💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › PHREAKING › part2_tx.txt captured on 2022-07-17 at 11:07:40.
View Raw
More Information
⬅️ Previous capture (2022-06-12)
-=-=-=-=-=-=-
THE IC'S RULES OF PHREAKING
These are the standards of hacking employed by the Inner Core.
The text comes from a data file written by and for IC members.
HACK YOUR OWN CODES.
Don't leech from someone else. Having codes is like having sex,
if you don't protect yourself you'll end up with a venereal
disease. You have no idea where a code has been before you got
your hands on it, when it was hacked or how long it's been in
circulation. Time is a very important factor, the longer a code
has been in use, the greater the risk.
DON'T STAY ON A CODE MORE THAN THREE DAYS.
Don't give the suckers an even break. To run a trace, MCI needs
to shuffle a lot of papers. Ain't that nice. Paper work takes
time, and it's highly unlikely they could accomplish the feat in
three days. It's even more unlikely they would even know
they've been phreaked for at least a week. All company's have
thirty day billing cycles, if you started using the code the day
after the bills went out, you'd have twenty nine days left to
play with it. The customer gets his billing and bitches up a
storm. The company now has the option of setting up a trap, but
alas, they notice you haven't used the code in three weeks and
have no destination number to PIN. If you phreaked the code one
day before the billing cycle ends, the customer may notice
right away. Figure you have two days for it to reach the
customer. If he yells right away it takes a few more days for
the security department to process the paperwork for the trace.
By that time you're long gone.
DON'T STAY ON A NODE MORE THAN THREE DAYS.
If you insist on burning the same company, you're going to
develop a pattern. You call your girl friend in Alaska every
damned day using the same company. It doesn't take a genius to
predict what you're going to do tomorrow. They know where you
enter their system and where you're going to. You've given them
everything they need to run a good trace. Spread the wealth a
little. Use US Telecom, then ITT, Lexitel, Skyline, Metro and a
few of the 800's if you like. Spread it out. These people have
no way of comparing. So you can screw Peter, Paul and the rest
of the Apostles with no worry. Just don't be a dip stick and get
lazy.
Everyone is worried about THE TRACE. Don't be. It's no big deal
for AT&T, after all it is their network, but for the leech
services it's an entirely different matter. This is why we don't
mess around with AT&T except through secondary accesses like
PBX's or Diverters. This is the scenario MCI's security
department will run down. They call up a number you've
called.......
"Hello, this is Inspector Bullshit with MCI. Did you receive a
phone call from the 212 area code on November 22, 1945 at 4:00
A. M.? "
"You didn't?"
"We've traced fourteen calls to this number in the last
two weeks, by the way, who am I speaking with?"
"Well Mrs. Blabbermouth, perhaps someone else in your household
received the calls? "
"I see, your daughter has a boyfriend in New York.
"I'm afraid he's in some serious trouble Mrs. B. If
you'll cooperate with me we won't pursue this matter with your
daughter."
"That's correct, little Susie Blabbermouth won't be involved. It
would be a shame to cause you folks trouble, after all she
didn't actually make the calls.""
All I need is the boy's name and phone number."
"Let me see if I have that right."Jimmy Phreaker at
212-555-1212?"
"Thank you Mrs. B you've been very helpful."
The point is, if Bullshit had really run traces he wouldn't be
calling to con the information. The exchange is typical of those
used by most phone companys and illustrate several important
issues.
Make sure the person you're calling is cool and there's no
chance someone else could rat on you. It is very unlikely MCI
will make such a call if you use the IC's Rules of Phreaking.
Yet, if it were to occur these are your friend's options...
1. HANGUP
2. "FUCK YOU"...THEN HANG UP
3. "I WAS WATCHING MIAMI VICE AND YOU INTERRUPT ME WITH
THIS CRAP. FUCK YOU"....HANG UP.
4. If you want to be nice about it; "I don't know what you're
talking about.....HANG UP.
The problem is now resolved. Remember these guys are like
rabid dogs in heat, they're excellent con artists. Believe
nothing you hear. You don't have to talk to them. If they had
anything on you they'd be standing at your door with a search
warrant. Their abilities in this area are very restricted. They
operate by manipulating your fear and you have nothing to fear
but your own fear. Don't try to come up with some lame
explanation, you know you received the call and they know it. So
don't make an ass out of yourself trying to explain away the
obvious - HANG UP!
What happens if your are caught?
Congratulate yourself on being an asshole. The number of phreaks
caught are so small you have now qualified for membership in a
really elite group of jerks.
Inspector Bullshit now has several options.
Grab your computer......... this will be done no matter what.
Grab your data files and any hard copy you have laying around.
This to help identify other subversives and also to supply
incriminating information about you.
Try to scare you into a confession. Standard operating procedure
- keep your fucking mouth shut. You have nothing to gain by
talking and a much to lose.
If you're a minor you can forget about jail time, an adult
is looking at a couple of weeks in the slam - may-be.
Realize this, they don't really want your ass as much as they
want THE MONEY. That's right boys and girls the buck talks loud
and clear.
If you're caught, you've broken every one of the IC's
rules. At worst you're looking at a couple of thousand in phone
bills. Get a lawyer to do your talking for you, that'll be about
a five hundred dollar retainer. If the company is willing to
settle for the money, and your computer, pay it - it's cheaper
in the long run. If they want you in the calaboose then fight
it. As a first time offender the odds of you actually getting
time are slim. Incidentally, Inspector Bullshit will drop a
little extra on the bill for good measure. Have the attorney
demand they produce their records of all "alleged phone
conversations".
In fighting a phreaking case you'll want to have a jury trial.
The technology behind the running of a trace is so
complicated even a halfassed lawyer could confuse the
average layman. He can make Inspector Bullshit describe
switching down to atomic subparticles if he wants and by the
time he gets to how a trace works the jury would be so confused
you'd skate on a "reasonable doubt". It would be
interesting to see if a sharp shark could subpoena the actual
equipment used to run the trace. I don't think MCI would
care to have one of their computers offline for the time it
would take to have "independent" examiners checking out the
functionality of the switching mechanisms.
To phreak or not to phreak. It's a question only you can answer
for yourself.
The following are electronic BBS conversations at a Hacker
Bulletin Board. They have been left intact (misspellings too)with
the exception of codes and phone numbers which could conceiveably
get my ass in hot water.
The Hacker network of communication is loosely knit but extremely
effective in getting information circulated quickly.
Lady G (Lady Godiva) is the only female I've ever seen on a hack
board. Amazingly she conned her way inside, yet turned out not to
be a threat to hackers even though she is employed by government.
Numb. --> 72
Title --> JUST A LITTLE CODE
From --> BIG BYTE
Left --> 19-Apr-86 2:30 am
While not to much to say just heres a sprint
(Code Deleted)
Also Bill the Cat do you know some people down in Florida like
Blackbeard or been on some off my Conferences?? Let me know.
.s
opps
/s
shit
B17>
--> Next bulletin
Numb. --> 73
Title --> Fed trap
From --> BIG BYTE
Left --> 19-Apr-86 3:05 am
Where i live here in Green Bay Wi, they are busting our town for
illegal use of the phone. The number they are getting kids
(leeches on) is 1-800-437-7010 it is GCI of Ancrage <-spelled
wrong Alaska and so far they have busted 400 people from one
school and have questioned 1500 its like a bad dream oh
who cares not me. Just be careful and dont use it unless you fell
lucky. All the codes used are in the 467xxxxx area so may be
other areas are safe.
later
bb
B17>
--> Next bulletin
Numb. --> 74
Title --> Bobo..
From --> THE ARABIAN KNIGHT
Left --> 19-Apr-86 11:10 am
Bobo,
Leave me mail. Id like to get a
sprint Code(New). I got a new Pbx,
maybe old. but it works fine..
Ak
Bobo- Why are you so worried About
Lady G? Does she know alot about you
or something?
B17>
--> Next bulletin
Numb. --> 75
Title --> [ Lady G. ] ?
From --> THE D MEN TOR
Left --> 19-Apr-86 1:23 pm
I can run CNA's in 415, Give me e-mail and I'll find out whatever
you want to find out about her BOBO. Have you spoken with her?
How do you really know this person is over 30 etc......
later,
The D men tor...Confused.
B17>W
Enter the name of the person you wish
to send mail to:
>THE D MEN TOR
What is the subject of this letter?
>Lady G
Mail:
You may enter up to 100 lines of text.
Press CTRL-A or CTRL-Q when done.
D men
The numbers for Lady G are 415-(Deleted) and
415-(Deleted).
She is over 30 because
1. She's uses expressions that are 15 years out of date.
2. I recoginize this becuase I too am 15 years out of date.
I don't like people getting busted. She pirates
but that's about it. I wonder why she's on so many hack boards.
Motor City went down right about the time she logged on.
I might be totally wrong, BUT, I want to check it out just to be
safe.
You can call me Mr. Paranoia. She rattles my cage and
it makes me nervous.
Let me know what pops.
Bobo
E>S
Filing mail for THE D MEN TOR...
B17>
B17>7
--> Telecommunications Today (7)...
--> 60 bulletins posted; some new!
B7>N
Numb. --> 59
Title --> Police Sting
From --> CHARLIE SMITH
Left --> 19-Apr-86 6:29 am
Here is an interesting story:
AUSTIN,TX--Law enforcement officials here have joined a growing
number of police agencies nationwide running "sting" operations
to catch persons using bulletin boards for illegal purposes.
Based on information posted on a bulletin board it operated, The
Austin Police Department said it has been able to turn off two
pirate boards here and expects shortly to make a number of
arrests for misdemeanor violations of Texas' newly enacted
computer crime law.
For more than two years, the police department secretly ran a
board called the Underground Tunnel, which was set up to appear
as a normal BBS run by a Sysop called "Pluto". But late last
month - to the surprise of the board's more than 1,000 users -
Pluto was revealed as Sgt. Robert Ansley, a seven-year veteran of
the Austin Police Department!
"Most of the users were people interested primarily in several
on-line fantasy games or in electronic messaging." Ansley said.
"To get to the levels where people posted information on how to
crash corporate sysems, the user had to ask for increased
access. We were very careful not to solicit or entrap anyone
into leaving illegal information."
The Austin Police Department disclosure caught most of the BBS's
users by surprise. "I liked the board's electronic messaging
capabilities," said user Michael Whalen, the managing editor of
the Daily Texan, the student newspaper of the University of
Texas, here. "I was really surprised at how the officer was able
to pull this off."
What the police found, according to Ansley, included access codes
belonging to the world's largest credit reporting organization,
TRW Information Services Systems Division of Orange, California.
"Most offenders seem to be real big on TRW," said Ansley.
Sting and intelligence gathering bulletin board operations are on
the rise throughout the country, according to law enforcement
officials. Several police departments nationwide have already
used bulletin boards to track down and arrest microcomputer
users who post illegally obtained calling card codes, mainframe
access procedures and passwords, or other confidential
information. According to one high-level West Coast law
enforcement officer who declined to be identified, federal
officials are now joining local authorities in running b5lletin
boards (BBSs) in several key metropolitan areas.
"You better believe law enforcement agencies are interested and
in in some cases, running bulletin boards," said Dan Pasquale, a
sergeant with the Fremont, California, police department. Last
month, police in Fremont, capped three and a half months of
bulletin board operations by arresting eight individuals for
alleged credit card fraud, misuse of telephone credit
card operations, and technical trespass. Pasquale said most
corporations whose passwords or calling card numbers were posted
on Fremont's BBS were unaware that their information had been
compromised.
- * Hackers Note Here** Pasquale actively solicited the posting of
codes, passwords, credit cards. Qualifying as entrapment. More
experienced hacks pulled out before he sprang his trap. More than
200 people were arrested coast to coast. Only one was elite and
he beat the rap. The rest were rodents.
Although police are pleased with their results, some users say
they feel the sting bulletin boards are unfair to both the
innocent users and the suspected criminals alike. Whalen said
students at the University of Texas used the board extensively,
andhe claimed that some people accused of posting access codes
and other information on the board felt they had been entrapped
when they discovered that the BBS was a police sting operation.
Whalen also said that some users were concerned about the privacy
and sanctity of electronic mail left on the board. "Ansley said
users are foolish if they don't think a sysop reads the mail on
the board," he added.
Indeed, as police turn increasingly to bulletin boards to catch
suspected criminals, the issue of entrapment has also become a
growing concern, one to which police are sensitive.
"At no time did the police department urge users to leave access
codes, applications, or passwords for corporate computers on The
Tunnel," Ansley said.
To prove entrapment, a suspect would have to clearly show that
the government agent offered some type of inducement to promote
criminal activity, said Jim Harrington, the legal director of
the Texas Civil Liberties Union here. "The whole area of police
gaining information on [criminal activities] by reading
electronic mail is very interesting."
Fremont police held a series of meetings with a district attorney
before they started a board, according to Pasquale. "We
established a point where entrapment began and made sure we
never crossed that point, and in fact, messages on the board
were scripted in conjunction with the district attorney's
of
Ahem, let me hasten to point out the Gemini System is NOT a
police BBS!
Charlie
Numb. --> 60
Title --> Infocom
From --> ATILLA THE HUN
Left --> 19-Apr-86 11:37 pm
Well I don't know if anyone has heard this but,
I have heard that Infocom will start (or may have started)
calling AE lines to see if they contain any infocom software.
If so they download it and check the serials, and bingo if a
pirated version then plain and simple YOU IS BUSTED!
oh well anyone else know of anything more, I picked it up under
discussion at a bbs.
atilla the hun -<*-----
B7>OFF
In The News
Press reports of hacker misdeeds seem to be written in flavors
which border upon awe to contempt. It depends on the publication.
Newspapers ten to permit more editorializing. Between the two
extremes there is a point of reason. I've often wondered, "If a
fifteen year old kid can break into a 'secure' government
computer, what could a fully trained enemy agent do?" It's a
reasonable question.
Virginia - A fourteen year old hacker who called himself Phineas
Phreak was the first to be prosecuted under the state's computer
trespassing law. Arrested for hacking at a Bulletin Board, he was
placed on one year's probation and ordered to pay $300.00 in
compensation to the board's operator, Allen Knapp.
Milwaukee - A hacker group who called themselves the 414's after
their area code were arrested by FBI agents and found to have
access to more than 60 computer databases. These included a
California Bank, a cancer center and the Los Alamos Scientific
Laboratory.
California - Stanley Rifkin a computer consultant for Security
Pacific Bank, stole the bank's passwords and liberated 10 million
dollars from the institution. He then erased the electronic
records of the transactions. While Rifkin was not a hacker, he
hold the distinction of being the country's number one computer
thief. His arrest was not the result of his computerized
misdeeds, but instead, his lack of expertise at being a thief.
Washington - The United States Government has become the nation's
leading user of computers. As such, they are a target of internal
thieves who have used their systems to divert funds for their own
uses. A number of arrests of computer related theft has led the
government to believe they haven't scratched the surface yet.
It's estimated that only one in 22,000 computers crimes will ever
be prosecuted.
San Diego - A computer hacker, Bill Landreth pleaded guilty to
tapping the GTE Telemail network in Vienna, Virginia. Known as
"The Cracker" he agreed to cooperate with Federal Investigators
in a larger investigation. Four teenagers from Irvine, California
were subsequently arrested and named Landreth as their source of
information on hacking. Landreth has since written a book "Out of
the Inner Circle". The four kids from Irvine don't receive
royalties.
TRW - Hackers armed with stolen passwords broke into the TRW
credit system and reviewed information on employment records,
bankruptcies, loans, social security numbers and credit cards.
The password was stolen from a Sears and Roebuck and was
reportedly in circulation for the better part of a year. The
credit card numbers, expiration dates and credit limits of card
holders were used to make fraudulent purchases. TRW changed the
password.
Atlanta - Edward Johnson took exception to Jerry Falwell's fund
raising activities. His mother had a thing for T.V. preachers and
often gave money to Falwell's Liberty Foundation. Mr. Falwell's
collectors were oblivious to the fact the elderly lady lived on
social security and couldn't afford the donations. On a previous
occasion she had attempted to give the family farm to Jimmy
Swaggart. Johnson adjusted his phreaker program into a phone
cranker to auto dial Falwell's 800 and tie up the line for 30
seconds a call. Falwell's people reported they lost one million
in donations from the activity. Southern Bell finally trace the
calls and gave Johnson two choices, stop or lose his phone line -
he stopped. After all, it was "God's will".
Washington - Representative William Hughes from New Jersey has
introduced a bill to make computer theft of data and certain
"kinds of hacking activities" federal felonies.
New Jersey - Seven teenagers were arrested on charges of credit
card fraud, phreaking and hacking. An investigation into credit
card purchases led local police to the operator of a hacker bbs.
Armed with a search warrant the police seized his computer and
all related data. Inspection of same led to the arrests of the
other six. Now known in hack circles as the New Jersey Seven,
they reportedly had the ability to change the attitude of a
government satellite. The Inner Core reports they consider it
unlikely the kids knew they had the capability.
In my research, I've noted government and business to be at
greater risk from their own employees than from hackers. Credit
card fraud is the leading hacker crime. The pales beside the
reported cases of computer theft from internal sources. The
Rifkin case is the most noted. However, thousand of unreported
thefts occur every year.
MAKING MONEY WITH YOUR CODES
Ok, phreaking will save you money, that's fine. Wouldn't you
rather make some bucks off these jokers? No biggy. You sell your
codes. Is it illegal? You bet, but your the adverturesome type
with avarice in your heart...this is how it works.
Abdul wants to call the Middle East so he can talk with his
camel. No problem. Call the international operator and ask how
much it costs for an hour to Jordon. Charge the raghead fifty
percent of the cost for hooking him up and let him talk as long
as he likes. MCI and Sprint both access the Middle East so you're
in business. Foreigners are good to deal with. They're extremely
paranoid anyway so tell them you have to make the calls from a
phone booth. This isn't true BUT, you're covering your own ass.
There are a variety of good reasons why a phone booth is called a
fortress, this is one. DO NOT SELL THE CODES. Abdul knows nothing
about phreaking. The dumbshit will stay on the code too long and
will end up getting his ass traced. The telcos don't give two
shits about this guy. THEY WANT YOU!. You're the guy costing them
the big bucks. Abdul will make a deal and your tit will be in the
ringer. So keep control of the codes. If you want to be a nice
guy and hand out codes to your phriends fine. Just be sure they
don't have big mouths and that they know the IC's Rules of
Phreaking. You'll find a list of the countrys MCI and Sprint
access in the appendix. You'll also notice there are a lot of
places that they don't go. India for one. The only way to book
passage to India is on AT&T. You'll need to bag a PBX or a
Diverter for that action.
Equal Access
What does equal access mean to you? Not much. Access was the
issue that permitted Mci to break up At&t. The result was the
sudden emergence of the companies you'll find listed in this
chapter. At&t still retains an 85%+ share of the
telecommunications market. The rest of the business enterprises
are basically parasites attempting to feed off of Ma Bell's
network.
Equal Access means you get to pay 2 to 5 dollars a month for
"access" to the long distance network, whether you want it or
not. It means your local telco can go begging to the Public
Utilities commissions claiming the need for rate increases in the
wake of the break up. Pacfic Tel was hurt so much they posted
sales recently of one billion dollars. I first in the company's
history.
There is one small advantage to equal access. Ustel (950-1033)
customers can crossover to the Sprint Network (950-0777) and make
international calls. By appending the equal access code to the
customer code the call will be cross connected.
In short, equal access means this..."Bend over and smile
America". If you thought you were getting screwed before, well
you ain't seen nothing yet.
Equal Access Codes
10824 ATC Directline
10482 Access America
10939 Access Long Distance
10282 Action Telecom
10444 Allnet
Americall
10002 Americall LDC Inc.
10053 American Network
10366 American Telco
10050 American Telephone Exchange
10080 Amtel
Amertel
10824
ATC Communications
10287 ATS Communications
10272 Bell of Pa
10606 Biz-Tel
10300 Call America
10221 Capitol Telecommunications Inc.
10987 Clay Desta Communications
10266 Com Systems
10885 Communigroup of Kansas City
10733 Comp-Data Communications
Compute a Call
Comtel of Pine Bluff
10203 Cytel10233 Delta Communications
10339 Dial USA
Directline
Discount Long Distance
EO Tech10054 Eastern Telephone Systems
10634 Econo Line of Midland
Econo-line of Waco
10256 Execuline
10393 Execulines of Florida
Garden State Telco
10235 Inteleplex
10884 ITI
10488 Itt
10535 LDL - Long Distance for Less
10084 LDS
LDX
LTS
10066 Lexitel
10852 Line One
10036 Long Distance Savers
10537 Long Distance Service of Washington
Long Distance Telephone Savers
Max Long Distance
10222 Mci
10021 Mercury Long Distance
10622 Metro America Communications
National Telecommunications of Austin
Network I/Metromedia
10855 Network Plus
10638 Northwest Telecom Ltd.
10785 Olympia Telecom
10808 Phone America of Colorado
10936 R - Comm
10211 RCI
10787 STS/Star Tel
10800 Satelco
10888 Skyline
10087 Southernnet
10321 Southland Systems
10777 Sprint
10889 St. Joseph10787 STS/Star Tel
10007 TMC of Arkansas
10021 TMC of Chattanooga
10007 TMC of El Paso
10007 TMC of Miami
10007 TMC of S.E. Florida
TMI of Oklahoma
10826 Tel AMCO
Tel-Central Inc of Oklahoma
10330 Tel-Share
10626 Tel/man
10007 Telemarketing Communications
10899 Telephone Express
10331 Texustel
10850 Tollkall
10824 Transcall
10333 US Telecom
10859 Valu-Line of Longview
Valu-Line of Wichita Falls
10687 WTS Communicatons
10085 Westel
10220 Western Union
10995 Wylon
ESS
The following is a file taken from a Hack Board. I think it is
intellegently written and accurate.
+====================================+
+ ELECTRONIC SWITCHING SERVICE V1. +
+ EXERT FROM 2600 MAGAZINE FEB '84 +
+FROM THE RADIO STATION: 718-xxx-xxxx+
+====================================+
THERE WAS OF COURSE NO WAY OF KNOWING
WETHER YOU WERE BEING WATCHED AT ANY
GIVEN MOMENT. HOW OFTEN, OR ON WHAT
SYSTEM, THE THOUGHT POLICE PLUGGED IN ON
ANY INDIVIDUAL WIRE WAS GUESSWORK. IT
WAS EVEN CONCEIVABLE THAT THEY WATCHED
EVERYBODY ALL THE TIME. BUT AT ANY RAT
E THEY COULD PLUG IN YOUR WIRE WHENEVER
THEY WANTED TO. YOU HAD TO LIVE--DID L
IVE, FROM HABIT THAT BECAME INSTICT--IN
THE ASSUMPTION THAT EVERY SOUND YOU MAD
E WAS OVERHEARD, AND, EXCEPT IN
DARKNESS, EVERY MOVEMENT SCRUTINIZED.
'FROM NINETEEN EIGHTY-FOUR'
ESS IS THE BIG BROTHER OF THE BELL
FAMILY. ITS VERY NAME STRIKES FEAR AND
APPREHENSION INTO THE HEARTS OF MOST
PHREAKERS, AND FOR A VERY GOOD REASON.
ESS (ELECTRONIC SWITCHING SYSTEM) KNOWS
THE FULL STORY ON EVERY TELEPHONE
HOOKED INTO IT. WHILE IT MAY BE PARANO
ID TO SAY THAT ALL PHREAKING WILL COME
TO A SCREECHING HALT UNDER ESS, IT'S
CERTAINLY REALISTIC TO ADMIT THAT ANY
PHREAK WHOSE CENTRAL OFFICE TURNS TO
ESS WILL HAVE TO BA A LOT MORE CAREFUL.
HERE'S WHY.
WITH ELECTRONIC SWITCHING, EVERY
SINGLE DIGIT DIALED IS RECORDED. THIS
IS USEFUL NOT ONLY FOR NAILING PHREAKS
BUT FOR SETTLING BILLING DISPUTES. IN
THE PAST, THERE HAS BEEN NO EASY WAY
FOR THE PHONE COMPANY TO SHOW YOU WHAT
NUMBERS YOU DIALED LOCALLY. IF YOU
PROTESTED LONG ENOUGH AND LOUD ENOUGH,
THEY MIGHT HAVE PUT A PEN REGISTER ON
YOUR LINE TO RECORD EVERYTHING AND
PROVE IT TO YOU. UNDER ESS, THE ACTUAL
PRINTOUT (WHICH WILL BE DUG OUT OF A
VAULT SOMEWHERE IF NEEDED) SHOWS EVERY
LAST DIGIT DIALED.
EVERY 800 CALL, EVERY CALL TO DIRECTORY
ASSISTANCE, REPAIR SERVICE, THE
OPERATOR, EVERY RENDITION OF THE 1812
OVERTURE, EVERYTHING! HERE IS AN
EXAMPLE OF A TYPICAL PRINTOUT, WHICH
SHOWS TIME OF CONNECT, LENGTH OF
CONNECT, AND NUMBER CALLED.
DATE TIME LENGTH UNITS NUMBER
0603 1518 3 1 456-7890
0603 1525 5 3 345-6789
0603 1602 1 0 000-4011
0603 1603 1 0 800-555-1212
0603 1603 10 2.35* 212-345-6789
0603 1624 1 0 000-000-0000
(TSPS)
A THOUSAND CALLS TO "800" WILL SHOW
UP AS JUST THAT--A THOUSAND CALLS TO
"800"! EVERY TOUCH TONE OR PULSE IS
KEPT TRACK OF AND FOR MOST PHREAKS,
THIS IN ITSELF WON'T BE VERY PRETTY.
SOMEWHERE IN THE HALLOWED HALLS OF 19
5 BROADWAY, A TRAFFIC ENGINEER DID AN
EXHAUSTIVE STUDY OF ALL 800 CALLS OVER
THE PAST FEW YEARS, AND REACHED THE
FOLLOWING CONCLUSIONS: (1) LEGITIMATE
CALLS TO 800 NUMBERS LAST AN AVERAGE OF
3 MINUTES OR LESS. OF THE ILLEGAL (I.E
PHREAKERS) CALLS MADE VIA 800 LINES,
MORE THAN 80% LASTED 5 MINUTES/LONGER;
(2) THE AVERAGE RESIDENTIAL TELEPHONE
SUBSCRIBER MAKES FIVE SUCH CALLS TO AN
800 NUMBER PER MONTH. WHENEVER
PHREAKERS ARE BEING WATCHED, THAT
NUMBER WAS SIGNIFICANTLY HIGHER. AS A
RESULT OF THIS STUDY, ONE FEATURE OF
ESS IS A DAILY LOG CALLED THE "800
EXCEPTIONAL CALLING REPORT."
UNDER ESS, ONE SIMPLY DOES NOT PLACE
A 2600 HZ TONE ON THE LINE, UNLESS OF
COURSE, THEY WANT A TELCO SECURITY
REPRESENTATIVE AND A POLICEMAN AT THEIR
DOORWITHIN AN HOUR! THE NEW GENERICS
OF ESS (THE #5) NOW IN PRODUCTION, WITH
AN OPERATING PROTOTYPE IN GDNZFA, nILL,
ALLOW THE SYSTEM TO SILENTLY DETECT ALL
"FOREIGN" TONES NOT AVALABLE ON THE
CUSTOMER'S PHONE. YOU HAVE EXACTLY 12
BUTTONS ON YOUR TOUCH-TONE (R) PHONE.
ESS KNOWS WHAT THEY ARE, AND YOU HAD
BEST NOT SOUND ANY OTHER TONES ON THE
LINE, SINCE THE NEW #5 IS PROGRAMMED
TO SILENTLY NOTIFY A HUMAN BEING IN THE
CENTRAL OFFICE, WHILE CONTINUING WITH
YOUR CALL AS THOUGH NOTHING WERE WRONG!
SOMEONE WILL JUST PUNCH A FEW KEYS ON
THEIR TERMINAL, AND THE WHOLE SORDID
STORY WILL BE RIGHT IN FRONT OF THEM, &
PRINTED OUT FOR ACTION BY THE SECURITY
REPRESENTATIVES AS NEEDED.
TRACING OF CALLS FOR WHATEVER REASON
(ABUSIVE CALLS, FRAUD CALLS, ETC.) IS
DONE BY MERELY ASKING THE COMPUTER
RIGHT FROM A TERMINAL IN THE SECURITY
DEPARTMENT. WITH ESS, EVERYTHING IS RI
GHT UP FRONT, NOTHING HIDDEN OR
CONCEALED IN ELECTROMECHANICAL FRAMES,
ETC. IT'S MERELY A SOFTWARE PROGRAM!
AND A PROGRAM DESIGNED FOR EASE IN
OPERATION BY THE PHONE COMPANY. CALL
TRACING HAS BECOME VERY SOPHISTICATED A
ND IMMEDIATE. THERE'S NO MORE RUNNING
IN THE FRAMES AND LOOKING FOR LONG PERI
ODS OF TIME. ROM CHIPS IN COMPUTERS
WORK FAST, AND THAT IS WHAT ESS IS ALL
ABOUT.
PHONE PHREAKS ARE NOT THE ONLY REASON
FOR ESS, BUT IT WAS ONE VERY IMPORTANT
ONE. THE FIRST AND FOREMOST REASON FOR
ESS IS TO PROVIDE THE PHONE COMPANY
WITH BETTER CONTROL ON BILLING AND
EQUIPMENT RECORDS, FASTER HANDLING OF
CALLS (I.E. LESS EQUIPMENT TIED UP IN
THE OFF ICE AT ANY ONE TIME), & TO HELP
AGENCIES SUCH AS THE FBI KEEP BETTER
ACCOUNT OF WHO WAS CALLING WHO FROM
WHERE,ETC. WHEN THE FBI FINDS OUT THAT
SOMEONE WHOSE CALLS THEY WANT TO TRACE
IS ON A ESS EXCHANGE, THEY ARE THRILLED
BECAUSE IT'S SO MUCH EASIER FOR THEM
THEN.
THE UNITED STATES WON'T BE 100% ESS
UNTIL SOMETIME IN THE MID 1990'S. BUT
IN REAL PRACTICE, ALL PHONE OFFICES IN
ALMOST EVERY CITY ARE GETTING SOME OF
THE MOST BASIC MODIFICATIONS BROUGHT
ABOUT BY ESS. "911" SERVICE IS AN ESS
FUNCTION. SO IS ANI (AUTOMATIC NUMBER
IDENTIFICATION) ON LONG DISTANCE CALLS.
"DIAL TONE FIRST" PAY PHONES ARE ALSO
AN ESS FUNCTION. NONE OF THESE THINGS
WERE AVAILABLE PRIOR TO ESS. THE AMOUNT
OF PURE FRAUD CALLING VIA BOGUS CREDIT
CARD, THIRD NUMBER BILLING, ETC. ON
BELL'S LINES LED TO THE DECISION TO
RAPIDLY INSTALL THE ANI, FOR EXAMPLE,
EVEN IF THE REST OF THE ESS WAS SEVERAL
YEARS AWAY IN SOME CASES.
DEPENDING ON HOW YOU CHOOSE TO LOOK
AT THE WHOLE CONCEPT OF ESS, IT CAN BE
EITHER ONE OF THE MOST ADVANTAGEOUS
INNOVATIONS OF ALL TIME OR ONE OF THE
SCARIEST. THE SYSTEM IS GOOD FOR
CONSUMERS IN THAT IT CAN TAKE A LOT OF
ACTIVITY AND DO LOTS OF THINGS THAT OLD
ER SYSTEMS COULD NEVER DO. FEATURES
SUCH AS DIRECT DIALING OVERSEAS, CALL
FORWARDING (BOTH OF WHICH OPEN UP NEW
WORLDS OF PHREAKING WHICH WE'LL EXPLORE
IN LATER ISSUES), AND CALL HOLDING ARE
STEPS FORWARD, WITHOUT QUESTION. BUT
AT THE SAME TIME, WHAT DO ALL OF THE
NASTY IMPLICATIONS MENTIONED FURTHER
BACK MEAN TO THE AVERAGE PERSON ON THE
SIDEWALK? THE SYSTEM IS PERFECTLY
CAPABLE OF MONITORING ANYONE, NOT JUST
PHONE PHREAKS! WHAT WOULD HAPPEN IF
THE NICE FRIENDLY GOVERNMENT WE HAVE
SOMEHOW GOT OVERTHROWN AND A MEAN NASTY
ONE TOOK ITS PLACE? WITH ESS, THEY
WOULDN'T HAVE TO DO TOO MUCH WORK, JUST
COME UP WITH SOME NEW SOFTWARE. IMAGINE
A PHONE SYSTEM THAT COULD TELL
AUTHORITIES HOW MANY CALLS YOU PLACED
TO CERTAIN TYPES OF PEOPLE, I.E. BLACKS
COMMUNISTS, LAUNDROMAT SERVICE
EMPLOYEES... ESS COULD DO IT, IF SO
PROGRAMMED.
*** BIOC FROM WHACKOLAND BBS:
*** AGENT
THE RADIO STATION BBS
300/1200 BAUD
---------------------------------------
GAMES PHONE COMPANIES PLAY
Some phone companies have come up with clever little tricks to
fuck up the phreaks hacking activities. One of these is the
CARRIER BLAST. Simply put, they shoot a 300/1200 baud answer tone
across the phone line right before you connect with your
destination. This move makes your computer THINK it's connected
with the computer you're calling. The attempt is laughable. All
you need do is to take the modem offline for that period of
seconds when the carrier is blasting. For the Hayes and the
Hayes compatible modems you work this command into the dialing
sequence, "+++,". Each modem in the AT mode permits you to take
the modem offline and "idle". The function is programable so you
can use any keyboard character. The "+++" puts the modem in idle,
the comma is a timing element you've preprogrammed. If you want a
five second delay, you will have programmed "ATS8=5" or "ATS8=10"
for a ten second delay. After your delay the modem will continue
to execute the dialing sequence. You'll now use "ATO" to put the
modem back on line. The whole routine will look like
this,"+++,ATO". Consult your modem manuals if you don't have a
Hayes Compatible. Each manufacturer has "borrowed" the same
features from Hayes. The result will be the same even if your
commands may differ.
Another little gimmick has been borrowed from the PBX. After
entering your code you have to enter "9" to get out. No big deal.
Just use nine as a suffix.
If you've ever tried hacking an AT&T credit card (and I recommend
that you don't) you'd notice that you can dump the entire dialing
sequence all at once. This is a classy system. Not so with MCI or
UStel. After you've entered the 0 and the area code of your
destination the system beeps you that it has received the proper
format. While this beeping is going on you can't dial over it.
The solution is simple, insert the "comma delay to wait for the
"beeper" to get done. The one problem you may encounter depends
on the size of you modem's buffer. The Hayes compatible can
accept forty five digits. The MCI/UStel format requires a full 44
digits. You have one to spare. If your buffer size is smaller,
you'll have to break the dialing sequence in two separate
routines. A bit of a bitch but liveable for the return.
Code format bastardizations are a nice change. The telco's hope
that in deviating from the norm, it will be less advantageous for
the hacker, who like anyone else develops habits, to whack away
at their systems. Itt's reverse arrangement is a prime example. The Pbx
The Pbx (Public Branch Exchange) is a switching station. In the
old days an operator would stick a plug into a slot and connect
with an incoming call and another plug to a second slot to
establish a connection with the destination. The equipment is the
same in theory except, today the microchip has eliminated the
human operator.
The phreak is interested in the board's dial in/out capability.
The legitimate users of the Pbx can call into a number, enter a
code + a routing number and have an At&t line to dial out with.
Pbx's afford the hack indirect access to Ma Bell without exposing
him to the risk of a trace. There are two principle uses,
Teleconferencing and Overseas calls to area only At&t services.
To find a Pbx the hack scans a local prefix. This is also known
as War Dialing after the movie War Games. To find the unit the
hack must be equipped with a modem capable of recognizing a dial
tone. The Hayes modem can not. The Apple Cat is considered the
ideal phreaking modem. Not only can it recognize dial tones it
can generate the frequencies needed to emulate a blue box. The
Cat is not one of Ma Bell's favorites. The Hayes user is forced
to sit and listen to the dialing if he wants a Pbx. Most phreaks
will usually make a deal with a cat owner for pbx locations.
The phreak will recognize the Pbx when he hears a second dial
tone. He'll now start playing around looking for the code. Many
switchboards have simple and easy to remember 4 digit codes like
1234. The hack will always go for the obvious. Code lengths can
be any where from zero to eight digits. Pbx's are very user
friendly. When you screw up it'll beep at you to let you know.
This is a worksheet for Pbx hacking
1 1 1 1 1 1 1 1
2 2 2 2 2 2 2 2
3 3 3 3 3 3 3 3
4 4 4 4 4 4 4 4
5 5 5 5 5 5 5 5
6 6 6 6 6 6 6 6
7 7 7 7 7 7 7 7
8 8 8 8 8 8 8 8
9 9 9 9 9 9 9 9
The hack will now enter a number from the far left column. If it
beeps at him he knows he's guessed wrong so he disconnects and
redials. With an autodialer that's no big deal. He goes back to
work on the first column. He will eventually it a number which
doesn't generate an error message. He circles it and proceeds to
the next column. When he's succeeded in hacking out the code, he
will hear another dial tone. This is his At&t line out. Most
phreaks will test the line by dialing information, local to the
Pbx.
Some units require an additional out code. Would you believe 9 ?
Actually the Pbx will accept any preprogrammed 2 digit code, like
85. Nine has become a habit and many virgins have lost their
cherry to a phreak by doing the obvious. I've seen units that
required no code, only the 9 to get outside.
It's impossible to make a Pbx secure. If a hacker want's it, and
he's willing to work on it, he'll get it. The only option
available to the business is to disconnect the in/out dialups and
supply their outside personnel with long distance travel cards.
Loops
Loops are mildly interesting in the hack/phreak world. They
consist of two telephone numbers that, when connected, permit
callers to hold conversations with strangers or friends whom
they've met by appointment.
A loop has a high side and a low side, meaning one of the pair of
numbers emits a tone while the other is quiet. Loops in 213 and
818 areas can be found by dialing any prefix and 1118 or 1119.
Pacific Telephone has injected a rather annoying "click" into the
line which makes data transfers impossible and voice
communication tedious. This situation doesn't exist in other
areas of the country.
At first glance, loops may not appear to have any practical
value. To the hacker it has two uses. It enables him to voice
with people he doesn't want to have his phone number and it's
useful in conferencing (see Alliance). Many hacks refuse to make
their personal information available to those who are not long
standing bbs acquaintances. Loops make safe voicing possible.
A Few Loops
201-531-9929,9930 201-938-9929,9930
206-827-0018,0019 206-988-0020,0022
212-283-9977,9997 208-862-9996,9997
209-732-0044,0045 212-529-9900,9906
212-283-9977,9979 212-352-9900,9906
212-220-9977,9979 212-365-9977,9979
212-562-9977,9979 212-986-9977,9979
213-549-1118,1119 214-299-4759,4757
214-291-4759,4757 307-468-9999,9998
308-357-0004,0005 402-779-0004,0007
406-225-9902,9903 714-884-1118,1119
These loops were taken from a Hack Board and are for the 808
area.
(((((((((((((((((((((((((((((((((((
( (
( (
( (
( Here are some loops for ya. (
( (
( (
( (
( (808) = 1 (
( (9907)= Loud (
( (9908)= Silent (
( (
( (
( (
( (
( 1 328 (Loud) (Silent) (
( " 322 """"""""""""""" (
( " 572 """"""""""""""" (
( " 261 """"""""""""""" (
( " 239 """"""""""""""" (
( " 668 """"""""""""""" (
( " 885 """"""""""""""" (
( " 961 """"""""""""""" (
( " 245 """"""""""""""" (
( " 332 """"""""""""""" (
( " 335 """"""""""""""" (
( " 623 """"""""""""""" (
( " 624 """"""""""""""" (
( " 959 """"""""""""""" (
( " 742 """"""""""""""" (
( " 879 """"""""""""""" (
( " 882 """"""""""""""" (
( " 329 """"""""""""""" (
( " 247 """"""""""""""" (
( " 235 """"""""""""""" (
((((((((((((((((((((((((((((((((((((((
The Loop master (Merauge) was here
DIVERTERS
Diverters are privately owned call forwarding machines. They'll
be found almost exclusively in areas that don't have call
forwarding. This also means ESS isn't operational in your
area. This is how it works...
You may not realize it, but the sounds of a call connecting are
permanently etched on your subconscience mind. Whether it's the
sounds of tones or clicks, you know when your call has
connected. Pay attention next time, you'll see what I mean. A
call going to a diverter makes two connections. First to the
number you called and second to the number that the diverter
called. When you hear this second connection, you'll know that
you've bagged a diverter. The call will be connected to a person
you have absolutely no interest in talking to. Tell the person
that you have the wrong number, click the rocker on your phone,
and wait for HIM to hang up. Your call is now in a never never
land between the first number you dialed and the number that the
diverter called. Wait about two minutes. You'll hear a faint
dial tone in the back ground. That's your AT&T line out. You can
now dial anywhere in the world.
Since you're dealing with a real human on the other end, be
prepared for the unexpected. I called one diverter recently and
had a fellow answer the phone. I used the wrong number routine
and clicked the rocker, but HE DIDN'T HANG UP. Hey, I'm cool, a
dummied up and waited. After five minutes HE STILL WOULDN'T HANG
UP. Not only that, he started making lewd suggestions that he
and I get together for a date. I like girls and this joker was
grossing me out. I said,"Jesus fucking Christ" very disgustedly
(for emphasis) and clicked the rocker arm again. THE SON OF A
BITCH STILL WOULDN'T HANG UP. I gave up and went to a PBX.
This is the moral of this story. This fellow had been burned
before. He knew the flaw in his diverter and he knew what to do
about it. Plus the guy gets 10 points for have some style. He
knew what I was trying to do to him and he played the game out
all the way. A good show. Manufacturers of diverters are hip to
the game. Their newer machines have disconnect features that
restrict a phreaks call out abilities. Never the less, there are
hundreds of thousands of the older machines still out there with
their cherries intact. Firms that use a diverter are too cheap
to hire and answering service. For this reason alone they won't
be too quick to upgrade their systems. They'll get a little
incentive after they receive a several thousand dollar phone
bill.
I spoke with a phreak not too long ago who received a 2 thousand
dollar phone bill for conferance calls he'd made with a
diverter.
Explained the steps he'd taken in its use. I asked him if the
second dial tone he received was as loud as the first. I
informed him as kindly as possible, "You dumb shit, that was
your dial tone not the diverter". There's a moral in there
somewhere.
The Black Box
Another credible file on box building. Note the black will work
under Crossbar or Step by Step but not with ESS.
- **************************************
- *
- HOW TO BUILD A BLACK BOX *
- *
- **************************************
A BLACK BOX
IS A DEVICE THAT IS HOOKED UP TO YOUR
FONE THAT FIXES YOUR FONE SO THAT WHEN
YOU GET A CALL, THE CALLER DOESN'T GET
CHARGED FOR THE CALL. THIS IS GOOD FOR
CALLS UP TO 1/2 HOUR, AFTER 1/2 HOUR
THE FONE CO. GETS SUSPICOUS, AND THEN
YOU CAN GUESS WHAT HAPPENS.
THE WAY IT WORKS:
WHAT THIS LITTLE BEAUTY DOES IS
KEEP THE LINE VOLTAGE FROM DROPPING TO
10V WHEN YOU ANSWER YOUR FONE. THE
LINE IS INSTED KEPT AT 36V AND IT WILL
MAKE THE FONE THINK THAT IT IS STILL
RINGING WHILE YOUR TALKING. THE REASON
FOR THE 1/2 HOUR TIME LIMIT IS THAT THE
FONE CO. THINKS THAT SOMETHING IS WRONG
AFTER 1/2 AN HOUR OF RINGING.
ALL PRTS ARE AVAILABLE RADIO
SHACK. USING THE LEAST POSSIBLE PARTS
AND ARANGEMENT, THE COST IS $0.98 !!!!
AND THAT IS PARTS FOR TWO OF THEM!
TALK ABOUT A DEAL! IF YOU WANT TO
SPLURGE THEN YOU CAN GET A SMALL PC
BOARD, AND A SWITCH. THERE ARE TWO
SCHEMATICS FOR THIS BOX, ONE IS FOR
MOST NORMAL FONES. THE SECOND ONE IS
FOR FONES THAT DON'T WORK WITH THE
FIRST. IT WAS MADE FOR USE WITH A BELL
TRIMLINE TOUCH TONE FONE.
- * SCHEMATIC 1 FOR MOST FONES **
- * LED ON: BOX ON **
FROM >--------------------GREEN-> TO
LINE >--! 1.8K LED !---RED--> FONE
!--/\/\/\--!>--!
! !
------>/<-------
SPST
PARTS: 1 1.8K 1/2 WATT RESISTOR
1 1.5V LED
1 SPST SWITCH
YOU MAY JUST HAVE TWO WIRES WHICH YOU
CONNECT TOGETHER FOR THE SWITCH.
- * SCHEMATIC 2 FOR ALL FONES **
- * LED ON: BOX OFF **
FROM >---------------GREEN-> TO
LINE >------- ---RED--> FONE
! LED !
-->/<--!>--
! !
---/\/\/---
1.8K
PARTS: 1 1.8K 1/2 WATT RESISTOR
1 1.5V LED
1 DPST SWITCH
HERE IS THE PC BOARD LAYOUT THAT I
RECOMMEND USING. IT IS NEAT AND IS
VERY EASY TO HOOK UP.
SCHEMATIC #1 SCHEMATIC #2
- ************* ****************
- * * ------- *
- --<LED>--- * * ! ! *
- ! ! * * ! <SWITCH> *
- RESISTOR ! * * ! ! ! *
- ! ! * * ! ! / *
- -------- ! * * ! ! \ *
- ! ! * * ! <LED>! / *
- --SWITCH-- * * ! ! \ *
- ! ! * * ! ! / *
L * ! ! * F L * ! ! ! * F
I>RED- -RED>O I>RED- ---RED>O
N>-----GREEN---->N N>-----GREEN------>N
E * H * E E * * E
- ************* ****************
ONCE YOU HAVE HOOKED UP ALL THE
PARTS, YOU MUST FIGURE OUT WHAT SET OF
WIRES GO TO THE LINE AND WHICH GO TO
THE FONE. THIS IS BECAUSE OF THE FACT
THAT LED'S MUST BE PUT IN, IN A CERTAIN
DIRECTION. DEPENDING ON WHICH WAY YOU
PUT THE LED IS WHAT CONTROLS WHAT WIRES
ARE FOR THE LINE & FONE.
HOW TO FIND OUT:
HOOK UP THE BOX IN ONE DIRECTION
USING ONE SET OF WIRES FOR LINE AND THE
OTHER FOR FONE.
- NOTE* FOR MODEL I SWITCH SHOULD BE OFF.
- NOTE* FOR MODEL ][ SWITCH SHOULD BE
SET TO SIDE CONNECTING THE LED.
ONCE YOU HAVE HOOKED IT UP, THEN
PICK UP THE FONE AND SEE IF THE LED IS
ON. IF IT IS, THE LED WILL BE LIT. IF
IS DOESN'T LIGHT THEN SWITCH THE WIRES
AND TRY AGAIN. ONCE YOU KNOW WHICH ARE
WHICH THEN LABEL THEM. *NOTE* - IF
NEITHER DIRECTIONS WORKED THEN YOUR
SWITCH WAS IN THE WRONG POSITION. NOW
LABLE THE SWITCH IN ITS CURRENT
POSITION AS BOX ON.
HOW TO USE IT:
THE PURPOSE OF THIS BOX IS NOT TO
POEPLE WHO CALL YOU SO IT WOULD MAKE
SENCE THAT IT CAN ONLY BE USED TO
RECEIVE! CALLS. WHEN THE BOX IS *ON*
THEN YOU MAY ONLY RECIEVE CALLS. YOUR
FONE WILL RING LIKE NORMAL AND THE LED
ON THE BOX WILL FLASH. IF YOU ANSWER
THE FONE NOW, THEN THE LED WILL
LIGHT AND THE CALLER WILL NOT BE CHARGED.
HANG UP THE FONE AFTER YOU ARE DONE
TALKING LIKE NORMAL. YOU WILL NOT BE
ABLE TO GET A DIAL-TONE OR CALL WHEN
THE BOX IS ON, SO TURN THE BOX *OFF*
FOR NORMAL CALLS. I DON'T RECOMMEND
YOU DON'T WANT IT TO ANSWER WHEN MA BELL
CALLS!
Incidentally, never let it be said that all hackers are literate.
Just knowing thieves.
The Infamous Blue Box
The follwoing appears to be a credible set of plans for the
Captain Crunch machine.
$$$$$$$$$$$$$$$$$$$$
$ $
$ BLUE BOX PLANS! $
$ --------------- $
$ $
$ Edited and Uploaded by: $
$ $
$ $
$$$$->The Spirit Of Radio<-$$$$
$ $
$ Written by: $
$ $
$ Mr. America from Osuny BBS $
$ $
$$$$$$$$$$$$$$$$$$$$
This file will explain the construction, troubleshooting,
andadjustmentof a Blue Box.
We all know that the touch tone frequencies are composed of 2
tones (2 different freqs.) so that is the reason why we have 2
VCO's (Voltage Controlled Oscilators). We'll call them VCO#1 and
VCO#2.If you have noticed VCO#1 and VCO#2 are exactly the same
type of circuits. That is why only 1 was drawn. But remember
that whatever goes for VCO#1 also goes for VCO#2. Both VCO'S are
composed of a handfull of parts. One chip, two capacitors,2
resistors and five potentionmeters. All of this will give you
(when properly calibrated) one of the freqencies necessary (the
other one will come fromVCO#2) for the operation of $ the Blue
Box. Both of these freqs. will bemixed in the speaker to form the
required tone.
This is one of the most sophisticated designs I have ever made.
Why? Because other designs will drain the battery after 10 calls.
This design will make them last 10 months!!!!!! But
nevertheless, don'tforget to put in aswitch for on and off. Ok
let's build the two VCO'S andcalibrate the unit before we get to
the keyboard construction.
VCO CONSTRUCTION
TOOLS REQUIRED
1 ocilliscope(optional but not req)
1 Freq. counter (REQUIRED)
1 Volt meter " " "
Electronics tools (Pliers, drll, screwdrivers, etc.)
PARTS
R1 1.5K RESISTOR 5%
R2 1K RESISTOR 5%
C1 .1uf ELECTROLYTIC CAPACITOR 16VDC
C2 .01uf " " (MYLQR) 16VDC
C1 2207 VCO CHIP BY EXAR ELECTRONICS
Remember the above only says VCO#1 but the same is for VCO#2
R3-R4 150 OHM RESISTORS 5% .
C3-C4 .1 uf ELECTROLITIC CAPACITOR .
10VDC .
P1-P10 200K TRIMMER POT - 20 TURNS DIODES USED IN THE KEYBOARD
ARE 1N914 TYPE(40 OF THEM) & 13 SWITCHES FOR THE KEYBOARD SPST
MOMENTARY.
SPKR YOU CAN USE A TELEPHONE SPEAKER FOR THIS (IT WORKS BEST) BUT
REMEMBER TOTAKE OUT THE DIODE THAT IS CONNECTED ACCROSS IT.
IMPORTANT NOTES
1. DO NOT USE ANYTHING ELSE OTHER THAN A MYLAR CAPACITOR FORC2.
2. PINS 10,9,8 SHOULD BE TIED TOGETHER AND BE LEFT FLOATING.
3. ALL RESISTORS SHOULD BE 5%! NOTHING ELSE!
4. A TELEPHONE SPEAKER GIVES THE BEST RESULTS.
TROUBLE SHOOTING
By now you should have constructed the two VCO'S on a bread board
or anything that pleases you. Check for cold solder
joints,broken wires,polarity of the battery, etc. Before we
apply power to the VCO'S we have to adjust the pots for their
half way travel point. This is done by turning them 21 turns to
the right and then 10 turns to the left. Do the same for all ten
of them.
Now apply power to the unit check to see that you have power in
the chips by putting the positive lead of your volt meter on pin
7 andthe negative lead on pin 12. If you do not have anything
there turn off the unit and RECHECK THE WIRING.
When you get the right voltages on the chips, connect a diode to
a piece of wire (look at fig. 2 for the orientation of the diode)
from round to any pot at point T (look carefully at the schematic
for point T it is labeled T1-T10 for all pots). You should be
able to hear a tone, if not disconnect the lead and place the
speaker close to your ear and if you hear a chirp-like sound,
this means that the two VCO'S are working if you don't,
it means that either one or both of the VCO'S are dead. So in
this case it is always good to have an ocilloscope on hand.
Disconnect the speaker from the circuit and hook the ocilliscope
to 1 of the leads of the speaker & the ground from the scope to
the ground of the battery. Connect again the ground lead with the
diode connected to it from ground to any pot on the VCO that you
are checking and you should see a triangle wave if not turn the
pot in which you are applying the ground to until you see it.
When you do see it do the the same for the other VCO to makesure
it is working. (amplitude is about 2VAC). When you get the two
VCO's working you are set for the adjustment of the individual
spots.
ADJUSTMENT
Disconnect the speaker from the circuit and connect a freq.
counter (the positive lead of the counter to one of the speakers
leads that belongs to VCO#1 or connect it to pin 14.
Connect the negative lead to the battery negative and connect the
jumperlead with the diode from ground to pot number 1.T1 (the
first pot number 1 point T1). If you got it working you should
hear a tone and get a reading on the counter. Adjust the pot for
a freq. of 1700hz and continue doing the same for pots 2-5
except that they get different freqs. which are:
: $$$$$$$ :
: $ $ :
: $ P1 1700hz $ :
: $ P2 1300hz $ :
: $ P3 1100hz $ :
: $ P4 900hz $ :
: $ P5 1500hz $ :
: $ $ :
: $$$$$$$ :
Now disconnect the freq. counter from the speaker lead of VCO#1
or from pin (which ever you had it attached to at the beginning)
and connect it to the speaker lead of VCO#2 or to pin 14 of VCO#2
and make the same adjustments toP6-10.:
: $$$$$$$$ :
: $ $ :
: $ P6 1100hz $ :
: $ P7 700hz $ :
: $ P8 900hz $ :
: $ P9 2600hz $ :
: $ P10 1500hz $ :
: $ $ :
: $$$$$$$$ :
When you finish doing all of the pots go back and re-check
them.
KEYBOARD
IF YOU LOOK AT FIG-2 YOU WILL SEE THAT THE KEYS ARE
SIMPLE SWITCHES. CONNECTED TO A GROUND AND TWO DIODES ON THE
OTHER END. THESE DIODES ARE USED TO SIMPLIFY THE CONSTRUCTION OF
THE KEYBOARD BECAUSE OTHERWISE THE DISTRIBUTION OF THE GROUND
SIGNAL FOR BOTH VCO'S WOULD HAVE BEEN DONE MECHANICALLY. THE
DIODE WILL GO TO VCO#1 AND THE OTHER WILL GO TO VCO#2. FIG-3
SHOWS THE ARRANGEMENT OF THE KEYS ON THE KEYBOARD.
BELOW IS A TABLE THAT WILL HELP YOU CONNECT THE KEYS TO THE
REQUIRED VCO'SPOTS.
<------------------------------------->
< >
< (-FIG 2-) >
< >
<-----!-----!--------!--------!------->
< ! ! ! ! >
< TO ! TO ! FREQ ! FREQ ! KEY >
< POT ! POT ! OUT: ! OUT: ! >
< ON ! ON ! ! ! >
< VCO1! VCO2! ! ! >
<-----!-----!--------!--------!------->
< 1 ! 06 ! 1700hz ! 1100hz ! C >
< 2 ! 10 ! 1300hz ! 1500hz ! 0 >
< 1 ! 10 ! 1700hz ! 1100hz ! E >
< 4 ! 07 ! 0900hz ! 0700hz ! 1 >
< 3 ! 07 ! 1100hz ! 0700hz ! 2 >
< 3 ! 08 ! 1100hz ! 0900hz ! 3 >
< 2 ! 07 ! 1300hz ! 0700hz ! 4 >
< 2 ! 08 ! 1300hz ! 0900hz ! 5 >
< 2 ! 06 ! 1300hz ! 1100hz ! 6 >
< 5 ! 07 ! 1500hz ! 0700hz ! 7 >
< 5 ! 08 ! 1500hz ! 0900hz ! 8 >
< 5 ! 06 ! 1500hz ! 1100hz ! 9 >
< - ! 09 ! ------ ! 2600hz ! X >
< ! ! ! ! >
<------------------------------------->
REMEMBER THAT IN FIG-2 IT'S THE SAME FOR EACH KEY EXCEPT THE "X"
KEY, WHICH ONLY TAKES ONE DIODE.