💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › PHREAKING › part2_tx.txt captured on 2022-07-17 at 11:07:40.

View Raw

More Information

⬅️ Previous capture (2022-06-12)

-=-=-=-=-=-=-



                   THE IC'S RULES OF PHREAKING


 These are the standards of hacking employed by the Inner Core.
 The text comes from a data file written by and for IC members.

                      HACK YOUR OWN CODES. 

Don't leech from someone else. Having codes is like having sex,
if you don't protect yourself you'll end up with a venereal
disease. You have no idea where a code has been before you got
your hands on it, when it was hacked or how long it's been in
circulation. Time is a very important factor, the longer a code
has been in use, the greater the risk.

           DON'T STAY ON A CODE MORE THAN THREE DAYS. 

 Don't give the suckers an even break. To run a trace, MCI needs 
to shuffle a lot  of papers. Ain't that nice. Paper work takes 
time, and it's highly unlikely they could accomplish the feat in 
three days. It's even more unlikely  they would even know  
they've been phreaked for at least a week. All company's have 
thirty day billing cycles, if you started using the code the day 
after the bills went out, you'd have twenty nine days left to 
play with it. The customer gets his billing and bitches up a
 storm. The company now has the option of setting up a trap, but
 alas, they notice  you haven't used the code in three weeks and
 have no destination number to PIN. If you phreaked the code one
 day before the billing cycle ends, the customer may notice
 right away. Figure you have two days for it to reach the
 customer. If he yells right away it takes a few more days for
 the security department to process the paperwork for the trace.
 By that time you're long gone.

           DON'T STAY ON A NODE MORE THAN THREE DAYS.

 If you insist on burning the same company, you're going to
 develop a pattern. You call your girl friend in Alaska every
 damned day using the same company. It doesn't take a genius to
 predict what you're going to do tomorrow. They know where you
 enter their system and where you're going to. You've given them
 everything they need to run a good trace. Spread the wealth a
 little. Use US Telecom, then ITT, Lexitel, Skyline, Metro and a
 few of the 800's if you like. Spread it out. These people have
 no way of comparing. So you can screw Peter, Paul and the rest
 of the Apostles with no worry. Just don't be a dip stick and get
 lazy.

 Everyone is worried about THE TRACE. Don't be. It's no big deal
 for AT&T, after all it is their network, but for the leech
 services it's an entirely different matter. This is why we don't
 mess around with AT&T except through secondary accesses like
 PBX's or Diverters. This is the scenario MCI's security
 department will run down.  They call up a number you've
 called.......

"Hello, this is Inspector Bullshit with MCI. Did you receive a
 phone call from the 212 area code on November 22, 1945 at 4:00
 A. M.? "

"You didn't?"

"We've traced fourteen calls to this number in the last
 two weeks, by the way, who am I speaking with?" 

"Well Mrs. Blabbermouth, perhaps someone else in your household 
 received the calls? "

"I see, your daughter has a boyfriend in New York.

"I'm afraid  he's in some serious trouble Mrs. B. If
 you'll cooperate with me we won't pursue this matter with your
 daughter."

"That's correct, little Susie Blabbermouth won't be involved. It 
 would be a shame to cause you folks trouble, after all she
 didn't actually make the calls.""

 All I need is the boy's name and phone number."

"Let me see if I have that right."Jimmy Phreaker at  
 212-555-1212?"

"Thank you Mrs. B you've been very helpful."

 The point is, if  Bullshit had really run traces he wouldn't be
 calling to con the information. The exchange is typical of those
 used by most phone companys and illustrate several important
 issues.

 Make sure the person you're calling is cool and there's no
 chance  someone else could rat on you. It is very unlikely MCI
 will make such a call if you use the IC's Rules of Phreaking.
 Yet, if it were to occur these are your friend's options...

 1. HANGUP
 2. "FUCK YOU"...THEN HANG UP
 3. "I WAS WATCHING MIAMI VICE AND YOU INTERRUPT ME WITH
    THIS CRAP. FUCK YOU"....HANG UP.
 4. If you want to be nice about it; "I don't know what you're   
    talking about.....HANG UP.

 The problem is now resolved. Remember these guys are like
 rabid dogs in heat, they're excellent con artists. Believe
 nothing you hear. You don't have to talk to them. If they had
 anything on you they'd be standing at your door with a search
 warrant. Their abilities in this area are very restricted. They
 operate by manipulating your fear and you have nothing to fear
 but your own fear. Don't try to come up with some lame
 explanation, you know you received the call and they know it. So
 don't make an ass out of yourself trying to explain away the
 obvious - HANG UP!

 What happens if your are caught? 
 
 Congratulate yourself on being an asshole. The number of phreaks 
 caught are so small you have now qualified for membership  in a
 really elite group of jerks.
 
 Inspector Bullshit now has several options. 

 Grab your computer......... this will be done no matter what.

 Grab your data files and any hard copy you have laying around.
 This to help identify other subversives and also to supply
 incriminating information about you. 

 Try to scare you into a confession. Standard operating procedure
 - keep your fucking mouth shut. You have nothing to gain by 
 talking and a much to lose.

 If you're a minor you can forget about jail time, an adult
 is looking at a couple of weeks in the slam - may-be.

 Realize this, they don't really want your ass as much as they 
 want THE MONEY. That's right boys and girls the buck talks loud 
 and clear.
 
 If you're caught, you've broken every one of the IC's
 rules. At worst you're looking at a couple of thousand in phone
 bills. Get a lawyer to do your talking for you, that'll be about
 a five hundred dollar retainer. If the company is willing to
 settle for the money, and your computer, pay it - it's cheaper
 in the long run. If they want you in the calaboose then fight
 it. As a first time offender the odds of you actually getting
 time are slim. Incidentally, Inspector Bullshit will drop a
 little extra on the bill for good measure. Have the attorney
 demand they produce their records of all "alleged phone
 conversations". 

 In fighting a phreaking case you'll want to have a jury trial. 
 The technology behind the running of a trace is so
 complicated even a halfassed lawyer could confuse the
 average layman. He can make Inspector Bullshit describe
 switching down to atomic subparticles if he wants and by the
 time he gets to how a trace works the jury would be so confused
 you'd skate on a "reasonable doubt". It would be
 interesting to see if a sharp shark could subpoena the actual
 equipment used to run the trace. I don't think MCI would
 care to have one of their computers offline for the time it
 would take to have "independent" examiners checking out the
 functionality of the switching mechanisms. 
 
 To phreak or not to phreak. It's a question only you can answer 
 for yourself.


The following are electronic BBS conversations at a Hacker
Bulletin Board. They have been left intact (misspellings too)with
the exception of codes and phone numbers which could conceiveably
get my ass in hot water.

The Hacker network of communication is loosely knit but extremely
effective in getting information circulated quickly.

Lady G (Lady Godiva) is the only female I've ever seen on a hack
board. Amazingly she conned her way inside, yet turned out not to
be a threat to hackers even though she is employed by government.
 
Numb. -->  72 
Title -->  JUST A LITTLE CODE 
From  -->  BIG BYTE 
Left  -->  19-Apr-86 2:30 am 
 
While not to much to say just heres a sprint 
(Code Deleted) 
 
Also Bill the Cat do you know some people down in Florida like
Blackbeard or  been on some off my Conferences?? Let me know. 
 
    
.s 
opps 
/s 
shit 
 
 
B17> 
 
--> Next bulletin 
 
Numb. -->  73 
Title -->  Fed trap 
From  -->  BIG BYTE 
Left  -->  19-Apr-86 3:05 am 
 
Where i live here in Green Bay Wi, they are busting our town for
illegal use  of the phone.  The number they are getting kids
(leeches on) is 1-800-437-7010 it is GCI of Ancrage <-spelled
wrong Alaska and so far they have busted 400 people from one
school and have questioned 1500 its like a bad dream oh  
who cares not me. Just be careful and dont use it unless you fell
lucky. All the codes used are in the 467xxxxx area so may be
other areas are safe. 
                      later  
                       bb 
 
 
B17> 
 
--> Next bulletin 
 
Numb. -->  74 
Title -->  Bobo.. 
From  -->  THE ARABIAN KNIGHT 
Left  -->  19-Apr-86 11:10 am 
 
Bobo, 
 
     Leave me mail.  Id like to get a 
sprint Code(New).  I got a new Pbx, 
maybe old.  but it works fine..  
 
                  Ak 
 
Bobo- Why are you so worried About  
Lady G?  Does she know alot about you 
or something? 
 
 
 
B17> 
 
--> Next bulletin 
 
Numb. -->  75 
Title -->  [ Lady G. ] ? 
From  -->  THE D MEN TOR 
Left  -->  19-Apr-86 1:23 pm 
 
I can run CNA's in 415, Give me e-mail and I'll find out whatever
you  want to find out about her BOBO. Have you spoken with her?
How do you really know this person is over 30 etc...... 
 
later, 
The D men tor...Confused. 
 
 
B17>W 
 
Enter the name of the person you wish 
to send mail to: 
>THE D MEN TOR 
 
What is the subject of this letter? 
>Lady G 
 
Mail: 
You may enter up to 100 lines of text. 
Press CTRL-A or CTRL-Q when done. 
 
D men 
 
The numbers for Lady G are 415-(Deleted) and 
415-(Deleted).
 
She is over 30 because 
1. She's uses expressions that are 15 years out of date.
2. I recoginize this becuase I too am 15 years out of date.
 
I don't like people getting busted. She pirates  
but that's about it. I wonder why she's on so many hack boards.
Motor City went down right about the time she logged on.
I might be totally wrong, BUT, I want to check it out just to be
safe. 
You can call me Mr. Paranoia. She rattles my cage and 
it makes me nervous. 
 
Let me know what pops. 
 
Bobo 
 
 
E>S 
 
Filing mail for THE D MEN TOR... 
 
B17> 
 
B17>7 
 
--> Telecommunications Today (7)... 
--> 60 bulletins posted; some new! 
 
B7>N 
 
Numb. -->  59 
Title -->  Police Sting 
From  -->  CHARLIE SMITH 
Left  -->  19-Apr-86 6:29 am 
 
 
Here is an interesting story: 
 
AUSTIN,TX--Law enforcement officials here have joined a growing
number  of police agencies nationwide running "sting" operations
to catch persons using bulletin boards for illegal purposes. 
 
Based on information posted on a bulletin board it operated, The
Austin  Police Department said it has been able to turn off two
pirate boards  here and expects shortly to make a number of
arrests for misdemeanor  violations of Texas' newly enacted
computer crime law. 
 
For more than two years, the police department secretly ran a
board called the Underground Tunnel, which was set up to appear
as a normal  BBS run by a Sysop called "Pluto".  But late last
month - to the surprise of the board's more than 1,000 users -
Pluto was revealed as Sgt. Robert Ansley, a seven-year veteran of
the Austin Police Department! 
 
"Most of the users were people interested primarily  in several
on-line  fantasy games or in electronic messaging."  Ansley said. 
"To get to  the levels where people posted information on how to
crash corporate  sysems, the user had to ask for increased
access.  We were very careful not to solicit or entrap anyone
into leaving illegal information." 
 
The Austin Police Department disclosure caught most of the BBS's
users  by surprise.  "I liked the board's electronic messaging
capabilities,"  said user Michael Whalen, the managing editor of
the Daily Texan, the  student newspaper of the University of
Texas, here.  "I was really surprised at how the officer was able
to pull this off." 
 
What the police found, according to Ansley, included access codes 
belonging to the world's largest credit reporting organization,
TRW  Information Services Systems Division of Orange, California. 
"Most  offenders seem to be real big on TRW," said Ansley. 
 
Sting and intelligence gathering bulletin board operations are on
the  rise throughout the country, according to law enforcement
officials.  Several police departments nationwide have already
used bulletin boards  to track down and arrest microcomputer
users who post illegally obtained  calling card codes, mainframe
access procedures and passwords, or other  confidential
information.  According to one high-level West Coast law  
enforcement officer who declined to be identified, federal
officials  are now joining local authorities in running b5lletin
boards (BBSs)  in several key metropolitan areas. 
 
"You better believe law enforcement agencies are interested and
in  in some cases, running bulletin boards," said Dan Pasquale, a
sergeant with the Fremont, California, police department. Last
month, police in Fremont,  capped three and a half months of
bulletin board operations by arresting eight individuals for
alleged credit card fraud, misuse of telephone credit  
card operations, and technical trespass.  Pasquale said most
corporations whose passwords or calling card numbers were posted
on Fremont's BBS were unaware that their information had been
compromised. 


codes, passwords, credit cards. Qualifying as entrapment. More
experienced hacks pulled out before he sprang his trap. More than
200 people were arrested coast to coast. Only one was elite and
he beat the rap. The rest were rodents.


Although police are pleased with their results, some users say
they  feel the sting bulletin boards are unfair to both the
innocent users  and the suspected criminals alike.  Whalen said
students at the University  of Texas used the board extensively,
andhe claimed that some people  accused of posting access codes
and other information on the board  felt they had been entrapped
when they discovered that the BBS was a  police sting operation. 
 
Whalen also said that some users were concerned about the privacy 
and sanctity of electronic mail left on the board.  "Ansley said
users  are foolish if they don't think a sysop reads the mail on
the board,"  he added. 
  
Indeed, as police turn increasingly to bulletin boards to catch
suspected  criminals, the issue of entrapment has also become a
growing concern,  one to which police are sensitive. 
 
"At no time did the police department urge users to leave access
codes,  applications, or passwords for corporate computers on The
Tunnel,"  Ansley said. 
 
To prove entrapment, a suspect would have to clearly show that
the  government agent offered some type of inducement to promote
criminal  activity, said Jim Harrington, the legal director of
the Texas Civil  Liberties Union here.  "The whole area of police
gaining information  on [criminal activities] by reading
electronic mail is very interesting." 
 
Fremont police held a series of meetings with a district attorney
before  they started a board, according to Pasquale. "We
established a point  where entrapment began and made sure we
never crossed that point,  and in fact, messages on the board
were scripted in conjunction with the  district attorney's
of
  
Ahem, let me hasten to point out the Gemini System is NOT a
police BBS! 
  
Charlie 
 
 
 
Numb. -->  60 
Title -->  Infocom 
From  -->  ATILLA THE HUN 
Left  -->  19-Apr-86 11:37 pm 
 
 
Well I don't know if anyone has heard this but, 
  
I have heard that Infocom will start (or may have started)
calling  AE lines to see if they contain any infocom software. 
If so they download it and check the serials, and bingo if a
pirated version then plain and simple  YOU IS BUSTED! 
  
oh well anyone else know of anything more, I picked it up under  
discussion at a bbs. 
  
   atilla the hun -<*----- 
 
 
 
 
B7>OFF
 
 
In The News

Press reports of hacker misdeeds seem to be written in flavors
which border upon awe to contempt. It depends on the publication.
Newspapers ten to permit more editorializing. Between the two
extremes there is a point of reason. I've often wondered, "If a
fifteen year old kid can break into a 'secure' government
computer, what could a fully trained enemy agent do?" It's a
reasonable question.

Virginia - A fourteen year old hacker who called himself Phineas
Phreak was the first to be prosecuted under the state's computer
trespassing law. Arrested for hacking at a Bulletin Board, he was
placed on one year's probation and ordered to pay $300.00 in
compensation to the board's operator, Allen Knapp.

Milwaukee - A hacker group who called themselves the 414's after
their area code were arrested by FBI agents and found to have
access to more than 60 computer databases. These included a
California Bank, a cancer center and the Los Alamos Scientific
Laboratory.

California - Stanley Rifkin a computer consultant for Security
Pacific Bank, stole the bank's passwords and liberated 10 million
dollars from the institution. He then erased the electronic
records of the transactions. While Rifkin was not a hacker, he
hold the distinction of being the country's number one computer
thief. His arrest was not the result of his computerized
misdeeds, but instead, his lack of expertise at being a thief.

Washington - The United States Government has become the nation's
leading user of computers. As such, they are a target of internal
thieves who have used their systems to divert funds for their own
uses. A number of arrests of computer related theft has led the
government to believe they haven't scratched the surface yet.
It's estimated that only one in 22,000 computers crimes will ever
be prosecuted.

San Diego - A computer hacker, Bill Landreth pleaded guilty to
tapping the GTE Telemail network in Vienna, Virginia. Known as
"The Cracker" he agreed to cooperate with Federal Investigators
in a larger investigation. Four teenagers from Irvine, California
were subsequently arrested and named Landreth as their source of
information on hacking. Landreth has since written a book "Out of
the Inner Circle". The four kids from Irvine don't receive
royalties.

TRW - Hackers armed with stolen passwords broke into the TRW
credit system and reviewed information on employment records,
bankruptcies, loans, social security numbers and credit cards.
The password was stolen from a Sears and Roebuck and was
reportedly in circulation for the better part of a year. The
credit card numbers, expiration dates and credit limits of card
holders were used to make fraudulent purchases. TRW changed the
password.

Atlanta - Edward Johnson took exception to Jerry Falwell's fund
raising activities. His mother had a thing for T.V. preachers and
often gave money to Falwell's Liberty Foundation. Mr. Falwell's
collectors were oblivious to the fact the elderly lady lived on
social security and couldn't afford the donations. On a previous
occasion she had attempted to give the family farm to Jimmy
Swaggart. Johnson adjusted his phreaker program into a phone
cranker  to auto dial Falwell's 800 and tie up the line for 30
seconds a call. Falwell's people reported they lost one million
in donations from the activity. Southern Bell finally trace the
calls and gave Johnson two choices, stop or lose his phone line -
he stopped. After all, it was "God's will".

Washington - Representative William Hughes from New Jersey has
introduced a bill to make computer theft of data and certain
"kinds of hacking activities" federal felonies.

New Jersey - Seven teenagers were arrested on charges of credit
card fraud, phreaking and hacking. An investigation into credit
card purchases led local police to the operator of a hacker bbs.
Armed with a search warrant the police seized his computer and
all related data. Inspection of same led to the arrests of the
other six. Now known in hack circles as the New Jersey Seven,
they reportedly had the ability to change the attitude of a
government satellite. The Inner Core reports they consider it
unlikely the kids knew they had the capability.

In my research, I've noted government and business to be at
greater risk from their own employees than from hackers. Credit
card fraud is the leading hacker crime. The pales beside the
reported cases of computer theft from internal sources. The
Rifkin case is the most noted. However, thousand of unreported
thefts occur every year.
                  MAKING MONEY WITH YOUR CODES


Ok, phreaking will save you money, that's fine. Wouldn't you
rather make some bucks off these jokers? No biggy. You sell your
codes. Is it illegal? You bet, but your the adverturesome type
with avarice in your heart...this is how it works.

Abdul wants to call the Middle East so he can talk with his
camel. No problem. Call the international operator and ask how
much it costs for an hour to Jordon. Charge the raghead fifty
percent of the cost for hooking him up and let him talk as long
as he likes. MCI and Sprint both access the Middle East so you're
in business. Foreigners are good to deal with. They're extremely
paranoid anyway so tell them you have to make the calls from a
phone booth. This isn't true BUT, you're covering your own ass.


There are a variety of good reasons why a phone booth is called a
fortress, this is one. DO NOT SELL THE CODES. Abdul knows nothing
about phreaking. The dumbshit will stay on the code too long and
will end up getting his ass traced. The telcos don't give two
shits about this guy. THEY WANT YOU!. You're the guy costing them
the big bucks. Abdul will make a deal and your tit will be in the
ringer. So keep control of the codes. If you want to be a nice
guy and hand out codes to your phriends fine. Just be sure they
don't have big mouths and that they know the IC's Rules of
Phreaking. You'll find a list of the countrys  MCI and Sprint
access in the appendix. You'll also notice  there are a lot of
places that they don't go. India for one. The only way to book
passage to India is on AT&T. You'll need to bag a PBX or a
Diverter for that action.

                          Equal Access 
 
What does equal access mean to you? Not much. Access was the 
issue that permitted Mci to break up At&t. The result was the 
sudden emergence of the companies you'll find listed in this 
chapter. At&t still retains an 85%+ share of the 
telecommunications market. The rest of the business enterprises 
are basically parasites attempting to feed off of Ma Bell's 
network. 
 
Equal Access means you get to pay 2 to 5 dollars a month for 
"access" to the long distance network, whether you want it or 
not. It means your local telco can go begging to the Public 
Utilities commissions claiming the need for rate increases in the

wake of the break up. Pacfic Tel was hurt so much they posted 
sales recently of one billion dollars. I first in the company's 
history. 
 
There is one small advantage to equal access. Ustel (950-1033)
customers can crossover to the Sprint Network (950-0777) and make
international calls. By appending the equal access code to the
customer code the call will be cross connected.

In short, equal access means this..."Bend over and smile 
America". If you thought you were getting screwed before, well 
you ain't seen nothing yet. 
 
 
                       Equal Access Codes







10824 ATC Directline

10482 Access America

10939 Access Long Distance

10282 Action Telecom

10444 Allnet

      Americall

10002 Americall LDC Inc.

10053 American Network

10366 American Telco

10050 American Telephone Exchange

10080 Amtel

      Amertel

10824 

      ATC Communications

10287 ATS Communications

10272 Bell of Pa

10606 Biz-Tel

10300 Call America

10221 Capitol Telecommunications Inc.

10987 Clay Desta Communications

10266 Com Systems

10885 Communigroup of Kansas City

10733 Comp-Data Communications

      Compute a Call

      Comtel of Pine Bluff

10203 Cytel10233 Delta Communications

10339 Dial USA

      Directline

      Discount Long Distance

      EO Tech10054 Eastern Telephone Systems

10634 Econo Line of Midland

      Econo-line of Waco

10256 Execuline

10393 Execulines of Florida

      Garden State Telco

10235 Inteleplex

10884 ITI

10488 Itt

10535 LDL - Long Distance for Less

10084 LDS

      LDX

      LTS

10066 Lexitel

10852 Line One

10036 Long Distance Savers

10537 Long Distance Service of Washington

      Long Distance Telephone Savers

      Max Long Distance

10222 Mci

10021 Mercury Long Distance

10622 Metro America Communications

      National Telecommunications of Austin

      Network I/Metromedia

10855 Network Plus

10638 Northwest Telecom Ltd.

10785 Olympia Telecom

10808 Phone America of Colorado

10936 R - Comm

10211 RCI

10787 STS/Star Tel

10800 Satelco

10888 Skyline

10087 Southernnet

10321 Southland Systems

10777 Sprint

10889 St. Joseph10787 STS/Star Tel

10007 TMC of Arkansas

10021 TMC of Chattanooga

10007 TMC of El Paso

10007 TMC of Miami

10007 TMC of S.E. Florida

      TMI of Oklahoma

10826 Tel AMCO

      Tel-Central Inc of Oklahoma

10330 Tel-Share

10626 Tel/man

10007 Telemarketing Communications

10899 Telephone Express

10331 Texustel

10850 Tollkall

10824 Transcall

10333 US Telecom

10859 Valu-Line of Longview

      Valu-Line of Wichita Falls

10687 WTS Communicatons

10085 Westel

10220 Western Union

10995 Wylon  

                     ESS

The following is a file taken from a Hack Board. I think it is
intellegently written and accurate. 


           +====================================+
           +  ELECTRONIC SWITCHING SERVICE V1.  +
           +  EXERT FROM 2600 MAGAZINE FEB '84  +
           +FROM THE RADIO STATION: 718-xxx-xxxx+
           +====================================+

            THERE WAS OF COURSE NO WAY OF KNOWING
          WETHER YOU WERE BEING WATCHED AT ANY
          GIVEN MOMENT.  HOW OFTEN, OR ON WHAT
          SYSTEM, THE THOUGHT POLICE PLUGGED IN ON
          ANY INDIVIDUAL WIRE WAS GUESSWORK.  IT 
          WAS EVEN CONCEIVABLE THAT THEY WATCHED
          EVERYBODY ALL THE TIME.  BUT AT ANY RAT
          E THEY COULD PLUG IN YOUR WIRE WHENEVER
          THEY WANTED TO.  YOU HAD TO LIVE--DID L
          IVE, FROM HABIT THAT BECAME INSTICT--IN
          THE ASSUMPTION THAT EVERY SOUND YOU MAD
          E WAS OVERHEARD, AND, EXCEPT IN
          DARKNESS, EVERY MOVEMENT SCRUTINIZED.
                                       
          'FROM NINETEEN EIGHTY-FOUR'

            ESS IS THE BIG BROTHER OF THE BELL
          FAMILY.  ITS VERY NAME STRIKES FEAR AND
          APPREHENSION INTO THE HEARTS OF MOST
          PHREAKERS, AND FOR A VERY GOOD REASON.
          ESS (ELECTRONIC SWITCHING SYSTEM) KNOWS
          THE FULL STORY ON EVERY TELEPHONE
          HOOKED INTO IT.  WHILE IT MAY BE PARANO
          ID TO SAY THAT ALL PHREAKING WILL COME
          TO A SCREECHING HALT UNDER ESS, IT'S
          CERTAINLY REALISTIC TO ADMIT THAT ANY
          PHREAK WHOSE CENTRAL OFFICE TURNS TO
          ESS WILL HAVE TO BA A LOT MORE CAREFUL.
          HERE'S WHY.

            WITH ELECTRONIC SWITCHING, EVERY
          SINGLE DIGIT DIALED IS RECORDED.  THIS
          IS USEFUL NOT ONLY FOR NAILING PHREAKS
          BUT FOR SETTLING BILLING DISPUTES.  IN
          THE PAST, THERE HAS BEEN NO EASY WAY
          FOR THE PHONE COMPANY TO SHOW YOU WHAT
          NUMBERS YOU DIALED LOCALLY.  IF YOU
          PROTESTED LONG ENOUGH AND LOUD ENOUGH,
          THEY MIGHT HAVE PUT A PEN REGISTER ON
          YOUR LINE TO RECORD EVERYTHING AND
          PROVE IT TO YOU.  UNDER ESS, THE ACTUAL
          PRINTOUT (WHICH WILL BE DUG OUT OF A
          VAULT SOMEWHERE IF NEEDED) SHOWS EVERY
          LAST DIGIT DIALED. 
          EVERY 800 CALL, EVERY CALL TO DIRECTORY
          ASSISTANCE, REPAIR SERVICE, THE
          OPERATOR, EVERY RENDITION OF THE 1812
          OVERTURE, EVERYTHING!  HERE IS AN
          EXAMPLE OF A TYPICAL PRINTOUT, WHICH
          SHOWS TIME OF CONNECT, LENGTH OF
          CONNECT, AND NUMBER CALLED.
     
          DATE  TIME  LENGTH UNITS  NUMBER
          
          0603  1518     3   1      456-7890
          0603  1525     5   3      345-6789
          0603  1602     1   0      000-4011
          0603  1603     1   0      800-555-1212
          0603  1603     10  2.35*  212-345-6789
          0603  1624     1   0      000-000-0000
          (TSPS)

            A THOUSAND CALLS TO "800" WILL SHOW
          UP AS JUST THAT--A THOUSAND CALLS TO
          "800"!  EVERY TOUCH TONE OR PULSE IS
          KEPT TRACK OF AND FOR MOST PHREAKS,
          THIS IN ITSELF WON'T BE VERY PRETTY.
          
            SOMEWHERE IN THE HALLOWED HALLS OF 19
          5 BROADWAY, A TRAFFIC ENGINEER DID AN
          EXHAUSTIVE STUDY OF ALL 800 CALLS OVER
          THE PAST FEW YEARS, AND REACHED THE
          FOLLOWING CONCLUSIONS:  (1) LEGITIMATE
          CALLS TO 800 NUMBERS LAST AN AVERAGE OF
          3 MINUTES OR LESS.  OF THE ILLEGAL (I.E
          PHREAKERS) CALLS MADE VIA 800 LINES,
          MORE THAN 80% LASTED 5 MINUTES/LONGER;
          (2) THE AVERAGE RESIDENTIAL TELEPHONE
          SUBSCRIBER MAKES FIVE SUCH CALLS TO AN
          800 NUMBER PER MONTH.  WHENEVER
          PHREAKERS ARE BEING WATCHED, THAT
          NUMBER WAS SIGNIFICANTLY HIGHER.  AS A
          RESULT OF THIS STUDY, ONE FEATURE OF
          ESS IS A DAILY LOG CALLED THE "800
          EXCEPTIONAL CALLING REPORT."

           UNDER ESS, ONE SIMPLY DOES NOT PLACE
          A 2600 HZ TONE ON THE LINE, UNLESS OF
          COURSE, THEY WANT A TELCO SECURITY
          REPRESENTATIVE AND A POLICEMAN AT THEIR
          DOORWITHIN AN HOUR!  THE NEW GENERICS
          OF ESS (THE #5) NOW IN PRODUCTION, WITH
          AN OPERATING PROTOTYPE IN GDNZFA, nILL,
          ALLOW THE SYSTEM TO SILENTLY DETECT ALL
          "FOREIGN" TONES NOT AVALABLE ON THE
          CUSTOMER'S PHONE.  YOU HAVE EXACTLY 12
          BUTTONS ON YOUR TOUCH-TONE (R) PHONE.
          ESS KNOWS WHAT THEY ARE, AND YOU HAD
          BEST NOT SOUND ANY OTHER TONES ON THE
          LINE, SINCE THE NEW #5 IS PROGRAMMED
          TO SILENTLY NOTIFY A HUMAN BEING IN THE
          CENTRAL OFFICE, WHILE CONTINUING WITH
          YOUR CALL AS THOUGH NOTHING WERE WRONG!
            SOMEONE WILL JUST PUNCH A FEW KEYS ON
          THEIR TERMINAL, AND THE WHOLE SORDID
          STORY WILL BE RIGHT IN FRONT OF THEM, &
          PRINTED OUT FOR ACTION BY THE SECURITY
          REPRESENTATIVES AS NEEDED.
          
            TRACING OF CALLS FOR WHATEVER REASON 
          (ABUSIVE CALLS, FRAUD CALLS, ETC.) IS
          DONE BY MERELY ASKING THE COMPUTER
          RIGHT FROM A TERMINAL IN THE SECURITY
          DEPARTMENT.  WITH ESS, EVERYTHING IS RI
          GHT UP FRONT, NOTHING HIDDEN OR
          CONCEALED IN ELECTROMECHANICAL FRAMES, 
          ETC.  IT'S MERELY A SOFTWARE PROGRAM!
          AND A PROGRAM DESIGNED FOR EASE IN
          OPERATION BY THE PHONE COMPANY.  CALL
          TRACING HAS BECOME VERY SOPHISTICATED A
          ND IMMEDIATE.  THERE'S NO MORE RUNNING
          IN THE FRAMES AND LOOKING FOR LONG PERI
          ODS OF TIME.  ROM CHIPS IN COMPUTERS
          WORK FAST, AND THAT IS WHAT ESS IS ALL
          ABOUT.

            PHONE PHREAKS ARE NOT THE ONLY REASON
          FOR ESS, BUT IT WAS ONE VERY IMPORTANT
          ONE.  THE FIRST AND FOREMOST REASON FOR
          ESS IS TO PROVIDE THE PHONE COMPANY
          WITH BETTER CONTROL ON BILLING AND
          EQUIPMENT RECORDS, FASTER HANDLING OF
          CALLS (I.E. LESS EQUIPMENT TIED UP IN
          THE OFF ICE AT ANY ONE TIME), & TO HELP
          AGENCIES SUCH AS THE FBI KEEP BETTER
          ACCOUNT OF WHO WAS CALLING WHO FROM
          WHERE,ETC.  WHEN THE FBI FINDS OUT THAT
          SOMEONE WHOSE CALLS THEY WANT TO TRACE
          IS ON A ESS EXCHANGE, THEY ARE THRILLED
          BECAUSE IT'S SO MUCH EASIER FOR THEM
          THEN.

            THE UNITED STATES WON'T BE 100% ESS
          UNTIL SOMETIME IN THE MID 1990'S.  BUT
          IN REAL PRACTICE, ALL PHONE OFFICES IN
          ALMOST EVERY CITY ARE GETTING SOME OF   
          THE MOST BASIC MODIFICATIONS BROUGHT    
          ABOUT BY ESS.  "911" SERVICE IS AN ESS
          FUNCTION.  SO IS ANI (AUTOMATIC NUMBER 
          IDENTIFICATION) ON LONG DISTANCE CALLS. 
          "DIAL TONE FIRST" PAY PHONES ARE ALSO
          AN ESS FUNCTION.  NONE OF THESE THINGS
          WERE AVAILABLE PRIOR TO ESS. THE AMOUNT
          OF PURE FRAUD CALLING VIA BOGUS CREDIT
          CARD, THIRD NUMBER BILLING, ETC. ON
          BELL'S LINES LED TO THE DECISION TO
          RAPIDLY INSTALL THE ANI, FOR EXAMPLE,
          EVEN IF THE REST OF THE ESS WAS SEVERAL
          YEARS AWAY IN SOME CASES.

            DEPENDING ON HOW YOU CHOOSE TO LOOK
          AT THE WHOLE CONCEPT OF ESS, IT CAN BE
          EITHER ONE OF THE MOST ADVANTAGEOUS
          INNOVATIONS OF ALL TIME OR ONE OF THE
          SCARIEST.  THE SYSTEM IS GOOD FOR
          CONSUMERS IN THAT IT CAN TAKE A LOT OF
          ACTIVITY AND DO LOTS OF THINGS THAT OLD
          ER SYSTEMS COULD NEVER DO.  FEATURES
          SUCH AS DIRECT DIALING OVERSEAS, CALL
          FORWARDING (BOTH OF WHICH OPEN UP NEW
          WORLDS OF PHREAKING WHICH WE'LL EXPLORE
           IN LATER ISSUES), AND CALL HOLDING ARE
          STEPS FORWARD, WITHOUT QUESTION.  BUT
          AT THE SAME TIME, WHAT DO ALL OF THE
          NASTY IMPLICATIONS MENTIONED FURTHER
          BACK MEAN TO THE AVERAGE PERSON ON THE
          SIDEWALK?  THE SYSTEM IS PERFECTLY
          CAPABLE OF MONITORING ANYONE, NOT JUST
          PHONE PHREAKS!  WHAT WOULD HAPPEN IF
          THE NICE FRIENDLY GOVERNMENT WE HAVE
          SOMEHOW GOT OVERTHROWN AND A MEAN NASTY
          ONE TOOK ITS PLACE?  WITH ESS, THEY
          WOULDN'T HAVE TO DO TOO MUCH WORK, JUST
          COME UP WITH SOME NEW SOFTWARE. IMAGINE
          A PHONE SYSTEM THAT COULD TELL
          AUTHORITIES HOW MANY CALLS YOU PLACED
          TO CERTAIN TYPES OF PEOPLE, I.E. BLACKS
           COMMUNISTS, LAUNDROMAT SERVICE
          EMPLOYEES... ESS COULD DO IT, IF SO
          PROGRAMMED.

          *** BIOC         FROM WHACKOLAND BBS:
          *** AGENT        
                           THE RADIO STATION BBS
                           300/1200 BAUD


          ---------------------------------------

 
                   GAMES PHONE COMPANIES PLAY



Some phone companies have come up with clever little tricks to
fuck up the phreaks hacking activities. One of these is the
CARRIER BLAST. Simply put, they shoot a 300/1200 baud answer tone
across the phone line right before you connect with your
destination. This move makes your computer THINK it's connected
with the computer you're calling. The attempt is laughable. All
you need do is to take the modem offline for that period of
seconds when the carrier is blasting. For the Hayes  and the
Hayes compatible modems you work this command into the dialing
sequence, "+++,". Each modem in the AT mode permits you to take
the modem offline and "idle". The function is programable so  you
can use any keyboard character. The "+++" puts the modem in idle,
the comma is a timing element you've preprogrammed. If you want a
five second delay, you will have programmed "ATS8=5" or "ATS8=10"
for a ten second delay. After your delay the modem will continue
to execute  the dialing sequence. You'll now use "ATO" to put the
modem back on line. The whole routine will look like
this,"+++,ATO". Consult your modem manuals if you don't have a
Hayes Compatible. Each manufacturer has "borrowed" the same
features from Hayes. The  result will be the same even if your
commands may differ.
  
Another little gimmick has been borrowed from the PBX. After
entering your code you have to enter "9" to get out. No big deal.
Just use nine as a suffix. 


If you've ever tried hacking an AT&T credit card (and I recommend
that you don't) you'd notice that you can dump the entire dialing
sequence all at once. This is a classy system. Not so with MCI or
UStel. After you've entered the 0 and the area code of your
destination the system beeps you that it has received the proper
format. While this beeping is going on you can't dial over it.
The solution is simple, insert the  "comma delay to wait for the
"beeper" to get done. The one problem you may encounter depends
on the size of you modem's buffer. The Hayes compatible can
accept forty five digits. The MCI/UStel format requires a full 44
digits. You have one to spare. If your buffer size is smaller,
you'll have to break the dialing sequence in two separate
routines. A bit of a bitch but liveable for the return.


Code format bastardizations are a nice change. The telco's hope
that in deviating from the norm, it will be less advantageous for
the hacker, who like anyone else develops habits, to whack away
at their systems. Itt's reverse arrangement is a prime example.                             The Pbx

The Pbx (Public Branch Exchange) is a switching station. In the
old days an operator would stick a plug into a slot and connect
with an incoming call and another plug to a second slot to
establish a connection with the destination. The equipment is the
same in theory except, today the microchip has eliminated the
human operator.

The phreak is interested in the board's dial in/out capability.
The legitimate users of the Pbx can call into a number, enter a
code + a routing number and have an At&t line to dial out with.
Pbx's afford the hack indirect access to Ma Bell without exposing
him to the risk of a trace. There are two principle uses,
Teleconferencing and Overseas calls to area only At&t services.

To find a Pbx the hack scans a local prefix. This is also known
as War Dialing after the movie War Games. To find the unit the
hack must be equipped with a modem capable of recognizing a dial
tone. The Hayes modem can not. The Apple Cat is considered the
ideal phreaking modem. Not only can it  recognize dial tones it
can generate the frequencies needed to emulate a blue box. The
Cat is not one of Ma Bell's favorites. The Hayes user is forced
to sit and listen to the dialing if he wants a Pbx. Most phreaks
will usually make a deal with a cat owner for pbx locations.

The phreak will recognize the Pbx when he hears a second dial
tone. He'll now start playing around looking for the code. Many
switchboards have simple and easy to remember 4 digit codes like
1234. The hack will always go for the obvious. Code lengths can
be any where from zero to eight digits. Pbx's are very user
friendly. When you screw up it'll beep at you to let you know.
This is a worksheet for Pbx hacking


               1    1    1    1    1    1    1    1
               2    2    2    2    2    2    2    2
               3    3    3    3    3    3    3    3
               4    4    4    4    4    4    4    4
               5    5    5    5    5    5    5    5
               6    6    6    6    6    6    6    6    
               7    7    7    7    7    7    7    7    
               8    8    8    8    8    8    8    8
               9    9    9    9    9    9    9    9

The hack will now enter a number from the far left column. If it
beeps at him he knows he's guessed wrong so he disconnects and
redials. With an autodialer that's no big deal. He goes back to
work on the first column. He will eventually it a number which
doesn't generate an error message. He circles it and proceeds to
the next column. When he's succeeded in hacking out the code, he
will hear another dial tone. This is his At&t line out. Most
phreaks will test the line by dialing information, local to the
Pbx.

Some units require an additional out code. Would you believe 9 ?
Actually the Pbx will accept any preprogrammed 2 digit code, like
85. Nine has become a habit and many virgins have lost their
cherry to a phreak by doing the obvious. I've seen units that
required no code, only the 9 to get outside. 

It's impossible to make a Pbx secure. If a hacker want's it, and
he's willing to work on it, he'll get it. The only option
available to the business is to disconnect the in/out dialups and
supply their outside personnel with long distance travel cards.

Loops 
 
 
Loops are mildly interesting in the hack/phreak world. They 
consist of two telephone numbers that, when connected, permit 
callers to hold conversations with strangers or friends whom 
they've met by appointment. 
 
A loop has a high side and a low side, meaning one of the pair of

numbers emits a tone while the other is quiet.  Loops in 213 and 
818 areas can be found by dialing any prefix and 1118 or 1119. 
Pacific Telephone has injected a rather annoying "click" into the

line which makes data transfers impossible and voice 
communication tedious. This situation doesn't exist in other 
areas of the country. 
 
At first glance, loops may not appear to have any practical 
value. To the hacker it has two uses. It enables him to voice 
with people he doesn't want to have his phone number and it's 
useful in conferencing (see Alliance). Many hacks refuse to make 
their personal information available to those who are not long 
standing bbs acquaintances. Loops make safe voicing possible. 
 
 
                           A Few Loops 
 
 
          201-531-9929,9930        201-938-9929,9930 
          206-827-0018,0019        206-988-0020,0022 
          212-283-9977,9997        208-862-9996,9997 
          209-732-0044,0045        212-529-9900,9906 
          212-283-9977,9979        212-352-9900,9906 
          212-220-9977,9979        212-365-9977,9979 
          212-562-9977,9979        212-986-9977,9979 
          213-549-1118,1119        214-299-4759,4757 
          214-291-4759,4757        307-468-9999,9998 
          308-357-0004,0005        402-779-0004,0007 
          406-225-9902,9903        714-884-1118,1119 



These loops were taken from a Hack Board and are for the 808
area.



          ((((((((((((((((((((((((((((((((((( 
          (                                    ( 
          (                                    ( 
          (                                    ( 
          (      Here are some loops for ya.   ( 
          (                                    ( 
          (                                    ( 
          (                                    ( 
          (               (808) = 1            ( 
          (             (9907)= Loud           ( 
          (            (9908)= Silent          ( 
          (                                    ( 
          (                                    ( 
          (                                    ( 
          (                                    ( 
          (         1 328 (Loud) (Silent)      ( 
          (         " 322 """""""""""""""      ( 
          (         " 572 """""""""""""""      ( 
          (         " 261 """""""""""""""      ( 
          (         " 239 """""""""""""""      ( 
          (         " 668 """""""""""""""      ( 
          (         " 885 """""""""""""""      ( 
          (         " 961 """""""""""""""      ( 
          (         " 245 """""""""""""""      ( 
          (         " 332 """""""""""""""      ( 
          (         " 335 """""""""""""""      ( 
          (         " 623 """""""""""""""      ( 
          (         " 624 """""""""""""""      ( 
          (         " 959 """""""""""""""      ( 
          (         " 742 """""""""""""""      ( 
          (         " 879 """""""""""""""      ( 
          (         " 882 """""""""""""""      ( 
          (         " 329 """""""""""""""      ( 
          (         " 247 """""""""""""""      ( 
          (         " 235 """""""""""""""      ( 
          (((((((((((((((((((((((((((((((((((((( 
          The Loop master (Merauge) was here 
 
 
                            DIVERTERS


 Diverters are privately owned call forwarding machines. They'll
 be found almost exclusively in areas that don't have call
 forwarding. This also means  ESS isn't operational in your
 area. This is how it works...

 You may not realize it, but the sounds of a call connecting are 
 permanently etched on your subconscience mind. Whether it's the 
 sounds of tones or clicks, you know when your call has 
 connected. Pay attention next time, you'll see what I mean. A 
 call going to a diverter makes two connections. First to the 
 number  you called and second to the number that the diverter 
 called. When you hear this second connection, you'll know that 
 you've bagged a diverter. The call will be connected to a person 
 you have absolutely no interest in talking to. Tell the person 
 that you have the wrong number, click the rocker on your phone, 
 and wait for HIM to hang up. Your call is now in a never never 
 land between the first number you dialed and the number that the 
 diverter called. Wait about two minutes. You'll hear a faint 
 dial tone in the back ground. That's your AT&T line out. You can 
 now dial anywhere in the world. 

 Since you're  dealing with a real human on the other end, be 
 prepared for the unexpected. I called one diverter recently and 
 had a fellow answer the phone. I used the wrong number routine 
 and clicked the rocker, but HE DIDN'T HANG UP. Hey, I'm cool, a 
 dummied up and waited. After five minutes HE STILL WOULDN'T HANG
 UP. Not only that, he started making lewd suggestions that he 
 and I get together for a date. I like girls and this joker was 
 grossing me out. I said,"Jesus fucking Christ" very disgustedly 
 (for emphasis) and clicked the rocker arm again. THE SON OF A 
 BITCH STILL WOULDN'T HANG UP. I gave up and went to a PBX. 

 This is the moral of this story. This fellow had been burned  
 before. He knew the flaw in his diverter and he knew what to do 
 about it. Plus the guy gets 10 points for have some style. He   
knew what I was trying to do to him and he played the game out  
all the way. A good show. Manufacturers of diverters are hip to  
the game. Their newer machines have disconnect features that  
restrict a phreaks call out abilities. Never the less, there are 
hundreds of thousands of the older machines still out there with 
their cherries intact. Firms that use a diverter are too cheap  
to hire and answering service. For this reason alone they won't  
be too quick to upgrade their systems. They'll get a little  
incentive after they receive a several thousand dollar phone  
bill. 


 I spoke with a phreak not too long ago who received a 2 thousand
 dollar phone bill for conferance calls he'd made with a  
diverter.
 Explained the steps he'd taken in its use. I asked him if the 
second dial tone he received was as loud as the first. I 
informed him as kindly as possible, "You dumb shit, that was 
your dial tone not the diverter". There's a moral in there 
somewhere.
                          The Black Box

Another credible file on box building. Note the black will work
under Crossbar or Step by Step but not with ESS.




A BLACK BOX
IS A DEVICE THAT IS HOOKED UP TO YOUR
FONE  THAT FIXES YOUR FONE SO THAT WHEN
YOU GET A CALL,  THE CALLER DOESN'T GET
CHARGED FOR THE CALL.  THIS IS GOOD FOR
CALLS  UP TO 1/2 HOUR,  AFTER 1/2  HOUR
THE FONE CO.   GETS SUSPICOUS, AND THEN
YOU CAN GUESS WHAT HAPPENS.

THE WAY IT WORKS:

WHAT  THIS LITTLE BEAUTY  DOES  IS
KEEP THE LINE VOLTAGE FROM DROPPING  TO
10V  WHEN  YOU ANSWER YOUR  FONE.   THE
LINE IS INSTED KEPT AT 36V AND IT  WILL
MAKE  THE  FONE THINK THAT IT IS  STILL
RINGING WHILE YOUR TALKING.  THE REASON
FOR THE 1/2 HOUR TIME LIMIT IS THAT THE
FONE CO. THINKS THAT SOMETHING IS WRONG
AFTER 1/2 AN HOUR OF RINGING.

ALL  PRTS  ARE  AVAILABLE   RADIO
SHACK.   USING THE LEAST POSSIBLE PARTS
AND ARANGEMENT,  THE COST IS $0.98 !!!!
AND  THAT  IS  PARTS FOR TWO  OF  THEM!
TALK  ABOUT  A DEAL!   IF YOU  WANT  TO
SPLURGE  THEN  YOU CAN GET A  SMALL  PC
BOARD,  AND  A SWITCH.   THERE ARE  TWO
SCHEMATICS  FOR THIS BOX,  ONE  IS  FOR
MOST  NORMAL FONES.   THE SECOND ONE IS
FOR  FONES  THAT DON'T  WORK  WITH  THE
FIRST.  IT WAS MADE FOR USE WITH A BELL
TRIMLINE TOUCH TONE FONE.



FROM >--------------------GREEN->  TO
LINE >--!   1.8K  LED  !---RED--> FONE
!--/\/\/\--!>--!
!              !
------>/<-------
SPST



PARTS:  1 1.8K 1/2 WATT RESISTOR
1 1.5V LED
1 SPST SWITCH

YOU  MAY JUST HAVE TWO WIRES WHICH  YOU
CONNECT TOGETHER FOR THE SWITCH.




FROM >---------------GREEN->  TO
LINE >-------      ---RED--> FONE
!  LED !
-->/<--!>--
!         !
---/\/\/---
1.8K

PARTS:  1 1.8K 1/2 WATT RESISTOR
1 1.5V LED
1 DPST SWITCH


HERE IS THE PC BOARD LAYOUT THAT I
RECOMMEND  USING.   IT  IS NEAT AND  IS
VERY EASY TO HOOK UP.

SCHEMATIC #1        SCHEMATIC #2


L *  !      !  * F L *  !      ! !  * F
I>RED-      -RED>O I>RED-      ---RED>O
N>-----GREEN---->N N>-----GREEN------>N
E * H          * E E *              * E



ONCE YOU HAVE HOOKED UP ALL  THE
PARTS,  YOU MUST FIGURE OUT WHAT SET OF
WIRES  GO TO THE LINE AND WHICH  GO  TO
THE FONE.   THIS IS BECAUSE OF THE FACT
THAT LED'S MUST BE PUT IN, IN A CERTAIN
DIRECTION.  DEPENDING  ON WHICH WAY YOU
PUT THE LED IS WHAT CONTROLS WHAT WIRES
ARE FOR THE LINE & FONE.

HOW TO FIND OUT:

HOOK  UP THE BOX IN ONE  DIRECTION
USING ONE SET OF WIRES FOR LINE AND THE
OTHER FOR FONE.


SET TO SIDE CONNECTING THE LED.

ONCE  YOU HAVE HOOKED IT UP,  THEN
PICK UP THE FONE AND SEE IF THE LED  IS
ON.  IF IT IS, THE LED WILL BE LIT.  IF
IS  DOESN'T LIGHT THEN SWITCH THE WIRES
AND TRY AGAIN.  ONCE YOU KNOW WHICH ARE
WHICH  THEN LABEL  THEM.   *NOTE*  - IF
NEITHER  DIRECTIONS  WORKED  THEN  YOUR
SWITCH WAS IN THE WRONG POSITION.   NOW
LABLE   THE   SWITCH  IN  ITS   CURRENT
POSITION AS BOX ON.

HOW TO USE IT:

THE PURPOSE OF THIS BOX IS NOT  TO
POEPLE  WHO  CALL YOU SO IT WOULD  MAKE
SENCE  THAT  IT  CAN ONLY  BE  USED  TO
RECEIVE! CALLS.   WHEN THE BOX IS  *ON*
THEN YOU MAY ONLY RECIEVE CALLS.   YOUR
FONE WILL RING LIKE NORMAL AND THE  LED
ON  THE BOX WILL FLASH.   IF YOU ANSWER
THE FONE NOW, THEN THE LED WILL
LIGHT AND THE CALLER WILL NOT BE CHARGED.
HANG  UP  THE FONE AFTER YOU  ARE  DONE
TALKING LIKE NORMAL.   YOU WILL NOT  BE
ABLE  TO  GET A DIAL-TONE OR CALL  WHEN
THE  BOX IS ON,  SO TURN THE BOX  *OFF*
FOR  NORMAL CALLS.    I DON'T  RECOMMEND
YOU DON'T WANT IT TO ANSWER WHEN MA BELL
CALLS!


Incidentally, never let it be said that all hackers are literate.
Just knowing thieves.
                      The Infamous Blue Box


The follwoing appears to be a credible set of plans for the
Captain Crunch machine.



 
$$$$$$$$$$$$$$$$$$$$ 
$                                     $ 
$           BLUE BOX PLANS!           $ 
$           ---------------           $ 
$                                     $ 
$       Edited and Uploaded by:       $ 
$                                     $ 
$                                     $ 
$$$$->The Spirit Of Radio<-$$$$ 
$                                     $ 
$              Written by:            $ 
$                                     $ 
$     Mr. America from Osuny BBS      $ 
$                                     $ 
$$$$$$$$$$$$$$$$$$$$ 
 
This file will explain the construction, troubleshooting,
andadjustmentof a Blue Box. 
 
We all know that the touch tone frequencies are composed of 2
tones (2 different freqs.) so that is the reason why we have 2
VCO's (Voltage Controlled Oscilators).  We'll call them VCO#1 and
VCO#2.If you have noticed VCO#1 and VCO#2 are exactly the same
type of  circuits.  That is why only 1 was drawn. But remember
that whatever goes for VCO#1 also goes for VCO#2. Both VCO'S are
composed of a handfull of parts.  One chip, two capacitors,2
resistors and five potentionmeters.  All of this will give you
(when properly calibrated) one of the freqencies necessary (the
other one will come fromVCO#2) for the operation of $ the Blue
Box. Both of these freqs. will bemixed in the speaker to form the
required tone. 
 
This is one of the most sophisticated designs I have ever made.
Why? Because other designs will drain the battery after 10 calls.
This design will make them last 10 months!!!!!!  But
nevertheless, don'tforget to put in aswitch for on and off.  Ok
let's build  the two VCO'S andcalibrate the unit before we get to
the keyboard construction. 
 
 
VCO CONSTRUCTION 
 
TOOLS REQUIRED 
1 ocilliscope(optional but not req) 
1 Freq. counter   (REQUIRED) 
1 Volt meter       "  "  " 
Electronics tools  (Pliers, drll, screwdrivers, etc.) 
 
 
PARTS 
 
R1  1.5K RESISTOR  5% 
R2  1K   RESISTOR  5% 
C1 .1uf  ELECTROLYTIC CAPACITOR 16VDC 
C2 .01uf  "        "  (MYLQR)   16VDC 
C1 2207 VCO CHIP BY EXAR ELECTRONICS 

Remember the above only says VCO#1 but the same is for VCO#2 

R3-R4 150 OHM RESISTORS  5%         . 
C3-C4 .1 uf ELECTROLITIC CAPACITOR  . 
10VDC                         . 

P1-P10 200K TRIMMER POT - 20 TURNS DIODES USED IN THE KEYBOARD
ARE 1N914 TYPE(40 OF THEM) & 13 SWITCHES FOR THE KEYBOARD SPST
MOMENTARY. 

SPKR YOU CAN USE A TELEPHONE SPEAKER FOR THIS (IT WORKS BEST) BUT
REMEMBER TOTAKE OUT THE DIODE THAT IS CONNECTED ACCROSS IT. 
 
 
IMPORTANT NOTES 
 
1. DO NOT USE ANYTHING ELSE OTHER THAN A MYLAR CAPACITOR FORC2. 
2. PINS 10,9,8 SHOULD BE TIED TOGETHER AND BE LEFT FLOATING. 
3. ALL RESISTORS SHOULD BE 5%!  NOTHING ELSE! 
4. A TELEPHONE SPEAKER GIVES THE BEST RESULTS. 
 
 
TROUBLE SHOOTING 
 
By now you should have constructed the two VCO'S on a bread board
or anything that pleases you.  Check for cold solder
joints,broken wires,polarity of the battery, etc.  Before we
apply power to the VCO'S we have to adjust the pots for their
half way travel point.  This is done by turning them 21 turns to
the right and then 10 turns to the left.  Do the same for all ten
of them. 
 
Now apply power to the unit check to see that you have power in
the chips by putting the positive lead of your volt meter on pin
7 andthe negative lead on pin 12.  If you do not have anything
there turn off the unit and RECHECK THE WIRING. 
 
When you get the right voltages on the chips, connect a diode to
a piece of wire (look at fig. 2 for the orientation of the diode)
from round to any pot at point T (look carefully at the schematic
for point T it is labeled T1-T10 for all pots). You should be
able to hear a tone, if not disconnect the lead and place the
speaker close to your ear and if you hear a chirp-like sound,
this means that the two VCO'S are working if you don't, 
it means that either one or both of the VCO'S are dead.  So in
this case it is always good to have an ocilloscope on hand. 
Disconnect the speaker from the circuit and hook the ocilliscope
to 1 of the leads of the speaker & the ground from the scope to
the ground of the battery. Connect again the ground lead with the
diode connected to it  from ground to any pot on the VCO that you
are checking and you should see a triangle wave if not turn the
pot in which you are applying the ground to until you see it.
When you do see it do the the same for the other VCO to makesure
it is working. (amplitude is about 2VAC). When you get the two
VCO's working you are set for the adjustment of the individual
spots. 
 
 
ADJUSTMENT 
 
Disconnect the speaker from the circuit and connect a freq.
counter (the positive lead of the counter to one of the speakers
leads that belongs to VCO#1 or connect it to pin 14. 
 
Connect the negative lead to the battery negative and connect the
jumperlead with the diode from ground to pot number 1.T1 (the
first pot number 1 point T1).  If you got it working you should
hear a tone and get a reading on the counter.  Adjust the pot for
a  freq. of 1700hz and continue doing the same for pots 2-5
except that they get different freqs. which are: 
 
:            $$$$$$$           : 
:            $            $           : 
:            $ P1 1700hz  $           : 
:            $ P2 1300hz  $           : 
:            $ P3 1100hz  $           : 
:            $ P4  900hz  $           : 
:            $ P5 1500hz  $           : 
:            $            $           : 
:            $$$$$$$           : 
 
Now disconnect the freq. counter from the speaker lead of VCO#1
or from pin (which ever you had it attached to at the beginning)
and connect it to the speaker lead of VCO#2 or to pin 14 of VCO#2
and make the same adjustments toP6-10.: 
 
:            $$$$$$$$          : 
:            $             $          : 
:            $ P6  1100hz  $          : 
:            $ P7   700hz  $          : 
:            $ P8   900hz  $          : 
:            $ P9  2600hz  $          : 
:            $ P10 1500hz  $          : 
:            $             $          : 
:            $$$$$$$$          : 
 
When you finish doing all of the pots go back and re-check 
them. 
 
 
KEYBOARD 
 
IF YOU LOOK AT FIG-2 YOU WILL SEE THAT THE KEYS ARE
SIMPLE SWITCHES. CONNECTED TO A GROUND AND TWO DIODES ON THE
OTHER END. THESE DIODES ARE USED TO SIMPLIFY THE CONSTRUCTION OF
THE KEYBOARD BECAUSE OTHERWISE THE DISTRIBUTION OF THE GROUND
SIGNAL FOR BOTH VCO'S WOULD HAVE BEEN DONE MECHANICALLY.  THE
DIODE WILL GO TO VCO#1 AND THE OTHER WILL GO TO VCO#2. FIG-3
SHOWS THE ARRANGEMENT OF THE KEYS ON THE KEYBOARD. 
 
BELOW IS A TABLE THAT WILL HELP YOU CONNECT THE KEYS TO THE
REQUIRED VCO'SPOTS. 
 
<-------------------------------------> 
<                                     > 
<              (-FIG 2-)              > 
<                                     > 
<-----!-----!--------!--------!-------> 
<     !     !        !        !       > 
< TO  ! TO  !  FREQ  !  FREQ  !  KEY  > 
< POT ! POT !  OUT:  !  OUT:  !       > 
< ON  ! ON  !        !        !       > 
< VCO1! VCO2!        !        !       > 
<-----!-----!--------!--------!-------> 
<  1  !  06 ! 1700hz ! 1100hz !   C   > 
<  2  !  10 ! 1300hz ! 1500hz !   0   > 
<  1  !  10 ! 1700hz ! 1100hz !   E   > 
<  4  !  07 ! 0900hz ! 0700hz !   1   > 
<  3  !  07 ! 1100hz ! 0700hz !   2   > 
<  3  !  08 ! 1100hz ! 0900hz !   3   > 
<  2  !  07 ! 1300hz ! 0700hz !   4   > 
<  2  !  08 ! 1300hz ! 0900hz !   5   > 
<  2  !  06 ! 1300hz ! 1100hz !   6   > 
<  5  !  07 ! 1500hz ! 0700hz !   7   > 
<  5  !  08 ! 1500hz ! 0900hz !   8   > 
<  5  !  06 ! 1500hz ! 1100hz !   9   > 
<  -  !  09 ! ------ ! 2600hz !   X   > 
<     !     !        !        !       > 
<-------------------------------------> 
 
REMEMBER THAT IN FIG-2 IT'S THE SAME FOR EACH KEY EXCEPT THE "X"
KEY, WHICH ONLY TAKES ONE DIODE.