boy Scouts cleaning the 
area as a project for our Eagje Scout badge. Following the 
tendency of the masses to follow falsehoods, she complimented 
us on how clean the town looked, for she had been out of the 
country for the last couple of months- Just remember when 
"creatively explaining* to sound confident, and to have your 
compatriots shut their mouths. A couple of times we almost 
contradicted each other as everyone got into the flow of 
falsehoods. 

N Limerous th mgs of interest can be found in Bell trash. Ones 
thal are of use to anyone are binders and notebooks with the 
Bell logo on them, good for impressing friends. Also, supplies 
of Bell letterhead are good for scaring phriends. Documents of 
more interest to phreaks can also be found. Cosmos printouts 
abound in any CO trash. In house telephone directories list 
employees of Bell, good to try social engineering on. Manuals 
also have merit for the phreak. Maintenance reports* trunk 
outages reports, line reports, network control ana lysis (NC A), 
TSPS documents, and lists Of abbreviations used by the font 
company can be found. The latter is of great importance as it 
allows one to decipher the cryptic documents , Bell seems to love 
ridiculous and mysterious abbreviations and anacronyms. 

“Looking for Notebooks* 

The expert irasher must be willing to physically enter the 
dumpster. Only reachi ng i n for easily obtai nable objects m isses 
heavy manuals that tend to sink to the bottom. Huge bulky 
printouts, directories, and obese manuals as well as binders 
settle out of reach. Also, once in the dumpster, inquisitive 
security can't see you. 


we don't know, having never been caught at it. The basic fact 
which protects the trasher is the ludicnou&ness of someone 
stealing your garbage. Probably the most they can get you for is 
trespassing, and most of the time theyll probably just throw 
you off the property. Good excuses for being around the 
d umpsten are that you are passing through on a shortcut, that a 
bail or friabce has flown in, or thal you are Looking for 
notebooks for school. 

A good way to avoid unnecessary surveillance by Telco 
employees is to trash late at night, after most have gone home. 
Weekends, especially Sunday nights* leave the sites deserted, 
except for security or janitorial staff. Before starting on a 
trashing run, be sure to ceconnoiter the a rea, and to Find out the 
schedule of garbage collection. That way you can hit the trash 
at the fullest and most profitable time. 

One thing that simplifies trashing runs is the use of a car. A 
car will allow one to hit trash sites farther afield, as well as 
assisting in the removal of bag* and boxes of trash to sort at 
your leisure. Trash sorting really shouldn't be done on site as U 
increases the possible time for disco very by security. Removing 
garbage by fool invites starts and limits the amount that can be 
removed- The car should drop off the t rashers and return about 
a half hour later* depending on the amount of trash there. 
Before dropping them off, be sure to investigate if there is any 
trash in the first place for, as past experience has shown, they 
tend to get quite angered when they have spent the hist hour - ^ 
staring at an empty trash container. 

The on-site tra^hera should be willing to hop into the 
dumpster. As we mentioned, this maximizes the amount 1 of 
trash that can be reached. They should rip open any bag*, 
shoving the uninteresting ones to the rear and bottom of the 
container, while bringing new ones to the forefront. Boxes in 
the trash should be used to cany the documents into the trunk 
of the car for leisurely sorting. This should be done with a 
minimum of noise and light, if flashlights are to be used, The 
trashere shouldnt attempt to take the best stuff, just to grab as 
much as looks interesting. 

At the appointed time, the car should return and pick up the 
trashers. Boxes should be stuffed in the trunk as quickly as 
possible. Smell won't be much of a problem* as all you are 
laking & re papers. Occasionally a bag of coffee grinds smells up 
the works, but you, at all costs, should avoid cafeteria 
dumpsters as the rotting food really reeks, and contains little of 
value to the telecommunications hobbicsL 

The car should then drive off to a safe and secluded spot to 
sort the trash. The location should be well lit and have another 
dumpster handy to throw the real trash out permanently. The 
valuable stuff should be taken home and sorted according to 
type. By keeping a 11 of the similar stuff together, patterns can be 
recognized. Here, abbreviation lists come in handy. The date 
and location where the trash is located helps to keep the junk 
organized. 

A careful inspection of local Telco trash receptacles can be 
informative and lun. Any real phreak should find out at the 
least what the switching equipment for his/hef/it^wa is. ^ 


Proper trashing technique is gained by experience, so climb on 
Speak ing of security, what are the dangers of trashing? Wei L in! Wc3L happy trashing and have a phree day. 

1-50 




— ' 

MNO 



r 

l 


OPER 

0 


i 

— - J 


OPER 

0 

I 



NS A Doesn^ Feel Secure 


I tie heir York Tii*ei 


The National Security Agency has told Congress that United Slates 
advantages in advanced teclmoldgiej, indudingdevelcpoieoi of nuclear 
weapons, are threatened by the poor security of the ration’s cocnmum- 
catkfoa networks. 


To protect information, the agency recommended that a single 
agency superv ise the development of communication security proce- 
dures, the purchasing of telecommunications security equipment and 
carrying out personnel security procedures. 

The National Security Agency is the largest and most secretive of the 
nation’s intelligence agencies. Its chief rwpoitribilitia am to collect 
intelligence by eavesdropping on the electronic communications of 
olher nations and to devise ways to prevent foreign countries from 
acquiring the confidential messages of the Defense Department and 
other security agencies, 

Jerry F. Berman, legislative counsel to the American Civil Liberties 
U nice, agreed that the swift development of computerized communi- 
cations systems had made security a legitimate public concern, 

"But what is disturbing about the proposal is that it comes from the 
N S. A. , a super-secretagewy with a major foreign intelligence mission 
and the least accountability of any agency in the United States. 
Government,'* Berman said- 

"lf any agency is competent, it is the N.S. A, The problem, however, 
is that they are not accountable and cannot be counted upon to weigh 
oiber interests, such as the privacy of all American citizens, 

“If the N r S,A, were to get involved in procurement, for example," 
Berman added, '‘they could end up putting a net of security over large 
parts of the academic community and industry. It might increase 


r\ 


security, but it also could reduce freedom and hinder the open 
development of new forms of communications, 1 " 

A list was not provided of the Government telecommunications 
networks that might come under the overall control of a centralized 
sccurily agency if it was given a broadened mandate. The Federal 
Bureau of Investigation, the General Services Administration, and the 
Federal Reserve operate nations L communication networks that would 
qualify as being among “the nation's automated information systems, ** 


Another Hacker Story 

Aunjwtnt Pick 

A boy who allegedly bought rare comic books and other goods 
worth thousands of dollars by using a computer to get crediTcaid ■, 
numbers is helping authorities trace other hackers across Ihe country, 
Howard County [MDJ police say- 

Hc has cooperated with local police, FBI, and Secret Service 
investigators by providing information about illegal computer opera- 
ting practices. I he youth allegedly bought computer equipment and 
programs valued up to54jD00 by using end it card numbers supplied by 
computer hackers from the Midwest. He ordered the good& by 
telephone and then picked them up after their delivery to unoccupied 
homes. . 

Police obtained a warrant to search the boyls house August lb after 
talking with an informant- Found were programs that allowed him to 
patch into several long distance telephone companies illegally, Police 
say he apparently was able to call around the world and arrange . 
conference calls using corporate telephone lines. 

[Must have been a real genius...] 


AT&T Faces Serious Money Problem 

AsuroUcd Pimcu^in 


The American Telephone and Telegraph Company, despite service 
backlogs and ine reared competition, hat moved closer in recent 
vmomhs to its maximum authorized profit margin for interstate long- 
-distance telephone service. 

A company spokesman said late last month that ATAT^ rate or 
return, or proHl margin, on long distance service was 12.36 pcrcenl 
after the first seven months of 1 984. The maximum authorized margin 


is 12.7 5 percent annually, based uu a Jdt i a investment ill equipineiu.. 

Among long distance companies, only ATAT faces an Federal 
Communications Commission limit on profits. The rommuram last 
adjusted the margin In J981 after more than a year of study, railing it 
from 1 1 percent. Should ATAT exceed itk margin, the F.C.C, can 
order rate cuts. 

Private Directories Soon to be Available 

Hie New Vnri Thus 

How valuable are the telephone directories or some of the nation^ 
lop banks, investment and accounting firms, insurance compa nics, a nd 
corporations — especially those that include not only direct office 
numbers for managers, but also home addresses and phone numbers 
and, in at least one instance, such date for summer homes? 

Steven Olsen is counting on their being worth a great deal. Hia firm, 
Corporate Information Services, plans to sell copies of directories for 
such companies as the General Motors Corporation, the RCA 
Corporation; Chase Manhattan Bank; Goldman, Sachs A Company; 
Arthur Andersen A Company, and Boot, Allen A Hamilton, the 
management consulting firm. 

Prospective buyers are told to write to a box number and ask fora 
catalog detailing what Mr. Olsen raid would be a package of directories 
for 250 companies from around the world . They must then submit bids 
through the mail for his package Bidders topping a minimum set by 
Mr. Obens company would receive the package, and, he said, "We're 
not talking small money. This is a valuable source of information to 
Stockbrokers, executive recruiters* [computer hackers,] insurance and 
real estate brokers, and those engaged in direct-mail marketing or 
telemarketing. We'Ve talking about the most powerful companies and 
some of the highest-salaried people in the world.” he added. 

Mr, Olsen, who raid he got his idea while working as an editor fora 
computer publication [it wasnl us, wc jhtot}. showed off copies of 
in-housc directories for Chase Manhattan and Goldman, Sacha during 
an interview. His plans drew a cool response from both companies. 

. Many other com panics declined comment on the attempted sale of 
their directory information. The reaction among those that did ranged 
from outrage to hearty amusement. 

“WeonEy have copies of the directories,” Mr. Olsen stressed, not the 
.directories themselves. “So we're not in receipt of stolen properties, 
and I acquired them all legally." 

But Mr. Olsen, who wants to sell other people's addresses and 
telephone numbers, declined for “reasons of security' 1 to disclose the 
address or telephone number of his company. There was no listing for 
Corporate Information Services in telephone information for New 
York City, and the address to which inquiries about the auction are to 
be sent is a mailbox in ft private postal drop company on lower Fifth 
Avenue, Mr. Olsen was reached through an answering service, whose 
number is not as closely guarded. [The folks at 2600 would be more 
than proud if some of our readers were able to Hud out this guy t phone 
number so we can display it on Page Onef*f\ 

Mr. Olsen said that such secrecy was necessary “as protection 
against attempts lo steal ordestroy this valuable database, "He said he 
was followed for a time and “had to take evasive action “ last year after 
a newspaper published an article about the company. 

Mr. Olsen also raid that he Had no copies of company directories 
that are copyrighted. Victor A. Kovner, a lawyer who is a copyright 
expert, raid that If ft company has copyrighted its directory and given 
notice in it, the book cannot be reproduced without permission. 

M r. K ovner raid that if a company has not copyrighted its d ireciory. 
then in most cases it could not prevent copies from being d inseminated. 

[To illustrate this point, we have published a picture of a directory on 
Page 5 that ts not copyrighted. We suggest you look at it so you II 
understand this article belter. And as a public service to nearly 
everyone, we challenge Mr. Olsen to beat vvr price for “public” 
Information, which is simply the cost of xeroxing a nd ma iling it . Well 
cheerily ma kc a vai lablt any d ocuments ( noncopyrighted , of course ! ) 
provided by contributors for a no-profll price. So send them on in!] 


1-51 


3 




A FRIEND IN HIGH PLACES 

YET ANOTHER TRUE STORY OF TELECOMMUNICATION FUN 


Qnce upon a lime there waa a most unusual phone phreak 
and it was a phone phreak who didn't realize it. Her name was 
Joanne. She had a very remarkable position in that she was a 
telephone operator in an extremely small, rural, midwestem 
community. A friend of mine, who wasa radio DJ-.gotajob in 
this small town. One night he had a few drinks after he got off 
work. He called this operator up and started talking to her for a 
while. She didn't hang up. In fact, she was quite cordial, quite 
nice, quite friendly. She said,**Wnuld you like to call DiaLa- 
Record (in Australia)? Or Dial-the-Timr in London? Or any 
other dial-it serviced If there are any phone calls you'd like me 
to place for fre just let me know,” 

So Joanne proceeded to place a lot oflong distance calls for 
the guy for free. He int roduced me to her and said you can call 
Joanne for free by dialing a certain out-of-service number 
She'd say, "What number did you dial, please?** And then she 
would quickly forward it to the other intercept operator in the 
nearby large city where she would tell the operator what 
number was dialed and then they'd put on the standard out-of- 


se price or number-changed recording, I Vi say, “ Hey Joanne, it’fc 
me, call me back!** And sbe would. And l*d talk to her all night 
long because i was a security guard at the time. We'd place long 
distance calls, conference calk like you wouldnK believe. One 
day she said that the switchboard was going to get phased 
out— a new TSPS switchboard was being installed in the large 
community and was going to serve all of the small communities 
in a four or five state area. 

But Joanne continued to be a phone phreak and to this day 
sbe^ working as a secretary for a senator in Washington, DC. 
She still docs some pretty remarkable things, even though she's 
not an operator. 

You might want to call up your local operator, provided you 
Jive in a small town, and just say hi sometime. I've done it on 
occasion and operators are usually fairly friendly, but far from 
phone phreaks. You might want to try this with directory 
assistance (they double as operators in smaller locales). 

Who knows, you might find another Joanne someplace. One 
never knows. 


LETTERS FROM THE OUTSIDE 


Dea tltiMP 

Would you explain these terms to me? L don’t know what 
they are: 

1) phone loop 

2) WATS extender. 

Also, what became of TA ÂŁ? 

Thanks. 

A Z 

Dear AZ: 

Phone loops are basically test circuits that the phone 
company uses for various purposes. They were never intended 
for use by the public. The way it works is simple- One caller 
dials number A, Another caller dials number B. When both of 
these people call these numbers at the same time, they become 
coimcctedT Some loop* make clicking or beeping sounds every 
few seconds which makes talking on them rather hard. But 
others are crystal clear connections. But while they may serve a 
purpose for the telco, what possible use could they be for 
anyone else. Well, for one thing, in many cases there is no 
choice for calling a loop number since they fall withina series of 
lest number the phone company uses, Loops are also a great 
way to have an anonymous conversation- it's an indirect 
connection to another person instead of a direct one, although 
it's far from impossible to be traced while using one. Finally, 
there’s the old call-collect trick where one person calls up one 
end of a loop that is within his local calling area, A friend from 
far away calls the other end of the loop collect When the 
connection is made between the two loops, the operator will 
think that somebody answered the phone and will ask them if 
they want to accept a collect ca II. The telephone company winds 


up billing themselves for the call. Also, your phone number 
need never be known by the person ^meeting" you on the loop, 
since he + s not ever dialing your number. Loops have two ends— 
the silent end and the tone end. When a connection is 
established, the tone stops and conversation can begin. Loops 
are almost always found within the phone company test 
numbers (the 99XX suffix, in many cases). Loops are slowly but 
surely dying out, however. 

An extender is very similar to a Sprint or M Cl dialup, except 
that it's a number used exclusively by a particular business or 
organization for their phone caU$- A WATS extender is one 
that is available on an 800 number. An employee calls up, hears 
the dial tone, enters a code, and dials away. There are many 
extenders around and many different types. Watch for an 
article soon detailing these. 

Asfaras TAP, we sent a message to their MCI Mailaccount, 
and this is what their editor said: 

44 TAP is in hiatus. 1 was evicted from my apartment last 
week, put everything I cobid carry into storage, and left for 
California on vacation. When 1 get back to the East Coast, 111 
be getting together issues 9 L and 92. (While there is a possibi lily 
of getting the issues out while I'm out here, l will not put TAP 
out in California due to the restrictive state laws on proprietary 
information.) 

MCI Mail is a viable way of ask ing me questions that req uire 
only short responses, but you should send me hard copy to 
TAP\ maildrop address (RM 603, 147 West 42nd St., New 
York, NY 10036) because L seldom check my MCI Mail 
anywhere near a hard copy printer. MCL usually deletes my 
mail before 1 can call back in and pull it out on paper. 

Hope this answers your question. Keep Smiling, Chesire." 




&QD 
HO TUNE 


H -3 -d ; J u- - 

Lrt —i u! La l*-l M hj o^-c 

i ! bi ^ y t < k* 7 kl T-C ■“! 

-jl-t i-< ,l 

Q -a H5- L'S L* L-1 «,i -^ , J ^ — u: 3 1 

J,x_ mh'-'; i-> £_■ e — i L- 

ti -* Ha Ci Q Ci ->1 Ort n-p -J u 
F- -t -t. al-\ Itl- 1 

in in >J C JT ‱2' -m u> nl -n: □ 

— y <■ \ i 

"FrcmolJ i, r :_: irt»- — -j 



i. i: □. ti j: i/i -i -i .■ ■ naElic 


V10RE THAN MEETS THE EAft 


a directory 


5 





New York Telephon 

i 5B w«i Central Ayahijs 
S onflg v*\toy, N*w York 1CÂŁ77 
Pftone fSlfli d?5"H5D 

June 27, 19M 


Wc /iave node. ieveJtal iimucceitiul attempti to neaoh you. by telephone 
to ducuii an important mattiA etmcwniny tfouA telephone AW vice 
Wew City axojt* 

Oua azcoasU indicate, that you. am not iubicAlblng to Touch Tom 
ScavIcq. but you ate u&lng a. pu&h button phone.. It tout be necenany ÂŁot 
you to. contact in no latex than July Sfid 40 that m my conoeAt youA iejivme 
to Touch Tom at *fie app-.oxiat.e efuwgai. I j you ÂŁalt to do 40 you wt&ÂŁ 
noi be a bli to make, outgoing c alZt Inom you*, pinh button. 4 it aÂŁtÂŁA JuLyJ.tli 
due to oua new call pnccti&lng iyitejv; which went Into e^ee* on June 9th. 

t 

The new 4y4iem It deilgmd to handle mo-te colli and phaezii them 
taiteA. A Uo', It adorn ÂŁoa iophl&tlcated calling cnpabllitlet called 
Custom Calling SeAolcei . Thue a zAvlca ate "Call tXattlng, Call TomvuUng, 
spud Calling, and ThAee Way Calling". 

You my Ulan* <0 Aubietibe to thete tenvlcei when you*. conoeAt to Touch 

Tone. 


Ptetae contact tnc befpti TuJLy $ttd, &o that T can make the n&cte&ahy 
ajuutn$cmzxit6 to cflftrtcct you. tint -to Touch Tout itntf &-void any ijtt&JOiiiptton 
in youft. outgoing bvivice. 


Sincexely, 




[MtojALJ, Coyne 
R^&aen ftutivt. 


OH NO! THIS PERSONS CENTRAL OFFICE HAS SWITCHED OVER TO ESS OR THE EQUIVALENT, 
WHICH MEANS NO MORE FREE USE OF TOUCH TONES*. AND SOMEHOW (PROBABLY THROUGH 
THE USE OF FCC REGISTRATION NUMBERS) THE PHONE COMPANY FOUND OUT THAT THIS 
PERSON WAS USING A “PUSH-BUTTON". BY THE WAY, CHECK OUT THE MANY TYPOS IN THIS 
LETTER. WE COUNTED FIVE MAJOR SCREWUPS, AND THERE ARE PROBABLY MORE-