💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › BOXES › hack.txt captured on 2022-07-17 at 10:39:28.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

This is a compilation of Texts by Dysphunxion..  Most of it was                     
actually typed by me..  like the intro.. the boxes explained..
and the VMB Hacking..  the rest are just plans for boxes.. Some
may be on the older side but most still work!!!

Now on with the show...


                    Xx-x-x-x-x-x-x-x-x-x-x-xX
                    I   Table of Contents   I
                    Xx-x-x-x-x-x-x-x-x-x-x-xX


Introduction to hacking. . . . . . . . . . . . . . . . . . . .  1

Phone Phreaking. . . . . . . . . . . . . . . . . . . . . . . .  2
     Basic Boxes Technically Explained . . . . . . . . . . . .  3
          (BLUE,3); (BLACK,4); (CHEESE,5)
     Voice mail box hacking. . . . . . . . . . . . . . . . . .  6
     Blue Box Tones. . . . . . . . . . . . . . . . . . . . . .  9
     Scarlet box . . . . . . . . . . . . . . . . . . . . . . .  10
     Green Box . . . . . . . . . . . . . . . . . . . . . . . .  11
     Blotto Box. . . . . . . . . . . . . . . . . . . . . . . .  12


Potpourri
     Lunch Box . . . . . . . . . . . . . . . . . . . . . . . .  13
                  
                    

                     
                     
                     
                     
                     
                     INTRODUCTION TO HACKING

Most people who have never hacked or are beginners think that
hackers are a small community of very knowledgeable computer
"geniuses" that randomly break into systems for fun and then
create havoc or steal information. I will speak of my own views
on hacking which shouldn't reflect the feelings of the entire
hacking community but I would guess a large amount. First of all
hacking is getting more and more risky everyday. Because of this,
hacking for fun isn't as safe as it used to be (although most of
my hacking is for fun). The reason people (people I know) hack is
because we believe in free information exchange. This means that
I should be able to freely access any information that is
available over the modem that I want. There are obvious reasons
why this can't be achieved, but if people have information that
is that sensitive then it should not be put out over the modem.
Now the second and biggest misconception about hacking is how the
hacker actually "hacks". Most people think that hacking is just
basically getting lucky and guessing a password that lets you
into a system. This is *very* untrue. Let us take an example that
you have just broken into the CIA's computer system. So suddenly
you get a -> prompt. Now what do you do?!? This is the difference
between the hacker and some kid that is good at guessing. The kid
may be able to guess a password, but if he doesn't know what to
do once he's in then he might as well have not even hacked the
password at all. So, the main objective of the hacker is to
concentrate on learning how to use a system. After he has done
that then he can figure out ways to get around certain kinds of
security and get to the stuff he wants. So what you should do is
read all the manual's and text files that you can get your hands
on. Because before you can defeat a system, you must know how it
works (this works for life in general). Ok, now you understand
what hacking is and how you should go about learning it. 

                          Phone Hacking
                Basic Boxes Technically Explained

BLUE 
   
   The "Blue Box" was so named because of the color of the first
one found. The design and hardware used in the Blue Box is fairly
sophisticated, and its size varies from a large piece of
equipment to the size of a pack of cigarettes. The Blue Box
contains 12 or 13 buttons or switches that emit multi-frequency
tones characteristic of the tones used in the normal operation of
the telephone toll (long distance) switching network. The Blue
Box enables the user to place free long distance calls by
circumventing toll billing equipment. The Blue Box may be
directly connected to a phone line, or it may be acoustically
coupled to a telephone handset by placing the Blue Box's speaker
next to the transmitter or the telephone handset. To understand
the nature of a fraudulent Blue Box call, it is necessary to
understand the basic operation of the Direct Distance Dialing
(DDD) telephone network. When a DDD call is properly originated,
the calling number is identified as an integral part of
establishing the connection. This may be done either
automatically or, in some cases, by an operator asking the
calling party for his telephone number. This information is
entered on a tape in the Automatic Message Accounting (AMA)
office. This tape also contains the number assigned to the trunk
line over which the call is to be sent. The information relating
to the call contained on the tape includes: called number
identification, time of origination of call, and info that the
called number answered the call and time of disconnect at the end
of the call. Although the tape contains info with respect to many
different calls, the various data entries with respect to a
single call are eventually correlated to provide billing info for
use by your Bell's accounting department. The typical Blue Box
user usually dials a number that will route the call into the
telephone network without charge. For example, the user will very
often call a well-known INWATS (toll-free) customer's number. The
Blue Box user, after gaining this access to the network and, in
effect, "seizing" control and complete dominion over the line,
operates a key on the Blue Box which emits a 2600 Hertz (cycles
per second) tone. This tone causes the switching equipment to
release the connection to the INWATS customer's line. The 2600Hz
tone is a signal that the calling party has hung up. The Blue Box
simulates this condition. However, in fact the local trunk on the
calling party's end is still connected to the toll network. The
Blue Box user now operates the "KP" (Key Pulse) key on the Blue
Box to notify the toll switching equipment that switching signals
are about to be emitted. The user then pushes the "number"
buttons on the Blue Box corresponding to the telephone # being
called. After doing so he/she uses the "ST" (Start) key to tell
the switching equipment that signalling is complete. If the call
is completed, only the portion of the original call prior to the
'blast' of 2600Hz tone is recorded on the AMA tape. The tones
emitted by the Blue Box are not recorded on the AMA tape.
Therefore, because the original call to the INWATS # is toll-
free, no billing is rendered in connection with the call.
Although the above is a description of a typical Blue Box call
using a common way of getting into the network, the operation of
a Blue Box may vary in any one or all of the following respects:
 
The Blue Box may include a rotary dial to apply the 2600Hz tone
and the switching signals. This type of Blue Box is called a
"dial pulser" or "rotary SF" Blue box. Getting into the DDD toll
network may be done by calling any other toll-free # such as
Universal Directory ASSistance (555-1212) or any number in the
INWATS network, either inter-state or intra-state, working or
non-working. Entrance into the DDD toll network may also be in
the form of "short haul" calling. A "short haul" call is a call
to any # which will result in a lesser amount of toll charges
than the charges for the call to be completed by the Blue Box.
For example, a call to Birmingham from Atlanta may cost $.80 for
the first 3 minutes while a call from Atlanta to Los Angeles is
$1.85 for 3 minutes. Thus, a short haul, 3-minute call to
Birmingham from Atlanta, switched by use of a Blue Box to Los
Angeles, would result in a net fraud of $1.05 for a 3 minute
call. A Blue Box may be wired into the telephone line or
acoustically coupled by placing the speaker of the Blue Box near
the transmitter of the phone handset. The Blue Box may even be
built inside a regular Touch-Tone phone, using the phone's push-
buttons for the Blue Box's signalling tones. A magnetic tape
recording may be used to record the Blue Box tones for certain
phone numbers. This way, it's less conspicuous to use since you
just make it look like a walkman or whatever, instead of a box.  
 
   All Blue Boxes, except "dial pulse" or "Rotary SF" Blue Boxes,
must have the following 4 common operating capabilities:
 
It must have signalling capability in the form of a 2600Hz tone.
This tone is used by the toll network to indicate, either by its
presence or its absence, an "on hook" (idle) or "off hook" (busy)
condition of the trunk. The Blue Box must have a "KP" tones that
unlocks or readies the multi-frequency receiver at the called end
to receive the tones corresponding to the called phone #. The
typical Blue Box must be able to emit M tones which are used to
transmit phone #'s over the toll network. Each digit of a phone #
is represented by a combination of 2 tones. For example, the
digit 2 is transmitted by a combination of 700Hz and 1100Hz. The
Blue Box must have an "ST" key which consists of a combination of
2 tones that tell the equipment at the called end that all digits
have been sent and that the equipment should start switching the
call to the called number.

BLACK   
   
   This Box was named because of the color of the first one
found. It varies in size and usually has one or two switches or
buttons. Attached to the telephone line of a called party, the
Black Box provides toll-free calling *to* that party's line. A
Black Box user tells other people beforehand that they will not
be charged for any call placed to him. The user then operates the
device causing a "non-charge" condition ("no answer" or
"disconnect") to be recorded on the telephone company's billing
equipment. A Black Box is relatively simple to construct and is
much less sophisticated than a Blue Box. NOTE: This will not work
on any type of Electronic Switching Systems, (ESS, DMS100 etc.)

CHEESE

This Box was named after the container in which the first one was
found. Its design may be crude or very sophisticated. Its size
varies; one was found the size of a half-dollar. A Cheese Box was
used most often by bookmakers or betters to place wagers without
detection from a remote location. The device inter-connects 2
phone lines, each having different #'s but each terminating at
the same location. In effect, there are 2 phones at the same
location which are linked together through a Cheese Box. It is
usually found in an unoccupied apartment connected to a phone
jack or connecting block. The bookmaker, at some remote location,
dials one of the numbers and stays on the line. Various bettors
dial the other number but are automatically connected with the
book maker by means of the Cheese Box interconnection. If, in
addition to a cheese box, a Black Box is included in the
arrangement, the combined equipment would permit toll-free
calling on either line to the other line. If a police raid were
conducted at the terminating point of the conversations -the
location of the Cheese Box- there would be no evidence of
gambling activity. This device is sometimes difficult to
identify. Law enforcement officials have been advised that when
unusual devices are found associated with telephone connections
the phone company security representatives should be contacted to
assist in identification.

(This probably would be good for a BBS, especially with the Black
Box set up. and if you ever decided to take the board down, you
wouldn't have to change your phone #. It also makes it so you
yourself cannot be traced. I am not sure about calling out from
one though.)                     

VOICE MAIL BOX HACKING

Hello again, and welcome to another ?egions ?f ?ucifer text file!
This text file has to do with hacking and scanning VMBs. The
reason I am writing this file is because I am very good at it,
and have had years of experience. In fact I have been called by
MCI for screwing them over by attacking and taking over a whole
damn system with a few friends of mine. Anyway, hacking VMBs is
very simple and basically safe, and not only that but they are
cool to have around. You can give them to friends, you can trade
them for access on bulletin boards, or you can use it for
yourself. As for this 'Tutorial on Hacking VMBs', we will be
talking about what systems to hack, how you go about hacking
them, default passwords, hints on better scanning, and having
your very own box.

VMB, in case you don't know, stands for 'Voice Mail Box'. Now a
VMB is like an answering machine. You can use it for all sorts of
things. Most VMB systems are dialed though 800 numbers. People
call up the VMB system that you have a box on, and dial in your
box number and then leave you a message. Whenever you want to
check your box, you just call up, enter your password and read
your messages. Inside a VMB you can do whatever, you can leave
messages to others on the system, you can change your 'Out Going'
message, you can have guest boxes (Explained later), you can have
the box call your house when you get an Urgent message, you can
do a lot of things. In fact, on some systems you can even CALL
OUT through them, so they can be used as a code of sorts! They
are cool to have.

You should scan/hack out Virgin Systems, this is another way of
calling a system that hasn't been hack out yet. Also, CINDI
Systems and ASPEN Systems have the best boxes and the most
options that VMB Systems can offer. I will be talking about ASPEN
System today since I know most about those.

Okay once you've found your Virgin VMB System, you start to scan.
Just incase you don't know what scanning is, that means you
search for boxes that are hackable (Explained later on). Now you
dial up the system and when it picks up and the bitch starts to
talk, press the "#" key. It will then ask you for your box
number... now there are two different way the ASPEN System can be
configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital
Box Number System". Now lets just say this system is a 3 Digit
System. Okay, when it asks for your Box Number, enter in 999, now
it will say one of three things: [These are known as 'Greeting
Names']

1. John Doe [Box owners name]
2. "Box Number 999 Is Not a Valid Box Number"
3. "Box Number 999"
Now, if it either says 1 or 2, go to box number
998...997...996...995..etc, but if it says 3, then you are lucky,
now it will ask you for your password, now you are probably
saying 'Oh no this is where it gets difficult'... well you are
WRONG! This part is easy. Here is a list of ASPEN Default
Passwords:


 [ BN = Box Number ]

List of Default Password: Combination  Result

                            1-BN           1666
                            BN+1           667
                            0-BN           0666
                            BN-0           6660
         Most Common ???    BN             666

Now enter in a those defaults, try JUST the Box Number first,
ASPENs usually use that most. Now, if you try all those Defaults
and still can not get into that Voice Mail Box, then that means
that the box has been already taken, but the owner hasn't changed
his 'Generic Message', if you don't get in, you will just have to
search until you get in.

Okay, once you get your first box, *DO NOT* change anything!!
That will come later. Your first box is, as what is known as a
'Scanning Box'! What you do with your Scanning Box is this: You
enter "3" from the main commands menu, and it will ask you for
the box number. Now that command is the "Check for Receipt"
command, what it does it check Box #xxx for mail from you. This
command is very convenient for us VMB Hackers. To use that
command to your advantage, you enter in box a box number and it
will say 1 of the three 'Greeting Names', like before, if it say
#3, then you write down that Box Number and hack it later. But if
it says 1 or 2, then just keep scanning! All boxes with the
number 3 Greeting Name is known as a 'Hackable Box'. Now you keep
scanning until you have gone all the way down to Box number 000
or whatever is the lowest box it supports. Now, once you have
your list this is when all the fun starts! Now you are ready to
hack!


Hacking Out Your New Found 'Hackable' Boxes:

Okay this is the easy part. After you spent most of your time by
scanning the system you should be used to the system and how it
works, that should make hacking the ASPEN all the easier. Now, if
you had a 'Scanning Box', you should know what the default
password was for your Scanning Box. Well if the password for your
Scanning Box was just the Box Number, then *EVERY* other hackable
box should have the SAME default password. VMB Systems have only
one default password, If one box has the BN for a Default PW, the
all the others will too.

Okay, you call up the VMB System will the list of 'Hackable'
boxes by your side, and when the bitch is talking, press the "#"
key. When it asks you for your box number, enter in the first box
number on your list. When it asks for your password, enter in the
Default Password Sequence. Now if you don't get into that box,
it's not a problem, just keep going down your list. You should
get into a few. But remember, just because a box is marked
'Hackable', it doesn't mean you will definitely get into it.

Okay, now you have a few dozen boxes. You can now use you
Scanning Box to do whatever you please.

ASPEN Guest Boxes:

Once you have a box of your own, you can give out 'Guest Boxes'.
Guest Boxes are like Sub Boxes in your box. In ASPEN you have 4
of them. If you give out Guest Box #1 to John Doe, Mr. Doe can
call in, enter in the password YOU set for him, and leave you
messages, but not only that, you can leave messages to HIM! Which
means, if his is in New York, and you are in California, and
neither of you have codes to call each other, then you can leave
messages thru your 800 VMB. Here is a list and explanation of all
4 of the Guest Boxes:

0. Main Box      - Your Voice Mail Box!
1. Guest Box #1  - Can Leave & Receive Messages
2. Guest Box #2  - Can Leave & Receive Messages
3. Home Box      - Can Leave & Receive Messages
4. Secretary Box - Can Check How Many Messages You Have & Receive
Messages


Hints On Better Scanning:
A lot of people say hacking and scanning for VMBs is too damn
hard... well that's because they are going at it all wrong, they
probably read some lame piece of text file on Hacking VMBs that
was about 500 bytes long. Well, here is a small list of hints on
better scanning and hacking:

1. Do not use a Voice Mail Box hacking/scanning program (i.e.:
VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..) 2. Do not hack in
random order (i.e.: B#999, 345, 810, etc) Always hack in order:
999, 998, 997, 996, 995...000. 3. Try to find out if it's virgin.
The newer the System, the better.
4. If you have a phone with memory dial, change one entry to the
number of the VMB System. 5. Don't hack the System Managers box
unless you really want to.

Ideas of Things To Do With Your Extra Boxes:

Well since you can have up to 500 extra Voice Mail Boxes, you
might not know what to do with them, here are a few ideas that
can help you out:

1. Give them to friends
2. Sell them to friends
3. Offer them to sysops for better access
4. Trade them for HSTs or whatever
5. Use them as a Voice Verifying line (So you don't have to give
out your real voice number to BBSs when you apply!)


                         Blue Box Tones
In this short section I will attempt to list some tones that Ma
Bell uses and what they are. Well here goes: Blue box
frequencies: 2600 hz - used to  get on/off trunk tone matrix to
use after 2600 hz.
 700:  1  :  2  :  4  :  7  :  11  :  
 900:  +  :  3  :  5  :  8  :  12  : 
1100:  +  :  +  :  6  :  9  :  KP  : 
1300:  +  :  +  :  +  :  10 :  KP2 : 
1500:  +  :  +  :  +  :  +  :  ST  : 
      900 :1100 :1300 :1500 : 1700 :
Use KP to start a call and ST (1500+1700) to stop. Use 2600 HZ to 
disconnect. Red box freqs: 1700 hz and 2200 hz mixed together. A
nickel is 66 ms on (1 beep). A dime is 66ms on, 66ms off, 66ms on
(2 beeps) a quarter is 33ms on, 33ms off repeated 5 times. (Ms =
millisecond). For those of you who don't know, a red box
simulates money being put into a pay phone. You must put in some
money first though (the operator can tell if money was put in but
as to how much she lets the computer answer that. (Yeah for the
computer) TASI locking freq: TASI (time assignment speech
interpolation) is used on satellite trunks, and basically allows
more than one person to use a trunk by putting them on while the
other person isn't talking. Of course, you'd never hear the other
person talking on your trunk. When you start to talk, however,
the TASI controller has to find an open trunk for you. Because of
this, some of your speech is lost (because of the delay in
finding a trunk) this is called clipping. Well, if you were
transmitting data over a trunk, clipping would really mess up the
data. So there is something called a TASI locking frequency which
keeps the TASI from putting anyone else on your trunk or you on
anyone else's trunk. In any case the freq. is 1850 hz. (Sent
before the transmission). Have fun!!!


:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
:%                                                                          %:
:%                              THE GREEN BOX                               %:
:%                                                                          %:
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:


   The Green Box generates useful tonessuch as COIN COLLECT, COIN RETURN, and
RINGBACK.  These are the tones that ACTS or the TSPS operator would send to
the CO when appropriate.  Unfortunately, the green box cannot be used at a
fortress station, but must be used by the CALLED party.  The tones (hz) are:

   COIN COLLECT      700  +  1100
   COIN RETURN      1100  +  1700
   RINGBACK          700  +  1700

   Before the called party sends any of these tones, an operator released
signal should be sent to alert the MF detectors at the CO.  This can be done
by sending 900 + 1500 Hz or a single 2600 Hz wink (90 ms) followed by a 60 ms
gap and then the appropriate signal for at least 900 ms.  Also, do not forget
that the initial rate is collected shortly before the 3 minute period is up.

:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-::-:-:-:-:-:-:-:-:-:-: -:-:-:-:-:-:-:-:

 
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
:%                                                                          %:
:%                              THE BLOTO BOX                               %:
:%                                                                          %:
:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:


HOW TO BUILD A BLOTO BOX

Finally, it is here! What was first conceived as a joke to fool the inncoent
phreakers around America has finally been concieved by the one phreak who is
the expert on lines and voltage: The Traveler. Other boxes by the Traveler 
include the White Gold Box, the Aqua Box, The Diverti Box, and the Cold Box.
All of those plans will soon be available in a BBS/AE near you!
Well, for you people who are unenlightened about the Blotto Box, here is a 
brief summery of a legend.

--*-=> The Blotto Box <=-*--
For years now every pirate has dreamed of the Blotto Box. It was at first
made as a joke to mock more ignorant people into thinking that the function
of it actually was possible. Well, if you are The Voltage Master, it is
possible. Originally conceived by King Blotto of much fame, the Blotto Box is
finally available to the public.
NOTE: The Traveler can not be responcable for the information disclosed in
the file! This file is strictly for informational purposes and should not be
actually built and used! Usage of this electronical impulse machine could
have the severe results listed below and could result in high federal
prosecution!
Again, The Traveler

TAKES NO RESPONCABILITY!

All right, now that that is cleared up, here is the basis of the box and
it's function.
The Blotto Box is every phreaks dream... you could hold AT&T down on it's
knee's with this device. Because, quite simply, it can turn off the phone 
lines everywhere. Nothing. Blotto. No calls will be allowed out of an area
code, and no calls will be allowed in. No calls can be made inside it for
that matter. As long as the switchhing system stays the same, this box will
not stop at a mere area code. It will stop at nothing. The electrical
impulses that emit from this box will open every line. Every line will ring
and ring and ring... the voltage will never be cut off until the box/
generator is stopped. This is no 200 volt job, here. We are talking
GENERATOR. Every phone line will continue to ring, and people close to the
box may be electricuted if they pick up the phone.
But, the Blotto Box can be stopped by merely cutting of the line or
generator. If they are cut off then nothing will emit any longer. It will
take a while for the box to calm back down again, but that is merely a
superficial aftereffect. Once again: Construction and use of this box is not
advised! The Blotto Box will continue as long as there is electricity to
continue with.
OK, that is what it does, now, here are some interesting things for you to
do with it...

--*-=> The Blotto Box Functions and Installation <=-*--
Once you have installed your Blotto, there is no turning back. The
following are the instructions for construction and use of this box. Please
read and heed all warnings in the above section before you attempt to
construct this box.
   Materials:
   
- A Honda portable generator or a main power outlet like in a 
  stadium or some such place.

- A radio shack cord set for 400 volts that splices a female
  plug into a phone line jack.

- A meter of voltage to attach to the box itself.

- A green base (i.e. one of the nice boxes about 3' by 4' that
  you see around in your neighborhood. They are the main switch
  boards and would be a more effective line to start with.
  or: A regular phone jack (not your own, and not in your area code!

- A soudering iron and much souder.

- A remote control or long wooden pole.

Now. You must have guessed the construction from that. If not, here goes,
I will explain in detail. Take the Honda Portable Generator and all of the
other listed equiptment and go out and hunt for a green base. Make sure it is
one on the ground or hanging at head level from a pole, not the huge ones at
the top of telephone poles. Open it up with anything convienent, if you are
two feeble that fuck don't try this. Take a look inside... you are hunting
for color-coordinating lines of green and red. Now, take out your radio shack
cord and rip the meter thing off. Replace it with the voltage meter about. A
good level to set the voltage to is about 1000 volts. Now, attach the voltage
meter to the cord and set the limit for one thousand. Plug the other end of
the cord into the generator. Take the phone jack and splice the jack part
off. Open it up and match the red and green wires with the other red and
green wires. NOTE: If you just had the generator on and have done this in the
correct order, you will be a crispy critter. Keep the generator off until you
plan to start it up. Now, sauder those lines together carefully. Wrap duck
tape or insultation tape around all of the wires. Now, place the remote
control right on to the startup of the generator. If you have the long pole,
make sure it is very long and stand back as far away as you can get and reach
the pole over. NOTICE: If you are going right along with this without reading
the file first, you sill realize now tHat your area code is about to become
null! Then, getting back, twitch the pole/remote control and run for your
damn life. Anywhere, just get away from it. It will be generating so much
electricity that if you stand to close you will kill yourself. The generator
will smoke, etc. but will not stop. You are now killing your area code, 
because all of that energy is spreading through all of the phone lines around
you in every direction.
Have a nice day!


<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>
<%>                                                                     <%>
<%>                             Making the                              <%>
<%>                                                                     <%>
<%>                              Lunch Box                              <%>
<%>                              ===== ===                              <%>
<%>                                                                     <%>
<%>              Written, Typed and Created by: Dr. D-Code              <%>
<%>                                                                     <%>
<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>^<%>
 
Introduction
============
 
The Lunch Box is a VERY simple transmitter which can be handy for all sorts of
things. It is quite small and can easily be put in a number of places. I have
successfully used it for tapping fones, getting inside info, blackmail and
other such things. The possibilities are endless. I will also include the plans
for an equally small receiver for your newly made toy. Use it for just about
anything. You can also make the transmitter and receiver together in one box
and use it as a walkie talkie.
 
Materials you will need
=======================
 
(1) 9 volt battery with battery clip
(1) 25-mfd, 15 volt electrolytic capacitor
(2) .0047 mfd capacitors
(1) .022 mfd capacitor
(1) 51 pf capacitor
(1) 365 pf variable capacitor
(1) Transistor antenna coil
(1) 2N366 transistor
(1) 2N464 transistor
(1) 100k resistor
(1) 5.6k resistor
(1) 10k resistor
(1) 2meg potentiometer with SPST switch
Some good wire, solder, soldering iron, board to put it on, box (optional)
 
Schematic for The Lunch Box
===========================
 
This may get a tad confusing but just print it out and pay attention.







  
          !
        51 pf
          !
       ---+----  ------------base   collector
      !        )(               2N366       +----+------/\/\/----GND
    365 pf     ()              emitter           !
      !        )(                 !              !
      +--------  ---+----         !              !
      !             !    !        !              !
     GND            /  .022mfd    !              !
                 10k\    !        !              !
                    /   GND       +------------------------emitter
                    !             !              !             2N464
                    /           .0047            !          base   collector
              2meg  \----+        !              !   +--------+       !
                    /    !       GND             !   !                !
                        GND                      !   !                !
        +-------------+.0047+--------------------+   !                !
                                                     !   +--25mfd-----+
            -----------------------------------------+   !            !
       microphone                                        +--/\/\/-----+
            ---------------------------------------------+   100k     !
                                                                      !
                  GND---->/<---------------------!+!+!+---------------+
                        switch                  Battery
                    from 2meg pot.
 
 
Notes about the schematic
=========================
 
1.  GND means ground
2.  The GND near the switch and the GND by the 2meg potentiometer should be
    connected.
3.  Where you see:  )(
                    ()
                    )( it is the transistor antenna coil with 15 turns of
                       regular hook-up wire around it.
4.  The middle of the loop on the left side (the left of "()") you should run
    a wire down to the "+" which has nothing attached to it. There is a .0047
    capacitor on the correct piece of wire.
5.  For the microphone use a magnetic earphone (1k to 2k).
6.  Where you see "[!]" is the antenna. Use about 8 feet of wire to broadcast
    approx 300ft. Part 15 of the FCC rules and regulation says you can't
    broadcast over 300 feet without a license. (Hahaha). Use more wire for an
    antenna for longer distances. (Attach it to the black wire on the fone
    line for about a 250 foot antenna!)
 
Operation of the Lunch Box
==========================
 
This transmitter will send the signals over the AM radio band. You use the
variable capacitor to adjust what freq. you want to use. Find a good unused
freq. down at the lower end of the scale and you're set. Use the 2 meg pot. to 
the 2meg is for turning the Lunch Box on and off. When everything is adjusted,
turn on an AM radio adjust it to where you think the signal is. Have a friend
say some shit thru the Box and tune in to it. That's all there is to it. The
plans for a simple receiver are shown below:
 
The Lunch Box receiver
======================
 
(1) 9 volt battery with battery clip
(1) 365 pf variable capacitor
(1) 51 pf capacitor
(1) 1N38B diode
(1) Transistor antenna coil
(1) 2N366 transistor
(1) SPST toggle switch
(1) 1k to 2k magnetic earphone
 
Schematic for receiver
======================
 
         [!]
          !
        51 pf
          !
     +----+----+
     !         !
     )       365 pf
     (----+    !
     )    !    !
     +---------+---GND
          !
          +---*>!----base  collector-----
             diode      2N366           earphone
                        emitter    +-----
                          !        !
                         GND       !
                                   -
                                   +
                                   - battery
                                   +
           GND------>/<------------+
                  switch
 
Closing statement
=================
 
This two devices can be built for under a total of $10.00. Not too bad. Using
these devices in illegal ways is your option. If you get caught, I accept NO
responsibility for your actions. This can be a lot of fun if used correctly.
Hook it up to the red wire (I think) on the fone line and it will send the
conversation over the air waves. If you have any problems or are confused,
leave me mail on:Hi-Times=702/832/7469  Warez House=702/827/9273
 
______________________________________________________________________________ 
 Sysops of other systems may use the file as long as none of it is altered.
______________________________________________________________________________
 
 This has been a High Mountain Hackers Production- (c) 1985 by HMH Industries
______________________________________________________________________________