💾 Archived View for clemat.is › saccophore › library › ezines › 2600 › 2600_3-6_djvu.txt captured on 2022-01-08 at 14:19:17.

View Raw

More Information

⬅️ Previous capture (2021-12-03)

-=-=-=-=-=-=-

$2 




JUNE, 1986 

VOLUME THREE, DUMBER SIX 


Computer Crime Review 


The National CeuteT U>r CoiupuUi Crime DaLa. purveyors 
of fWt'ipiLl^r CiilYLC: W\vtn:r'i , IlTiVT: ;i V iimh-leJ U. Statistical report 
e n t i 1 1 ed Cot i ; p ui < • r Cr it tie, C 'ornpu t cr Sea i r i ly, a t \d Co mpuier 
Ethics. 

This ncpwt, (]jc 1ir$c stuctl one, reviews measura ble trends in 
Computer crime and tom putci use. It docs this using graph ic 
regn CSCrUin ion^ 10 pmscui i.ts iflfoitriulibfl accompanied by 
brief introductions. 

The National Center for Computer Crime Data's (NCCCD) 
report is an v.soclkrit guide tor those who are selling computer 
policy around the country in industry, in government, and 
through user groups. It provides some empirical basis for the 
'War Clamc-Lsh’ attitude that is usually eaten by the computer 
i Lid* [Vile facets of computer pow‘er — suimety industry and 
government. In a form that can easily be dialed by the 
illiLerales, I he repeal includes seemingly irrelevant data (to 
cnmpirtci users) that, in fact, provide* background that the 
illiterates (toed. This is especially true for I In: graphs of world 
wide semiconductor CO ilium pi ion, COrrlpuler sales, projected 
jijhoi populal ion growl h. and an undocumented map of federal 
communication networks . ' I hese all add to the message that sve 
all know: "Computers am important, 


Ck*OSl tHril'd beiiHlii bini 



f*-.r ►■n\"S>Triim ( , .T.rO r„*. 


One of the NCCCD Report '* not iceable coticl usions is- tlia I 
Ihe amount of computet eriuie has increased, that few are 
punished for it. that we are becoming more aud more 
dependent upon computers, a od that there is little awareness of 
security, relevant laws, and security procedures. 

This information, taken t w o-d i me n s i cua Lly , says that we 
► should make many strong computer-oriented laws 10 protect 
our national itilcresi a War Games response. 

Taken another way, tlie TepOrl loll* US that computers are 
becoming a more significant part of society and are being taken 
for granted as is television, and os such, we should act 
Cautiously when passing computer law*. 

M computers a re becoming so in i i i nsie in American and 
international life, we must think twice before legislating them , 
Stealing is had. but KBS's and commercial database*, have 
entered the realm of our F'i rst A intendment rights to free speeeh. 
and this is the most precious th iilg wo have, 

Perhaps our attention m the subjecl of COmpUtd crime 
should be di awn more toward i ndustry. What are they doing 
with the information that they sdOie? Why i* then darn so easy 
10 steal? Should rltey be more responsible to those who are 
dragged along with Ihe burden thal they cariy? If rliey want 
your ertd it history, bank statements, arrest record s. and other 
Transactional data* sn badly, why (Sony they take rare of it 
once they have it? 


Lcmputer Laws nllect both the user and industry, but are 
sponsored only by industry. By Lobbying for legislation, 
industry gains its semblance of scenriiy from laws and Jaw 
enforcement agencies who k n u w nothing about 
telecommunications and computers. Industry must do its parL 
to strengthen its integrity against attack from a computer 
criminal and not depc ad on laws to do tire job. As world powers 
(who is it who sa id "k now I edge is powe r'?), companies often do 
not accept their responsibilities. 

An example that is usually cited is the case of GTE-Telema il 
on Telenet. W hen Telcma ij was breached hack in I hackers 
said. Tr was sn easy rhat I could not resist." At that time all new 
1 elemai I accounts had a default password ol the letter "A". A 
full six mouths Ifllcr (even 0s people were being indicted}, the 
default password was the same. By allowing th is sltuat ion to 
cordinuc (they were even aware of the I rouble four months 
before comport Cl's were suievd i I1 October. 1 9 SSl), J elemail 's real 
intent ions and real commitment to computer security were 
displayed. It is possible that this really reflects a lack of 
communication between CITE administrators and G [ L' 
ptogra mmeri. Telenui i I was concerned enough to involve the 
I HI, make headlines, but not concerned enough to rectify the 
situation, 

On a system as hip a* '! -elemail . it i s almost enmina I to lia VC a 
one-letter passwoid. 

If wo think abou l COmpti tens us mere than just tools, as in the 
rase of JJHS 's, we real ire 1 hat wc have to p roc red witSi caul i on 
when it comes to computer law*. Anarchy will not restill if we 
do not move fast , because it ln'i s a Iw^iy* been a crime to steal 
money a nd government secrets. 

I he results In the report were d pawn from iitfomwitiOit from 
[ ,10 prosecutors ' offices in states w ith computer crime laws. A 
mujor conclusion of the report is that computer Ct ime has boeit 
"dcmoeiatlAXl", lL Th<: Memos-ratirulion' of computer crime 
does i:01 mean Ltuil we no longer have to fear computer 
geniuses, just that we cannot I ini it our focus to 1 hem. Like every 
cl her type of crime compute! crime will ultimately reflect Ihe 
culture that surround* plir computers. ” Computer crimina fcs 
are noi just hackers, but are employers, consultants, and 
programmers. 

The most useful part of the report is the summary of all the 
provisions of the 45 state com putcr crime law-, in an easy tu read 
rablc . 

TheNCCCD isa rereareh institute which studies all facets of 
computer crime. It. was created to help answer legal, recnrily. 
accounting, moral, and technological 4U1S.-I ion* dial com pu ter. 
crime poses. 1 1 publishes 1 he CompukrCrima; L^lw Reporter, a 
collect ion of current computer legislation, and other 
pu bLieatious. 

C&n\pi(H T r Crime, Computer Security, Computer Etirics, Jay 
Bioo 1 1 1 Beck cr . FdiSt) f . A va iia h iV/b.im ihr iV(V (iom/lQrnt cr for 
C&tttpuiCrCfimf Dii<afori 28 aiZTtttt :V. C-Qfuirrjga 
Suite 2 ! id. Los A w:!?!., California 9 m$- Cati( 2 l 3 ) 8 SQ 4 SQ 9 
for information. 


How To Hack A Pick 


" •• lu ' i town: thing to Pick in $k V and feel Is probably UNIX. 
ft.;th are hi*, complex operating systems this! are mi-grit tiny 
dvwn to tite microcomputer world after having hern developed 
and refined on minicomputers. Penh systems art sophisticated 
and vtr\' jsowerfnl am! hash rend to produce vehement 
partisans. One of tin.- big differences, though, h that UNIX 
partisans tend to be programmers, especially systems 
programmers. Pick's- partisans tend to be users and 
apphetit ions programmers. Of the two systems, UNIX is the 
more p m«. i erfu l for se ter it\fic at id eng ini -cr 1 , 7 , 1 ; app he a it mis. Pick , 
by its structure, fy better adapted for business and managerial 
app Sita t tom, 

ti\d Pick is hardly perfect, Strut tured programming purists 
shudder over the fact that Pick's, cm/y high-level language Is an 
extensively reworked version of BASIC. The present release is 
Multiuser but not multitasking., and rather lacking in 
communications capability. Some of the UNIX-type concepts, 
-uch as pftes and jitters, which are becoming widely available 
on other operating systems r are not fully developed in pick. 
Software hackers generally dislike Pick because it it difficult to 
get inside the system and play with a (BYTE magazine 
October !Q#4) 

The issue of security on F h iek is not often considered, because 
1 hero is a hti ost no kku ril y on Pick, 1 1 is therefor tr. wrt casv lo 
eraok a Rick system. Once a nser has gained Recess ton system, 
lieonpenisr irtfc.fllicd.atti. Mast people have not heurd of the 
Kick operating system, but there ait now 60 ODD sites ?0 
tin hi bytes of data, and -1W.OOO usets. What is Pick, mid who 
cares"? 

I he Pick operating sysLem contains many more functions 
'h.a,n [post. It has an English like no up ru eed u ra I query 
language, II compiled SASIC language, a JCL-Like procedure 
Language culled PTCQC, and a Cuictmund Einc interpreter called 
Terminal Control Language jftCL). Pick runs on 
microcomputer* (IBM PU-XT) and mainframes (IBM MSn, 
d3 , x f- clc ) However most Pick implementations 41 re on 
minicomputers with five to fifty terminals. These Are the mosl 
vulnerable 10 cracking, because Ifiey often have auLcj-answer 
telephone modems, 


Once a Crackei has a logon prompt from a Pick .system, hs 
can continue tryi rtg to login until he fl nds 4 t valid use t- number 
and password. The system wilt not hang up after repeated 
in ili.i ret. Fasswoids- are almost always upper ease lettcs, and 
often short. 'There is always an account called SYS FR( K 5 on 
every Pink system Jliis Is also the host account to crack, 
betause it has operator access to the system, 

Perusing Data 

A ttcr crack ine the SY£pR(X ] password, you ca n drop out of 
the menu to FO ., Tr there is no explicit option u-n Lhc menu, the 
command 'TCL 1 " usually works. Type SORT ONLY DICT 
SV STEM J rom 1 CL. and a list of all aece/iiu I $ un the system is 
displayed , E"o pet a d i redory of the Dies on any account, tvpe 
”3 rs I ^facormnO' < . To look through the items in the tiles. vii U 
mtist first make a pointer untie file in SYSPKOCi. Tvpe “SET- 
FILE {acCdurU) (file) 1 ". Then type “COPY QH 1 .F *"and when 
the system says ,l TO;L hit a carriage return. 

(.'riching (he System 

AIL that has to he done In crash any Pick system it to type 
control break until a "’'"prompt is displayed, Type "6.074". 
Then, is displayed, (hen type H, .FF". All' inputs are 
teimi nated by carriage returns, 

Disabling the System 

AL! Pick systems can, be destroyed and rendered useless hv the 
comiiumd "UE.FAR-FlLE DECT SYSTEM" 

I he September and October L'JfW issues of Byte nijigfnrine 
give a good Overview 0 f J "ick. The Operating system, has a 
unique d£ila model and file structure. which is a bit comp heated 
10 explain in ibis limited space. Some books have also been 
published On Pick. There arc Pick user societies and 
publications which would provide phone numbers for gaining 
access. Tu addition, many Pick vendors have on-line client 
sysinn photic number lists— masking a vendor's machine is a 
gold mine. 

Pick vend urs include Ultimate Corp,. MclJoncl Dougtass 
SolIwh re Systems, General Automation, Pick Svstems Inc, 
and Dntamcdia, Richard (Dick) Pick is alive and well in 
California. There 4 ire also softw 4 iTe houses which specialize in 
Pick, And Lhey have Pick clients loo. Users include R-Marc 
International and Harvard University. 


nothing new in computer underground 


The Computer Underground. By- hi Harry. Available through 
Uwmpatiu s Unlimited, 1 14.9$ 

by .lohn Drake 

The Computer Underground Appears to be an excuse to 
publish text hies. The book runs a Lone; 257 pages of computer 
printout. 

Et irs <1 Aided up into what M £ Earry has written a tid what he 
has downloaded off a BBS, ’his is About a one 1o twenty rAtio 
P s also unfortunate that nearly tveryhexiv who writes about 
hacking spends so much time dwelling on lhc obvious "this is 
a , modem, . .there are A hits., .you connect it to a phone Line,.." 
Fven Out of the Inner Circle hy Bill Land ruth tales Lnlo this 
I rap. Tlwre is not! L ing in Harry's writings that any self- 
respecting hsclMr/ phone phreak doesn't already know. 

‘ W8S Ituping for real research like extensively tracing the 


fKfiinuing of phone phreak in* through Captain Crunch, Ahbie 
Hoffman,; and TAP to the present, with soijk interesting 
interviews with hackers And phreakers. The only thing lie seems 
in have Annually done was to poll peopEc through a BUS. His 
analysis ot the results are also prettv obvious lo anyhodv 
involved. He tlien proceeds 1.0 plot oul the old flow chart of a 
search inn, mid hacking program. 

The rest nl the 257 pages are printouts of text Dies. Harry 
seems to (iAVe a prcoceupalion with ARE 5 A Not Lind lists of dial 
poi ts . J here is an abundance of blank space, particularly when 
a section cuds at the top of a page. A few of the text lilfo are 
typeset and nicely plated in the Center of I lie page. The rest of 
The Computer Underground is mere printout, nnj even in 
don ble-emphasize mode. This is clearly not one of Loompan ics . 1 
better releases. 


ARC 

2 





New York’s Computer Law 

T»-. ^ V..-I Tin-.-- 



Public Phone Secrecy 


He/ itoI Wnetlv IvVas 


New York Slate legislator have reached agreement on anew 
computer crime law. I tie biEI would create the new crimes of 
unauthorized use of comparers, computer Irespussing. and 
ttiitlpuLer tampering, El would also make it a evince In use 
in to r m a: i on stored "by cn ni pul cr wT i I e corr i mi t L i n g other 
crimes, sneVi as forgery or tliCCI of business records. 

Although 40 ulliersUtLes have al ready approved similar In w\, 
legisliit ion in New Y ork is considered a majo r step i n stemming 
computer crime in this country 

S iflCtt there a re no such laws in N ew Y cut. prosccuto rs must 
try to apply related law in eases isivolvi hr com pi Hers, 

A run jot provision of the biLI . wh ich is expected to pass the 
sULe Legislature and take effect ncxr November, expands the 
legal definition of “ writ leu inst re munis" and “business records'" 
to iuolutlc computer data and programs: Under this change, 
penalties of up to fom years in prison or fS.QOG in fines would 
be imposed lor these otlciises. tarrlpd mg with computer data 
while trying rn commit a felony: making unauthorized 
duplications of computer material that deprive the owner of a I 
least 52,500:. tapping into legally confidenl ibil computer data. 

Tlic Sill would also create several misdemeanor eliargds, 
punishable by up to one yea i In jail or lines. of up to !> 1 ,(OJ, to 
address lo^-level computer. abuse. 

Because many computer crimes occur across stale litres. the 
h: II includes a provision « I lowing New York State to prosecute 
an offended In anothei }.lalc who taps into a computer in New 
York. 

56,829 Phone Bill 

I bv Ihrt.M- ■ L tuViii I 

The ht-yen r-old retired insurance agent was quite surprised 
when he received a phone lul I for SfiJ^.fiO TEiq | 3 1 poge hil I 
was from ( f l“H Spr ini . 

The man said i,hul "the calls that E made p.tc nn the IJDth 
page for ^.9 49, " 

At lastcuunt the total on his account had risen 1.0567,594,02, 
u. Sprint spokesman said, with 1 .200 calls placed in one 24-hour 
period. 

Sprint has a security rtepailre.eu I that rtlOiuloTumonthlybills 
and stalls i live si iga t i ng wh e n there is a fantastic clumgo in use, 
The man's previous hi I’.s were abdU t &20 . 

In this cate, however, security did not cancel his code until 
three weeks after they noticed the increased usage. 

Big Computer Crime Pays 

Mi Jr-flir al 

Out of I he discoveries of a new stud y shows I hal when it 
cornea to compute r scams, I he big-t ime crime pays. Two-th irds 
of the companies pa n Lei pat inrr in the su rvey mi id ttmi they tend 
to punish tow-leveE employees accused of committing mium 
computer crimes w3u le letting the major offenders go free . 

“The cardinal rule seems to he: Thou sEialt not sLeai sum 13," 
says Joseph OlDonogbuc. a Mercy College sociology professor 
who conducted the suivcy, Ttie companies, he said, would 
mther keep major heists quiet than punish suspected offenders 
foul risk publicity about lax seen i ii.y, 

O'ETanoghuc warns that this perception could lead to “four 
or five people pulling a billiem^ollar heist, it's merely a matter 
of knowing how the terminal wcuks.” 


New Jersey Bell has imposed a veil n T secrecy on Lhe locations 
of its public phn ncs, fearing, tha L pu blicizing that i n formal ion 
would unduly expose them to vandalism, 

Hanover’s Township Committee was required lo pass, a 
resolu lion at a recent meeting, agreei ng lo such non-d use Loin re 
as a condition for installing its 91 i emergency dialing system. 

Alter die measure was approved, a non-ptussed Mayor Sal 
lannaeconc risked a reporLer in the audience. "‘Can you bclievu 
that they won't lei ns toll people where the public phones aieT 

Capitol Hill Hacker 

Tl rN't.*! Yrik I jv.> 

Jeilrt ifer K u iper wns wmk ing la tc ar her computer terrmnn I in 
tlicotllcc et' ReprtSuiituliw Eid Zschau of California on M a roll 
2 when sEic hca rd a beep that told her someone had entered Lhe 
Computer system from an outside telephone Line. Twenty 
minutes Inter, hci dOmpulcr screen went blank. When service 
was restored, copies of more than 200 letters sent to 
COUSlil vents and information on [nailing addresses had 
d isappearqd . 

Foul days luLer, stalf workers for Representative John 
McCain nf A rbonu i o Id the police ( hey had d ^covered that 
SOnj&Oii.e outside their office bad reached into McCain’s 
Computer and destroyed hundreds of letters and mailing 
add r esses over the lunch hour. 

Bolh or 1 liese representatives are Eicpublk.'Liui und both are 
see s ing Senate seats th is Novcrnhc r. These were uppa rcu tly 1 he 
lirsl computer break-ins on Capitol Hill, where eomputeni are 
increasingly being used, especially for record-keeping and 
answering mail. 

lL Rveiy office on Capitol U ill can he broken into in Lh is way 
and the iilec deleted. El enn bring the work that a mem her of 
C lofigrcss does lo <i comp lete halt.” said 7seh;i.u , [We Nid no 
idc-fi it was this easy to grind the government Lo a holt, folks.' 

Stcpticn A. Armstrong., vice president of Micro Research, 
the company that provides COcnpulens and related equip] -Cut lo 
more tha n 1 50 mein bent o: Congress, inetud i ng they, 1 two, said 
tlu'U whoever broke into the computers ""wou ld have to have a 
pnsswn rd and I wo y curi Ly codes to pet in .” 

Citibank Money Games 

lv Nr'j Y.vf Tiv« 

“You added funds... Nnvember E X ,.liMJ,(K>njC>50.fX5" 

If you have ever dretuned uf opening, y out monlhly bsnkittg 
statement to find a trunsactieui Like that, you tan probably feel 
I EiC (Jtcitement Nelson Nash felt wltcn he d id j list that. Y nu ean 
also loci his hearr breaking when he read down a few li nes more. 
Or, the very same day. Citibank recorded a withdrawal of 
S60,«:O,0>0.OO. 

'"1 i.i sou I ly check my Lmlaaee cvciy day or two ” he ta id .‘"If! 
hud been m town a nrl soen tbi 1 1 had Sfsth mi llinn , I woulrl lm ^ 
Utken the money iri unmarked bills and escaped f 

Hut a Oitifs;inii spokesnsan countered, “Eveil Jind il been on 
Isis, record for several hou rs, and Emd lie checked hiskalaneeand 
tu n to his branch , it would not have been given to h im, Il would 
have EsSn questioned. People don’1 keep $60 million in then' 
checking accounts.. 11 

[Bur keep an eye on your .wvilue.t account btilitnorsll 


3-13 



LETTERS OF THE MONTH 


Dear 26m : 

Cfi i) ('Lr'iy of v l. :■ i.j r gOCd JjilOnC ph iVni k l Fidel'S wtl .0 iim: w'ill in fr 
tb explore Lhe British telephone system contact me :i1 my 
address in London? [f you wanted to mate a long distance call 
in Loudon, you could Fill the operator, and- BS her and die 
riiipht jusi pul yourtall through for nothing. This method only 
works if you get through to a happy operator. When phoning 
the international operator In London, lie or she asks for your 
number and (he international number, The Operators in uur 
country are very stupid. You could Hfi tlieet all day long and 
they would think 1 hat the fall tlvey received is a (me call, not a 
false call. Dot International operator can he reached hy 
phoning an '.nward lor 1 endon a nd 0 1 1^5 is the number which 
cun reach her. 

Another thing I like doing Li what you folks over there call 
scanning. [ spent hours scanning phone lines tor interesting 
(hi ogs a nd 1 only came up with one number; 200020. After I he 
last digit has finished, depress the hoobswiteh [the Ihing. that 
yon res; your telephone on). Depress it frn lvdf a second, then 
bring tL up again. You should hear the central office switching 
yon through to I h is wei i d number, K rep listcui ng to the phone 
line and after about 2G seconds you will heur a one second tone 
burst. 1 don't know what (o do after that. 

The cellular telephone system is good in our country, bur 1 
luiven) had time lo explore it . Tlw niuiiber foif ii is 010836 filial 
includes- the London dialing code — the Gra-1 0 is nol needed 
when outside Kngland). 

Twiligtil ^onc The I'hieaker 
12 Bam Way, Wembley Par k h Middlesex HA9 9NW 

London, England 

I>car3SCfl: 

1 n response i n police L 'kl lug" BBS 's , why nol get one nf I ho.se 
hooks that list siolen and expired cralii csitfs (they arc issued 
weekly or bi-weekly). Type the cuutents into a disk and dump 
■Id megabytes of burned credit card numbers into these cc<p 
I raps Id spring Ihem safety. If it comes in trial, tell the liny 
whcTC you got them and watch the DA blush and the jury laugh . 
If I he cops had any sense, dud is wliai ihey would dump into 
anv svstem collecting credit card numbers. 

JN 

Illinois 

Dear JY; 

Good idea, hut haw many of its tire witting to go through wit }. l 
; fa* a *.\p euti * and fr> J i 1 rarra s sr> j en i at ‘h a ine h a uied in to a court of 
law first tomaketi DA blush! A ad what happens if the jury Hitt 
no sense of humor? Since w-c Va n at especially fond of credit 
card frstud,. we have no objection to people posting whatever 
numbers came into their heads or even > andom eemputer- 
generi, tied num bari, Thai way, the 'criminals are confused, the 
author it it -s a re c on fuse d. an d dew oc nyc.i ■ is soft for a hide vl ft lie 
longer. 

Dear 2ASB\ 

In the Deccutbcr I9S* issue of 2£00.. you mention in the 
article on the "Scariest Number in the World" that the phrenk 
rceogflisiod thal Ihc mmihcr was non-suped, using a technique 
that ‘‘experienced phreaks know? I’d like (O (JCua-ider myself (ilk 
experienced phneak, How do 1 tell? 

Don't say. “JusL try calling ii from 41 pay phone" because aU 
long distance uon-snped numbers won’t go (Ji rough withuut 
paying (the damned TSPS payphone console won’t respond to 
rcusOu) Local non-sasped numbers work though (for the 
payphone repair). 


Another method is hy calling and if it doesn't appear on youi 
neat bill it ain't suped. !"his hus several draw bite ki, cause if i( is, 
well then, TY/e gnt a one minute call to Australia oil my bill. 
Alsu, waiting a niunth to find out ain't tlsat expedient. 

Lord Peter Wirasey 

Deyr LPW; 

These days, this point is open rtf debate. Many phone 
phreaks can hear al! k i/tds of Hide sounds that teif them things 
die average person doesn > ewn think about. One phreak. h-,? 
kntnv am ted whene^r n phene tod fa routed through Finridu 
fust hy the sounds he hears? Some phreaks aiso eiabn they t ii?r 
fall if (t adl is supervised fi.e., oylwrer} an the hiding 
computer) by the sounds ihsh are made when the i a fled party 
picks up- Generally, if no click 1$ heard when they pick tip or 
'L-frert a recording comes an. the fail fa thought tv be "non* 
suped " or free Hut exceptions abound. For one thing, many 
new elect rente switches {Fieri f tern Telecom's DMS-IW, for 
one) hatch, make any natxe \cher< they arc picked tips, ff you 
were to tall someone v.ho had one of those, you might 
mistakenly ihink the call wasn't supervised, llten there are 
alternate long distance companies that have been known to 
charge people far calls that were never completed. Flame 
companies aren't able (or willing) to recognise that a busy 
signal nr a ring fa different from the merry chimes of human 
speech. 

Ami not only are tiart-su/md numiwrs not always free, but 
free numbers area V always non- Suped! Take g>X> numbers 
they do .rkr.iv-' up on a billing compel! er somewhere in man ) ■ 
eases- You're simply not lulled for them. 

An operator is usually able to tell you if the tall you are 
p iat tng is b illab ie I tut she Op era t or has t ,;> pia cc the call t> i find 
this out 1 7?iif can he a t hailenge. to say the very least. 

Dear 2(/tM: 

Wbtii ha ppciicd to the 2600 phone bon'«: ,f 

IIhjw well is your rmiiliiig lisi protected agjinst ^i^ttic by 

au thtir [tics? 

I>r. William Wainwright 

Dear WW: 

There is a small phone guide- (the 26(5(1 Fhun Book) in 
existence that is available on manv F IfS's, 77k r ft fame Sector 
ifil l.it-tef-fl I) included You run also get a copy through our 
reader bid fat hi board, which is up Friday and Saturday nights, 
from midnight to noon. Eastern time at our office number 
ic!f>75!26t..S.i\. Many of these numbers- have already been 
printed , r n met issues, hut if you want a full printout of thedfsilor 
so Interfiling nurnfam-i, sera! us h2.fh. Ry the way, wc always 
need more numbers-, so please send us wind vou vc got, 

Our mailing list is only sear; by Twenty Six Hundred. It will 
not be sold, lent to , itvrr. or turned over to anyone. That fa our 
policy. We dan V heiicrr-e the authorities pose any thn-at in that 
depursmerit, especially S b tie so many different kinds, of fsc-opic 
read this magazine. 

DcarJZlJW: 

1 would like to take tins time to thank you for your 
commend a hit work . Il\ istople 1 ike you that make me proud to 
say I’m an American. 3 wanted to get ihis niesv/ige to you as 
soon as possible. I represent only a small part of the kiTge world 
nf computer antics, which consists of plireakCfS, hackcrSL and 
pirate rs. Upon the receipt ni this message, please discard (a 
small atom bomb will do iltc ti iek) and forget ever receiving it. 
Thank you. 

John Smith murker 

Dear JSJL 

Don 7 worry. jV has been destroyed 
(continued on page- F-i If) 


1V44 


The 2600 Information Bureau. 


300-342-1 143 
000-342-1 119 
8QQ-368-1017 
eoo-36a-lt>ia 
800-62 1 -4562 
SOO-52 7-2007 
000-527-2351 
300-343-2903 
000—527—201 1 
BOO-368— 1 040 
BOO-221-2000 
900-271-2014 
300-424-5900 
BOO— 424— 6200 
800-343-6400 
000-22 i-7733 
900-221 -72 *0 


BOO OPERATOR 
LOUD TONE 
TEST # 

TEST ft 
77777 
300 BAUD 
CARRIER 

CALL AMERICA LDS 
CREDIT AUTHORIZATION 
ATT I NFC SYSTEMS 
THA RESERVATIONS 
EX TENDER 
PBX 

□DD SERVICE 

PBX WITH RECORDING 

CARRIER 

BANK OF NY 


0OO -323-2005 

300— 323-“3 1 07 

800— 323— J 146 

800-323-4279 

B00-323-4297 

000-323—1 1 51 

B00-323-43I3 

000-323-4376 

800-323-4377 

BOO-323-4462 

BOO— 323— 0021 

BOO— 323— 0039 

000-523-4298 

800-323-4354 

BOO-526-2O0O 

000-342-1 105 

000-342-1100 


CARRIER 

CARRIER 

CARRIER-LIKE SOUNDS 

ASKS FOR 7 DIGIT ACCESS CODE 

LO DIVERTER 

PBX 

CARRIER 
CARRIER 
CARRIER 
TRY THIS' 

PBX 

SPECIAL OPERATORS 

special OPERATORS 

"YOU'VE GOT EQUIPMENT PROBLEMS?" 

TONE 

TONE 


000-331-1323 


SPECIAL AT&T SERVICES 

DIRECT CONNECTION TG FRENCH OPERATORS ! ! IWE THANK THE 
SUPPLIED US WITH THIS NUMBER AFTER WE REQUESTED 


MANY READERS WHO 
IT LAST MONTH.! 

SOO— 222-0300 AT&T TOLL-FREE WAKE-UP SERVICE* YOU ARE LULLED TO SLEEP 
BY THE PEACEFUL SOUNDS OF GEORGE WINSTON AT PIANU AND AWAKENED BY 
YOUR PLEASANT AT&T REPRESENTATIVE IN THE MORNING. (CALL LATE AT 
NIGHT AND IGNORE INITIAL VOICE MESSAGES. > 

BOO-555-8 111 AT&T ALTERNATE TOLL-FREE WAKE-UP SERVICE, FDR THOSE WHO 
PREFER TO LISTEN TO CHEERY MUZAC WHEN THEY FALL ASLEEP. AN AT&T 
REPRESENTATIVE WILL AWAKEN YOU IN THE MORNING* (CALL LATE AT NIGHT 
AND IGNORE INTIAL VOICE MESSAGES. J 


2600 


(ISSN 0749-3851) 


Editor and Publisher 
Twenty Six Hundred 

Associate Editors 

Eric Cor I ay Dftirtd Ftudenmnn 


Executive Director 
Helen Victory 

CnrtO&nist 
Don Holder 


BBS Operator 
Tom Blidh 

Junk Mail Receiver 
Richard Petrovich 


Writers: Paul Ealev, Mr French. Emmanuel Gold ace in, 
Chaster Holmes. The Kid & Company, Lex Luthier, Lefd 
Phreaker, Mine Salerno, The Shadow, Siltni Switchman, and 
the usual anonymous bunch. 

2-5&J 5 publisiied by 2600 Enterprises. Inc.. ;in nlcjnrnraivnarv 
orftgnizaiiorv 

ANNUAL SUU&RRIPTIQN RAILS: 5-1 2, iftdrvklufll, 930, corjwrmn; 

-6 JCJ. 

LIFETIME SUBSCRIPTION 9-260. SPONSORSHIP: 52600 
JACK ISSUES: S2 «ech. indlvISJOV ^enrh, wrpqrate; 

Fj~ - « auv v i l heV- 

MAKE CHECKS PAWI F TO- ?GCO Enrtrsprisns, Inc. 

V.HITE TO ZtfOS P 0- Hi-i* TtT2 . Middle fctand. IVY 1 1 SEJ-0752. 
rtU-PHOKF- iy,TV|7£1 2600. PEWATE SECTOR BPS' 1201)36(5-4431 . 
ADVERTISING DEPAITTMENT: P.O. Bo* 7fj? . Mirtclln bland, NY 
U 9630762. Cdll R>r reias 

ARTICLE 9UFiM.tS$I 0N Ah 0 LLTTETtS: P.O. Bex 00. IWiddln Island. NV 
[1:1953 -0093. VJe readily aCMp’ BftlClSS. laitnrs, clipping:!, artwork, anil 
data c ur publ CSMion 
POSTMASTER This is pnytrlrr mail. 



jViVWv knew why aid Mr. FerfOtson 
suddenly got a 373 , 060 phone bill. 


3-45 




RESOURCES G L I □ h 


IFroi E-D*pu4*r Cmu, Coiputfr Security, CaipuSsr Ethi-sF 

S£f 0 Ssr ed wjttl CtmiuHerSetuNty, Computer Elhigs, and Ccrtilicatlcn or Computer 

Ajfwjjean Har AssocUtiun 7«k Force inn Computer Crinw, taoa M. St, STY, VVafthino'un DC vr V 

SsreiaS' * WHn,mts ' 12U Avenue of :hc ^ NY 

AmcL-Jcao Soeisty for [nduiLria: SmiritV 1 , National Computer Security Commitl*- i«sv c> m 
nr r Suile 1200, Arlington, VA 22259 (703.) 523-5000. * -, Lbai N . Ft. Myer 

A^ociAUan Sat Cm ria* Mafihiiiwy, Special Interest Group on Security Audit ami Cmtrgl Snectel 
[ntepcst Group on Computers and Society, 11 W. 42 Si , Ky in®* (2H', ftrfl ?W " ' ” P 

fcLI Cng]d C, - Jltc - S50 Colt Jtond. Rollins Meadow*, IL 60Mft 

yoKton Compute? society, Social Impact Group, 1 Center P Liza, Boston, MA 02106 [6i?\ SC7-3OS0 
r f orSoaa! Responsibility, P.O. Pom 717, Palo Alto, CA 94301 ( 4151 . 132 - 377 S 

Computer Security Institute, 43- Boston EYist Road, MorthJtwKJugh, MA 01532 iiYtyj S 45 . 31 K 0 
rAn Ala " a B™“t Association, P.O. Heim 1*711, Standard. CT0S905 |2lTA 9*70500 
EDP Auditors Associabon, 373 Schmate Read, Carol Stnssm, IL 6 Dl ($7 (312) *K 2 -] 2 (JP 
]'RE SodaJ Jjnpsct Group, o'o F.A Futfan. 117 Washington R.d., IX t 5 burgh, Pa 15 22 1. 

acujite Awodafton, P.O. to-: 7192b, Los Angeles, CA 50071 ( 2 1 : 5 ) 4SfrSal6. 
(3]™-^^' " ^ Cg,mptltcr ^“fcwionals, 35 E. Wacker Or, Chicago, EL *1*01 

APditDfi '’ " ,59 Mai1talvd Av *' Bmr £lt& - Altamonte Springs, FL S27Dt 

!SS) t SS!™£ er tsrCl 3 m i ,l,1crCficYlL - 2 ™' N- Cahuenga Blvd , Los Angeles. CA 

Publ icaltpps Conccmeif with CnmpnlerEtliJes, Computer SMiirih, Computer Crifite: 

2U^ l A57 erCDnllB] ^ U:iTtCTLy ' 26 WajfhLT »Etan Ave., .East Malvern, Victoria 3145 Australia (p.?J 

Computer Fraud and Sawrity Bulletin. Hscvicr International Bulletin*, 52 Vanderbilt Ave NY lijmj 
Computer C rntic Digest, 70432 Wtmsatt Road . Springfield, VA 2215L-4P7J (?Z"i\ 94l„fiflQ0 
Compute* and Security, Elsevier Intematronp! Bulletin*. 52 Vanderbilt a VC NY 11017 
Compute* and Society c:o ftirh^rd Rosenberg, Department Mathematics, Statistics and Cornet 
mg Science, DaUwmste University, 1 Ialitex N .S., Canada B3K 3J5 

Wwtsm*'''**' C,:,nip,J ^ r ^ ,rUTil} ' L ‘ ,ititutr ' 45 Pwt R*»d, XvTtheorcay].., MA 01532 

Computer Security Alert, 500 N. E. Spanish River REvd., # ft, Bnra Eaton, 1X33431 (3053 0P:-54lT 
Computer Security Digest, 711 W Ann Aibot Trail, Suite 4, Plymouth, ML 4ai7?:{313j 454^757 
S;™ j n Computing *700 N. CaRuenga BLvd., #2113, L 01 AngeLes, CA Wyfi (213i SSJ CWl 
Da, a JYixessing Auditing Report, Bus ftS, Mtddlevdle, Ml OTBi 1 ^ (2l)i ) 33'-3<i J| >i 

™4n-S?|° ma1 “ n TrjininS Ccntei EnCl U2S0 Ec S pr IJa «» Dr -. Suite 17, ftestFn. VA 22EIVO 

En formation Security Monitor, Durran ( Houap, ft Herbal Kill, London FCER STB England rail 27 ft-im 
t^KHut Edmtificatiori News, O. Bon : lfllfi. Washington, DC 2030B " J ^ S { ) V 

['nvaey Journal, P.O. Boh fift-bl, Washington, DC 20Oftl f2d2'i S47^S6 f: 

Processed W(! Jld, So Suitor St., ^ft29. San Francisco, CA 94104 . 

React, ci'O Mike MrGnlJough, 90 £. 7lh St.. biYlDOW. 

Seftirity' Audit and Control Review, r.'o ACM, 11 W. 42 M , NY lOIRS. 

260ii Bux 752. Middle Ldarid, N”Y 11953, 

SdL’rpfts Qj liilontialfon aloul CtunpuEer Elhicu Courses; 

r?| Ahj ^ & e 3ap r: tmd n en ^ F Schooli - ot Hank. New jemev, A dir, mistral ton 

Building, f a Branoh. Ave., Pad Bonk, NF 07701 (HI!) • S42-4954. " 

r -! ,! r f 1 : ' = 'T J r E lJJ 1 1 i>: -! ' F nJv f rSi tM Dcpartmwrt "t Philosophy EJir.ftojo, PA li:444 iii-t;. 732-24M 

■x i: ' >12-^23.' EqUdLt ^ 0JCCL Ljwtl ‘ rw HaD ^ -■ dcri,: ^' ’JntveriLty of California, Berkeley, 0\ S4720 

Montgomery County Pub lie Schools, E?m;kvilk, MD 

Jnhn Snapper, Illinois Institute of Technology, Chicago, EL 6IJ6tft $12) 567-.KL7, 

Corsullante and Researoliers Prouidrrtg Infcrm alien lor this Report- 

Kevin FLDgerald, 2b Washington Ave., Eait Malvern, Victoria 3145 Australis (03) Si-3737, 

Joan Mai-LiLUL'i,, Bonrdscan, 1W05 W, McNLdiuls, Delioit, Ml 4f32i9 (3l3l 534-1 aiy... 

Dflnn PiiJfw SKI rntemationa., 353 Ravenswond Ave ,. Menk. 3’irk, CA 94025 |41S'- h59-237ft 

n u '/ u A J T r ' r Oology Ari^ma Sta to Univcrsttv fSffii 9b.5.fi3L] 

Dr U-r-ch Sieher; innsmucrior Slrasse, 22 "SCO Freiburg [.Brag., West Germane 07*] 44 14 at 

S^en^^'^Sft 3 ' 311 lNflrt0nni CoKrteil hj J ’ !rev,!5,t ’on r AiLasmirren l'S-lE3 21, Bnx-koc’m, 
^gl?n n d«V|i™ PPliBd Sy5t ^' Ud " B'MWiiais St.. Manchester M5 2 EC 


Chari ? 5 H- H.1II0M,, Boards 
! -j •; s » f-T^T 77 77- ” T — 1 ^ 



.1-46 


r 


HD A " Fl 1 u m a 

Wm "I Tui Fat' 1 Rnlk'lm l!inr..1s 
11 Lj r i'v : Puhn Mi ft;'ir!sl. B i> J rd S C i rv 

Packer ^ur-i^d Fid 
turned tcn^ultajit....) 


H SVSTEClflTJCflUV SPEAKING 

Hands Across Telenet 


'l > * + %,rp > YmiI I rm 


In order to accomplish Hands Across America lout month. 
fjriL a nationwide network of technology Erad to he f aimed to 
coordinate the event. 


viO fifiim »e aren't a. viable entily,’'®mpla.iired AIL.’. Patsoiiv. 
president and eh ,cf neem h* $1 ^bufowestem'k publ kh : ng ami 
^Iv.eh still intends to public its "Clone Book" I his fall. H, lr\ 
sum awfully convenient for this to happen slow." tic noted 


Ti> i heir attempt to comhat hunger. Hands Across Amcridi 
Organized millions of people to donate money, buy T -shirts 
und hold hnn.dk 


'■Three or four years ago this event could not have been 
done,' 1 said l-red S, Drov, the national project director of 
Skmds Across America, "‘Computers, TV. telephones, 
teleconferencing dir technology has to eomc together. ” 

Nie fogisiics of keeping tmek of millions of people and the 
millions of dollars they have pledged wor ld have been 
overwhelming without computer power and communications 
networks, which permit the gathering, .storage, and 
transmission of inform.;! I ion. I he process recpii itxl stogperin a 
amounis oi' dale mimes and addresses, route' assign men I s. 
directions, amounts of donations and credit card numbers, to 
name bm a few. In addition organisers had to k^-j track of 
detniSssueh os Local pemii^WEUcrsuppti&s, and the ava i.labiJitv 
of medical facilities, 


As a result of the Hands project, they have developed a 
database system that hits the potential ta coni rot future 
nationwide fund-raising campaigns with pinpoint accuracy. 

GTE Telenet CanuniiiiicatiruiA donated its 237,000 mile-, of 
computer network and overseas satellite hookups to the Hands 
project. Over this network, a wide variety of computers- can 
v:nd information back and forth as high speed, 

1 he Sou roe, an i ntornvi tion system . joined with GTE Lo offer 
i!s fiO.iXNJ me m be ns free compufor access to information about 
foe Hands project. 


Kiev Calling Clogged 

V.’j >s'i I nJi.,1 

In the Wilke oi' the recent nuclear plant accident in 
Chernobyl, the volume of telephone talk heing made to ilic 
Soviet Union lias tripled, a spokesman for AT&T Internal ionnl 
said. 

All calls from the United Slates to the Soviet Union ;iT e 
rented through the AT&T International Operation Center in 
Pittsburgh . A II these tails have ro go t brciugh operators i n the 
Soviet Union. A fot of times well htwe a let of attempts, bin not 
CumplctimisAifod Rick Ri avail of AT&T-I, 

A I & I no longer has. direct-dial service to the Soviet Union. 
Rccaiii* of the unusual volume, cutlers must wait several hours 
On reservations for calls to Moscow and Kiev. 

A i &1 cannot employ any more personnel to pm I he cal Is 
through, because "iherc it no puint in having SO American 
operator trying to gd calk through to only two Soviet 
operators,’" Rrayal] said. 


Nynex Bumps Southwestern Bell 

■£ riAnd Shj S 

“‘A clerical error,” caused l he omission of Southwestern 
Hell’s New York olficc numbs: from the hi lest edition of i.he 
Nynes Manhattan Yellow Rages. 

Southwestern Hell of St. Louis planned Lu pu bl ish ili own 
Vfonhullan Yellow Pages directory lhat would compete 
directly with Nynex. 

In total, i hree listings for Southwestern Retl were; 
"aacrdemaUy’" dropped; its Yellow Pages; Ad-Vent; a graphics 
ope i nt ion; and the Silver Pages . a national <1 jrectorv for the 
elderly. 

I f adveii isera can't find us in ! he |'N yneji'l Yellow Pages, 1 hey 


Slock Market Crash 

likAV-aill 

Options trading i>n the London Stock Exchange ceased fora 
d n y recently following foe crash of a new elect rmi ic tradi ng 
system. Thy crush has caM a pall over the Stock Exchanged 
Automated Quotes system . wh ich will be used for sha re trading 
itl .er the fXtober deregulation til finaiseial services m London 
1 -:e foiled system consists of five TRM PC ATs linked 
Luge the r by ei network, with an addilional AT as network 
controller, 

“Ed Quinn Cell Site” 

I'V, T'Oi.y 

Pell Atlantic Corporation's, cellular telephone division has 
hi'en re wo rd mg top employees by nami ng a cel I site afo? r there. 

A p iK|ue bca i in t, t he employee S name adonis i he site, which 
is usually I itl I* more than un antenna lower next In a ^iragc- 
sived building housing n cel lulu i phone relay. 

Two employees ei month will be recognized , which means 
thill R-e J A i la nt ic has two years wort h of honors to dole out and 
more sites Eire being built every dov So far (here's Susan 
Sclufoii Iter cell s He, K athy Schaefer cell site, a nd Ed Quinn o ell 
She. dinners get to choose their own dte, 

Let's Move To France! 

UrSW-Yrri. I r,\-. 

Tn Eiurrita.. France, people dial " ri 0r-^S-62’ 1 to reach the 
world’s only “televideocltib." that offers each .subscriber a 
choice of more (ban 2.000 video cassettes So look nt on their 
videcvpjtone, a combination television and telephone. 

This sammei, un estimated J.Sk) Biarritz houses will be 
equipped wilh foe tabletop machine that incorporates a 
television screen and a movable video camera. Thev will he 
hooked to ail underground web of optica! fibers trial can carry 
[fi times I he amount of informat inn as is normal coaxial cable" 
This project weis started foree years Ago by President 
Mitterrand istid provides for the wiring of all major french 
towns and cities by 1 be end of the «uLu rv wh ik a t the same ( ifoe 
estahlisJimu E' ranee e’is the world IcEiderin this technology. By 
the end oi 1 98,81 3 . 1 million homes are ex pe tied to be connected 
to Optical liber • systems. 

In RiHTritE, videophone owners cun see each other as tlio.- 
dim. and can walk around wdh a hand-held camera 
1 ram-milling pictures fo a friend. 

They can dial into'! blevidcoclub, rcquesi ei film and weilo!i it 
on (heir home screen. Or t1i*y can choose among! 12'ieEevisipii 
channels: mid can switch to larper screens elsewhere in their 
homes; or select one of six slerco rEidio stalions Or the;' con 
plug into viv.iul data brinks Einrl sifi huge amounts of 
information, from train ssSiedtiks in ihe ktesl smek market 
priees. A: Ihe locnl hospital, <lfv.-c.rs can call L] p paticijlV 
rne d Lea I records and N-ruys on a videophone dtiring 
eonsu lla i ions and sick children can follow clamw in the local 
s< hool from Eiome. 

li arntz also has several pay videophones in kiosks on the 
stioct . 

At present, a single videophone costs .£ 3,000 L1 nd sscxpecled 
<0 fall to SfiOO for a town of 3iXJ.bOO houses. 

Watca iug an hour-and ,1 ei IJ-fong li hn un video cassette now 
costs about S5. 


M7 


Call The Private Sector BBS! 

The official bulletin board of 2600 

is available for you to calif 
NOW RUNNING ORIGINAL SOFTWARE 
ON A 20-MEG PC WITH THESE SUB BOARDS: 


Telecom Digest 
Medio/News 
Networking 
Info Retrieval 
BD5 Advertising 


® Computer Law 

• Telecom 

• Compurer Security 

• User Suggestion* 

• Radio Common, 
Connect with the famous 

Private Sector BBS and participate 
in interesting and intelligent talk 
on telecommunications and computers. 

201 - 366-4431 ( 300 / 1200 ] 


SHOCKING BOOKS!!! 


COJJSUMrftTROlVLCS CO- — - The National Clear inp,- 
ticmve 3ee Survival automation — - S(?t SHOCK]MC SUR- 
VIVAL PUBLICATIONS — Electronics, Computer!, 
Energy, Weapons, Security, MeriicnL, FionncLY ■ irpiun irvpj! 

( I ir'L tONb UOLOR LSOKtS 'If'Jaji:- ™ : ? Da it* Btwei) i? i O 
( I , LLLJ’: IONL RECORDER INTERFACE (Tap 0. Si-rink P.Lmii) I.&] 

( I COtMt'DTLK PblftfiAKlNG If (Comptrtrr Crmes tr. Abusrj) <SL>1 
( I AliiCHUTi: COMFUTEK SECURITY (Unbreakable CLtOerti Mar vf 
Sea-ii-liy r-tchnlgoei; J] ,660 ComeSl) C2(J) 
i ) + IRU-PC/CMnpjcililo niiY wi.Cn Programs, CIphcrtcKt (Sb!I) 

( | CfiYTT ANALYSE TECHNCQUW tCrypTjnalyiW Frommi) ($JSr 
4 ) h IBkH-PGj'Cv-npPttfele Di-^i WiL’Ii Fine- Program! ($JC) 

( i AUVUMATIC i Ell ek maCHlnes (ATM y»w k . ,01 n i k :i ) (Ji =■] 

( !• CKiiiMT CAR 10 SCAMS I Many Credit C-srC R p-Q[t v) (SGI 
( '.■ llLMt SOtVLCli MANUAL 11 (Repair, Maintain T I -n ?7> i =0 ($??( 

( \ TUSK Dacvc TUTORIAL SI (Theory, Facts, Many Tips] ($ J ?) 

( } PTtCNTF.R Jt RjQTTUK MANUAL I] (Inter Ihiirjj. Repairs!- ($J ?') 

( J SUPER GI^irJKWC METHOD IFclrit Glbbens ChenpUtSG) 

( >TEOtJ GONADS IFil-l- P.le^irjfiif - Ci.iiide- Mag.ee tie Ways) tS-S-il 

< i STOPPING DOVBH MFIRltS (Frim EUr-e. - liukte Load Ways} (is] 

( J Klt-LIft METERS (he™ EJeelrR- M-rierr. 'furlt, lirritr Mih I Li) CJl;i 
( a LJOL H.A LE GAS Jr V ATE ft NpWmI Cut? Free W9WrM$7f 
( ^GASFCr ALL 1 (Free GH-XL-slinH-; Frim Dhiu:'! Fi ih L] i'S ] II 

( I- VOtATEX GENERATOR (Cw>k H„hi - ft a Fll-I,' i„ K . Pants) fit) 

( >TV DECODERS * CONVERTERS I.D.tih.Ilt , On--.:. Fla,wKSs) 

( i VOICE DlSGUlSER. (TCttliy DuhmVw Yapr PKsnr V-ni^relJ fit) 

I. '/ EieC'LHOMACnETiC &ft WNBLASrER IEM 5vpflr-Wd*po„J 
( >]1EAL ri-iiSELF U (pfnvtrn EM H^lir^ Mu iIkkIO (Ja) 

( > POLYGRAPH DEFEATS (He* TIh^ ffertt; WrrthiwlLj &LO> 

( a J [Kill VOLTAGE DEVICES Cyl^m*r.jj J^iyiiiri; ftliALixJ KlO> 

( J SURVIVAL CU^SJt AMMO (Fu]l-AutttCermnriierti.j Tj^sJ (5 10) 

( ] SILENCE IS GOLDEN (Silererers - Cl etip it E-'y) (ifJ 

< ‘t MtXiCLR, HAR1ST - OlE! (Slirr* BlimirdleT P|*-iO i?C) 

( J LnTLMATlL JUSTICE (Timer, Uetenator, iKPiter PJarn] (VJ 
( ) SLCW.LT & ALTERNATE JDLN L lTlES 'IPiVr hjl L-r n-r- 1 10 
( J E!'NTAL r.O'Jlj'MLIiT (Del«c Ti Tiere. ,V-i(ea ^e Or- icri) (Sil 
( ) STTALTK TLOINDLOCY iStcalih Your Vehicle or Plarel 6> 

| ) SFiDPC.inTH IM^iy Specking Methods) (S-Yl 
( ) AIJTD L‘LV ir! A.’JfJ, EIP-OPPSI (Hew to L-tat lhe bysie-nl' ■! i ) 

I ) THE ^GCIDFINGER* (Ncwr-F^ rnus Mcul Dd-cciecaKS^) 

( ) riLf-SLLKWOOfr’ iCln ip: Eindplf, Flk^iivn Tlud. Debtor) (^ 

( ) SUPLR-SOHVJVA1 CA'l'AlOG (Free with all br-dert- J?G+? li!) 




By John J. V/LI I in mr,. 

CDS J fiD MENUVKLS", 


y hlj:i:. (ton-LT NMSlJ cs lY&IOiaOr], 

. AKG TiiJkkhow.t Scsr^orm. lUKOFFal 
orders etvr-r $yj r PJeme add 5% bhip/hrcil (Ji min). No' 
credit ^oL-tJ lor EduceitLnnni pijrpQfrfli Only. 

JDJ1 L?E5GL'N7 Dfi., 

A IAMCK 30 RDO, MM. 05310 


ConsumerJron/cs Co, 


LETTERS 

{cant in wed from pagt • S - 44 J 

Dear 'ZfifKI-. 

Enjoyed yijur artide on inobiLt p'nonrs (ApnL 1 9f!(V;. — 
romiridi rut of the old TA P which E miss, OiK CObltUCiH 
on the Ei'd nf (lw( anide '^JuTt you refer to the I CC c-iitchinv 
up. In my urea we have three enpLneers for a many state area 
nr,-d they cover ham radio, CR no more, broadcast, publyt 
saJcty, microwaves,, etc. Rd cite itlca? They won^l bother you 
wilhoul 0 tnl of COtnpLfi ints. '] he en>ea to look out for are the 
phone corr. pan .aeon s-qsiad . Re careful hut don’t swea f rite 
FCC for a feu- testi do watch for 1 he plimie company who is 
very sensitive to any d isiupt inn of their revenue. 

Seafiul] 

DearJfifW: 

Kstw can [ he Like Captain Midnight? Elow about an AM 
carrier-current pirate radio sluiLOti? 

v\ 

Dear P\: 

W<> can ir tell you whai to do oXoLtiy. btfl wc •vnr vtr >h»l it 
involves iftgemfrfyj iTteukitress, inteNigentx, persistence, and u 
youthful spirit. Mix together you shovM torn? m/j 
with bvmelhing hvrtinvhik. 

TViiW (iff mriTjy A M i'Qtfiff-t'atfWnt fti/Vfc fudiv SUdkfns in 
existence. TuO many of ihem try so sound lib: respsiur AM 
it as ions and Low ptopk notice any if ling different. 

DearififWt 

Your 2f\W> mapaainc is great! I realty enjoy ii Your article on 
mobile phones was rnct-l interestinj! Pm very interested in Lhis 
area, and Look forward to any future art ides on it such as 
vvhat uwke&nd modelof two-way radio is best (arid cheapest) 
to use, or what Tedio is best (and cheapest) tn just listen in on 
calls. 

Dear 2600 : 

l have something interesting to report about RC’l. RO is 
another one of the long-distance telephone companies. They 
USC OpIiCi'il liber n el works that have been laid aloiie railitKid 
1 racks around the oountrv. If you are near where their cables 
ran , there is a s ign that telfcs yon what to dd ifyou wHh to d ig tl>c 
Cables up. f he bijnis give a luc;ilion which is the initials of the 
slate you a re in and a number which is us.ua lly less tlva n 1 00C 
Y ou simply eult ant! yon get an KCt operator who 

may chat with you for hours about cahle sites around rite 
enunny. 

S]i^ can give you fable luca I ions, and she might want to know 
if you plan on digging a few cables- up. 

RLgjtt Traci. 

Itear RejtkrX; 

}>.y r it jittaify happened. We So si Stack o arse ires of the 
different: bciwccn Flush and SystemftkoUy Speaking and 
acridentalfy mixed then? np ftptt month. We regret she error. 


EQUIPMENT 

SccuiiLy, Privacy, Police 
Surveillnuce, Countcmncasiitcs. Telephone 

BOOKS 

Pin ns, Secret Reports, Forbidden Knowledge 
fu:an S2Q.m FOR i.A RG£ CATA 1.0(1 ASfti ONF. YkdR VPiWtX 

SHERWOOD COMMUNICATIONS , 

PKilmonf Crunmisns 
27Sf) Phi I merit Avenue Suite flCOKT 
Huntingdon Vidlcy, PA I'&CXKj