2600 Magazine - Volume 1, Number 1 0 Jdftl wpuUiahed bv I tin Em*!****. Ik., tndara^i^^miwi. Suhwi^imiftiDb,- Hi i ™ *. «, SUM - I yuar. "<^2, MWdklitaiid.NV IliU-msi HCJ Mill 3 SHUNI»ED;"tl.K t.Mjnwa ptrlHcL nr. AH ilOTSJUi* VOLUME ONE, NUMBER TEN getting caught: hacker’s view Deep down, every hacker wants to get caught- Computer hacking isn't really the same as killing or stealing, after all You need at least a lit tie brains to be able to hop around on the corporations* DECsystcms nr to know the ARPANet better than your own PC So if and when you get caught, you wind up getting a little bit of credit for having some brains. Most people exaggerate and call you a genius! Who can resist this, type of an ego boost? So when the FBI came knocking at my door early this spring, it seemed like the beginning of an adventure. It was me they were after! 1 had done something to deserve national attention! r At Em 1 didn't know what it was they wanted. They came to my house before I was a wake and showed my mother the search warrant. 113 never forget the tone in her voice when she called me that day. “You T d better come down here right away," she said, sounding very worried and pissed off at the same time, l knew something was up when 1 heard that. So then I came downstairs and saw what was happening. J was very calm throughout the whole thing— l even kept my sense of humor. After 1 figured out which of my many "pro- jects “they wen: interested in, 1 showed them where al! the good stuff was hidden, “tio tell the world," I said, I had been hacking for about a year. 1 seemed to pick up things incredibly fast and before I knew it, I was buried inside the weird world of phones and compute rss. In this case, I had been running a huge corporation's mainframe for them for a few months, This computer had so much data in it that I could find out (and change) just about anything paychecks, profit margins, telephone numbers, you name iir 1 had lots of fun. My friends used to come over late at night and watch me explore. Nobody they knew had ever been able to do anything like that and it seemed pretiy amazing. Then War Games cam t out and J turned into a sort of cult figure in my neighborhood. But it was OK nobody knew exactly what l was doing. Even my patents didn't seem to mind that much, ibey'd shake their head&and wonder what Lind of mischief I d get into next. Most people (grown-ups* Lhal is) seemed to act exactly the same. And my friends were all into it as something fun and rebellious So now that 1 was caught, I expected the fun to continue. My parents would be outraged that a mischievous kid was being hounded by the feds while murderers and presidents were roam- ing free. And of course, my friends would slick by me morethan ever. We were pretty tight. For about a day, that's exactly what happened. My name got in a] I the papers, I was on a few news shows, and nobody really understood anything. I suddenly became popular at school. Everybody seemed to agree that it wasnlt fair for them to come to my house and take away my two computers just like that. Then, after the initial shock, people's moods started to change. My parents were the first. They suddenly got mad at me. '‘What a stupid thing to do!" I remember those words. "If you don't care about yourself, at least think about what you're doing to your family," and so on. They also said that 1 never listened when they told me to knock it off, which was totally false, since they never really seemed to care at all But a II that didn't upset me. After all, parents are supposed to say those kinds of things. I knew they really cared, so it didn't matter what they said. It wasn't until a few mane weeks that the really bad stuff started happening. The feds began calling my friends and tried to scare them into saying incriminating things about me. They told them they'd be in just ns much trouble if they didn’t say anything. \ could tell something was wrong when a II of a sudden nq one was talking to me. People ] used to hang out with suddenly seemed uneasy when 1 was around. Then the feds starred calling me. And I could tell from the pointed questions they were asking, that someone J trusted had told them a lot. Much more than they had to. U wasn't Like they had just cracked and said* yes, he did this and that. They volunteered information! , I iried to figure out why someone would do 1 his- -no om knew had any grudges against me. 1 didn't really have any enemies^ They must have thought that telling everything was for my own good. The feds had probably told them that l was really sick and needed help and lhal only the truth would set me free. Could that have been it? It might have been. But th^rc was definitely more than that. When the feds started scaring my friends, lhat was my fault. At least it seemed that wav to on friends. A couple of them gnt so scared that their families hired these big, expensive lawyers. And that was my fault, too. even though I knew they were being ripped off. So what did I get out ol the whole thing? Well, nobody trusts me anymore- people are even Afraid, lo 3ct mu use their phone. IVc gotten a reputation as someone who doesn't care at all aboui hts friends, otherwise how could l have pul them in such a spot? Everyone in town knows that 1 did something had to some corporation somewhere, but nobody understands how much of a game the whole thing seemed at the lime. The newspapers were never really interested in my side and nobody else seems, to be either. Maybe this is good in a way, because 1 found out that mo$i people value friendship less than their own safety. As soon as the pressure is applied, they Jose all feeling for you. Then they trick themselves into believing that you were always a had seed from the start. They do this so they won't feel guilty about the way they shafted you. But there were a couple of others who did n't desert me because they knew who I really was. If it wasn't for them* I might have just jumped off a building one nigL"""N That's how bad it makes you feel sometimes. Yes, l^rti through hacking. Let the professionals do it they can't gel hurt like 1 was. Name withheld by request. i VITAL INGREDIENTS SWITCHING CENTERS AND OPERATORS Every switching office in North America (the NPA aystem) u issipcd ar office name and class. There are five citUW of offices numbered I through 5. Youf CO is most likely a class 5 or end office. Al l Lon^-D^taivce {T oil) calls are switched by a toll office which can he a class 4, 3, 2 , Or t office. There is also a 4X office called an intermediate point- The 4X office is a digital one that can have an unattended exchange attached to it (known as a Remote Switching U nit — RSU). The following cha rt will List the office number name, and how many of those office* existed in North America in I9SI . Ch» Name Abb. I Retfonal Center . , - RC . J SectkraaJ Center SC . # Emitting ■ h + 1 ■ h 11 67 , . . . . 230 . , . 130 3 ♦ ♦ , , . . Primary Center PC + 4 TollCemer TC * 4P * * , . . Toll Point TP 4X Intermediate Point IP 5 End Gflk* EO 19,000 R RSU ....►♦<<,► RSU When connecting a call from one party to another, the switching equipment usually tries to find the shortest route between the Class 5 end office of the caller and the Class 5 end office of the called party. If no inter-office trunks exist between the two parties, it will then move u p to the next highest office for servicing (Class 4 ). If the Class 4 office car not handle the call by send ing it to another Class 4 or 5 office h Li will be sent to the next office in the hierarchy (3). The switching equipment first uses the high-usage interoffice trunk groups. If they arc busy il guc* to the final trunk. groups On the next highest level. If the call cannot be connected then, yon will probably get a reorder [120 IPM ( Interruptions Per Minute! signal— also known as a fast busy]. At this time, the guys at Network Operations are probably going berserk trying u> avoid the dreaded Network Deadlock fas seen onTVI). It i* a Iwi interesting to note that 9 connections in tandem is called ring-arourd-the-rosy and it has never occurred in telephone history. _^J'hLK would cause an endless loop connection fan interesting way to * rally screw up the Network). The 10 regional centers in ihe United Slates and the 2 in Canada are all interconnected. They form the foundation of the entire telephone network. Since there are only 1 2 of them, they are listed below: Ct*&* I Regional Office Location NPA h h ^ - ♦ < 214 Wayne, PA 215 Denver 4T - 303 Reglm Nq. 2 SPl -4W [ Canada \ ► ♦ 306 St. Louis 4T + 31 4 Rodulilc, (p A . . + . . ■ 1 . . . . + 1 r t 1 1 ■ ■ ■ * . ■ ■ ■ ■ 404 Ptttsburih 4F, . . . P h + H ■ ■ ■ - ■ ■ 41 2 Montreal No. I 4 AETS [C*n*tfe*| 504 Norwich, NY - 607 San Bernardino, CA , > - - ,. hP + .. 714 Norway, IL - < . r ► < < . have bu^ in them thai alto* you to use a \ or a 0 as the 4th digit when dialing. (This tends to happen mostly in c rossha n and it d oesn T work consi*ten ilyT'l his cna hies a ca Her to call special opera torn and other internal telco numbers without having to use a blue box. Kor. example. 4I5-I2I-ISI I would get you a San Fra nciscoAlak land INWARD Operator. /The uktnv vvo.i ftikcti from Basic f eloeLMnm un icat i«ns Part IV. written hr Sh 7 ( ' Atft'ftr fMJ.} I MNO 6 OPER o — * -J OPER o NSA Wants Better Phones The Nr* ViMt l's^n The National Security Agency is proposing that the Government and industry be equipped with as many as 500,000 telephones that can be secured against interception. The agency is convinced that the Soviet Union and the other nations are obtaining important intelligence from United States telephones. Although cloaked in secrecy, a program like the one the agency proposes could cost hundreds of millions of dollars. Under the proposal, production of the secure phones would begin in two years, The number of secure telephones currently used by Govern- ment agencies Is classified information. But the Carter Administration said there were 100 such phones in the Government and it planned to buy 1 50 more. The cost of each phone then was £35,000. The Reagan Administration has bought an unknown number of additional secure phones. “Anyone making a phone call to the West Coast or Boston from the Washington area has no idea how the conversation will be transmitted," an NSA spokesperson said- Tt might go via fiber opt ics, conventional cable, microwave towers or one of the 19 domestic satellites. Ef it is going via satellite you can presume the other guy Is listening to It," Oh No, Not Again! AnaLUuInl Pr^j : : The House passed a bill on September 17 by voice vote that would make it a Federal crime to gain unauthorized access to or tamper with computerized medical records. Victimized by Crime Computers IV Vnrk. I Police officers went to an apartment in New Orleans looking for a woman named Vera Davis, who was wanted for theft and forgery. Although the woman who answered the door identified herself as Shirley Jones, they arrested her anyway, A police computer listed Shirley Jones as an alias used by the forgery suspect. That was two and a half years ago. According to her attorney, Mrs. Jones, who was oner advised by a sherifTs deputy to change her name to avoid future arrests, is one of a growing number of people in New Orleans who have gotten in trouble with the law because of inaccurate, outdated, or misused information in police computers. The New Orleans computers are part of a national network. From a local terminal, a computer check can be run through the National Crime Information. Center in Washington, operated by the FBI, in less than a minute. The New Orleans case, said Robert Ellis Smith, publisher of Privacy Journal, a newsletter that reports on privacy cases from Washington, DC, is “symbolic of a larger national problem, an incredibly high rate of inaccuracy" in criminal records and “an inordinate amount of mistaken identity cases in the criminal justice information systems." Sears Satellite Network The American Satellite Company has signed a contract with Sears, Roebuck and Company to construct arid operate a private communications system linking corporate offices of Sears and its subsidiaries in 26 United States cities. Thif would be the largest private system ever developed capable of offering ftiJL-motion video teleconferencing- Loopholes Around Wiretap Laws H* New TbH W in] Senator Patrick J. Leahy t Democrat of Vermont, has that he will seek, legislation to improve protection of privacy by closing gaps in Federal wiretapping laws. He and Severn) experts said at a Senate Judiciary subcom- mittee hearing that it was unclear, for example, whether existing laws permitted Government officials or others to intercept electronic mail* or even ordinary telephone oalh sent by computer or microwave technology, without a warrant. “There are tremendous holes in communications privacy today, "testified Ronald L. PLesser. a Washington lawyer who has long specialized in information privacy issues. The experts at this hearing testified that private interception of electronic mail and other messages carried through telephone networks may nut violate Federal law. IBM is Buying Rolm! Tl»t ■*!(*» t-wk Tbtki jjfrt ipan| . IBM has said that it will buy the Rolm Corporation, in a move that will heighten the competition between the world’s largest computer company and AT&T. The price? SI ,25 billion. TBM wants It all, it needs it all,* 1 said Bather Dyson, editor of Release 1.0, an industry newsletter. "They have a biological urge to grow." Most analysts, however, said that IBM bad realized — perhaps belatedly — that it greatly needs to strengthen its offerings in telecommunications switching equipment. Rolm. founded in 1969 as a maker of military computers is now a leading maker of private branch exchanges, systems that control both voice and data communications over the telephone. 9! 1 Suspect Hung Up 'nwNrw Vnrfc F-iw A notorious hoax caller who has plagued 91 1 switchboards for three years has been nabbed reporting another bogus crime, police say. Cops say the suspect — who they have been unable to identify — made more than 500 false reports ranging from strangulations in progress to rapes and shootings of police officers. He was arrested at a Penn Station pay phone while telling a 91 1 operator he had just raped and strangled his girlfriend with her pantyhose. Thai was the fabricated crime he reported most frequently, according to police. “He called every day of the week at all hours, “ said Sgt. Stephen McDonald, “He was causing a lot of problems and the 91 1 people were really Looking for him," said Officer James Espied ra who collared the hoaxer. According to McDonald, news of the hoaxers capture was jubilantly received by 91 3 operators: “There was a lot of cheering." In the words of Lapiedra, "He was surprised he was caught," 1-57 3 LETTERS FROM THE Dtir 2600: I am currently involved with the Crystal Palace BBS, formerly OS UN V (hopefully yon have heard of it). The system is down now for some software mod ification^ and many people have tried to persuade me into changing the purpose of the board, which is telecommunications and other related fields. The crackdown on this type of BBS is starting to become overwhelming. This is what my inquiry is about. After reading my first copy of your newsletter, 1 was elated with the quality and content of information it had! Referring to the front page article (July 1984, page 1-37), “Loot Out, Hels Got a Computer!" 1 agree that the ami-computer hysteria has gone and is going to go too far! 1 am interested to know what exactly iN an illegal BBS message and what is not. Do I have to monitor the system 24 hours a day, 7 days a week? Am I responsible for every message posted on the board? L know that these are questions that everyone wants answers to and can^t find. As I see it the BBS is just another form of newsletter, so why ate they picking on us?! I do, however, realize that some messages are quite illegal like: cred it ca rd tf*s and the like, but the information on how to gel those #'s is not i llegal ( right?). Any information on this subject would be greatly appreciated. Crystal Palace Dear CP: What is a BBS? You know the answer, we do, and a good many of our readers also do. The problem is that the people who go around passing laws and raiding homes don^t have the slightest idea what a BBS really is. All they care-about is the fact that a computer is involved somewhere along the line. And computers, they say, can do anything in the world. But what's so ironic in 1 he case of a BBS Is the fad that the Computer is just Muring messages //The exact same effect coukf be accomplished on a physical bulletin board, inside an auditorium, or in everyday conversation. Bui you don't see these things being outlawed because people would never stand for that kind of repression (we hope). Computers are easy targets because the average person doesn't understand them al ail. By making people think that itY actually illegal to wrile something d own and pass it along tool hers, the authorities ate taking one great big step towards total contFdb We agree that a BBS is really a nother form of newsletter. We don it agree that messages containing cried it card fr'sare Illegal in any sense. (They are boring, though, and practically useless to anyone except fraud investigators.) It's the actual use of these numbers I hat constitute* fraud, not the simple act of passing them around. If a cop on the street overheard you giving numbers to a friend, could hr arrest you? l,etb hope it hasn't reached this stage. We're currently working on getting some pone legal i nforma I ion concerning this su bject so t hat we can address your questions better. In the meantime, though, we hope your board and the many others like it amtmd the world won't he intimidated by these scare tactics. You can talk about whatever the hell you want. But it's still illegal to commit the crimes you're talking about. If enough of you guys stood up for your rights out in the open, this wouldn't be such a problem. You might actually wind upsa vipg an importam part of democracy fora few more years. By the way, readers, if youYe running a BBS that talks a bom these things or know of one that does, send in the name and phone number for our Hot 100 list which will be published soo fi. Make sure the BBS you're sending iiqnffto be publicized and try to include a reason or two why your BBS is better than most. Check the front page for our addresses. Received your August issue, and enjoyed it. A number of comments... I ] Does anyone know what happened to TA P ? 2) There is a newsletter called the Contser Letter, available lor free from Ross Engineering Assoc., 7906 Hope Valley f’ourt. Adamstown, MD217IO. Lots of good information, bui :hey want a tetter requesting ihe newsletter on leiterhead and dentifying your interest in communications security (one can^t k too careful these days!). It^ always interesting to know 1 - 5 * OUTSIDE WORLD what's happening on the other side... 3} What works against an ESS switch? Black boxes are ok, but more modem equipment seems to be coming in rapidly, blowing our older techniques off the air! Hie Animal Dew Animal; For info on TAP > consult our September issue, page J-52. We hate repeating ourselves nit the time. Thanks for the sample copy of Comsec letter h looks interesting and we're looking into reprinting some of the good stuff. Readers: feel free to send us anything that looks like it might be interesting to us. Lt usually is. ESS switches and black boxes are dealt with extensively on page 1-43 of our August issue, as you probably know. The only thing we can suggest to counter an ESS is ingenuity. There's always a way to get around anything. Dear 2600: t really enjoy your publication! It seems you guys are not a bunch of wimps who are so damn paranoid that the feds are going to catch you. Anyway . what types of back Issues do you have? I received my first issue, which is Volume I, Number 9. What are the context of the back issues? I ‘m looking for one having to do with loops, sprinting, back ingout sprint/ mci s, or anything similar. Also, any arpanct. 1 archnet stuff? ltd Dear kd: Welt be publishing a guide to our hack issues that should be out right in time for the Christmas rush. Just about all of the topics you mentioned have already been covered and they all will be co vered in the future. Wc accept articles and information from anyone. You’re quite correct in saying that we're not paranoid. We have nothing to be paranoid about because we're not doing anything wrong. Dear 2600: Though it may seem like only yesterday ihai computer crime first caught the nation's fancy, it has been on the mmd of state legislators for quite some time. With the recent passage of computer crime laws in Maryland. Iowa, Connecticut, and Hawaii, the number of states Jacking computer crime laws ha^ fallen to seventeen. I he law* of the other33 have beervcollecte^ in a new reference work published by the National Center for Computer Crime Data, and called 77 m* Computer Crime Jjjn] Reporter. In I he course of compiling the text* of all the state' computer crime laws on the books^ editor Jay BloomBecker found that.a number of states had hills or the books for years without anyone noticing them. The book, 200 pages plus two updates, is available for $45 from 'the National Center for Computer Crime Data, 4053 J.F.K. Library, California State University at Los Angeles, 53 5 1 State University Drive, Los Angeles. CA 90032. In addition, the National Center will begin publishing a newsletter devoted to moral* and ethics in computing. Its name is Conscience in Computing. There are schools teaching computer ethics, no matter how ma ny a re not . There a re professionals questioning their roles as computer scientists and asking a bout the social impact of their work. There are computer bulletin boards which support ethics discussion groups. Conseience in Computing will he a monthly newsletter, subscriptions costing SIR annually. Work exchanges a|Eow reader* to become subscriber* by convincing others to subscribe, reporting news of conscience in computing, or working out an individual contract with the National Center. Interested people can write to Ihe above address. The Niltoatil Center Tor Computer Crime Data (The National Center for Computer Crime Data a a nonprofit research organizaf ion at Cuiifomia State University tit Los Angeies.) Whoopsee In our tut issue* we forgot to mention that in our August issue, we forgot to mention that the front page story (“But How Does It Wort?") came from the desk of BIOC Agent 003. Better late than never. 4 2600 ONTA wm* ^SsS^. PS>*~ ,- o*rj. i *%&£%$& ■S^S^S 51 'igs*-' J Now YorkTelephon* ;' n *'fe J K w i, "» -v ‘''"Sirs '‘'"^C’’"’ J j -^ «" -TT" ■» ;? «. *£> ^t' J '"Wkm * &?*■ . w. ■* ^ 4*< J **r : ‘ **> L^r-i ' '■«<** * '*S ; .T.*- : ■"t'H ™.. “ -» i'j. * r,- H rj- . H .1 Hq tjl ,H * tj l , Al 1 j h T ^ hl l -H- &■£$.£& E^-CC** ■■‘'l- „.. ** W, f*h | j^i ■■At-,- h,,,.. • | 3r v * V "*41 ,. ■ *’ J •H.tto, ^ ^IfL r " ,l v-Tr** 1 ^ ““ Aw^C*^ ,"’"■ /..z.'“' ^Tjy^ '^nm ^ J„ ,. n *<-i -,«?** '■•**,"<'■"• “J 1, rilV From th« t£mK of 003 ING "JTr. -1 ‘*-*53 p , . -: page 5 Security ss close as your fingertips CORPORATE. SECURITY Diraclcr Corporals Ssctinly Jt- ft i MMbar 212-395-0505 SECURITY STAFF SflCU^Ly Suptrv^tf W F Mcd*My . .£l2-3fl!i-M28 SiCuriCy Minagar R F. Jotraan £12-395-0552 Mew Vohk city reDiON Security Mimggr W-ffr-Bre**- .212-395-4159 N*w York C>1y Wh( Security OlliCf 212-3»5-Q«15 Security Sjo«tvr»r JL P. PHi* 2l?-3M-Kl5 H«Hr Yotk CEty East Bacmrly attic* . 2T2-291-9017 Security Suo«vi»r C JL Hauls'll 212-523-9953 H STATE REGION Suburban Secmily fJin^g^r JL JL Ferrari 9TJ-0&9-9&49 MitfStam Secu^y OINce 914-993-93&5 S*Cufny &jp*rviur H ft Z apr &14-6W-WW Long island StCuniyOrikCt , . . . 5ifi-294-DZT0 Sacijrity Si4D&rvisor . R. H. tamtwrwn , , 515-29443722 UPSTATE Security Office 510-449-3250 Stcufiiy Supurvisor T. A. P#o4>:Ci 510-449-S442 S*curity Uarugar T.JDofan 515-449-7224 I« HWl 'i***40>H I4a*i.i* ■ U4 U*im H*A -+ M* ■*^jb lw iwa* tmi ■! ^ tai^ Jif ia|M 14 n a «adi m k l|l#L -^IMillMU M^dlUwO-*^ MTfr4i4.NI pwi^l dvn MN MW H1H m ■“** F" .I.YIV i* “N Tl«M UH -jmi •rtrrt*. n(fr*i Jfl 4 11 " U»W)*^( ' ^(ij|_V n| jtfiM iii pun -JfN.V OJ Hlf] | jm ,i| 4 «iai 4 w awd ^1 Mja 4 « --Tl|r ' >| iu^ inii ..unhnj *m» b ini iftnil Hit AiHf 'i4unj> H,** -»i»i*!ui ■ pu;j i* II. Ati****'< fr-f4) ** ^-4iini ** upm i *u HinaB^.1 > ^Bar*q^iliriJvi «1M|. WMI1. (.Iiup H APf lilk, ■jJZLti 'JWK JiN s.’iaii^apafvh ii*n^ n> p^i \.11-| *L||. Jt P*F*J! "W « »«iai wAhla-ihri pua km puHiiBt ■4 i d Am *U -IMV^I ji> iM^ni iv w xn rm-ii l i iua«iBwiun.')i'n]Hnii |u^u-t ^l.T*'** au;p w>i^N|L>A »uja 41 pv-H. ^|^.>KQnd uipbu uM|nan> ml I k I M 1 1 1 1 V 1 LIE iw* J(IJ ppwuu ■MU amp ** HPW4HM^U4**! W| V* »d U* 1 HH itn Ftl TOLL FRAUD Ton Fraud OlhCB 212-22 M764 Sdcunty Su£ii"Mi»r H. F G^lfrQKwr .212-2^1-5944 SccuAty hian*9nr JL S- Whitman 2T2-395-0W7 On *HHtn4l. hclHJaya and oul of n&u rt ctM lha loKowmj Hltpnont num- ban to duaip aumanct. t CuiBdmar Sirwca Bureau Naw 4x4 Cily ftc9*vi iiS 3K H71 U«tSUt* 914-390-5900 U"9 Wind 51E-742-3030 StCuMy Ollica Uoataba 519-449-3250 ■ULLOINS PftOTECTIDH □MANIZAHON Qmrd C wn iii i n wi N*w Itrk Cfly N*Q«r W J. Blue mat 212-3 Sul* Rsg*oh H. K Athldtah 914-9 .212-394-3400' 914-994 -9253' ■iVOtf (fliphfliwjiumJrj wuurdAa ca«td co*KWftuf*s martffi tit bwt&tiQ pfm'KMm. 5 • Humm-rtim-mm, Tholes ttw tone—your "go ohtod" ,nol to stort dialing. Please wait for it after you finish your C&Jt j . . . . sure to replace trie receiver Try Ond'Plus Dialing. •Telephone cords and water don't mix. A wet cord can put your telephone out of order. So please keep your telephone cord away from sinks, valves, steam and other places where water might get on It. DIAL CAREFULLY! Avoid wrong numbers by first checking the number and them DIAL EACH DIGIT CAREFULLY! Dj al - a- Discount , Dial - H-Y Du reelf £ 'u HEN ANSWERING THE TELEPHONE, always identify yourself your firm, or your department. ^ ■ I IF YOU RE NEW IN TOWN mtt , *e< s? V % The wheel the* lets you roll around town without leaving home. Jus! spin the dial an4 you ra laRmg to tnc pharmacist. Son n ioairi and r&acn your insurance mart. Or chat wun a friend acre 53 town. Count on it any lime — 10 save you ltnn& ana 1 raveline. 5ave£ mOrt^y. too. Wha! e SO doe 5 so muc rt yo [ c-dsTs & 3 1 itt -e ? when ybu r re owejr \Z-f from your office -who'tf answer r ■ \ U \<0; .■ 1 your phone? _*+ ' " * hiii* iM" S«l ^Tfltp Irene imwwriq iimirt" pogM irt ihii ' ^ rfjffrtflryt y when to get personal? SlitlofHHUIbfl riln m ■Iwjyi cheaper, io you thouAd VH perwm-to-per- nn wily when you want to liiklo ■ parUeuwr pirty* shop the YeMow Popes •Party-liners — don't forget the other fellow needs the tele- phone too. • For better service, don't trans- fer a call to someone else it you car take care of it yourself. 1-69 NOT SORE OF THE NUMBER Youll save time and trouble if you took in the directory Save lime . . telephone. When you're on the go . . . you're as close to home or office a? the nearest public - telephone booth fry It end 6