💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › PHREAKING › bob-3.phk captured on 2022-07-17 at 11:06:11.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-

	Guide to: Hacking, Carding Phreaking By: The Dark Lord 

	  Introduction:
	  ~~~~~~~~~~~~~~
	      This is a text file is Made By The Mickey Mouse Club and
	would ask  that it would be distibuted to others for there use. 
	This file is going to  go into depth on how to Hack, Phreak, and
	card.  There will be information that should help everyone,
	Hopefully!!

	Hacking:
~~~~~~~~~~
	Hacking is a long hard process, unless you get lucky.  There are
	many programs and aids out to make the job a lot easier, but the
	concept is the same no matter how you use it.  First, at least on
	most things that you  hack, you need to get some type of account or
	vacancy, etc...  This is done by randomly entering numbers and or
	letters until you come up with the proper combination to find the
	account.  Knowing the size of the account number makes this job
	one-hundred times easier.  Thats why I suggest you find out from
	someone who allready has one or card one.  By carding the account,
	it will die quickly but at least it will give you the length of the
	account numbers (More on that topic will be expained in the carding
	section).  The accound numbers, do not always just contain numbers
	or have numbers at all in it.  If it has a mix, it makes it a hell
	of a lot harder to get.  You will just have to experiment to find
	out what charactors are contained in the account.  Some Examples of
	ones that do have mixes of numbers and letters would be Pc Persuit
	accounts. The forms of them are usuall as such:

	            Account: Pgp014764g
    	        Password: 23632k

	    It looks from these that you are pretty much screw because of
	the way letters are mixed with numbers, thats what makes having a
	program so much easier.  In a lot of circumstances, getting the
	account is the hardest part that is why having a good background of
	the system is a major plus in your favor. Once you have got the
	account, it is time to get the password for this account.  Once
	again having the length and such makes this process not only
	easier, but faster.  just keep entering random passwords of the
	length or the thought length in until you get a stoke of luck and
	get it.  You MUST remember that 99.5 out of 100 times, this is a
	long process, and you have to have patience.  If you don't you
	might as well forget ever getting on to the system or have someone
	else do it for you.  Once you have gotten the password, look it
	over long and hard.  Write it down and keep it, examine it. 99% of
	the time there is a pattern to all the account passwords.  Things
	to look at is the password in reference to the account number. 
	check to see if things have been added to the end or beginning like
	00 or 01 or 99 of 0010 thing like that.  If  you see no relations, 


                                  - 141 -


	the only other way to really find out the pattern in to get another 
	one. Look at both of them together, see if there the same or it 
	account 400's password is 3456 and 402's password is 3458 (they go 
	in order) then just those as a reference to other passwords, take 
	away so much from accounts with a lower number and add the required 
	amounts to accounts with a higher number, etc....  But bassicly, 
	LOOK FOR A PATTERN!  Once you have got the password and the account, 
	you have got yourself a passage way in.
    
	Although this is what you do to succeed, you have to take many
	precautions. They do NOT like us messing with the system and they
	obviously want you to pay just like the others, so they will take
	necessary means to nail you.  They trace like you wouldn't belive. 
	They will trace right as you get on, if you happen to be unlucky,
	you will never know when they are doing it either, you must ALWAYS 
	be aware of the dangers and take precautions! Even on things that 
	you wouldn't think that they would trace you but, be carfull.  
	Whether they trace depends on a couple of things, here are a few 
	major ones:

	  1. There bank balance
	  2. There desire to catch you
	  3. The amount of infestation in there system

	There are things that you can do to protect yourself, these are not
	all of them and none of them are sure fire ways, but hey, cutting
	down your chances of getting caught makes a world of difference,
	because remember, All the fun is taken away if you caught.  Some
	things to do to protect yourself is: 

	  1. Use a diverter
	  2. Use false information about you
	  3. Never stay On-line too long
	  4. Call during late or early hours, were there is most likely   
	     no one monitoring the system
	  5. Don't call frequently or during the same hours, regulate it

	   Once again these are not all of them but these are some of the
	"More" helpfull things.  If you follow all the step, you can reduce
	the change of getting caught by about 40%. f you do get caught
	there is not a whole lot that you can do, but some tips are, first,
	don't reveal any information on what you have done. Deny  all
	charges.  Sencond, plea bargin with knowladge of things, like
	hacked sytems etc..  But never admit that you did it.  Three, and
	most important, get a GOOD LAWYER!!!!!!!

	 DIFFERENT TYPES OF SYSTEMS:

	    Pc Persuit     Cp\m,  Trw, Unix, Vmb, Vms



                                  - 142 -


	These are just a few systems, if I made a complete list There would
	be pratically no end to it, there are millions.

	Phreaking:
	~~~~~~~~~~
	Phreaking, Ahhhwwww, the wonderfull world of phreaking.  Well to
	start with Phreaking is "The use of Telecommunications to others
	besides people of the Phone Company".  Well thats my version of the
	definition at least. Using codes is wuit easy, there are different
	parts to it, the Dial-up, the code, and the number.  First you will
	have to dial in the dial-up and on most dial ups you will get a
	tone or a buzz or click or something to that effect.  Once you hear
	this, and you will know when you hear it you dial in the code. 
	Sometime you will get another tone or beep etc. and when you do
	that is when you dial in the number.  If you do not get another
	tone or whatever you just dial in the number right after you 
	enter the code. You might have to have a test dial up to see how 
	the tones go. In dialing the number once agian the nubers differ.  
	You must enter the area code and then the nuber.  Some require that 
	you have a one before the area code but most that I have used do not.
	You can tell if the code worked right after the number has been put 
	in not just by the error recording that you get but if right off the 
	bat the phone begins to ring, it doesn't work. A code can also be busy.
	If it is busy it could mean that the code is dead or that too many 
	people are using it at once.  You might experiance this often. There 
	are numbers that make phreaking much safer, they are called diverters.
	What the do is when the number that you have dial is being traced it 
	diverts it to that number.  Unless this is virgin or nobody else uses 
	it, you will find that with in a couple of days after it is out, it 
	will be busy, that is the annoyance about diverters, and they are 
	also hard to get. Hacking is also put into play in phreaking by 
	using programs to get dial ups and the codes. Getting these are done 
	in the same way you hack anything else. Just get a program like code 
	thief or code hacker, or make one yourself, it is quite easy. There 
	is a danger with useing the codes. If you hack a code yourself, not 
	just the code but the dial up amd no one else has it you can pretty 
	well  bet that it is safe.  A newly hacked dial-up/code is considered
	"Virgin". those Ma bell is not having the problem with people
	phreaking off of it so they don't bother doing anything with it. 
	But after a while, it will either Die (No Longer work) or they will
	start tracing off of it.  The whole pain about it is, is you will
	never positively no when they started doing traces or things like
	that.  The codes might be being traced but you are getting the luck
	of the draw.  On most codes they don't trace on every call, they 
	just file it away and watch for like the 50th or 100th caller and 
	then that person gets nailed.  You might think if they do trace every 
	100 calls, that means you have a 1 in 100 chance of getting caught and 
	those are really good odds.  Well the odd is 100 to 1 but the is a lot 
	of people that live in areas that they can call with that code.  If you 
	figure about 10 million people could use it then about 100,000

                                  - 143 -


	of them are.  100,000,  hummmmmmm, how odes your odds look now.  
	In a couple minute time spand 99 peoplecould have used it, and 
	lucky you might be the 100th caller.  A lot of times the take like 
	every hundered calls and then when they get the 100th caller, that 
	don't just trace one, they trace 100, 101, 102, 103, 104 200, 201, 
	202 etc.  So you chances of getting caught when the heat is on the 
	code is pretty good.  There are a couple different types of codes 
	and the two major ones are 1-800's and 950's.  800's can pretty much 
	be dialed from anywhere in the states, but 950's stay in certain
	areas.  Some 950 dial ups are:

	    9501001
	    9500266
	    9500355
	    9501388

	And there are others, but like take me for example, where I live
	you cannot use 9500266.  It will tell you that you cannot use that
	number from your dialing range or it just won't work.  You might
	get to the point where the dial-up works but not the code.  If this
	is the case it will say: "Invalid authorization Code" Some examples
	of 1-800's are as follows:

	     1-800-255-2255
	     1-800-759-2345
	     1-800-959-8255

	There are many others but those are just a few, very few.  There
	are also 1-800's and others that will send you directly to the
	operator, you must tell her the code and the number you are
	dialing.  These are NEVER safe to use. but in one case they are
	alot better.  I am out of town a lot so I have to use pay phones
	right?  Well, you are safe with anything with pay phones, so that
	is a good way to call people.  The real good thing them though, is
	since you must go throught th operator, the codes stay valid for up
	to 10 times as long as the others.  But thenm again another draw
	back is it is not a line that you want to give real names or
	numbers over. Because these are often tapped, since the
	operator know that you used the code, they will listen in quite
	often, and you will never even notice. Another problem experianced
	with them is if you are what MMC calls

	"Petite Flowers", our home made word for , someone that sounds like
	a little kid, then they  really give you a hastle about using the
	code. I have had a lot of people ask me if the person you are
	calling with the codes can get busted. The answer is "No".  They
	cannot do anything to the person, just ask him who is calling him 
	with the codes, and they rarely do that.  Just let the person you 
	are talking to, if they don't already know, not to tell anyone that 
	you are calling with the codes.  The phone companies do have to option 
	of setting up a trace on that persons line and bust you when you do call

                                  - 144 -



	him with a code. I have never seen this done but do be aware that 
	the phone companies are made up of intellegent adults and they are 
	very smart and can and will nail you in many ways. I am a firm beliver 
	that you should share a the information that you other phreakers and 
	hackers as they should do the same with you. I also see an execption, 
	inexperianced people. They can run it for everyone be not have the 
	knowladge and screwing up.  I realize that they need someway to build 
	themselves up to a good phreaker but be cautions in what you give to 
	them. Codes die really often and you really have to keep up with the 
	phone company. Its kinda of a pain to keep up with it on your own as 
	quickly as they work but thats why there is phreaking communities and 
	groups such as Fhp and MMC, the gives the edge to the phreakers in the 
	way that, you have help in keeping up with the phone companies, and in
	most cases if the groups or communities are working well together,
	you can eve stay one step ahead of good 'ole Ma bell and others. 
	You really need to find ways of getting codes either from getting
	acess to the phreaking sections  on the pirate boards you call or
	throught friends, Vmb's Loops, Confrences, etc., just try to find a 
	good connection to people that are into phreaking too.

	 Carding:
	~~~~~~~~~
	Although everything talked about in the text file to this point is
	illegal, and you will get busted if you get caught, this is one one
	the one that you can get in some major shit over.  About the only
	thing I have talked about that this falls short of is hacking a
	government compter, and thats one of the Grand daddies of them all. 
	Well, although it is a major crime, it is really cool!!!!  This is
	the process in which you find the card number of someone and use it
	to purchase things.  In order to card, there are a few things that
	you must have or it will not work.  You will need to have........

	     1. The Card Number
	     2. The Experation date
	     3. Card type (Master Card, Visa, etc...)

	Those are the main things tha you will need.  Having the name of
	the owner is very helpfull but it is not a must.  You can get by
	without it. You have to order everything you want by mail.  A
	couple of "Beginner" carder that I talked to didn't understand how
	you would do it, but thats when they had the misconception that you
	actually go to the store and purchase things.  That is a complete No, 
	no. You do everything from a phone ordering service. When you call make 
	sure that you are a t a pay phone.  Don't do it your house or anywhere 
	where it can come back to you.  When you order the merchandice, once 
	again do send it to anywhere that it can come back to you like your 
	home, work, etc.  Find a vacant house or building or anywhere else 
	that you can send it to. Also, don't send it to a P.O. box that you 
	have, just as dangerous.

                                  - 145 -


	When you do order it and you think its around the time that you 
	will be reciving it, check the mailbox frequently.  But do it 
	during odd hours.  I mean, hows it going to look you taking a
	package from a vacant house? Most bills are sent at the end of the
	month or at the biginning, so try to time it to where the bill
	won't come to the person untill a couple of days after you have
	recived the package.  Ok heres how to figure it.  I have found out
	that the bills are sent out up around the 26-30th of the month, so
	they will actually recive the bill around the 31-4th.  Have it sent
	right after you think the bill has been sent. Find what you want,
	but try to order it from the place that guarentees the fastest
	delivery.  When you order the item, make sure they have it in stock
	and don't have to get the item in first.  Order the highest class
	of delivery but not COD or next day service.  Thats cutting it too
	close.  It should take around 2-4 weeks before you get it and if
	you timed it right, then it sound get there right before the person
	gets the bill.  You need to have it in your possesion before the
	bill gets to the person because if they complain, they can keep it
	from being sent, or watch who actually gets it even while its going
	throught the mail process. Don't order more than a couple of things
	or overcharge the card, if the people at the Credit card office,
	see irregular charging on the card, they will follow up on it. To 
	actually order the item you will call up the place that you will be 
	ordering from, and when the operator answers let her know what you 
	need to as far as what you are purchasing, etc. When she ask how you 
	will be paying just tell her "Charge" and the the type of card like 
	Master Card, Visa, ect.  Then Tell them your name, if you don't know 
	the name of the actuall owner of the card, Make up a false name that 
	has NO relation to your name, not the same first, last middle what 
	ever, nothing relating to your real name.  Then continue answering all 
	the operators questions, address (Not your own remember!) state, area 
	code etc.  They will also ask for your phone number. Make one up, not 
	your own.  If something happens to go wrong as far as delivery or if 
	they are checking if you are who you say, then your screwed, unless of 
	course, hehehe, the number is ALWAYS busy. Find the busiest number 
	there is and leave them that. When they ask for the card number and 
	experation, just tell them and do what all else you need. Wish them a 
	good day, and hope you get it. Ok heres how you check if the card is 
	good, and how much money can be charged on the card.......

	1. Dail 1-800-554-2265
	2. it will ask for the type of the card.  you must put in 10 for
	   Master Card and 20 for Visa, I am not sure about the others. 
	3. Next it will ask for the Identification.  You will need to enter
	   1067 
	4. After all that you will have to enter the Mecrchant number,
	   which you will either need to put in 24 or 52.  One of them 
	   should work.


                                  - 146 -

	5. You will then have to enter (When Prompted) the card number    
	   itself.
	6. Next, the experation date of the card.
	7. Last but not least the amount you want to try to get on the
	   card. The procedure for this is enter dollars, astricks, then
	   cents. (Example:) 100*30 = One hundred dollars and thirty cents.
	   One thing I do need to mention, after you type in everything you
	   must press pound (#).  Like when it asks you for the type of card,
 	   if you had a Master Card you would put:  10#.  when it asked for
	   identification you would enter 1067#.  If it says invalid, that
	   either means that the card is no good or you can't charge that 
	   amount on the card.  Try it again, but try a lower amount.  If 
	   you get down to $1 and it still doesn't work, hehehe, you can 
	   probably guess that the card is no good. You might not be ordering 
	   just merchandice you might be ordering accounts and things like that 
       and if you are, fine, but you have to remember, the accounts do not 
	   stay good for very long, the owner of the card gets the bill, 
	   complains and its no longer any good.  And when you card and 
	   account, Nine out of ten times, they won't kill the account, they 
	   will trace in and that is when you butts really in a sling.  So 
	   carding accounts and things, isn't the safest way to go, of course. 
	   nothing we have talked about it, right?

	 Conclusion:
	~~~~~~~~~~~~~~

	Well thats about it for now, there should be a BIG newsletter by
	The mickey Mouse Club comming out soon that you have to be sure NOT
	to miss. I sincerely hope that you have gotten alot out of this
	newsletter and I would like to ask for suggestions and Ideas to
	make MMC a better orginazation.  At this time myself and Cardiac
	Arresst have a Vmb at:  1-800-444-7207 [Ext] 4001. All ideas and
	suggestions, please bring there.  Also, since your making the trip
	anyways, bring along some phreaking codes and all and any types of
	accounts.  I would be greatly appreciated by: The Mickey Mouse
	Club.
















                                  - 147 -


	LOD/H BUST By Pizza Man

	             " U.S. computer investigation targets Austinites "
	           ------------------------------------------------------
	[ The above caption high-lighted the Saturday March 17, 1990
	edition of the Austin American-Statesman [ Austin, Texas ].  The
	article has been copied in its entirety, and the main point for
	typing this up was because of the involvement of the LOD/H
	throughout the article. ]

	The U.S. Secret Service has seized computer equipment from two
	Austin homes and a local business in the past month as part of a
	federal investigation into electronic tampering with the nation's
	911 emergency network. Armed Secret Service agents, accompanied by
	officers from the Austin Police Department, took the equipment in
	three March 1 raids that sources say are linked to a nationwide
	federal inquiry coordinated by the Secret Service and the U.S.
	attorney's office in Chicago. While federal officials have declined
	to comment on the investigation - which focuses on a bizarre mix of
	science fiction and allegations of high-tech thievery - the Austin
	American-Statesman has learned that the raids targeted Steve
	Jackson Games, a South Austin publisher of role-playing games, and
	the home of Loyd Blankenship, managing editor at the company. A
	second Austin home, whose resident was acquainted with Jackson
	officials, also was raided. Jackson said there is no reason for the
	company to be investigated Steve Jackson Games is a book and game
	publisher of fiction, he said, and it is not involved in any
	computer-related thefts. The agents, executing search warrants now
	sealed by a judge from public view, took computer equipment,
	including modems, printers, and monitors, as well as manuals,
	instruction books and other documents.  The equipment has been
	forwarded to federal officials in Chicago. The Secret Service,
	best-known for protecting the president, has jurisdiction in the 
	case, government officials say, because damage to the nation's 
	telephone system could harm the public's welfare. In addition, 
	the system is run by American Telephone & Telegraph Co., a 
	company involved in the nation's defense. The 911 investigation 
	already has resulted in the indictment of two computer "hackers" 
	in Illinois and sources say federal authorities now are focusing 
	on Austin's ties to a shadowy underground computer user's group 
	known as the Legion of Doom.

	The hackers, who live in Georgia and Missouri, where indicted in
	Chicago. they are believed to be members of the Legion of Doom and
	are charged with seven counts, including interstate transportation
	of stolen property, wire fraud, and violations of the Computer
	Fraud and Abuse Act of 1986.  

	The government alleges that the defendants stole a computerized
	copy of Bell South's system that controls 911 emergency calls in
	nine states.  The information was then transferred to a computer 

                                  - 148 -


	bulletin board and published in a hacker publication known as
	Phrack! A trial in the case is scheduled to begin in June. U.S.
	agents also have seized the final drafts of a science fiction
	game written by the Austin-based game company.  Sources say the
	agents are trying to determine whether the game - a dark,
	futuristic account of a world where technology has gone awry - is
	being used as a handbook for computer crime.  Steve Jackson, the
	owner of the local company and a well-known figure in the
	role-playing game industry, said neither he nor his company has
	been involved in tampering with the 911 system.
	
	No one in Austin has been indicted or arrested as a result of the
	investigation.  "It is an on-going investigation.  That is all I
	can say," said Steve Beauchamp, special agent-in-charge of the
	Secret Service Austin field office.  "Until we can put it all 
	together, we just do not comment," he said.

	Bob Rogers, Jackson's Dallas attorney, said federal officials have
	assured him that neither Jackson nor Jackson Games is the target of
	the probe.  The authorities would not tell Rogers whether the
	inquiry focused on other company employees.  As for the science
	fiction game, called Cyberpunk, Jackson said federal authorities
	have mistaken a fictional work for a technical manual [E.N. Why
	does this sound all  too familiar?] . "It's not a manual for
	computer crime any more than a Reader's Digest story on how to
	burglar-proof your house is a manual for  burglars," said Jackson,
	36.  "It's kind of like the hints you get on safe-cracking from a
	James Bond movie." 

	Blankenship, the author of the book, said his attorney has advised
	him not to comment on the book or the Secret Service investigation.
	Jackson said he guesses his company was linked to the 911 probe by
	its use of a computer bulletin board system, called Usenet.  The
	board, one of hundreds throughout the country, is a sort of
	electronic Town Square, where personal computer users from
	throughout the world can tap into the system via phone lines and a
	modem.

	The network, free and relatively unregulated, is an information
	exchange where users can post information, exchange electronic
	messages and debate with keyboards everything from poetry and
	politics to nuclear war. One of the world's largest networks -
	boasting more than 600,000 users - Usenet was tapped by Chinese
	students in North America to organize support for students during
	the pro-democracy demonstrations last year.  The network also was
	infected in 1988 by a now-famous computer "virus" unleashed by
	college student Robert Morris. Jackson said his company has
	maintained a bulletin board on the Usenet network on which it posts
	advanced copies of its role-playing games.  The firm posts the games 
	and requests that the users of the network comment on the text and 
	propose improvements. The Jackson bulletin board, called Illuminati, 
	greets users with the 

                                  - 149 -


	company's logo and a message that states: "Welcome to the
	World's Oldest and Largest Secret Conspiracy." Over the past
	several months, the company has been posting drafts of Cyberpunk
	for review. The resident of the second Austin home raided by the
	Secret Service was acquainted with Jackson and had made comments
	about the game on  Usenet.  He asked to remain anonymous. Typical
	of Cyberpunk literature, the game is set in a bleak future,  much
	like the world portrayed in Max Headroom, formerly a network 
	television program. Computers and technology control people's
	thoughts  and actions and are viewed both as a means of oppression
	and as a method  of escape.  Portions of Jackson's Cyberpunk viewed
	by the Austin American  Statesman include a detailed discussion on
	penetrating government computer  networks and a list of fictitious
	programs used to break into closed  networks.  Bruce Sterling, an
	Austin science fiction writer and one of  the world's best-known
	Cyberpunk writers, said Jackson's game and its  computer-related
	discussions are hardly unusual for the genre. "Cyberpunk is
	thriller fiction."  Sterling said. "It deals to a  great extent 
	with the romance of crime in the same way that mysteries  or 
	techno-thrillers do."  He said the detailed technical discussions 
	in the Jackson games are what draws people to them.  "That's the charm 
	of simulating something that's supposed to be accurate.  If it's 
	cooked up out of thin air, the people who play these games are  going 
	to lose interest."

	Jackson, though, said he has been told by Secret Service agents
	that they view the game as a user's guide to computer mischief.  He
	said they made the comments where he went to the agency's Austin
	office in an unsuccessful attempt to reclaim some of his seized
	equipment.  "As they were reading over it, they kept making
	outraged comments," Jackson said. "When they read it, they became
	very, very  upset.  "I said, 'This is science fiction.'  They said,
	'No.  This is real.'" The text of the Cyberpunk games, as well as
	other computer equipment taken from Jackson's office, still has not
	been returned. The company now is working to rewrite portions of
	the book and is hoping to have it printed next month.  In addition
	to reviewing  Cyberpunk, sources say federal authorities currently
	are investigating  any links between local computer hackers and the
	Legion of Doom.  The  sources say some of the 911 information that
	is the subject of Chicago  indictments has been traced to Austin
	computers. Jackson's attorney said federal officials have told him
	that  the 911 information pilfered from Bell South has surfaced on
	a computer  bulletin board used at Steve Jackson games.  But the
	information  apparently has not been traced to a user.  Jackson
	said that neither  he nor any of his employees is a member of
	the Legion of Doom. Blankenship, however, did consult with the
	group in the course of researching the writing the Cyberpunk game,
	Jackson said. Further, the group is listed in the game's
	acknowledgments for its aid in providing technical information used
	in Cyberpunk.  For these reasons he believes Blankenship is 

                                  - 150 -


	a local target of the federal probe, though none of the
	investigators has yet confirmed his suspicion. "My opinion is that
	he is (being investigated)," Jackson said,  "If that's the case,
	that's gross. he had been doing research for what he hoped would be
	a mass-market book on the computer underground," Jackson said. The
	other Austin resident raided by the authorities, who asked to
	remain anonymous, acknowledged that he is the founding member of 
	the Legion of Doom and that copies of the 911 system had surfaced
	on  the group's local bulletin board.  The 20-year-old college
	student  said the information hardly posed any threat to the 911
	system.  "It was nothing," he said.  "It was garbage, and it was
	boring." In the Chicago indictment accuses the group of a litany of
	electronic abuses, including: disrupting telephone service by 
	changing the routing of telephone calls; stealing and modifying 
	individual credit histories; stealing money and property from  
	companies by altering computer information; and disseminating  
	information about attacking computers to other computer hackers. 
	The Austin Legion of Doom member said his group's worst crime is 
	snooping through other people's computers.  "For the most part, 
	that's all we do," he said.  "No one's out ripping off people's 
	credit cards.  No one's out to make any money. "We're just out to 
	have fun." The group member said the fact that the legion is shrouded 
	in mystery adds to its mystique - and to the interest law enforcement
	agents have in cracking the ring.  "It's an entirely different
	world," the student said.  "It's a very strange little 
	counter-culture.  "Everybody who exists in that world is familiar
	with the Legion of Doom," he said.  "Most people are in awe or are
	intimidated by it."

	A shadowy gang of computer hackers with ties to Austin has become
	the target of a massive federal probe into the nation's high-tech
	underground. Federal and local authorities involved in the inquiry
	seized evidence from three Austin homes and a business in March. 
	They say some action on the local cases, possibly including
	indictments or arrests, is expected in the next month.

	The computer crime crackdown - the largest ever launched by the
	U.S. government - has resulted in the temporary disbanding of the
	Legion of Doom, a notorious national group of young computer
	hobbyists with at least two Austin members. State and federal
	investigators say the 6-year-old group, which once boasted more
	than 150 members in nearly every U.S. state, has been connected
	to a string of computer crimes in Texas, Georgia, Arizona,
	Illinois, California and New Jersey. Officials say group members
	have electronically stolen money and long-distance telephone access
	numbers, changed credit reports, planted datadestroying computer
	viruses in government networks, attempted to tamper with hospital
	patient records, and distributed information that, if used, could
	have debilitated the nation's 911 emergency response network. So 
	far, only four Legion of Doom members have been indicted for the 
	crimes, and none has gone to trial. However, an investigation team

                                  - 151 -


	coordinated by Assistant U.S. Attorney William Cook in Chicago and 
	including the secret Service, the U.S. Department of Justice, the 
	FBI	and a handful of state attorney generals, has in the past six 
	months raided the homes and businesses of about a dozen suspected 
	legion members across the country. In Austin, Secret Service agents,
	local police and officers from the University of Texas Police 
	Department seized computer equipment and documents from three homes 
	as part of the probe. One local business, a role-playing game-
	publishing company called Steve Jackson Games, also was raided in 
	the March crackdown, but officials say the firm is not a primary 
	target of the hacker investigation.  The firm is believed to have 
	been raided because investigators wanted to examine equipment used 
	by an employee. The search warrants used in the raids remain sealed 
	from public view, and Secret Service and UTPD officials declined to
	comment on the case. Law enforcement sources say one of the targets
	of the Austin investigation is a juvenile who is not believed to be
	a member of the hacker group. The two other Austinites under
	investigation are legion members, authorities say, and have been
	linked to the 911 probe centered in Chicago. According to law 
	enforcement sources, the two men helped circulate information about 
	the 911 system's software through a national bulletin board network 
	that hackers could call by using a telephone, a computer and a modem. 
	In addition, details about ways to tamper with the emergency system 
	were published in Phrack, a legion newsletter. While no one in Austin 
	has been indicted or arrested, officials said they expect some action 
	on the local cases in the next month. And state and federal authorities 
	involved in the national investigation say they are preparing dozens of
	additional indictments aimed at the entire membership roster of the 
	Legion of Doom. "It doesn't matter whether you commit a burglary by 
	telephone or by breaking into a building," said Gail Thackeray, an 
	assistant attorney general in Arizona, one of a handful of state 
	investigators working solely on computer crime. "Did they expect that 
	the rest of us would sit by and let every idiot kid in America break 
	into our 911 system?" she said. "I do not respect the right of hackers 
	to learn what they want to learn at the expense of the rest of us." 
	Thackeray, who helped investigate a hacker's attempt to break into 
	the computer system at the Barrow Neurological Institute in Phoenix, 
	said the recent legion crackdown is a result of improved coordination 
	among law enforcement agencies with jurisdiction over computer crime.
	In addition, she said, the effort has been boosted by a new breed of
	investigators with computing expertise. Because of the potential
	for widespread damage to both government and business computer
	systems, officials say the hacker probe has caught the eye of the
	Justice Department, which is pushing U.S. attorneys throughout the
	country to beef up their computer crime-fighting capacity. "There
	is a push on Capitol Hill to shore up our activity in this area,"
	said an assistant U.S. attorney who asked not to be named.  "I
	think this is the beginning of a boom." Said Thackeray: "There's
	more computer crime going on out there than any one agency can

                                  - 152 -


	handle. We're totally flooded." For members of the Legion of Doom, 
	the unwanted law enforcement attention is nothing new. Formed in 84 
	and named for a gang at took on Superman and other heroes in the 
	television cartoon Superfriends, the group has survived two other 
	waves of criminal investigations. The first, in 1985, resulted in 
	the Arrrest and conviction of five of the legion's founders for credit 
	card fraud and theft by wire.  After a brief resurgence, group
	members again were arrested en masse in 1987, only to revive again
	in 88. But according to investigators familiar with the group,
	pressure form the recent legion crackdown is the most intense to
	date.  Several of the investigators said the legion has shut down,
	at least for now. A history of the group written by one of its
	founders and obtained by the Austin American- Statesman seems to
	bear out investigators' suspicions. The 10- page document recounts
	significant developments in the group's history, from its founding
	in 1984 (an event "that would ulti- mately change the face of the
	computer underground forever," the brochure states), to its
	current, besieged status. The pamphlet acknowledges that "there is
	no indication that points to a resurgence in the future" and ends
	with the words "Legion of Doom (84-90)." The brochure also takes
	potshots at federal investiga- tors and the media, often accused by
	legion members of exaggera- ting their crimes and sensationalizing
	the group. "The Legion of Doom has been called everything from
	'organized crime' to a 'communist threat to national security' to
	an 'international conspiracy of computer terrorists bent on
	destroying the nation's 911 service,'" the brochure states.
	"Nothing comes closer to the actual truth than 'bored adolescents 
	with too much spare time.'" Finally, the legion history includes an 
	"alumni" list that conttains the code names of 38 current and former 
	members. According to the legion's own accounting, 14 of the 38 people 
	on the list have either been convicted of computer crimes or are under
	investigation. Officials familiar with the group say the legion's
	characterization of itself as a clique of bored whiz  kids is
	inaccurate. Instead, they portray group members as sophisticated
	and organized malcontents who do not accept conventional concepts
	of respect and trust. "These are not just wacky kids," Thackeray
	said.  "They have absolute contempt for the rest of us." "They are
	constantly in a high-level skill kind of game, part of a thrill.
	They've totally lost touch with reality." William Murray, a systems
	security fellow for the Ernst & Young accounting firm, said even
	though hackers take advantage of the tremendous power of personal
	computers, they still view their crimes as an electronic game of
	cat and mouse. "This whole sense of excitement and joy is not
	tempered," Murray said. "Nobody has told them that they have a
	responsibility for polite behavior." Some states, including
	Arizona, are developing treatment programs for hackers.  Patterned
	after Alcoholics Anonymous and drug-treatment centers, the programs
	are aimed at rehabilitating hackers who have grown dependent on
	their craft. "It is absolutely addictive behavior," Thackeray said. 
	"When they get their hands on tools as powerful as these computers,
	they lost all judgement."

                                  - 153 -


	Operation "Sun-Devil"  by Phreak_Accident
	=====================
	     May 9th and 10th brought on two day thats would be marked in
	every hackers history book.  The reason we assume these days will
	be important to many, is that maybe it's time we opened are eyes
	and saw the witch hunt currently in progress. In less than 48
	hours, 150 Secret Service men and other law officials served 30
	search warrents in 14 cities around the nation (This thing was
	hudge). Operation "Sun-Devil" (As the Attorney General in Phoenix
	called it), was a success on their part. "The investigation though
	is not over,  and there are more warrents to be executed.", said
	Jim Folwer of L.A's Secret Service. Any details of the
	investigation are not being given out at this time. The Asst. 
	Attorney General of Pheonix told Phrack Inc. that there were
	other problems involving the investigation and that it was an
	ongoing investigation for the last TWO years. It is my
	understanding that Gail Thackeray and the Secret Service are not,
	taking this lightly.  She told Phrack inc. that they are not
	distinquishing pirates, hackers, or phreakers.  Basically, it's any
	kid with a modem that calls a BBS with an alias.  Yes, we are the
	witches, and we are being hunted.

	The following are Two news releases obtianed via fax through the
	U.S. Secret Service for Phrack Inc.

	N E W S     R E L E A S E
	FOR IMMEDIATE RELEASE      CONTACT:  Gail Thackeray
	------------------------   Assitant Attorney General
	May 9, 1990 @ 11:00 A.M.   (602) 542-4266



	Attorney General Bob Corbin announced today that in connection with
	an eighteen-month joint investigation into computer crime conducted
	with the United States Secret Service and the United States
	Attorney's office, the Arizona Attorney General's office has
	executed seven search warrants in which computers, electronic
	bulletin boards, telephone test equipment and records have been
	seized. The Organized Crime and Racketeering Division investigation
	involved complaints by Arizona and out of state victims of
	substantial financial losses resulting from credit card fraud and
	theft of long distance telephone and data communications services,
	and by victims of attacks on computer systems operated by
	government agencies, private corporations, telephone companies, 
	financial institutions, credit bureaus, and a hospital. The Arizona 
	Attorney General's office received information and technical 
	assistance from the Glendale, Arizona Police Department's Computer 
	Crime Unit, and from many private sector sources, including Bellcore 
	(Bell Communications Research), American Express, Communications 
	carriers U.S. Sprint, AT&T, MCI,Com Systems, MidAmerican 
	Communications, LDL Communications, and Shared Use Network. Without 
	the cooperation of these companies and of numerous federal,

                                  - 154 -


	state and local law enforcement agencies around the country, this 
	investigation would have been impossible. The privacy of our citizens 
	and the health of our economy depend upon secure, reliable computer 
	systems. Computer fraud and attempts to compromise senstitive public 
	and private computer systems will not be tolerated. Individuals who 
	commit these offenses in Arizona can expect to be prosecuted. 

	.end.
    	       P R E S S     R E L E A S E


	FOR IMMEDIATE RELEASE         Contact:  Wendy Harnagel
	Wednesday, May 9, 1990        United States Attorney's Office
	----------------------        (602) 379-3011


	PHOENIX -- Stephen M. McNamee, United States Attorney District of
	Arizona,
	Robert K. Corbin, Attorney General for the State of Arizona, and
	Henry R. Potosky, Acting Special Agent in Charge of the United
	States Secret Service Office in Phoenix, today announced that
	approximately twenty-seven search warrants were executed on Monday
	and Tuesday, May 7 and 8, 1990, in various cities across the nation
	by 150 Secret Service agents along with state and local law
	enforcement officials.   The warrants were issued as a part of
	Operation Sundevil, which was a two year investigation into alleged
	illegal computer hacking activities. The United States Secret
	Service, in cooperation with the United States Attorney's Office,
	and the Attorney General for the State of Arizona, established an
	operation utilizing sophisticated investigative techniques,
	targeting computer hackers who were alleged to have trafficked in
	and abuse stolen credit card numbers, unauthorized long distance
	dialing codes, and who conduct unauthorized access and damage to
	computers. While the total amount of losses cannot be calculated at
	this time, it is estimated that the losses may run into the millions 
	of dollars.  For example, the unauthorized accessing of long distance 
	telephone credit cards have resulted in uncollectible charges.  The 
	same is  true of the use of stolen credit card numbers. Individuals are
	able to utilize the charge accounts to purchase items for which no
	payment is made. Federal search warrants were executed in the following 
	cities: Chicago, IL - Cincinatti, OH - Detroit, MI - Los Angeles, CA 
	Miami, FL - Newark, NJ - New York, NY - Phoenix, AZ - Pittsburgh, PA - 
	Plano, TX - Richmond, VA - San Diego, CA San Jose, CA

	Unlawful computer hacking imperils the health and welfare of
	individuals, corporations and government agencies in the United
	States who rely on computers and telephones to  communicate.
	Technical and expert assistance was provided to the United States 

                                  - 155 -


	Secret Service by telecommunication companies including Pac Bel,
	T&T, Bellcore, Bell South, MCI, U.S. Sprint, Mid-American,
	Southwestern Bell, NYNEX, U.S. West, and by the many corporate
	victims.  All are to be commended for their efforts for their
	efforts in researching intrusions and documenting losses. McNamee
	and Corbin expressed concern that the improper and alleged illegal
	use of computers may become the White Collar crime of the
	1990's.  McNamee and Corbin reiterated that the state and federal
	government will vigorously pursue criminal violations of statutes
	under their jurisdiction. Three individuals were arrested yesterday
	in other jurisdictions on collateral or independent state charges.
	The investigations surrounding the activities of Operation Sundevil
	are continuing. The investigations are being conducted by agents of 
	the United States Secret Service and Assistant United States  
	Attoryney Tim Holtzen, District of Arizona, and Assistant Arizona 
	Attorney General Gail Thackery. 

	.end.
	_________________________________________________________________
	RIPCO      May 8th, 1990
	-----      -------------
	Operation Sun-Devil claimed more than just a few "Codelords" around
	the states, it claimed one of the oldest and more popular boards. 
	Nobody knows when or if RIPCO shall return. Reportedly, Dr. Ripco
	was charge on a hand-gun violation after his house was searched. 
	Phrack inc. can't comment on this. The following is the exact
	transcript of the message left on RIPCO's answering
	maching after Operation Sun-Devil.
	- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
	This is 528-5020. As you are probably aware, on May 8, the Secret
	Service conducted a series of raids across the country.  Early news
	reports indicate these raids involved people and computers that
	could be connected with credit card and long distance toll fraud.
	Although no arrests or charges were made, Ripco BBS was confiscated
	on that morning.  It's involvement at this time is unknown. Since
	it is unlikely that the system will ever return, I'd just l say
	goodbye, and thanks for your support for the last six and a half
	years. It's been interesting, to say the least. 

	Talk to ya later.
	  {Dr. Ricpo}

	                 *** END OF VOICE MESSAGE ***

	_________________________________________________________________
	{C}omputer {E}mergency {R}esponse {T}eam
	----------------------------------------

	Some call it "Internet Police" -- Others call it "just stupid."
	CERT however is a mix.    But I do give them credit -- After all,
	have your number one goal being 'making the Internet more secure'
	has to be a tough task. Therefore, we give them credit. However, 

                                  - 156 -

	CERT is funded by DARPA, which is a government agency.  And
	anything in my book that the government runs is bad news.  Yes,
	the government pays the 6 man salary and keep their hot-line active
	24 hours a day.  Ahh..  What do you know about CERT?  "Nothing" you
	say?  Well, the following is the press release and other reprints
	of information about CERT. 
	- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 
      
	Richard Pethia <rdp@SEI.CMU.EDU>

	DEAR XXXXXXXXX,
	I have been reviewing our correspondence files and have discovered
	that your request for information may not have been filled.  I
	apologize for the delay and hope that the information is still
	useful to you.  If, after reading the following, you have
	additional questions or would like to subscribe to one of
	our information lists, please send email with your
	question/request.

	The Computer Emergency Response Team (CERT) was established by the
	Defense Advanced Research Projects Agency in November of 1988 to
	serve members of the Internet Research community.  The press
	release below describes the general role of the CERT. More
	specifically, the CERT supports individual Internet sites by:
	-Working with site personnel to help resolve individual computer
	security  incidents.  Contact potentially affected sites to warn
	them of possible security breaches.  Work with sites to change the
	conditions that allowed incidents to occur. -Issuing advisories
	that alert the community to specific system vulnerabilities or
	intrusion techniques, as well as the methods to protect against 
	them. -Working with the community and system (primarily Unix) vendors 
	to reslove specific system vulnerabilities. -Maintaining and 
	operating moderated mailing lists that: (1) provide a discussion 
	forum for tools and techniques to improve the security of Unix 
	systems, and (2) provide a discussion forum and alert mechanism for 
	PC viruses, trojan horses, etc. Over the past year we have developed 
	hundreds of working relationships with members of the Internet and 
	other communities and have established an extensive information 
	collection and dissemination network.  Because of this network of
	cooperating individuals and organizations, we are often able to
	advise the community of problems allowing them to take corrective
	action before being affeceted by those problems.

	                                  No.  597-88
	                                 (202) 695-0192 (Info.)
	                                 (202) 697-3189 (Copies)
	IMMEDIATE RELEASE  12 6, 1988    (202) 697-5737 (Public/Industry)

	     DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM

	The Defense Advanced Research Projects Agency (DARPA) announced 

                                  - 157 -


	today that it has established a Computer Emergency Response Team
	(CERT) to address computer security concerns of research users of
	the Internet, which includes ARPANET. The Coordination Center for
	the CERT is located at the Software Engineering Institute (SEI),
	Carnegie Mellon University, Pittsburgh, PA. In providing direct
	service to the Internet community, the CERT will focus on the
	special needs of the research community and serve as a prototype
	for similar operations in other computer communities.  The National
	Computer Security Center and the National Institute of Standards
	and Technology will have a leading role in coordinating the
	creation of these emergency response activities. The CERT is
	intended to respond to computer security threats such as the recent
	self-replicating computer program ("computer virus") that invaded
	many defense and research computers. The CERT will assist the
	research network communities in responding to emergency situations. 
	It will have the capability to rapidly establish communications
	with experts working to solve the problems, with the affected
	computer users and with government authorities as appropriate. 
	Specific responses will be taken in accordance with DARPA policies. 


	It will also serve as a focal point for the research community for
	identification and repair of security vulnerabilities, informal
	assessment of existing systems in the research community,
	improvement to emergency response capability, and user security
	awareness. An important element of this function is the development
	of a network of key points of contact, including technical experts,
	site managers, government action officers, industry contacts,
	executive level decision-makers and investigative agencies, where
	appropriate. Because of the many network, computer, and systems
	architectures and their associated vulnerabilities, no single
	organization can be expected to maintain an in-house expertise to
	respond on its own to  computer security threats, particularly
	those that arise in the research community.  As with biological
	viruses, the solutions must come from an organized community
	response of experts.  The role of the CERT Coordination Center at
	the SEI is to provide the supporting mechanisms and to coordinate
	the activities of experts in DARPA and associated communities. The
	SEI has close ties to the Department of Defense, to defense and
	commercial industry, and to the research community.  These ties
	place the SEI in a unique position to provide coordination support
	to the software experts in research laboratories and in industry
	who will be responding in emergencies and to the communities of
	potentially affected users. 

	The SEI is a federally-funded research and development center,
	operating under DARPA sponsorship with the Air Force Systems
	Command (Electronic Systems Division) serving as executive agent. 
	Its goal is to accelerate the transition of software technology to
	defense systems.  Computer security is primarily a software 


                                  - 158 -


	problem, and the presence of CERT at the SEI will enhance the
	technology transfer mission of the SEI in security-related areas.

	                         -END-

	QUESTIONS AND ANSWERS:   DARPA ESTABLISHES CERT, 12/6/88
	Q: Can you provide background on earlier break-ins?
	A: On November 2, 1988, thousands of computers connected to       
	   unclassified DoD computer networks were attacked by a virus.   
	   Although the virus did not damage or compromise data, it did   
	   have the effect of denying service to thousands of computer    
	   users.  The computer science research community associated     
	   with the Defense Advanced Research Projects Agency (DARPA),    
	   along with many other research laboratories and military sites 
	   that use these networks, quickly responded to this threat.     
	   They developed mechanisms to eliminate the infection, to block 
	   the spread of the self-replicating program, and to immunize
	  against further attack by similar viruses.  Software experts   
	  from the University of California at Berkeley, with important  
	   contributions from the Massachusetts Institute of Technology   
	   and other network sites, rapidly analyzed the virus and        
	   developed immunization techniques.  These same software        
	   experts also provided important assistance in the more recent  
	   Internet intrusion of 27-28 November.  As the events unfolded, 
	   DARPA established an ad hoc operation center to help           
	   coordinate the activities of software experts working around   
	   the clock and to provide information to appropriate government 
	   officials.  The operations center had three main tasks.  It    
	   facilitated communications among the many groups affected, it  
	   ensured that government organizations were promptly informed   
	   of developments, and it provided initial technical analysis in 
	   DoD.  Although the threat was contained quickly, a more        
	   maliciously designed virus could have done serious damage. The 
	   recent events serve as a warning that our necessarily          
	   increasing reliance on computers and networks, while providing 
	   important new capabilities, also creates new kinds of          
	   vulnerabilities.  The Department of Defense considers this an  
	   important national issue that is of major concern in both the  
	   defense and commercial sectors.  The DoD is developing a       
	   technology and policy response that will help reduce risk and  
	   provide an emergency reaction response. 

	Q: Who will be on the CERT?

		A: The CERT will be a team of over 100 experts located throughout 
		   the U.S. whose expertise and knowledge will be called upon     
		   when needed. When not being called upon, they will continue    
		   their normal daily work.  As noted in the release, these       
		   experts will include: technical experts, site managers,        
		   government action officers, industry contacts, executive-level 
		   decision-makers and representatives from investigative         
		   agencies. recommendations that will be acted upon by DoD       
		   authorities.
                                  - 159 -


	Q: Is the CERT fully operational now?

	A: We are in the very early stages of gathering people for the    
	   CERT. We are first concentrating on collecting technical       
	   experts.  A staff is in place at SEI, but details are still    
	   being worked out. 

	Q: Will there just be one CERT?

	A: The intent is that each major computer community may decide to 
	   establish its own CERT.  Each CERT will therefore serve only a 
	   particular community and have a particular technical           
	   expertise.  (The DARPA/SEI CERT will serve, for example, the   
	   research community and have expertise in Berkeley-derived UNIX 
	   systems and other systems as appropriate.)  The National       
	   Computer Security Center and the National Institute of         
	   Standards and Technology will support the establishment of the 
	   CERTs and coordinate among them. 

	Q: What are the special needs of the research community that      
	   their CERT will serve?

	A: The special challenge of the research community is improving   
	   the level of computer security without inhibiting the          
	   innovation of computer technology.  In addition, as is often   
	   DARPA's role, their CERT will serve as a prototype to explore  
	   the CERT concept so that other groups can learn and establish  
	   their own.

	Q: Does the CERT Coordination Center have a press point of        
	   contact?

	A: No. Their function is to serve as a nerve center for the user  
	   community.

	.end
	_________________________________________________________________ 
	USA Today and the devil
	-----------------------

	Many controversies have been made of the article printed in USA 
	Today after Operation Sun-Devil took it's toll.

	 Phrack inc. tried to contact the author, and with no luck she wast
	accepting phone calls.   Please remember, this is only a USA Today
	article -- C'mon, get real USAT.


	byline 'Debbie Howlett, USA Today' reads:

	A network of computer hackers operating in 14 cities -- which
	bilked phone companies of $50 million -- has been unplugged, police
	say.

                                  - 160 -


	"We're not talking about somebody who played Space Invaders too
	many times," says Tim Holtzen, spokesman for the U.S. attorney in
	Phoenix.

	The hackers -- the largest such ring discovered in the USA --broke
	into phone company and bank computer systems to obtain account
	numbers and run up an unknown total in debts, police say.
	
	"The main thing is the life-threatening information these computer
	hackers were trying to get into," says Richard Adams of the Secret
	Service.  "It goes beyond being monetary to totally mischievous." 

	The ring was uncovered 18 months ago, when members tried and failed
	to infiltrate computers at Barrows Neurological Institute in
	Phoenix.

	They later tried to block incoming calls to the 911 emergency
	service in Chicago.  The motivation?  "The primary reason is as
	kind of a malicious hobby." says Gary Chapman of Computer
	Professionals for Social Responsibility.  "People are interested in
	testing their skills against security measures." But, Adams says,
	"I hate to minimize it by saying it was just for kicks."

	Police seized 40 computers and 23,000 disks during searches Tuesday
	in 14 cities, officials said Wednesday.  Five men, between the ages
	of 19 and 24, have been arrested.

	What's been uncovered so far, says Holtzen, may be "just the tip of
	the iceberg."




















       


                                  - 161 -


	THE ART OF INVESTIGATION By The Butler

	There are many ways to obtain information about individuals.  I am
	going to cover some of the investigative means of getting the low
	down on people whom you wish to know more about.

	Some of the areas I will cover are:

	Social Security Checks
	Driving/Vehicular Records
	Police Reports
	FBI Records
	Insurance Records
	Legal Records
	Credit Bureau Checks
	Probate Records
	Real Estate Records
	Corporate Records
	Freedom Of Information Act
	Governmental Agency Records
	Maps
	Tax Records

	To obtain information from some organizations or some individuals
	one must be able to "BULLSHIT"!!! Not only by voice but in writing. 
	Many times you must write certain governmental bodies requesting
	info and it can only be done in writing.  I can't stress enough the
	need for proper grammer and spelling. 

	For you to obtain certain information about another person you must
	first get a few KEY pieces of info to make your investigation
	easier.  The persons Full Name, Social Security Number, Date &
	Place of Birth will all make your search easier and more complete.

	First of all in most cases you will know the persons name you want
	to investigate. If not you must obtain it any way you can.  First
	you could follow them to their home and get their address.  Then
	some other time when they are gone you could look at their mail or
	dig through their trash to get their  Full Name. While in their
	trash you might even be able to dig up more  interesting info like: 
	Bank Accout Numbers, Credit Card Numbers, Social Security Number, 
	Birth Day, Relatives Names, Long Distance Calls Made, etc.

	If you can't get to their trash for some reason take their address
	to your local library and check it against the POLKS and COLES
	Directories.  This should provide you with their Full Name, Phone
	Number, Address, and how long they have lived at the current
	location.

	You can also check the Local Phone Book, Directory Assistance, 


                                  - 162 -


	City Directories, Post Office, Voter Registration, Former
	Neighbors, Former  Utilities (water, gas, electric, phone, cable,
	etc.)

	If you know someone who works at a bank or car dealer you could
	have them run a credit check which will reveal all of their credit
	cards and if they have ever had any late payments or applied for
	any loans. If you are brave enough you could even apply for a loan
	impersonating the individual under  investigation The Credit Bureau
	also has Sentry Services that can provide  deceased social security
	numbers, postal drop box address and known  fraudulent information.

	You can get an individuals driving record by sending a letter to
	your states Department of Revenue, Division of Vehicles.  You can
	also get the following:

	Driver Control Bureau For Driving Record send Name, Address, Date
	of Birth and usually a $1  processing fee for a 5 year record.

	Titles & Registration Bureau For ownership information (current and
	past).

	Driver License Examination Bureau To see what vision was rated.

	Motor Carrier Inspection & Registration Bureau To check on
	licensing and registration of trucks/trucking companies.

	Revocation Dept Can verify if someone's driver's license has ever
	been suspended or revoked.

	You can even obtain a complete vehicle history by sending the
	vehicle description, identification # for the last registered
	owner, and a small fee. Send this info to your states Dept of
	Vehicles.  It is best to contact them first to get their exact
	address and fees.  I would advise using a money orders and a P.O.
	Box so they cannot trace it to you without a hassle.

	Police Records

	All Police and Fire Records are Public record unless the city is
	involved. You can usually get everything available from the police
	dept including: Interviews, maps, diagrams, misc reports, etc.


	FBI Records

	If the individual you are inquiring about is deceased the FBI will
	provide some info if you give them Full Name, SSN, Date & Place of
	Birth.  Contact you local FBI office to get the details.


                                  - 163 -


	Real Estate Records

	Recorder of Deeds offices in each county maintain land ownership
	records. Most are not computerized and you have to manually search. 
	Then you must review microfilm/fiche for actual deeds of trust,
	quit claim deeds, assignments, mortgage, liens, etc.

	A title company can run an Ownership & Equity (O&E) search for a
	fee  ($80-$100) which will show ownership, mortgage info,
	easements, taxes owned, taxes assessed, etc.

	Most county assessors will provide an address and value of any real
	property if you request a search by name.


	Social Security Records

	Social Security Administrator
	Office of Central Records Operations
	300 North Greene Street
	Baltimore, Maryland 21201
	301-965-8882

	Title II and Title XVI disability claims records, info regarding
	total earnings for each year, detailed earnings information show
	employer, total earnings, and social security paid for each quarter
	by employer.

	Prices are approximately as follows:

	1st year of records                        $15.00
	2nd-5th year of records                    $ 2.50 per person
	6th-10th year of records                   $ 2.00 per person
	11th-15th year of records                  $ 1.50 per person
	16th-on year of records                    $ 1.00 per person

	**  Call for verification of these prices.  **

	Social Security records are a great source of information when
	someone has been relatively transient in their work, or if they are
	employed out of a union hall.

	If you want to review a claim file, direct your request to the
	Baltimore office.  They will send the file to the social security
	office in your city for you to review and decide what you want
	copies of.

	The first three digits of a social security number indicate the
	state of application.




                                  - 164 -


	                 The Social Security Number

	SSA has continually emphasized the fact that the SSN identifies a
	particular record only and the Social Security Card indicates the
	person whose record is identified by that number. In no way can the
	Social Security Card identify the bearer. From 1946 to 1972 the
	legend "Not for Identification" was printed on the face of the
	card.  However, many people ignored the message and the legend was
	eventually dropped.  The social security number is the most widely
	used and carefully controlled number in the country, which makes it
	an attractive identifier.

	With the exception of the restrictions imposed on Federal and some
	State and local organizations by the Privacy Act of 1974,
	organizations requiring a unique identifier for purposes of
	controlling their records are not  prohibited from using (with the
	consent of the holder) the SSN. SSA records are confidential and
	knowledge of a person's SSN does not give the user  access to
	information in SSA files which is confidential by law.

	Many commercial enterprises have used the SSN in various
	promotional efforts. These uses are not authorized by SSA, but SSA
	has no authority to prohibit such activities as most are not
	illegal. Some of these unauthorized uses are: SSN contests;
	skip-tracers; sale or distribution of plastic or metal cards;
	pocketbook numbers (the numbers used on sample social security
	cards in wallets); misleading advertising, commercial enterprises
	charging fees for  SSN services; identification of personal
	property.

	The Social Security Number (SSN) is composed of 3 parts,
	XXX-XX-XXXX, called the Area, Group, and Serial.  For the most
	part, (there are exceptions), the Area is determined by where the
	individual APPLIED for the SSN (before 1972) or RESIDED at time of
	application (after 1972). The areas are assigned as follows:

	000     unused   387-399 WI    528-529 UT
	001-003 NH       400-407 KY    530     NV
	004-007 ME       408-415 TN    531-539 WA
	008-009 VT       416-424 AL    540-544 OR
	010-034 MA       425-428 MS    545-573 CA
	035-039 RI       429-432 AR    574     AK
	040-049 CT       433-439 LA    575-576 HI
	050-134 NY       440-448 OK    577-579 DC
	135-158 NJ       449-467 TX    580     VI Virgin Islands
	159-211 PA       468-477 MN    581-584 PR Puerto Rico
	212-220 MD       478-485 IA    585     NM
	221-222 DE       486-500 MO    586     PI Pacific Islands*
	223-231 VA       501-502 ND    587-588 MS
	232-236 WV       503-504 SD    589-595 FL
	237-246 NC       505-508 NE    596-599 PR Puerto Rico
	247-251 SC       509-515 KS    600-601 AZ

                                  - 165 -


	252-260 GA       516-517 MT    602-626 CA
	261-267 FL       518-519 ID    *Guam, American Samoa,
	268-302 OH       520     WY     Northern Mariana Islands,
	303-317 IN       521-524 CO     Philippine Islands
	318-361 IL       525     NM
	362-386 MI       526-527 AZ
	627-699 unassigned, for future use
	700-728 Railroad workers through 1963, then discontinued
	729-899 unassigned, for future use
	900-999 not valid SSNs, but were used for program purposes
    	    when state aid to the aged, blind and disabled was
	        converted to a federal program administered by SSA.

	As the Areas assigned to a locality are exhausted, new areas from
	the pool are assigned.  This is why some states have non-contiguous
	groups of Areas. The Group portion of the SSN has no meaning other
	than to determine whether or not a number has been assigned. SSA
	publishes a list every month of the highest group assigned for each
	SSN Area.  The order of assignment for the Groups is: odd numbers
	under 10, even numbers over 9, even numbers under 9 except for 00
	which is never used, and odd numbers over 10. For example, if the
	highest group assigned for area 999 is 72, then we know that the
	number 999-04-1234 is an invalid number because even Groups under
	9 have not yet  been assigned.

	The Serial portion of the SSN has no meaning. The Serial is not
	assigned in strictly numerical order. The Serial 0000 is never
	assigned.

	Before 1973, Social Security Cards with pre-printed numbers were
	issued to each local SSA office. The numbers were assigned by the
	local office. In  1973, SSN assignment was automated and
	outstanding stocks of pre-printed  cards were destroyed.  All SSNs
	are now assigned by computer from head-quarters.  There are rare
	cases in which the computer system can be forced to accept a manual
	assignment such as a person refusing a number with 666 in
	it.

	A pamphlet entitled "The Social Security Number" (Pub. No.05-10633)
	provides an explanation of the SSN's structure and the method of
	assigning and validating Social Security numbers.


	Tax Records

	If you can find out who does the individuals taxes you might be
	able to get copies from them with the use of creative social
	engineering. If you want to run a tax lien search there is a
	service called Infoquest. 1-800-777-8567 for a fee.  Call with a
	specific request.


                                  - 166 -


	Post Office Records

	If you have an address for someone that is not current, always
	consider  writing a letter to the postmaster of whatever post
	office branch services the zip code of the missing person.  Provide
	them the name and the last known address and simply ask for the
	current address.  There might be a $1 fee for  this so it would be
	wise to call first. City Directory, Polk's, Cole's, etc.
	Information in these directories is contained alphabetically by
	name, geographically by street address, and numerically by
	telephone number, so if you have any of those three pieces of info,
	a check can be done.  The Polk's directory also shows whether the
	person owns their home or rents, their marital status, place of
	employment, and a myriad of other tidbits of information. However, 
	these books are not the be-all and end-all of the  information as 
	they are subject to public and corporate response to surveys. These 
	directories are published on a nationwide basis so if you are looking  
	for someone outside of your area, simply call the public library in 
	the area  you have an interest  and they also can perform a crisscross 
	check for you.

	You can also call a service owned by Cole's called the National
	Look up Library at 402-473-9717 and either give a phone number and
	get the name & address or give the address and get the name and
	phone number. This is only available to subscribers, which costs
	$183.00 dollars for 1991.  A subscriber  gets two free lookups per
	day and everyone after that costs $1.25.  A  subscriber can also
	mail in a request for a lookup to:

	National Look Up Library
	901 W. Bond Street
	Lincoln, NE 68521-3694

	A company called Cheshunoff & Company can, for a $75 fee, obtain a
	5-year detailed financial analysis of any bank.

	505 Barton Springs Road
	Austin, Texas 78704
	512-472-2244

	Professional Credit Checker & Nationwide SSN-locate.

	!Solutions! Publishing Co.
	8016 Plainfield Road
	Cincinnati, Ohio 45236
	513-891-6145
	1-800-255-6643

	Top Secret Manuals



                                  - 167 -


	Consumertronics
	2011 Crescent Drive
	P.O. Drawer 537-X
	Alamogordo, New Mexico 88310
	505-434-0234


	Federal Government Information Center is located at

	1520 Market Street
	St. Louis, Missouri
	1-800-392-7711


	U.S. Dept of Agriculture has located aerial photos of every inch of
	the  United States.

	2222 West 2300 S.
	P.O. Box 36010
	Salt Lake City, Utah 84130
	801-524-5856

	To obtain general information regarding registered agent,
	principals,  and good standing  status, simply call the Corporate
	Division of the  Secretary of State and they will provide that
	information over the phone. Some corporate divisions are here:

	Arkansas Corporate Division   501-371-5151
	Deleware Corporate Division   302-736-3073
	Georgia Corporate Division    404-656-2817
	Indiana Corporate Division    317-232-6576
	Kansas Corporate Division     913-296-2236
	Louisiana Corporate Division  504-925-4716
	Missouri Corporate Division   314-751-4936
	New York Corporate Division   518-474-6200
	Texas Corporate Division      512-475-3551


	Freedom Of Information
	The Freedom of Information Act allows the public to request
	information submitted to, or generated by, all executive
	departments, military  departments, government or government
	controlled corporations, and  regulatory agencies. Each agency, as
	described above, publishes in the  Federal Register, descriptions
	of its central and field organizations and  places where and how
	requests are to be directed. Direct a letter to the  appropriate 
	person designated in the Federal Register requesting reasonably  
	described records be released to you pursuant to the Freedom of 
	Information  Act.  Be sure to follow each agency's individually 
	published rules which  state the time, place, fees, and procedures 
	for the provisions of information. The agency should promptly respond.


                                  - 168 -


	How to Find Information About Companies, Ed. II, 1981, suggests,
	"Government personnel you deal with sometimes become less helpful
	if you approach the subject by threatening the Freedom of
	Information Act action - it's best to ask for the material
	informally first."  While this will probably enable  you to find
	the correct person to send your request to, be prepared to spend
	at least half an hour on the phone talking to several people before
	you find the person who can help you.  The book also has a brief
	description of what  each governmental agency handles.

	If you want to see if someone you are trying to locate is a
	veteran, has a federal VA loan, or receives some sort of disability
	benefit, use Freedom of Information and provide the person's SSN.

	You will get a bill but you can ask for a fee waiver if this
	contributes to a public understanding of the operation of the
	government.  You can also request an opportunity to go through the
	files yourself and then decide what you want copied.


	Insurance Records

	PIP carrier records (may contain statements, medical records, new
	doctors/hospital names,  records of disability payments, adjuster's
	opinions, applications for insurance coverage, other claim info,
	etc.)

	Health insurance records (may contain medical records, record of
	bills, new doctors/hospital names, pre-existing conditions
	information, info regarding other accidetns/injuries, etc.)

	Often you will have to go through the claims office, the
	underwriting dept, and the business office to get complete records
	as each individual dept maintains its own seperate files.

	Workers Compensation

	Some states will let you simply request records.  Just submit your
	request including the SSN and Birthdate, to the Department of Human
	Resources,  Division of Worker's Compensation.  They will photocopy
	the records and send you the copies.  Other states require an
	authorization to obtain these  records.

	You can always call your local Private Investigator pretending you
	are a student doing a research paper on the methods of getting
	personal information about people or even trash his place to find
	tips on tracking down people.





                                  - 169 -


	Frankie's Fireside Phreak Primer
	~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
	A few words of advice that apply to phreaks every-where.  Whether
	a telecom veteran, or a K0dez Kid, the following guidelines may
	keep you out of trouble and make life in the Computer Underground
	a little more pleasant. Brought to you by the CULT, o'course.


	>> A CULT Publication by High Priest and Scribe, Franken Gibe <<
	     -cDc- Cult of the Dead Cow Dissemination Council -cDc-

	=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=I
	think we could all use a little refresher on Phreak Safety and
	Hygiene. It seems that phreaks are getting more and more
	careless...and it's when you think you can't get caught
	that...yeah: You do. Most of you know these, or think about them
	occasionally, but try to put the following stuff into practice. A
	Safe Phreak is an Informed Phreak; A Safe Phreak is a Phreak who
	Respects the Telecom Medium.  Those are trite epigrams, but very
	true.
	=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
	1) Due to the proliferation of Traffic Pattern Monitoring software
       among independent carriers, it is DEADLY to scan. If you must 
       scan, NEVER use big name IC's (notably MCI [Real Time Toll Fraud
	   Detection System], U.S. Sprint [those 950's are NOT fun-and-games],
       etc). If you MUST scan, remember these few commandments:

	  A) Thou shalt never scan sequencially.
	  B) Thou shalt never scan in predictable or detectable patterns.
	  C) Thou shalt never scan a single access port all night, in     
	     closely-spaced increments. Best not to scan.  Best to have   
	     some little kid who doesn't know you scan.

	2) Alternate codes as MUCH as you can. Using a code-a-call isn't  
	   a bad idea if you have those kinds of resources.  Coupled with 
	   the no-scanning doctrine, though, notebooks full of codes will 
	   not be so common.

	3) This is the important corollary to number 2...NEVER EVER EVER  
	   overuse codes, nor use codes that you've abused earlier in a   
	   given month later on in the same month (generally, after the   
	   20th, when d'bills start to roll out).

	4) Do as MUCH remote phreaking as is humanly possible. If you can 
	   roll your computer out to some fortress fone, and hook up an   
	   acoustic coupler, AND not attract attention...Go for it.       
	   (Heck, I'd do it!)

	5) Local access ports and AT&T WATS access ports are generally    
	   safer than 950's. WATS #'s owned by Ind. Carriers are DEADLY.  
	   Here's a little list of advantages and disadvantages of all    
	   the above...
                                  - 170 -


	  A) Local Access Ports: Depending on the size of the LDS, these  
	     ports can be more or less safe. Almost NEVER have any sort   
	     of ANI hooked up, but if abuse becomes notable, they CAN     
	     install an incoming trap, discover a phreak's Central Office 
	     Code, and then put an outgoing trap in his CO. After that,   
	     it's only a matter of time.  Traffic Pattern software can    
	     give an LDS a good idea of what action it needs to take.

	  B) AT&T WATS numbers: Not a free ride by ANY means, but         
	     generally pretty safe. According to No Severance, AT&T WATS  
	     lines receive no ANI information. Like the local ports, the  
	     area from which a phreak is calling can be determined, but   
	     abuse would have to be pretty dramatic. Between local and    
	     AT&T WATS, I'd take WATS ("But what about the 800 Excessive  
	     Calling List?" Well, if it exists, then it's best not to use 
	     WATS too much...i.e. Do NOT Scan).

	  C) Most 950's are safe, contrary to popular belief. There are a 
	     number of Feature Groups into which these numbers fall. I    
	     don't really remember what they are, and it doesn't really   
	     matter. I just wouldn't be too anxious to use these 'cause   
	     they're sorta bizarre, and they're VERY abused (never a good 
	     thing). But if you must, it's better than...

	  D) Independent Carrier-Owned WATS numbers: God, DO NOT use      
	     these. When an IC owns its own carrier, it receives KP + II  
	     + 10Dig (YOUR phone number) + ST. In other words, these guys 
	     are generally ANI equipped. How can you tell? Well, if       
	     you've got an 800 access port, and the exchange is NXX       
	     (i.e., you've got a number :1-800-NXX-XXXX), then FIRST dial 
	     1-800-NXX-0000. If you get the "You have reached the AT&T    
	     Long Distance Network" recording, the # is AT&T. If you get  
	     a "Your call cannot be completed " recording, DO NOT use     
	     that WATS number. Simple.

	6) [or whatever number...sigh]  PLEASE...for your own good, and   
	   that of Phreakdom, DO NOT advertise what you do. Yeah, some    
	   kids at school might think it's pretty k-radical. Those same   
	   kids are the ones to nark, or to mention stuff to the friendly 
	   administrators should they ask around. The less non-phreaks    
	   know the better.  Keep your MOUTH SHUT.

	That reminds me of poor Disk Demon [of 915]. The kid really wasn't
	expecting trouble, but he made the fatal mistake of talking:
	probably to someone he trusted, and probably he didn't say much.
	All he mentioned was bringing a pirated disk to school the next day
	over the phone which was all the cops needed to search his house,
	and bam...they have him with telecom fraud evidence. The cops don't 
	need much to get a warrant to monitor your telfo. It's a scary 
	reality in a nation that takes less and less seriously the Bill of 
	Rights.


                                  - 171 -


	8) NEVER phreak voice calls. Sigh. I know, I'm sure there are a   
	   thousand screams of "Oh, COME ON, that's going too far". Okay, 
	   let me qualify that, then. Voice-phreak only if you're 1) sure 
	   you're not monitored (and who is ever sure?) and 2) know that  
	   the recipient can handle possible threats and unpleasantness   
	   from the friendly operator who may give him a buzz.  Feds and
	   investigators ain't stupid...or at least, not THAT stupid. As  
	   long as no one admits anything, it's okay. But the minute you  
	   start voice-phreaking, you open a lot of loose ends. Some      
	   suggestions, then, for voice phreaking:

	  A) Try to remain anonymous. Not too hard.
	  B) IF you're talking to strangers, don't mention where you're   
	     calling from, much less leave a number. Yeah, just common    
	     sense.
	  C) Don't talk about phreaking over the line if you don't think  
	     the line is secure. Duh!
	  D) If you trust the kid you're calling, tell him you've         
	     phreaked a call to him. Ask him if it's "cool". Make sure he 
	     can handle possible (and usually improbable) inquiries. Make 
	     sure his 'rents know NOTHING.

	9) That's another thing. This doesn't have to do with safe        
	   phreaking, but with keeping phreaks safe. Know what you'll say 
	   if you ever get called by an operator or investigator type. If 
	   you have a bbs or data line, great. If not, have a story ready 
	   and rehearsed. When you think about it, it IS kinda hard for
	   these people to believe that you don't know WHO called you for 
	   5 hours last Sunday night...be prepared. (Ee! Boy scouts       
	   rule.)

                                
	 This file was just to be a short set of definitions for those of
	you who don't know all the phreaking terms.  This was requested by
	a few people on a small 312 board called The Magnetic Field Elite
	(312-966-0708, call, board has potential) like The Don.  But I have
	decided against making this small file that is common in many
	places but instead to make something that I have never
	seen before.  Not just a common file but one of high technical use. 
	With a printout of this you will never need to missout on a
	definition again.  But that's not all. The file will discuss,
	indepth, the working of each of these operations below.  If you are
	viewing this file simply for the sake of finding one meaning I
	suggest that you get the entire thing and then never  need to call
	and view phreak files again.

	        Topic 1:  The Phone/Modem

	Scince phreaking is impossible without a phone or modem you I will
	start with the most important and most complex part of phreaking. 
	The Phone.  Now, the phone is a device that transfer sounds as
	sound enters a receiver, is transfered to an amount of 

                                  - 172 -


	voltage, sent through the telephone lines and decode back to sound. 
	A modem is based on a universal language of sounds transfered
	through the modem.  Modem stands for the work
	Modulator/Demodulator.  This is like receiveing and sending.  Now,
	with most modems, before connecting, tones just are just the same
	as the tones that a common phone can make.  But the phone can make
	many tones and some have purposes that are very useful, tones that
	are reserved for At&t, and thus dangerous.  To go through all the
	tone would be senseless and a book on tones alone could be written
	(Hmm...maybe I could...) so I will not go into that. But, assuming
	that you know what a box is I will explain what the odd types of
	modems can do. If you own an Apple Cat modem you may use it to 
	generate any tone.  This is very useful.  Some people are against 
	the Cat for various.  I will remain neutral on the topic but if you 
	have no understand then phreak the way you see easiest and safest. 
	The ther way is by using an acoustic modem.  You may modify a phone 
	to make certain tones and you may make then send these tones through 
	the acoustic modem by placing the headset of the phone on the 
	acoustic's couplers.  You may also attempt to make the box 
	modfications directly to the modem but if you error and damage the 
	modem alot of money is wasted while you could have used an acoustic 
	and messed up a twenty dollar phone. Basicaly the common phone can 
	make 18 tones.  For example, when you press a number on the phone two 
	tones are made together and make the signal for the number or charater 
	you hit.  This is the entire phone to line explantion of the phone.  
	Now the actual internal working of the phone is very complex and can be 
	best under stood by getting a book from the library on it.

	       Topic 2:  The Calling of Numbers

	 When you call a local number as soon as you hit a number other
	than one you the phone knows that you are calling localy.  Once
	seven digits are entered the numbers are sent to the nearest
	switching station and you call goes out.  The station deter mines
	the units per minute and start billing as soon as the called phone
	answers.  All calls are automaticaly one minute long.  If you hit
	a one as the first digit you dial the phone recignizes this as a
	long distance call and sends you to either the At&t switching
	station or to another long distance service if you have chose to
	use other than At&t. If you are using a At&t the call goes through
	the long distance switching station where unit per minute is 
	determined and then it is refured to the number you called.  The 
	call may be slowed down depending on how many times the switching 
	station changes between you and the place you are calling.  If it 
	changes between ESS and X-Bar (described below) one it would go through 
	fast.  If it changed between them 50 times it would be a very slow 
	call going through.  Plus the sound quality may decrease but that is 
	not a fact, just an understanding I have come to when callign long 
	distance with At&t. If you are calling through any other service, 
	such as MCI, Alnet, Teleco, US Sprint or any of the other endless 
	companies,


                                  - 173 -


	then things are not the same for long distance calls. You call
	first goes to the company you call through and price of call is
	determined by any of the ways a company determines price.  The call
	then goes out through the lines to the long distance companie's
	station nearest to the number you dialed and tres to
	go though.  If the number is too far away from a station you may
	get a "The number you have dialed cannot be reached from your
	calling area." Thus, you have the basic information of how call
	goes out.  Now to get to phreaking and the real reson you read this
	file.

    	    Topic 3:  The Long Distance Company and Codes.

	The way of using a different long distance company or not paying a 
	quarter when calling from a payphone.  Using the phone card or the
	code.Names for these numbers: 950's, 800's, Extenders, PBX's, 950 
	ports, Port, Code port, (Company name) port

	The above mentioned names are the phreaks lifeline.  They are
	places where you call and enter a code, then the area code of the
	place you want to call and finally the number for the place you
	want to call.  When the code is entered it is checked if it is
	valid and then the person how owns the code pays for the call.  If
	the code is not valid you normaly get a message saying that the
	code you entered is not valid.  When a call goes through it is the
	same as a normal long distance call except that it is charged to
	the owner of the card.  Some places may require that you enter a
	nine or a one before you enter the code. Now, the phreak uses these
	places by calling them over and over again until they get a code. 
	But they do this with a computer and a program such as
	Hack-a-Matic, Hacking Construction Set (often called HCS), Hack
	This Buddy, Intellihacker (Old), C at-(and then a name, for the
	Apple Cat.  Has to many names to list), and some others.  These are
	all Apple programs but there are also code hackers for the Commodor
	64, 128, Amiga, IBM (of course) and so on.  Most computers have
	them.  One thing I have found useful is to use a Radio Shack
	portable computer with a built in modem and hack from other houses,
	this is much safer.  Secrity in these companies run from really
	tough (MCI) to sad (like the places that tryo to scare off hackers
	with tape recordings).  950 ports in the ESS area are set up to 
	trace and could do so very easily but for some reson they are against 
	it.  Possibly the time and modey to cheack the calls and pay for 
	tracing.  Places have gotton tougher though, if three people get 
	busted off a number in one week and this has never happened before 
	then you can almost be sure that they have stepped up security and 
	that it is time to use a new port.
 
	        Now I will discuss some of the things used by the Phreak.

	        Topic 4: The Loop



                                  - 174 -


	Loops, although they may seem fun they are really rather useless. 
	They work as follows.  Two numbers are looped together.  Usually
	they are almost the same just a digit different from one another. 
	If you call the lower number you will wait a few secounds and then
	hear a 1000mhz. tone.  If you call the higher number you will hear
	nothing.  If you can one number (dosen't matter which) and someone
	else calls the other number you will be able to talk to each other. 
	The purpose of these is to test trunk lines.  This way they could
	make sure there was no break in each trunk.  Now the old purpose
	for loops was that they where free to call so one person would call
	one and another would call the other and they would get to talk for
	free.  Also, one person might call one number and just wait and talk 
	to whoever called the other number.  Like a two line bridge. Today you 
	cannot call these without being charged because the phone company 
	caught on.  But you can split a phone call with these so if there 
	is a loop between you and a person you want to talk to you can only 
	pay for half by calling the loop.  And the phone company dosen't care 
	 because either way they get their money. The billing service for a 
	loop is one all by itself, not like normal local calling and for this 
	reson I might almost belive the rumor that Blue Box tones can be used 
	to call loops. The loops billing service didn't exist awhile back so a 
	call to one was free.  Now, if you call this new billing system picks 
	it up.  But the loops billing system is just something that At&t
	scraped together and there are most likly some holes in the system
	(like not recording blue box tone generation numbers). 

	        Topic 5: The Diverter

	The diverter has been a very simple, yet incredibly usefulthing
	through the years.  To use one you must call, after hours and let
	someone answer the phone, don't answer them, let them hang up and
	get a faint dialtone.  Then you dial again and call from the
	diverter. Before, you could use a diverter and call through it. 
	The you would only be charged for the call to the diverter, not the
	one after it.  That bill went to the diverter itself.  But they fix
	this problem easily and now you still get charged if you are in the
	ESS area. Also before, you could use a diverter to call a number
	that traces and instead of being traced to your number it is traced
	to the diverter.  But ESS eliminated that too. But you can still
	use a diverter to call hard to reach numbers.  Like if you called
	a place and it gave you a "The number you have dial cannot be reach
	from your calling area" then if you knew of a diverter in the area
	of the number you could call through it to the unreachable number
	and get through. The way a diverter works is after hours when you
	call a place the call is forwarded to another place.  Then, when
	you don't answer the person at the other place hangs up and your
	call tries to  disconnect from the forwared number and you end up
	at the diverter with it's dialtone.



                                  - 175 -


	HACKING TYMNET 

	  AS MOST OF YOU ALREADY KNOW, TYMNET IS AN INFORMATION SYSTEM
	ACCESSABLE BY COMPUTERS WITH MODEMS FROM ALMOST ANYWHERE IN THE
	COUNTRY.  TYMNET INCLUDES MANY SUB-SYSTEMS OF INFORMATION WHICH CAN
	BE USEFUL FOR BUSINESSES OR JUST PHUN.  ONE SUB-SYSTEM WHICH I WILL
	WRITE A SEPARATE ARTICLE ON IS THE ATPCO'S ELECTRONIC TARIFF
	SYSTEM.  BUT FOR NOW, I'LL MAKE ALL OF YOU EXPERTS IN TYMNET SO YOU
	CAN HAVE AS MUCH PHUN AS YOURS TRUELY.

	ACCESS NUMBERS
	--------------
	FOR YOUR LOCAL ACCESS NUMBER YOU COULD CALL THE NICE PERSON AT
	800-336-0149 AND REQUEST IT FOR YOUR AREA.  IF YOU LIVE NEAR A
	METROPOLITAN AREA ASK FOR THAT AREA CODE SINCE THEY RARELY HAVE
	ACCESS NUMBERS FOR OUT-OF-CITY AREAS. FOR THOSE OF YOU IN THE 914
	AREA YOU CAN USE: POUGHKEEPSIE : 914-473-0401 WHITE PLAINS :
	914-684-6075

	LOGGING IN TO TYMNET
--------------------
	1. WHEN YOU HAVE CONNECTED WITH THE NETWORK, THE FOLLOWING REQUEST
	WILL BE DISPLAYED: PLEASE TYPE YOUR TERMINAL IDENTIFIER ENTER YOUR
	TERM.IDENTIFIER ACCORDING TO THE FOLLOWING CHART:

	KEY: IDENT  = IDENTIFIER
	     ASC    = ASCII
	     EBCD   = EBCD CORRESPONDENCE
	     <R>    = CARRIAGE RETURN

	SPEEDS ARE GIVEN IN CPS (CHARACTERS PER SECOND). TO TRANSLATE TO
	BAUD RATE JUST MULTIPLY BY 10.

	IDENT  CODE  SPEED   TERMINAL TYPE
	-----  ----  -----   -------------
	  A    ASC   30,120  PERSONAL COMP.
                     WITH CRT

	[ MOST EVERYBODY AT HOME WILL USE THIS OPTION SO IF YOU AREN'T SURE
	USE A ]

	  B    ASC   15      ALL TERMINALS
	  C    ASC   30      IMPACT PRINTMRS
	  D    ASC   10      ALL TERMINALS
	  E    ASC   30      THERMAL PRINTERS
	  F    ASC  15 IN    BETA TERMINALS
	            30 OUT
	  G    ASC  30,120    BELT PRINTERS
	                      G.E. TERMINET
	  I    ASC  120       MATRIX PRINTERS
	  P<R> EBCD 14.8      SELECTRIC-TYPE
	                      TERMINALS (E.G., 2741)

                                  - 176 -


	IF THE MESSAGE DOES NOT APPEAR JUST WAIT A FEW SECONDS THEN ENTER
	IT.  NOTE THAT ONLY P IDENTIFIERS NEED A <R>  THEM BUT SINCE MOST
	OF YOU WON'T BE USING P FORGET IT. 

	2. TYMNET WILL THEN DISPLAY THE NUMBER OF THE REMOTE ACCESS NODE TO
	WHICH YOU ARE CONNECTED, FOLLOWED BY THE NUMBER OF YOUR PORT ON THE
	NODE, AND WILL DISPLAY THIS REQUEST:

	   -NNNN-PPP-
	   PLEASE LOG IN:

	3. TYPE YOUR USER NAME AND <R> THIS USER NAME SEEMS TO BE THE
	ABBREVIATION FOR THE COMPANY WHO OWNS THE SUB-SYSTEM. FOR EXAMPLE,
	FOR ELECTRONIC TARIFF THE USER NAME
	IS ATP WHICH STANDS FOR AIRLINE TARIFF PUBLISHING, THE COMPANY THAT
	RUNS THE ELECTRONIC TARIFF.

	4. TYMNET WILL THEN REQUEST:

	   PASSWORD:

	TYPE YOUR PASSWORD AND <R>. THE PASSWORD MAY NOT BE DISPLAYED ON
	YOUR SCREEN.

	5. TYMNET WILL THEN DISPLAY SOME CHARACTER OR MESSAGE INDICATING
	THAT YOU HAVE LOGGED ON. SINCE BUSINESSES DON'T REALLY GET
	COMPLICATED WITH PASSWORDS AND THE SUCH, JUST ENTER VALID USER
	NAMES AND FOR PASSWORDS YOU CAN FORGET CTRL-CHARACTERS... PASSWORDS
	HAVE A LENGTH OF 8 CHARACTERS (AS FAR AS I KNOW).

	TYMNET CONTROL CHARACTERS
	-------------------------

	CTRL-CHAR    OPERATION
	--------     ---------
	   H         HALF-DUPLEX
	   P         EVEN PARITY
	   R         ALLOWS THE TERMINAL TO
	             CONTROL THE INCOMING FLOW
	             OF DATA WITH X-ON/OFF
	             CHARACTERS (SEE BELOW)
	   S         X-OFF CHARACTER
	   Q         X-ON CHARACTER

	ACCESSING DATAPAC
	-----------------
	THE STANDCRD PROCEDURE FOR ACCESSING A HOST ON THE DATAPAC NETWORK
	IS DESCRIBED BELOW.  TYMNET'S INFORMATION DIRECTORY INCLUDES FILES
	OF MATERIAL ABOUT DATAPAC AND TYMNET'S INTERNATIONAL SERVICES.



                                  - 177 -


	LOGGKNG IN TO DATAPAC
	---------------------
	1. DIAL-UP TYMNET (SEE ABOVE)
	
	2. ENTER YOUR TERMINAL IDENTIFIER

	3. AT THE "PLEASE LOG IN:" PROMPT, ENTER THE LOG-IN COMMAND,
	SPECIFYING: THE DATAPAC NETWORK (DPAC), A SEMICOLON (A SECOND
	SEMICOLON WILL ECHO AT YOUR END) , THE DATAPAC NETWORK
	IDENTIFICATION CODE (3020), THE 8-DIGIT HOST ADDRESS AND <R>.

	E.G., DPAC;;3020HOST ADDRESS <R>

	IF YOU NEED TO ENTER FUTHER USER DATA ENTER A COLON AFTER THE HOST
	ADDRESS THEN A <R>.

	E.G., DPAC;;3020HOST ADDRESS:USER DATA <R>
	
	5. DATAPAC WILL THEN DISPLAY A MESSAGE OR CHARACTER TO SHOW THAT
	YOU	ARE ON-LINE.

	THIS LITTLE BIT OF INFORMATION SHOULD GET SOME OF YOU GOING.  MY
	EXPERIENCES WITH TYMNET HAVE BEEN MAINLY RESTRICTED TO THE ATPCO
	SYSTEM SO COMMANDS MAY DIFFER.





























                                  - 178 -


	THE PHREAKER'S HANDBOOK #1 by Phortune 500 
	----------------------------------------------
	a useful source for the phreaker covering both the basics and
	advances of phreaking

    	                             GENERAL NOTE
        	                         ------------
	The purpose of this newsletter is purely educational. It has been
	released in order to teach and advance the knowledge of today's
	declining phreaks. However, the author does not take  any
	responsibility over the  misuse of  the herein contained
	information, and the newsletter itself does not encourage or
	support the  above type of  activity. Also, any wrong or old
	information in this document is not to the responsibility of the 
	author, and the  reader accepts any consequences due to information
	that may be mistaken in this manner. 


    	                            NOTE TO ABUSERS
        	                        ---------------
	All information contained within this document was intended towards
	educational purposes. Any  misuse or illegal use of the information 
	contained in  this document is strictly at the  misuser's risk. The 
	author assumes  NO responsibility of the reader's actions following
	the release this document (in otherwords, you're on your own if you
	get nailed!) 

	  TPH Issue #1, Volume 1               Release Date::July 3, 1989

    	                        Introduction To TPH #1
        	                    ======================
	This  phile  was  written  for  beginning  as  well as those
	uninformed  "advanced"  phreaks  who  need  something  as  a 
	reference  when reading or writing  philes concerning phreaking or
	fone phraud. Of course, you could be a  beginning  phreak and use
	this phile to B.S. your way into a big group by acting  like  you
	know a lot, or something, but that is up to you. Anyway, I
	compiled  this  listing  phrom  various  sources,  the majority is
	listed as references at the end of this phile.

	This  phile's  only  goal  is  to  educate  and  inform. Any
	illegal or fraudulent  activity  is  neither  encouraged nor
	supported by the author of this  phile,  not  by  the  majority  of
	the >TRUE< phreaking community. The author assumes NO
	responsibility for the actions of the reader.

	Also,  I  know  that  some  of the stuff covered in this release of
	TPH will  be old and outdated; however, I will try to clean that up
	by the next release  of  TPH,  and  will  notify  you, the reader,
	of the changes due to these revisions.



                                  - 179 -


	                             The Phreak's Vitals:
    	                         ====================

        	                True Definition Of The Phreaker
            	            -------------------------------
	"Many  people  think of phone phreaks as slime, out to rip off Bell
	for all  she  is  worth. Nothing could be further from the truth!
	Granted, there are  some  who  get  their kicks by making free
	calls; however, they are not true  phone  phreaks.  Real phone
	phreaks are 'telecommunications hobbyists'who  experiment,  play 
	with, and learn from the phone system. Occasionally, this 
	experimenting  and  a  need to communicate with other phreaks,
	without going  broke,  leads to free calls. The free calls are but
	a small subset of a >TRUE< phone phreak's activities."         
   	- Wise Words Of The Magician


	                      The Phone Phreak's Ten Commandments
    	                  -----------------------------------
	I.   Box  thou  not over thine home telephone wires, for those    
    	 who doest will surely bring the wrath of the Chief           
	     Specialent down upon thy head.
	II.  Speakest  thou  not of important matters over thine home     
    	 telephone wires, for to do so is to risk thine right of      
	     freedom. 
	III. Use  not  thine own name when speaking to other phreaks,     
	     for that every third phreak is an FBI agent is well known.
	IV.  Let  not overly many people know that thy be a phreak, as to 
	     do so is to use thine own self as a sacrificial lamb.
	V.   If thou be in school, strive to get thine self good grades,  
	     for the authorities well know that scholars never break the  
	     law.
	VI.  If thou  workest, try to be an employee and impressest thine 
	     boss with thine enthusiasm, for important employees are      
	     often saved by their own bosses.
	VII. Storest thou not thine stolen goodes in thine own home, for  
	     those who do are surely non-believers in the Bell System     
	     Security Forces, and are not long for this world.
	VIII.Attractest  thou  not  the  attention of the authorities, as 
	     the less noticeable thou art, the better.
	IX.  Makest  sure  thine  friends  are instant amnesiacs and      
	     willst not remember  thou  hast  called  illegally,  for     
	     their  cooperation  with  the authorities willst surely      
	     lessen thine time for freedom on this earth.
	X.   Supportest thou TAP, as it is thine newsletter, and without  
	     it, thy  work would be far more limited.

    	                        The Phreaker's Glossary
        	                    =======================
	1XB - No.1 Crossbar system. See XBAR for more information.


                                  - 180 -


	2600   -  A  hack/phreak  oriented  newsletter  that  periodically 
	was released  and still is being released. See Phile 1.6 for more
	information on the magazine and ordering.

	4XB - No.4 Crossbar system. See XBAR for more information.

	5XB  -  No.5  Crossbar  system.  The  primary end office switch of
	Bell since the 60's and still in wide use. See XBAR for more
	detail. 

	700  Services  -  These services are reserved as an advanced
	forwarding system,  where the forwarding is advanced to a
	user-programed location which could be changed by the user.

	800  Exceptional  Calling  Report  - System set up by ESS that will
	log any  caller  that excessively dials 800 numbers or directory
	assistance. See ESS for more information.

	800  Services  -  Also known as WATS. These services often contain
	WATS extenders  which,  when  used  with  a code, may be used to
	call LD. Many LD companies  use  these services because they are
	toll-free to customers. Most 800  extenders  are  considered 
	dangerous  because most have the ability to trace.

	900  Services  -  Numbers  in  the  900 SAC usually are used as
	special services,  such  as  TV polls and such. These usually are
	$.50 for the first minute  and  $.35 for each additional minute.
	Dial (900)555-1212 to find out what the 900 services currently have
	to offer.

	950  -  A  nationwide  access exchange in most areas. Many LD
	companies have  extenders located somewhere on this exchange;
	however, all services on this  exchange  are  considered dangerous
	due to the fact that they ALL have the ability to trace. Most 950
	services have crystal clear connections.

	ACCS  -  Automated  Calling  Card  Service.  The typical
	0+NPA+Nxx+xxxx method  of  inputting  calling cards and then you
	input the calling card via touch tones. This would not be possible
	without ACTS.

	ACD - Automatic Call Distributor.

	ACD  Testing Mode - Automatic Call Distributor Test Mode. This
	level of phreaking  can  be  obtained  by pressing the "D" key down
	after calling DA. This  can  only  be done in areas that have the
	ACD. The ACD Testing Mode is characterized  by  a pulsing dial
	tone. From here, you can get one side of a loop  by  dialing  6, 
	the  other side is 7. You may also be able to REMOB a line.  All 
	possibilities  of  the ACD Test have not been experimented with.
	See silver box for more details.


                                  - 181 -


	ACTS  -  Automated  Coin  Toll  Service. This is a computer system
	that automates  phortress  fone  service by listening for red box
	tones and takes appropriate  action.  It is this service that is
	commonly heard saying, "Two dollars  please.  Please  deposit  two 	
	dollars for the next three minutes." Also,  if  you  talk for more
	than three minutes and then hang up, ACTS will call back and demand 
	your money. ACTS is also responsible for ACCS. 

	Alliance  -  A  teleconferencing  system  that is apart from AT&T
	which allows  the general public to access and use its conferencing
	equipment. The equipment   allows  group  conversations  with 
	members  participating  from throughout  the United States. The
	fone number to Alliance generally follows the  format  of
	0-700-456-x00x depending on the location the call originates from
	and is not accessible direct by all cities/states.

	AMA  -  Automated  Message  Accounting. Similar to the CAMA system;
	see CAMA for more info.

	analog  -  As  used  for  a  word  or data transmission, a
	continuously varying electrical signal in the shape of a wave.

	ANI  -  Automatic  Number  Identification  - This is the system you
	can call,  usually  a  three digit number or one in the 99xx's of
	your exchange, and  have  the  originating  number  you  are 
	calling from read to you by a computer.  This is useful if you
	don't know the number you are calling from, for  finding 
	diverters,  and  when  you  are playing around with other fone
	equipment  like  cans  or  beige boxes. The ANI system is often
	incorporated into  other  fone  companies  such as Sprint and MCI
	in order to trace those big bad phreaks that abuze codez.

	ANIF  - Automatic Number Identification Failure. When the ANI
	system of a particular office fails.

	APF  -  All  PINs Fail. This is a security measure which is
	designed to frustrate attempts at discovering valid PINs by a
	hacking method.

	aqua  box  -  A  box  designed to drain the voltage of the FBI
	lock-in- trace/trap-trace  so  you  can  hang  up  your  fone  in 
	an  emergency  and phrustrate  the  Pheds  some more. The apparatus
	is simple, just connect the two  middle wires of a phone wire and
	plug, which would be the red and green wires  if  in  the jack, to
	the cord of some electrical appliance; ie, light bulb  or  radio.  
	KEEP  THE  APPLIANCE  OFF.  Then,  get  one  of those line splitters  
	that  will  let  you hook two phone plugs into one jack. Plug the end  
	of  the  modified  cord into one jack and your fone into the other. THE 
	APPLIANCE  MUST  BE  OFF! Then, when the Pheds turn their lame tracer 
	on and you  find  that  you  can't hang up, remove your fone from the
                                  - 182 -


	jack and turn the  appliance ON and keep it ON until you feel safe; it 
	may be awhile. Then turn  it  off,  plug  your fone back in, and start
	phreaking again. Invented by: Captain Xerox and The Traveler.

	BAUDOT - 45.5 baud. Also known as the Apple Cat Can.

	BEF  - Band Elimination Filter. A muting system that will mute the
	2600 Hz tone which signals hang-up when you hang up.

	beige  box  - An apparatus that is a home-made lineman's handset.
	It is a  regular  fone  that  has  clips  where  the  red and green
	wires normally connect  to  in  a  fone jack. These clips will
	attach to the rings and tips found  in  many  of  MA's output
	devices. These are highly portable and VERY useful  when  messing 
	around  with  cans  and other output devices the fone company has 
	around. Invented by: The Exterminator and The Terminal Man.

	BITNET  -  Nationwide  system for colleges and schools which
	accesses a large  base  of  education-oriented information. Access
	ports are always via mainframe.

	bit  stream  -  Refers  to  a continuous series of bits, binary
	digits, being transmitted on a transmission line.

	black  box  -  The infamous box that allows the calling party to
	not be billed  for  the call placed. We won't go in depth right
	now, most plans can be  found on many phreak oriented BBS's. The
	telco can detect black boxes if they suspect one on the line. Also,
	these will not work under ESS.

	bleeper  boxes  -  The  United  Kingdom's  own version of the blue
	box, modified  to  work  with the UK's fone system. Based on the
	same principles. However, they use two sets of frequencies,
	foreword and backwards.

	Blotto  box  -  This  box  supposedly  shorts  every  fone  out  in
	the immediate  area,  and  I  don't  doubt  it. It should kill
	every fone in the immediate  area,  until  the  voltage reaches the
	fone company, and the fone company  filters  it.  I  won't  cover 
	this  one  in  this issue, cuz it is dangerous,  and  phreaks
	shouldn't destroy MA's equipment, just phuck it up. Look  for  this  
	on your phavorite BBS or ask your phavorite phreak for info if you 
	really are serious about seriously phucking some fones in some area.

	blue  box  -  An  old  piece of equipment that emulated a true
	operator placing  calls,  and  operators  get  calls for free. The
	blue box seizes an open  trunk  by  blasting  a  2600  Hz tone
	through the line after dialing a party  that  is  local  or in the	
	800 NPA so calls will be local or free for the  blue 


                                  - 183 -


	boxer. Then, when the blue boxer has seized a trunk, the boxer may
	then,  within the next 10-15 seconds, dial another fone number via
	MF tones. These  MF  tones  must be preceded by a KP tone and
	followed with a ST tone. All of these tones are standardized by
	Bell. The tones as well as the inter-digit  intervals  are around
	75ms. It may vary with the equipment used since ESS  can  handle
	higher speeds and doesn't need inter-digit intervals. There are 
	many  uses to a blue box, and we will not cover any more here. See
	your local  phreak or phreak oriented BBS for in depth info
	concerning blue boxes and  blue  boxing.  Incidentally, blue boxes
	are not considered safe anymore because  ESS  detects  "foreign" 
	tones,  such as the 2600 Hz tone, but this detection  may  be 
	delayed  by  mixing pink noise of above 3000 Hz with the 2600  Hz 
	tone. To hang up, the 2600 Hz tone is played again. Also, all blue
	boxes  are  green  boxes because MF "2" corresponds to the Coin
	Collect tone on  the  green box, and the "KP" tone corresponds to
	the Coin Return tone on the  green  box.  See  green  box  for 
	more  information.  Blue  boxing  is IMPOSSIBLE  under  the new 
	CCIS system slowly being integrated into the Bell system.

	blue  box  tones  -  The MF tones generated by the blue box in
	order to place  calls,  emulating  a  true operator. These dual
	tones must be entered during  the  10-15 second period after you
	have seized a trunk with the 2600 Hz tone.



	                       700:  1 :  2 :  4 :  7 : 11 :    KP= Key
	Pulse
	parallel Frequencies   900: ** :  3 :  5 :  8 : 12 :    ST= STop
	  2= Coin Collect     1100: ** : ** :  6 :  9 : KP :   KP2= Key
	Pulse 2
	 KP= Coin Return      1300: ** : ** : ** : 10 :KP2 :    **= None
	 (green box tones)    1500: ** : ** : ** : ** : ST :
	                          : 900:1100:1300:1500:1700:   75ms
	pulse/pause
	
	BLV  -  Busy  Line  Verification.  Allows  a TSPS operator to
	process a customer's  request  for  a  confirmation  of  a  
	repeatedly busy line. This service is used in conjunction with 
	emergency break-ins.

	BNS - Billed Number Screening. break  period  -  Time  when  the 
	circuit during pulse dialing is left pen.  In  the  US,  this
	period is 40ms; foreign nations may use 33ms break periods.

	break  ratio  -  The  interval  pulse dialing breaks and makes the
	loop when  dialing.  The US standard is 10 pulses per second. 


                                  - 184 -


	When the circuit is opened,  it  is called the break interval. When
	the circuit is closed, it is called  the make interval. In the US,
	there is a 60ms make period and a 40ms break  period.  This  is 
	often  referred  to  as  a 60% make interval. Many
	foreign nations have a 67% make interval. 

	bridge - I don't really understand  this  one, but  these  are
	important phreak toys. I'll cover them more in the next issue of
	TPH.

	British Post Office - The United Kingdom's equivalent to Ma Bell.

	busy  box  - Box that will cause the fone to be busy, without
	taking it OFF-HOOK.  Just  get a piece of fone wire with a plug on
	the end, cut it off so  there  is a plug and about two inches of
	fone line. Then, strip the wire so  the  two middle wires, the tip
	and the ring, are exposed. Then, wrap the ring  and  the  tip 
	together,  tape with electrical tape, and plug into the fone jack.
	The fone will be busy until the box is removed.

	cans  -  Cans  are  those  big  silver  boxes  on  top of or around
	the telephone  poles. When opened, the lines can be manipulated
	with a beige box or whatever phun you have in mind.

	calling  card  -  Another  form of the LD service used by many
	major LD companies  that  composes of the customers fone number and
	a PIN number. The most  important  thing  to  know when questioned
	about calling cards are the area code and the city where the
	calling card customer originated from.

	CAMA  -  Centralized  Automatic Message Accounting. System that
	records the  numbers called by fones and other LD systems. The
	recording can be used as evidence in court.

	CC - Calling Card.

	CC - Credit Card.

	CCIS   -  Common  Channel  Inter-office  Signaling.  New  method 
	being incorporated  under  Bell  that will send all the signaling
	information over separate data lines. Blue boxing is IMPOSSIBLE
	under this system.

	CCITT  -  The  initials  of  the  name  in  French of the
	International Telegraph  and Telephone Consultative Committee. At
	CCITT representatives of telecommunications  authorities, 
	operators  of  public  networks  and other interested  bodies  meet 
	to  agree  on  standards  needed for international intermarrying of
	telecommunications services.

	CCS - Calling Card Service.


	                                  - 185 -


	CCSS   -  Common  Channel  Signalling  System.  A  system  whereby 
	all signalling  for a number of voice paths are carried over one
	common channel, instead of within each individual channel.

	CDA - Coin Detection and Announcement.

	CF  -  Coin First. A type of fortress fone that wants your money
	before you receive a dial tone.

	Channel  - A means of one-way transmission or a UCA path for
	electrical transmission  between  two  or  more points without
	common carrier, provided terminal equipment. Also called a circuit,
	line, link, path, or facility.

	cheese  box  -  Another  type  of  box  which,  when  coupled with
	call forwarding  services, will allow one to place free fone calls.
	The safety of this  box  is unknown. See references for information
	concerning text philes on this box.

	clear  box  - Piece of equipment that compromises of a telephone
	pickup coil  and  a  small  amp. This works on the principal that
	all receivers are also  weak  transmitters.  So,  you amplify your
	signal on PP fortress fones and spare yourself some change.

	CN/A  -  Customer  Name  And  Address.  Systems  where  authorized
	Bell employees  can  find  out  the  name and address of any
	customer in the Bell System.  All  fone  numbers  are listed on
	file, including unlisted numbers. Some  CN/A  services ask for
	ID#'s when you make a request. To use, call the CN/A  office 
	during  normal  business hours, and say that you are so and so from 
	a  certain  business or office, related to customers or something
	like that,  and  you  need the customer's name and address at
	(NPA)Nxx-xxxx. That should  work.  The  operators  to  these 
	services usually know more than DA operators  do  and  are  also 
	susceptible  to  "social  engineering." It is possible  to 
	bullshit  a CN/A operator for the NON PUB DA number and policy
	changes in the CN/A system.

	CO  Code  - Central Office code which is also the Nxx code. See Nxx
	for more details. Sometimes known as the local end office.

	conference  calls  - To have multiple lines inter-connected in
	order to have  many  people talking in the same conversation on the
	fone at once. See Alliance and switch crashing for more
	information.

	credit  operator - Same as TSPS operator. The operator you get when
	you dial "0" on your fone and phortress fones. See TSPS for more
	information.



                                  - 186 -


	CSDC  -  Circuit Switched Digital Capability. Another USDN service
	that has no ISDN counterpart.

	DA - Directory Assistance. See directory assistance.

	DAO - Directory Assistance Operator. See directory assistance.

	data   communications   -   In   telefone   company  terminology, 
	data communications   refers  to  an  end-to-end  transmission  of 
	any  kind  of information  other  than  sound, including voice, or
	video. Data sources may be either digital or analog.

	data  rate - The rate at which a channel carries data, measured in
	bits per second, bit/s, also known as "data signalling rate."
	data signalling rate - Same as "data rate." See data rate.

	DCO-CS - Digital Central Office-Carrier Switch.

	DDD - Direct Distance Dialed.

	Dial-It Services - See 900 Services.

	digital  -  A  method  to  represent  information  to  be  discrete 
	or individually  distinct  signals,  such as bits, as opposed to a
	continuously variable analog signal.

	digital  transmission - A mode of transmission in which all
	information to  be  transmitted  is first converted to digital form
	and then transmitted as  a  serial  stream of pulses. Any signal,
	voice, data, television, can be converted to digital form.
	
	Dimension 2000 - Another LD service located at (800)848-9000.
	
	directory  assistance  -  Operator  that  you  get when you call
	411 or  NPA-555-1212.  This call will cost $.50 per call. These
	won't know where you are  calling from, unless you annoy them, and
	do not have access to unlisted numbers.  There  are  also 
	directory assistance operators for the deaf that transfer  BAUDOT.
	You can call these and have interesting conversations. The fone 
	number is 800-855-1155, are free, and use standard Telex
	abbreviations such  as  GA  for  Go  Ahead. These are nicer than
	normal operators, and are often   subject   to   "social 
	engineering"  skills  (bullshitting).  Other operators   also  
	have   access   to  their  own  directory  assistance  at
	KP+NPA+131+ST. 

	diverter  - This is a nice phreak tool. What a diverter is is a
	type of call  forwarding  system done externally, apart from the
	fone company, which is  a piece of hardware that will foreword the
	call to somewhere else. These can  be  found  on  many  24 hour
	plumbers, doctors, etc. When you call, you will  often  hear  

                                  - 187 -


	a  click  and then ringing, or a ring, then a click, then another 
	ring,  the second ring often sounds different from the first. Then,
	the  other  side  picks  the  fone  up  and  you  ask about their
	company or something  stupid, but DO NOT ANNOY them. Then
	eventually, let them hang up, DO  NOT  HANG  UP  YOURSELF.  Wait 
	for the dial tone, then dial ANI. If the number  ANI  reads  is
	different from the one you are calling from, then you have  a 
	diverter.  Call  anywhere you want, for all calls will be billed to
	the  diverter.  Also,  if  someone uses a tracer on you, then they
	trace the diverter  and  you  are safe. Diverters can, however,
	hang up on you after a period  of  time; some companies make
	diverters that can be set to clear the line  after  a  set period
	of time, or click every once in a while, which is super  annoying,
	but it will still work. Diverters are usually safer than LD
	extenders,  but  there are no guarantees. Diverters can also be
	accessed via phortress  fones.  Dial  the  credit  operator  and 
	ask for the AT&T CREDIT OPERATOR.  They  will  put on some lame
	recording that is pretty long. Don't say  anything  and  the 
	recording will hang up. LET IT HANG UP, DO NOT HANG UP.  Then  
	the  line will clear and you will get a dial tone. Place any call 
	you  want  with  the following format: 9+1+NPA+Nxx+xxxx, or for local 
	calls, just  9+Nxx+xxxx. I'd advise that you call ANI first as a local 
	call to make sure you have a diverter.

	DLS - Dial Line Service.

	DNR - Also known as pen register. See pen register.

	DOV - Data-Over-Voice.

	DSI  -  Data  Subscriber  Interface.  Unit in the LADT system that
	will concentrate  data  from  123  subscribers  to a 56k or a 9.6k
	bit-per-second trunk to a packet network.

	DT - Dial tone.

	DTF  -  Dial Tone First. This is a type of fortress fone that gives
	you a dial tone first.

	DTI - Digital Trunk Interface.

	DTMF  - Dual-Tone-Multi-Frequency, the generic term for the touch
	tone. These  include  0,1,2,3,4,5,6,7,8,9  as  well as A,B,C,D. See
	silver box for more details.

	DVM  -  Data  Voice  Multiplexor.  A system that squeezes more out
	of a transmission  medium  and  allows  a  customer  to  transmit 
	voice and data simultaneously to more than one receiver over the
	existing telefone line.



                                  - 188 -


	emergency  break-in  -  Name given to the art of "breaking" into a
	busy number  which  will  usually  result  in  becoming a third
	party in the call taking place.

	end office - Any class 5 switching office in North America.

	end-to-end  signalling  -  A  mode  of  network  operation in which
	the originating   central  office,  or  station,  retains  control 
	and  signals directly  to  each successive central office, or PBX,
	as trunks are added to the connection.

	ESS  - Electronic Switching System. "The phreak's nightmare come
	true." With  ESS,  EVERY  SINGLE  digit  you  dial  is recorded,
	even mistakes. The system  records  who  you  call, when you call,
	how long you talked, and, in some  cases,  what  you  talked 
	about.  ESS  is programed to make a list of people  who make
	excessive 800 calls or directory assistance. This is called
	the  "800  Exceptional  Calling  Report."  ESS can be programed to
	print out logs  of  who called certain numbers, such as a bookie,
	a known communist, a BBS,  etc.  ESS is a series of programs
	working together; these programs can be  very  easily  changed  to 
	do whatever the fone company wants ESS to do. With  ESS,  tracing 
	is  done in MILLISECONDS and will pick up any "foreign" tones  on
	the line, such as 2600 Hz. Bell predicts the whole country will be
	on  ESS  by  1990!  You can identify an ESS office by the
	functions, such as dialing  911  for  help, fortress fones with DT
	first, special services such as  call forwarding, speed dialing,
	call waiting, etc., and ANI on LD calls. Also, black boxes and
	Infinity transmitters will NOT work under ESS.

	extender  -  A  fone  line  that serves as a middleman for a fone
	call, such  as  the  800  or 950 extenders. These systems usually
	require a multi- digit code and have some sort of ANI to trace
	suspicious calls with.

	facsimile  -  A  system  for  the  transmission of images. The
	image is scanned  at  the  transmitter,  reconstructed  at the
	receiving station, and duplicated on some form of paper. Also known
	as a FAX.

	FAX - See facsimile for details.

	FiRM - A large cracking group who is slowly taking the place of PTL
	and the endangered cracking groups at the time of this writing.

	fortress  phone  - Today's modern, armor plated, pay fone. These
	may be the  older,  3  coin/coin  first  fones or the newer, 1
	coin/DT first fones. There  are  also  others, see CF, DTF, and PP.
	Most phortresses can be found in the 9xxx or 98xx series of your
	local Nxx. 

                                  - 189 -


	gateway city - See ISC.

	Gestapo  - The telefone company's security force. These nasties are
	the ones  that  stake  out  misused  phortresses  as  well as go
	after those bad phreaks that might be phucking with the fone
	system.

	green  base - A type of output device used by the fone company.
	Usually light  green  in  color  and stick up a few feet from the
	ground. See output device for more information.

	green  box - Equipment that will emulate the Coin Collect, Coin
	Return, and  Ringback  tones.  This  means  that if you call
	someone with a fortress fone  and  they  have  a  green  box,  by 
	activating it, your money will be returned.   The   tones   are,  
	in   hertz,   Coin  Collect=700+1100,  Coin Return=1100+1700,  and 
	Ringback=700+1700.  However,  before these tones are sent,  the  MF 
	detectors  at  the  CO  must be alerted, this can be done by
	sending  a  900+1500  Hz  or  single 2600 Hz wink of 90ms followed
	by a 60ms gap, and then the appropriate signal for at least 900ms.

	gold  box  -  This  box  will  trace  calls,  tell if the call is
	being traced, and can change a trace.

	grey box - Also known as a silver box. See silver box.

	group  chief  -  The  name  of the highest ranking official in any
	fone office. Ask to speak to these if an operator is giving you
	trouble. high-speed  data  -  A rate of data transfer ranging upward 
	from 10,000 bits per second.

	H/M - Hotel/Motel.

	ICH - International Call Handling. Used for overseas calls.

	ICVT - InComing Verification Trunk.

	IDA  -  Integrated  Digital  Access. The United Kingdom's
	equivalent of ISDN.

	IDDD  -  International  Direct  Distance Dialing - The ability to
	place international  calls  direct  without processing through a
	station. Usually, one  would  have to place the call through a 011,
	station, or a 01, operator assisted, type of setup.

	IDN  -  Integrated  Digital  Networks.  Networks  which provide
	digital access and transmission, in both circuit switched and
	packet modes. 





                                  - 190 -


	in-band  -  The  method of sending signaling information along with
	the conversion using tones to represent digits.

	INS - Information Network System. Japan's equivalent of ISDN.

	Intercept  -  The  intercept  operator  is the one you get
	connected to when  there  are not enough recordings available to
	tell you that the number has  been  disconnected  or  changed. 
	These usually ask what number you are calling and are the lowest
	form of the operator.

	intermediate  point  -  Any class 4X switching office in North
	America. Also known as an RSU.

	international  dialing  -  In order to call across country borders,
	one must  use  the  format PREFIX + COUNTRY CODE + NATION #. The
	prefix in North America  is  usually  011  for  station-to-station
	calls or 01 for operator-assisted calls. If you have IDDD, you
	don't need to place this prefix in.

	INTT - Incoming No Test Trunks.

	INWARD  -  An  operator  that  assists  your local TSPS '0'
	operator in connecting  calls.  These  won't  question you as long
	as the call is within their  service  area. The operator can ONLY
	be reached by other operators or a  blue  box.  The  blue box
	number is KP+NPA+121+ST for the INWARD operator that will help you
	connect to any calls in that area ONLY.

	INWATS  -  Inward  Wide  Area Telecommunications Service. These are
	the 800  numbers  we  are all familiar with. These are set up in
	bands; 6 total. Band  6  is the largest, and you can call band 6
	INWATS from anywhere in the US  except  the  state  where  the call
	is terminated. This is also why some companies  have  a  separate
	800 number for their state. Band 5 includes the 48  contiguous 
	states.  All the way down to band 1, which only includes the states 
	contiguous to that one. Understand? That means more people can
	reach a band 6 INWATS as compared to the people that can access a
	band 1 INWATS.

	IOCC  -  International  Overseas Completion Centre. A system which
	must be  dialed  in  order  to  re-route fone calls to countries
	inaccessible via dialing  direct.  To  route a call via IOCC with
	a blue box, pad the country code  to  the RIGHT with zeroes until
	it is 3 digits. Then KP+160 is dialed, plus the padded country
	code, plus ST.

	IPM  -  Interruptions  Per  Minute.  The number of times a certain
	tone sounds during a minute.




                                  - 191 -


	ISC  -  Inter-Nation  Switching  Centers.  Most  outgoing  calls
	from a certain  numbering  system  will be routed through these
	gateway cities" in order to reach a foreign country.

	SDN   -  Integrated  Services  Digital  Network.  ISDN  is  a 
	lanned hierarchy  of  digital  switching  and transmission
	ystems. Synchronized so that  all  digital elements speak the same
	language" at the same speed, the ISDN would provide voice, data,
	nd video in a unified manner.

	TT  -  This  is  another large LD service. The extenders owned by
	his company are usually considered dangerous. The format    is
	CC-ESS#,(NPA)Nxx-xxxx,1234567.

	kpk  -  Key  Pulse.  Tone that must be generated before inputting a
	one number using a blue box. This tone is, in hertz, 1100+1700.

	P2  - Key Pulse 2. Tone that is used by the CCITT SYSTEM 5 for
	pecial international calling. This tone is, in hertz, 1300+1700.
	
	ADT  -  Local Area Data Transport. LADT is a method by which
	ustomers will send and receive digital data over existing customer
	oop wiring. Dial-Up  LADT  will  let  customers use their lines
	or occasional data services; direct  access LADT will transmit
	imultaneous voice and data traffic on the same line.

	LAN - Local Area Network.

	LAPB - Link Access Protocol Balanced.

	LD - Long Distance

	leave Word And Call Back - Another new type of operator.

	local  loop  -  When  a loop is connected between you and your CO.
	his occurs when you pick the fone up or have a fone OFF-HOOK.

	Loop  -  A  pair  or group of fone lines. When people call these
	lines, they  can  talk  to  each  other. Loops consist of two or
	more numbers, they usually  are  grouped  close  together somewhere
	in the Nxx-99xx portions of your  exchange.  The lower number in a
	loop is the tone side of the loop, or the  singing switch. The
	higher number is always silent. The tone disappears on  the  lower  
	#  when someone dials the other side of the loop. If you are the  
	higher  #,  you  will  have  to  listen to the clicks to see if 
	someone dialed  into  the  loop. There also are such things as Non-
	Supervised loops, where  the call is toll-free to the caller. Most 
	loops will be muted or have annoying  clicks  at  connection, but 
	otherwise, you might find these useful 

                                  - 192 -


	goodies  scanning  the  99xx's in your exchange. Some loops allow
	multi-user capability;  thus,  many  people  can talk to each other
	at the same time, a conference  of  sorts.  Since loops are genuine
	test functions for the telco during the day, most phreaks scan and
	use them at night.

	MA  -  Ma  Bell,  the Bell Telesys Company. Telco, etc. See Ma Bell
	for more information.

	Ma  Bell  -  The telephone company. The Bell Telesys Phone Company.
	The company  you  phreak  and  hack  with. The company that doesn't
	like you too much.  The company you often phuck with, and sometimes
	phuck up. The company that can phuck u up if u aren't careful.

	make  period  -  The  time  when,  during pulse dialing, the
	circuit is closed.  In  the US, this period is 60ms; however,
	foreign nations may use a 67ms  make  period.  Make  periods are
	also referred to in percentages, so a 60ms make period would be
	60%, a 67ms as 67%.

	marine verify - Another type of operator.

	MCI  -  Yet  another  LD service that owns many dial-ups in most
	areas. However,  the  codes from various areas may not be
	interchangeable. Not much is  known  about  MCI;  however,  MCI 
	probably has some sophisticated anti-phreak equipment. The format
	is ACC-ESS#,12345,(NPA)Nxx-xxxx.

	MCI  Execunet  -  The  calling  card  equivalent  of the regular
	MCI LD service,  but the codes are longer and interchangeable. For
	the local access port  near  you,  call  (800)555-1212.  The 
	format  for  the  port  will be ACC-ESS#,1234567,(NPA)Nxx-xxxx.

	Metrofone  -  Owned  by Western Union. A very popular system among
	fone phreaks.  Call  Metrofone's  operator and ask for the local
	access number at (800)325-1403.  The  format  is 
	ACC-ESS#,CODE,(NPA)Nxx-xxxx.  Metrofone  is alleged to place trap
	codes on phreak BBS's.

	MF  - Multi-Frequency. These are the operator and blue box tones.
	An MF tone  consists  of  two  tones  from  a  set  of  six master
	tones which are combined  to  produce  12  separate  tones.  These
	are NOT the same as touch tones. See blue box tones for
	frequencies.

	mobile - A type of operator.

	NAP/PA - North American Pirate/Phreak Association. A large group of
	bbs boards which include a lot of pirates/phreakers. I'm not quite
	sure where the group will go from here.


                                  - 193 -


	NON  PUB  DA  - A reverse type of CN/A bureau. You tell the service
	the name  and the locality, they will supply the fone number.
	However, they will ask  for  you  name,  supervisor's  name,  etc. 
	Use your social engineering skills  here  (aka,  bullshitting
	skills). You also can get detailed billing
	information from these bureaus.

	NPA  -  Numbering Plan Area. The area code of a certain city/state.
	For example,  on  the  number  (111)222-3333,  the  NPA would be
	111. Area codes never  cross state boundaries sans the 800, 700,
	900, and special exchanges. 

	Nxx  -  The exchange or prefix of the area to be dialed. For 
	example of the number (111)222-3333, the Nxx would be 222.

	OGVT - OutGoing Verification Trunk.

	OFF-HOOK  - To be on-line, to have the switchhook down. To have a
	closed connection. At this point, you also have a local loop.

	ON-HOOK  -  To  be off-line, to have the switchhook up. To have an
	open connection.

	ONI  -  Operator Number Identification. Identifies calling numbers
	when an office is not equipped with CAMA, the calling  number  is 
	not automatically recorded by CAMA, or has equipment failures, such
	as ANIF.

	OPCR  -  Operator  Actions  Program.  Standard  TBOC  or equivalent
	"0" operator.

	OPEN  -  Northern  Telecom's  Open  Protocol  Enhanced  Networks 
	World Program.

	OSI   -  Open System Interconnection. Form of telecommunication
	architechture which will probobly fail to SNA.

	OST - Originating Station Treatment.

	OTC - Operating Telefone Company.

	out-of-band  -  Type  of signaling which sends all of the signaling
	and supervisory  informations,  such  as  ON  and  OFF  HOOK, over
	separate data links.

	output  device  -  Any  type  of interface such as cans, terminal
	sets, remote  switching centers, bridging heads, etc., where the
	fone lines of the immediate  area are relayed to before going to
	the fone company. These often are  those  cases  painted light
	green and stand up from the ground. Most of these  can  be  opened 
	with a 7/16 hex driver, turning the security bolt(s)
	1/8  of  an  inch  counter-clockwise,  and  opening. Terminals on 

                                  - 194 -


	the inside might  be  labeled "T" for tip and "R" for ring.
	Otherwise, the ring side is usually on the right and the tip side
	is on the left.

	OUTWATS  - Outward Wide Area Telecommunications Service. These are
	WATS that are used to make outgoing calls ONLY.

	Paper  Clip  Method  -  This method of phreaking was illustrated in
	the movie  War Games. What a phortress fone does to make sure money
	is in a fone is  send  an  electrical  pulse  to  notify  the  fone 
	that a coin has been deposited,  for  the  first  coin  only. 
	However,  by  simply grounding the positive  end  of  the
	microphone, enough current and voltage is deferred to the  ground 
	to  simulate  the first quarter in the coin box. An easy way to
	accomplish  this is to connect the center of the mouthpiece to the
	coin box, touch  tone  pad,  or anything that looks like metal with
	a piece of wire. A most  convenient  piece  of wire is a bend out
	of a paper clip. Then you can send  red  box  tones  through the
	line and get free fone calls! Also, telco modified  fones  may 
	require  you  to  push  the  clip  harder  against the mouthpiece, 
	or  connect  the mouthpiece to the earpiece. If pressing harder
	against the mouthpiece becomes a problem, pins may be an easier
	solution.

	PBX  -  Private Branch eXchange. A private switchboard used by some
	big companies  that  allow  access  to  the  OUTWATS line by
	dialing  a 8 or a 9 after inputting a code.

	PCM - Pulse Code-Modulated trunks.

	PC  Pursuit  -  A  computer  oriented LD system, comparable to
	Telenet, which  offers low access rates to 2400 baud users. Hacking
	on this system is virtually impossible due to the new password
	format.

	pen  register  -  A  device  that the fone company puts on your
	line if they  suspect  you  are fraudulently using your fone. This
	will record EVERY SINGLE  digit/rotary  pulse  you  enter  into 
	the  fone  as  well  as other pertinent  information,  which  may 
	include a bit of tapping. Also known as DNR.

	Phortune 500 - An elite  group  of  users  currently paving the way
	for better quality in their trade.

	PHRACK   -  Another  phreak/hack  oriented  newsletter.  See 
	reference section, phile 1.6 for more information.

	PHUN  -  Phreakers and Hackers Underground Network. They also
	release a newsletter that is up to #4 at the time of this writing.
	See phile 1.6 for more information on finding this phile.


                                  - 195 -


	PIN  -  Personal  Identification  Number  -  The  last four digits
	on a calling card that adds to the security of calling cards.

	plant  tests  -  test  numbers  which include ANI, ringback, touch
	tone tests, and other tests the telco uses.

	Post Office Engineers - The United Kingdom's fone workers.

	PP  -  Dial  Post-Pay  Service. On phortress fones, you are
	prompted to pay  for the call after the called party answers. You
	can use a clear box to get around this.

	PPS - Pulses Per Second.

	printmeter  -  The  United  Kingdom's equivalent of a pen register.
	See pen register for more info.

	PTE - Packet Transport Equipment.

	PTL - One of the bigger cracking groups  of all time. However, the
	group has been dying off and only has a few nodes as of this
	writing.

	PTS - Position and Trunk Scanner.

	PTT - Postal Telephone Telegraph.

	pulse - See rotary phones.

	purple  box  -  This one would be nice. Free calls to anywhere via
	blue boxing,  become  an  operator  via  blue box, conference
	calling, disconnect fone  line(s),  tap  fones,  detect  traces, 
	intercept directory assistance calls. Has all red box tones. This
	one may not be available under ESS.

	rainbow  box  -  An  ultimate  box. You can become an operator. You
	get free  calls,  blue  box. You can set up conference calls. You
	can forcefully disconnect  lines.  You can tap lines. You can
	detect traces, change traces, and  trace as well. All incoming
	calls are free. You can intercept directory assistance.  You have
	a generator for all MF tones. You can mute and redial. You  have 
	all  the  red-box tones. This is an awesome box. However, it does
	not exist under ESS.

	RAO  -  Revenue  Accounting Office. The three digit code that
	sometimes replaces the NPA of some calling cards.

	RBOC - Regional Bell Operating Company.

	red  box  -  Equipment that will emulate the red box tone generated
	for coin recognition in all phortress fones.

                                  - 196 -


	red  box  tones - Tones that tell the phortress fone how much money
	was inserted  in  the  fone  to make the required call. In one slot
	fones, these are  beeps in pulses; the pulse is a 2200+1700 Hz
	tone. For quarters, 5 beep tones  at 12-17 PPS, for dimes it is 2
	beep tones at 5-8.5 PPS, and a nickel causes  1  beep  tone  at 
	5-8.5  PPS.  For  three slot fones, the tones are
	different.  Instead of beeps, they are straight dual tones. For a
	nickel, it is  one  bell  at 1050-1100 Hz, two bells for a dime,
	and one gong at 800 Hz for  a  quarter.  When  using  red  box 
	tones, you must insert at least one nickel  before playing the
	tones, cuz a ground test takes place to make sure some  money  has 
	been  inserted. The ground test may be fooled by the Paper
	Clip  Method.  Also,  it has been known that TSPS can detect
	certain red box tones, and will record all data on AMA or CAMA of
	fraudulent activity.

	regional center - Any class 1 switching office in North America.

	REMOB  -  Method  of  tapping  into  lines by entering a code and
	the 7 digit  number you want to monitor, from ACD Test Mode. A
	possibility of this may be mass conferencing.

	ring  -  The  red wire found in fone jacks and most fone equipment.
	The ring  also is less positive than the tip. When looking at a
	fone plug on the end  of typical 4 wire fone line from the top,
	let's say the top is the side with  the  hook,  the ring will be
	the middle-right wire. Remember, the ring is red, and to the right.
	The three "R's" revived!

	ring-around-the-rosy  -  9  connections  in tandem which would
	cause an endless loop connection and has never occurred in fone
	history.

	ringback  -  A  testing  number that the fone company uses to have
	your fone  ring  back  after  you  hang  up.  You  usually  input
	the three digit ringback  number  and  then  the last four digits
	to the fone number you are calling from.

	ring  trip  -  The  CO  process  involved  with stopping the AC
	ringing signal when a fone goes OFF-HOOK.

	rotary  phone  -  The dial or pulse phone that works by hooking and
	un-hooking  the  fone  rapidly  in  secession  that  is directly
	related to the number  you  dialed.  These  will  not  work  if
	another phone with the same number is off-hook at the time of
	dialing.

	Rout  & Rate - Yet another type of operator; assists your TSPS
	operator with rates and routings. This once can be reached at
	KP+800+141+1212+ST.

	RPE - Remote Peripheral Equipment.

                                  - 197 -


	RQS  -  The  Rate  Quote System. This is the TSPS operator's
	rate/quote system.  This  is  a  method your '0' operator gets info
	without dialing the rate and route operator. The number is
	KP+009+ST.

	RSU  -  Remote  Switching  Unit.  The  class 4X office that can
	have an unattended exchange attached to it.

	RTA - Remote Trunk Arrangement.

	SAC  -  Special  Area Code. Separate listing of area codes, usually
	for special services such as TWX's, WATS, or DIAL-IT services.

	SCC  -  Specialized  Common  Carriers.  Common  Nxx  numbers  that 
	are specialized for a certain purpose. An example is the 950
	exchange. sectional center - Any class 2 switching office in North
	America. service monitoring - This is the technical name of phone
	tapping. 

	SF  -  Supervision Control Frequency. The 2600 Hz tone which seizes
	any open trunk, which can be blue boxed off of.

	short-haul - Also known as a local call.

	signalling  -  The  process  by  which  a  caller  or  equipment on
	the transmitting  end of a line in: forms a particular party or
	equipment at the receiving  end  that a message is to be
	communicated. Signalling is also the supervisory  information 
	which  lets  the  caller  know the called know the called  party 
	is  ready  to talk, the line is busy, or the called party has
	hung up.

	silver  box  -  Equipment that will allow you to emulate the DTMF
	tones A,B,C,D.  The  MF  tones  are, in hertz, A=697+1633,
	B=770+1633, C=852+1633, D=941+1633.  These  allow  special
	functions from regular fones, such as ACD Testing Mode.

	Skyline  -  Service  owned  by  IBM,  Comsat, and AEtna. It has a
	local access  number in the 950 exchange. The fone number is
	950-1088. The code is either a 6 or 8 digit number. This company is
	alleged to be VERY dangerous. 

	SNA  - System Network Architechture, by IBM. A possible future
	standard of architechture only competed by OSI.

	SOST  -  Special  Operator Service Treatment. These include calls
	which must  be  transferred  to  a  SOST switchboard before they
	can be processed; services such as conferences, appointments,
	mobile, etc.



                                  - 198 -


	SPC  -  Stored  Program  Control.  Form of switching the US has
	heavily invested in.

	Sprint  -  One of the first LD services, also known as SPC. Sprint
	owns many  extender  services  and is not considered safe. It is
	common knowledge that Sprint has declared war on fone phreakers.

	SSAS  -  Station  Signaling  and  Announcement  System.  System on
	most fortress  fones  that will prompt caller for money after the
	number, usually LD  numbers,  has  been  dialed,  or the balance
	due before the call will be allowed to connect.

	stacking  tandems  -  The  art  of  busying  out all trunks between
	two points. This one is very amusing.

	STart  -  Pulse  that  is transmitted after the KP+NPA+Nxx+xxxx
	through operator or blue boxed calls. This pulse is, in hertz,
	1500+1700.

	station # - The last four digits in any seven digit fone number.

	STD  -  Subscriber Trunk Dialing. Mechanism in the United Kingdom
	which takes  a  call from the local lines and legimately elevates
	it to a trunk or international level.

	step  crashing  -  Method  of  using a rotary fone to break into a
	busy line.  Example,  you  use  a rotary fone to dial Nxx-xxx8 and
	you get a busy signal.  Hang  up  and  dial  Nxx-xxx7 and in
	between the last pulse of your rotary  dial  and  before  the  fone
	would begin to ring, you can flash your switchhook  extremely 
	fast.  If  you do it right, you will hear an enormous
	"CLICK" and all of a sudden, you will cut into your party's
	conversation. 

	STPS  -  Signal  Transfer  PointS.  Associated  with  various
	switching machines and the new CCIS system.

	switchhook  -  The  button on your fone that, when depressed, hangs
	the fone up. These can be used to emulate rotary dial fones if used
	correctly.

	SxS  -  Step-By-Step.  Also  known  as  the Strowger Switch or the
	two-motion  switch.  This  is  the switching equipment Bell began
	using in 1918. However,  because  of  its  limitations,  such  as
	no direct use of DTMF and maintenance  problems,  the  fone 
	company has been upgrading since. You can identify  SxS  switching 
	offices  by  lack  of DTMF or pulsing digits after 	dialing  DTMF, 
	if you go near the CO it will sound like a typewriter testing factory,  
	lack  of  speed  calling,  lack  of  special  services  like  call 
	forwarding  and  call  waiting,  and  fortress  fones want your money 
	first, before the dial tone.

                                  - 199 -


	TAP - The "official" phone phreak's newsletter. Previously YIPL.

	T&C - Time and Charge.

	tapping  -  To listen in to a phone call taking place. The fone
	company calls this "service monitoring."

	TASI  - Time Assignment Speech Interpolation. This is used on
	satellite trunks,  and basically allows more than one person to use
	a trunk by putting them on while the other person isn't talking.

	Telenet  -  A  computer-oriented  system  of relay stations which
	relay computer  calls  to  LD  numbers.  Telenet  has a vast array
	of access ports accessible at certain baud rates.

	Tel-Tec  -  Another LD company that usually give out a weak
	connection. The format is (800)323-3026,123456,(NPA)Nxx-xxxx.

	Tel-Tex  -  A  subsidiary  of  Tel-Tec,  but is only used in Texas.
	The number is *800)432-2071 and the format is the same as above.

	terminal   -   A   point   where  information  may  enter  or 
	leave  a communication  network.  Also,  any device that is capable
	of sending and/or receiving data over a communication channel.

	tip  -  The green wire found in fone jacks and most fone equipment.
	The tip  is  the more positive wire compared to the ring. When
	looking at a fone plug  from  the  top, lets say the hook side is
	the top, the tip will be the middle wire on the left.

	toll center - Any class 4 switching office located in North
	America. 

	toll point - Any class 4P switching office in North America.

	Toll LIB - Reverse CN/A bureau. See NON PUB DA for more info.

	touch tone phone - A phone that uses the DTMF system to place
	calls.

	touch  tone  test  - This is another test number the fone company
	uses. You  dial  the  ringback  number and have the fone ring back.
	Then, when you pick  it up, you will hear a tone. Press your
	touch-tone digits 1-0. If they are correct, the fone will beep
	twice.

	trace  -  Something  you don't want any fone company to do to you.
	This is  when the fone company you are phucking with flips a 

                                  - 200 -


	switch and they find the  number you are calling from. Sometimes
	the fone company will use ANI or trap  and  trace  methods  to
	locate you. Then the local Gestapo home in and terminate the caller
	if discovered.

	trap  and  trace  - A method used by the FBI and some step offices
	that forces  a  voltage  through  the  line and traces
	simultaneously, which mean that  you  can't  hang  up  unless the
	Pheds do, and pray you aren't calling from your own house. Trap and
	trace is also known as the lock-in-trace.

	trap  codes  -  Working  codes owned by the LD company, not a
	customer, that,  when  used,  will  send  a  "trouble card" to Ma
	Bell, no matter what company  the  card  is coming from, and ESS
	will immediately trace the call. Trap  codes  have  been in use for
	some time now, and it is considered safer to  self-hack  codes 
	opposed  to  leeching them off of BBS's, since some LD
	companies post these codes on phreak oriented BBS's.

	Travelnet  - Service owned by GM that uses WATS as well as local
	access numbers. Travelnet also accepts voice validation for its LD
	codes.

	TSPS  -  Traffic  Service Position System. Operator that usually is
	the one  that  obtains billing information for Calling Card or 3rd
	number calls, identifies  called customer on person-to-person
	calls, obtains acceptance of charges  on  collect  calls,  or
	identifies calling numbers. These operators have an ANI board and
	are the most dangerous type of operator.

	TWX  -  Telex  II  consisting of 5 teletypewriter area codes. These
	are owned  by  Western  Union.  These  may  be  reached  via
	another TWX machine running at 110 baud. You can send TWX messages
	via Easylink (800)325-4122.

	USDN  -  United  States  Digital  Network. The US's version of the
	ISDN network.

	videotext  -  Generic  term  for  a  class of two-way, interactive
	data distribution  systems  with  output typically handled as in
	teletext systems and input typically accepted through the telephone
	or public data network.

	WATS  -  Wide  Area Telecommunications Service. These can be IN or
	OUT, see the appropriate sections.

	WATS  Extender  - These are the LD companies everyone hacks and
	phreaks off of in the 800 NPA. Remember, INWATS + OUTWATS = WATS
	Extender.

	white box - This is a portable DTMF keypad.


                                  - 201 -


	XBAR  -  Crossbar.  Crossbar is another type of switching equipment
	the fone  company  uses  in  some areas. There are three major
	types of Crossbar systems  called  No.1 Crossbar (1XB), No.4
	Crossbar (4XB), and No.5 Crossbar (5XB).  5XB  has been the primary
	end office switch of MA since the 60's and
	is  still  in  wide  use. There is also Crossbar Tandem (XBT) used
	for toll-switching.

	XBT - Crossbar Tandem. Used for toll-switching. See XBAR.

	YIPL - The classic "official" phreak's magazine. Now TAP.


    	                        Other Fone Information
        	                    ======================

            	              Voltages & Technical Stuff
                	          --------------------------
	      When  your telephone is ON-HOOK, there is 48 volts of DC
	across the tip  and  the  ring.  When  the  handset of a fone is
	lifted a few switches close  which  cause a loop to become
	connected between you and the fone company, or  OFF-HOOK.  This  is 
	also known as the local loop. Once this happens, the DC current  is
	able to flow through your fone with less resistance. This causes 
	a  relay  to  energize  which  causes other CO equipment to realize
	that you  want  service.  Eventually,  you  will  end  up  with a
	dial tone. This also  causes  the 48 VDC to drop down to around 12
	VDC. The resistance of the loop  also  drops  below the 2500 ohm
	level; FCC licensed telephone equipment must  have an OFF-HOOK
	impedance of 600 ohms.
	      When  your  fone rings, the telco sends 90 volts of pulsing
	AC down the  line  at  around 15-60 Hz, usually 20 Hz. In most
	cases, this causes a metal  armature  to  be attracted alternately
	between two electromagnets; thus, the  armature  often  ends up
	striking two bells of some sort, the ring you often  hear  when 	
	non-electronic  fones  receive  a  call. Today, these mechanical 
	ringers  can  be  replaced  with  more  modern  electronic  bells 
	and other  annoying  signaling  devices,  which  also explains why
	deaf people can have lights and other equipment attached to their
	fones instead of ringers.
	      When  you  dial on a fone, there are two common types of
	dialing, pulse  and  DTMF.  If  you  are like me, you probably
	don't like either and thought  about  using  MF  or  blue  box 
	tones.  Dialing  rotary  breaks  and  makes  connections  in  the 
	fone  loop, and the telco uses this to signal to their  equipment 
	that  you  are  placing  a  call.  Since  it  is one fone that is
	 disconnecting  and  reconnecting  the  fone  line,  if someone
	else picks up  another  fone on the same extension, both cannot
	make pulse fone calls until  one  hangs  up. DTMF, on the other
	hand, is a more modern piece of equipment  and  relies  on tones
	generated by a keypad, which can be characterized by a 
	0,1,2,3,4,5,6,7,8,9/A,B,C,D   keypad.  Most  fones  don't  have  
                                  - 202 -


	an  A,B,C,D  keypad,  for  these  frequencies  are  used  by the
	telco for test and other  purposes.

    	                       Scanning Phun Fone Stuff
        	                   ------------------------
	      Scanning  is  the  act  of either randomly or sequentially
	dialing fone  numbers  in  a  certain  exchange when you are
	looking for several different  things.  These  things  could  be 
	carriers,  extenders, ANI, "bug tracers,"  loops,  as  well  as 
	many other interesting "goodies" the fone company uses  for test
	purposes.
    	  When  scanning  for carriers, your local BBS probably has
	some scanning  programs,  as  these became popular after the movie
	WARGAMES, but what these  do  are  to  call  every  fone  in an
	exchange, or a specified range of fone  numbers  in  certain 
	exchanges  to  look  for  possible  carriers and other
	 interesting  computer  equipment.  So,  if your computer finds a
	carrier, or  what  seems  like  a carrier, it will either print it
	out or save it in some  file  for  later  reference.  With  these
	carriers one finds, one can either  call  them  and find out what
	each is or, if one of them is interesting, one  can  hack  or 
	attempt to break into some interesting systems available, not  to
	the general public, of course.
    	  Scanning telephone "goodies" requires time and patience.
	These goodies  usually  cannot  be traced by most unmodified
	modems, as the frequencies and  voice  transmissions  cannot be
	differentiated from other disturbances, such  as  the  annoying 
	operator saying, "We're sorry... blah blah..". Anyway, to  scan 
	these,  you  usually get a regular carrier scanner and, with the
	modem  speaker  on,  sit  by  your wonderful computer and listen in
	on the scanning  for  any  interesting  tones, voices, or silences,
	which could be telco fone  phun  numbers,  for  us  of  course! 
	Then write these down, and spread them around,  use,  abuze,  etc. 
	if  you dare. Anyway, most telefone goodies are
	 located  in  the 99xx suffixes of any fone exchange. If you found
	everything  you  think in the exchanges you have scanned, try the
	0xxx and 1xxx suffixes  in  that order. You might even find loops,
	ANI, and other phun things if you  mess around enough.


    	                    References & Suggested Reading
	       	                ==============================
	      The  following  is  a  list of references and suggested
	reading for the  beginning,  as well as advanced phreak. See you
	local fone phreak for these,  or  call  your  local  phreak 
	oriented  BBS for information regarding these publications.

	 2600 Magazine

	 Aqua Box, The By Captain Xerox & The Traveler


                                  - 203 -


	 Basic Alliance Teleconferencing By The Trooper
 
	 Bell Hell By The Dutchman & The Neon Knights

	 Better Homes And Blue Boxing By Mark Tabas

	 BIOC Agent 003's Course In Basic Telecommunications
    	  By BIOC Agent 003

	 History Of British Phreaking, By Lex Luthor & The Legion Of Doom

	 Home Phone Tips By 13th Floor Enterprises

	 How To Build A Blotto Box By The Traveler

	 How To Build A Cheese Box By Mother Phucker

	 Introducing The Beige Box - Construction & Use
	      By The Exterminator and The Terminal Man

	 Integrated Services Digital Network [ISDN]
	      By Zander Zan

	 LOD/H Technical Journal

	 Loops I've Known And Loved By Phred Phreak

	 PHRACK Magazine
    	  Edited By Taran King and Knight Lightning UMCVMB
























                                  - 204 -

	950's:  The Real Story: by Jester

	    Ever heard (actually, seen) people on various hacking boards
	around the  country telling you how you are going to get caught for
	sure if you use the in state-WATS (950) telephone numbers to make
	your phreaks off of? This file is to tell you what the story is
	with 950's and how to SAFELY use them. The 950 prefix was created
	by the old Bell System for all the SSC's  (Specialized Common
	Carrier), or Extenders as they are called, to place their services
	upon.  This was done for the long distance company's benefit so
	they could have the same dialup in all cities across the USA. For
	some reason, the Long Distance companies rejected the 950 prefix in
	favor of local lines and 1-800 numbers.

    	 Disadvantages to 950's are that they are run on a special ESS
	of their own that can trace you call before you can say 'shit!'. 
	But tracing only  occurs on special occasions.  The companies on
	950's will only trace when the computer controlling the calls sees
	that there is an unusually high number of calls to the extender on
	that particular day.  The computer then will  auto-trace every
	100th call or so.  Which means that, if used in moderation, 950's
	are fantastic!

    	  Advantages:  By having the same dialup in all cities, you can
	go on vacation and just hack codez to use for while you are there
	on your favorite  950 extender.  Being a free call (in most cases,
	some phones not) from a pay phone, this is very advantageous.  
	Also, and anyone who has used a 950 knows this, the connections on 
	950 extenders are VERY clear usually, making for  excellent 
	error-free data transfer on AE lines, etc.

    	   With the breakup of the Bell System in January of 1984, the
	950 prefix was supposed to be dragged down with it and the
	companies were supposed to  have switched over to either local or
	1-800 numbers, but as is very typical of the phone company, they
	never got around to it.

    	   Here is the list of the 950's that are currently in use in
	the U.S.  :

    	        950-1000..........Southern Pacific Communications
        	    950-1022..........MCI Exec-U-Net
            	950-1033..........U.S. Telephone
	            950-1044..........AllNet
    	        950-1066..........Lexitel
        	    950-1088..........SBS Skyline

	      Personally, I favor the use of 950-1088, because it has many
	users and the codez (which, by the way are 6 digits, but they are
	switching over to 8  igits) are easy to hack out from a 
	pay phone.  You may want to try the other services so you can have
	a few codez from each available for use.

                                  - 205 -


	Automatic Number Identifier: By Jester

    	                    Automatic Number Identification


	    Automatic Number Identification (ANI) is nothing more than
	automatic means for immediately identifying the Directory Number of
	a calling subscriber. This process made it possible to utilize
	CAMA* (Centralized Automatic Message Accounting) systems in SxS,
	Panel, and Xbar #1 offices. The identity of the calling line is
	determined by ANI circuits installed in the types of CO's mentioned
	above. Xbar#5 offices have their own AMA (Automatic Message
	Accounting) equipment and utilize an AMA translator for
	automatically identifying the calling line.

    	Before ANI was developed, each subscriber line (also called a
	local loop) had a mechanical marking device that kept track of toll
	charges. These devices were manually photographed at the end of the
	billing period and the amount of the subscribers bill was
	determined from that. This process was time consuming, so a new
	system (ANI) was developed.

		The major components of the ANI system used in SxS and Crossbar #1
	are: Directory number network and bus arrangement* for connecting
	the sleeve (the lead that is added to the R(ing) and T(ip) wires of
	a cable pair at the MDF* (Main Distribution Frame)); A lead of each
	line number through an identifier connector to the identifier
	circuit; Outpulser and Identifier connector circuit to seize an
	idle Identifier; Identifier circuit to ascertain the calling
	party's number and send it to the outpulser for subsequent
	transmission through the outpulser link to the ANI outgoing trunk;
	An ANI outgoing trunk to a Tandem office equipped with a CAMA system.

	    The following is a synopsis of the ANI operations with respect
	to a toll call through a #1Xbar office. The call is handled in the
	normal manner by the CO equipment and is routed through an ANI
	outgoing trunk to a Tandem office. The identification process
	starts as soon as all digits of the called number are received by
	the CAMA sender in the Tandem office and when the district juncture
	in the Xbar office advances to its cut-through position (a position
	of the connecting circuits or paths between the line-link and
	trunk-link frames in the CO).

    	  Upon receiving the start identification signal from the CAMA
	equipment, the ANI outgoing trunk (OGT) establishes a connection
	through an outpulser link to an idle outpulser circuit. An idle
	identifier is then seized by the outpulser circuit through an
	internal Identifier connector unit. Then the identifier through 
	the connector unit connects to the directory number network and 
	bus system.



                                  - 206 -


	    At the same time, the identifier will signal the ANI trunk to
	apply a 5800Hz identification tone to the sleeve lead of the ANI
	trunk. The tone is transmitted at a two-volt level over the S lead
	paths through the directory number network and bus system. It will
	be attenuated or decreased to the microvolt range by the time the
	identifier circuit is reached, necessitating a 120dB voltage
	amplification by the amplifier detector equipment in the
	identifier to insure proper digit identification and registration
	operations.

	    A single ANI installation can serve as many as six CO's in a
	multi-office building. The identifier starts its search for the
	calling line number by testing or scanning successively the
	thousands secondary buses of each CO. When the 5800Hz signal is
	detected, the identifier grounds corresponding leads to the
	outpulser, to first register the digit of the calling office and
	then the thousands digit of the calling subscriber's number. The
	outpulser immediately translates the digit representing the calling
	office code into its own corresponding three digit office code. The
	identifier continues its scanning process successively on the
	groups of hundreds, tens, and units secondary buses in the calling
	office, and the identified digits of the calling number are also
	registered and translated in the outpulser's relay equipment for 
	transmission to the tandem office.  The outpulser is equipped with 
	checking and timing features to promptly detect and record troubles 
	encountered (This process may be responsible for some of the cards 
	found while trashing). Upon completion of the scanning process, it 
	releases the identifier and proceeds to outpulse in MF tones the 
	complete calling subscriber's number to the CAMA equipment in the 
	tandem office in the format of KP+X+PRE+SUFF+ST where the X is an 
	information digit. The information digits are as follows: 
	0-Automatic Identification (normal)     
	1-Operator Identification (ONI)*
	2-Identification Failure (ANIF)*

	(There is also other types of outpulsing of ANI information if the
	calling line has some sort of restriction on it).

	    When all digits have been transmitted and the ANI trunk is
	cut-through for talking, the outpulser releases.

	    In the tandem office, the calling party's number is recorded on
	tape in the CAMA equipment together with other data required for
	billing purposes. This information, including the time of when the
	called station answered and the time of disconnect, goes on AMA
	tapes. The tapes themselves are usually standard reel to reel
	magnetic tape, and are sent to the Revenue Accounting Office or RAO
	at the end of the billing period.




                                  - 207 -


	    So, to sum the entire ANI process up:

	The toll call is made. The CO routes the call through ANI trunks
	where an idle identifier is seized which then connects to the
	directory number network and bus system while signalling the ANI
	trunk to apply the needed 5800Hz tone to the Sleeve. The identifier
	begins a scanning process and determines the calling office number
	and the digits of the calling subscriber's number, which is sent by
	way of the outpulser in MF tones to the CAMA equipment in the
	tandem office. The call information is recorded onto AMA tapes and
	used to determine billing.

	    Note that your number does show up on the AMA tape, if the
	circumstances are correct, (any toll call, whether it is from a
	message-rate line or from a flat-rate line). However, the AMA tapes
	do not record the calling line number in any separated format. They
	are recorded on a first-come, first-serve basis.


	Misc. Footnotes (denoted by an asterisk in the main article)
	---------------

	* ANIF-Automatic Number Identification Failure. This is when the
	ANI equipment does not work properly, and could occur due to a wide
	variety of technicalities. When ANIF occurs, something called ONI
	(Operator Number Identification) is used. The call is forwarded to
	a TSPS operator who requests the calling line number by saying
	something similar to 'What number are you calling from?'

	* CAMA-Centralized Automatic Message Accounting. CAMA is a system
	that records call details for billing purposes. CAMA is used from
	a centralized location, usually a Tandem office. CAMA is usually
	used to serve class 5 End Offices in a rural area near a large city
	which contains a Tandem or Toll Office. CAMA is similar to LAMA,
	except LAMA is localized in a specific CO and CAMA is not.

	* The Directory Number Network and bus system is a network involved
	with the ANI process. It is a grid of vertical and horizontal
	buses, grouped and classified as Primary or Secondary. There are
	100 vertical and 100 horizontal buses in the Primary system. In the
	Secondary system, there are two sub-groups: Bus system #1 and Bus
	system #2, both of which have ten horizontal and vertical buses.
	These buses as a whole are linked to the Identifier in the ANI
	trunk and are responsible for identifying tens, hundreds, thousands
	and units digits of the calling number (After the Identifier begins
	its scanning process).

	* MDF-Main Distribution Frame. This is the area where all cable
	pairs of a certain office meet, and a third wire, the Sleeve wire,
	is added. The Sleeve wire is what is used in gathering ANI 

                                  - 208 -


	information, as well as determining a called lines status (off/on
	hook) in certain switching systems by presence of voltage. (voltage
	present on Sleeve, line is busy, no voltage, line is idle.) 

	* ONI-Operator Number Identification. See ANIF footnote.

	NOTE: There are also other forms of Automatic Message Accounting,
	such as LAMA (Local Automatic Message Accounting). LAMA is used in
	the class 5 End Office as opposed to CAMA in a Toll Office. If your
	End Office had LAMA, then the ANI information would be recorded at
	the local level and sent from there. The LAMA arrangement may be
	computerized, in which it would denoted with a C included (LAMA-C
	or C-LAMA).







































                                  - 209 -