2600 Magazine - Volume 1, Number 8 2600 — August, 1984 — ' ’ — — JflW if prtlifM MfUJilv byJBdS EhftEd PFC |$t5. 1 TIC. jrictaM^Nrywpiiiatiwt. Su**ri]*»«i rtlhillB- 1 pr.H-tcmrihi. II pr h ack iwe; DwrK»)JI3.S6-l jar. Vritow: MCI Upk aSHUNDBED; U*: WJWPSfl. VOLUME ONE, NUMBER EIGHT 4 BUT HOW DOES IT WORK? How much do you [tally understand about the way your telephone works? Probably not as much as you should. Considering the amount of time moat people spend on the contraptions, this is really quite a disgrace. Ask questions and make an effort to learn and you 11 be the exception to the rule, which k basically: “Safety k Stupidity, '‘Read on. W faring Assuming a standard one-line Tone, there are usually 4 wires that iftM out of the feme set- These are standardly colored red green, yeUow, and black. The red and green wires are the two that are actually hooked up to yotu central office (CO)- The yellow wire is sometimes used to ring different femes on a party line (i.e., one number, several families — found primarily in rural areas where they pay less for the service and they don't use the fone as much), otherwise the yellow is usually just ignored. On some two-line foues, the red and green wires are used for the first fume number and the yellow and black are used for the second line. In this case there must bean internal or external device that switches between the two lines and provides a hold function {such as Audio Shack's outrageously priced 2 line and hold module). In telephony, the green and red wiresare often referred to as tip |T) and ririg(R), respectively. The tip is the more positive of the two wires. This naming goes hack to the old operator cord boards where one of the wires was the tip of the plug and the other was the ring (of the barrel). A rotary feme (a.k a. dial or pulse) will work fine regardless of whether the red (or green) wire isconnected to the tip (+}or ring H- A touch-tone# font is a different story, though, it will not work except if the tip(+) is the green wire. (Some of the more expensive DTMF fortes do have a bridge rectifier which compensates for polarity reversal, however.) This, is why uoderceitain (non-digital) switching equipment you can reverse the red and green wires on a touch-tone# for* and receive free DTMF service, Even though it wont break dial tone, reversing the wires on a rotary line on a digital switch will cause the tones to be generated. Vokagen, Etc. When your telephone is orvhook hung up) there are approxi- mately 48 volts of DC potential across the tip and ring- When the handset of a fane h lifted, a few switches close which cause a loop to be connected (known ns the local loop") between your fore and the CO. Once this happens, DC current is able to flow through the fone with less resistance. This causes a relay to energize which causa other CO equipment to realize that you want service. Eventually, you should end up with a dial tune. Thisabo causes the 48 VDC to drop down into the vicinity of 12 volts. The resistance of the Impulse drops below the 2500 ohm level, though POC I ice reed telephone equipment must have an off 4XKtk impedance of 600 ohms. As of now, you are probably saying to yourself that this is all nice and technical but what the hell good is the information. Well, also consider that this diop in impedance is how the CO detects that a fone was taken off hook (picked up), to this wfiy + they know when to start billing the calling number. Now what do you suppose would happen if a device such as a resistor or a zener diode waA placed On the c ailed parly Is line so that the voltage would drop just enough to allow talking but not enough to start billing? First off, the calling party would not be billed for the call but conversation could be pursued. Secondly, the CO equipment would think that the fane just kept on ringing. The Telco calls this a “nO‘flo"(toU fraud to he more specific) white phone phreata affectionately call this mute a black box. How These Bgsai Are thrift It “s really surprisingly easy to build a device such as a black box. If it wtrerrt for theamazingly high morals inherent in todays society, you'd most certainly see more of them in use. Only two parts are needed: an SPST toggle switch and a IOJOOO ohm (10 K) Vs. watt resistor. Any electronics store should stock these parts. A person would then cut 2 pieces of wire (about 6 inches long) and attach one end of each wire to one of the terminals on the switch. Then the IC5CC (standard desk fone) would be turned upside down and the cover taken off. A wire would be located and disconnected from its terminal. The switch would then be brought out the rear of the forward the cover replaced. Labelling the switch usually corner next, A position where one receiwK a dial toot whcti picking up is marked “NORMAL'*. The other side is, naturally, "FREE* 1 Making Them Wofk When phriends e ah (usually ala prearranged time), the person with the black box quickly lifts and drops the receiver as fast as possible. This stops the ringing (if not it must be done again) without starting the billing. This must be done within less than one second. The phone can then be picked up with the switch in the “FREE" position. Most phone phreaks are wise enough to keep their calls under 15 minutes im length, greatly minimizing the odds of getting caught. Some interesting points: (I ) If someone picks up an extension in the called party^ house and that fone is not set for “FREE 1 *, then hilling will siait. {2) An old way of signalling a phriend that you want to call him is to make a collect call to a non-existent person in the house. Since the phriend will (hopefully) not accept the charges, he will know that you are about to call and thus prepare the blackbox (or vice versa). (3) The phone company can detect black boxes if they suspwl one on the line. This is done due to the pretence of AC voice signal at the wrong DC level! (4) The blade box will not work under ESS or other similar digital switches since ESS does not connect the voice circuits until thf-- fone is picked up (and billing starts). Instead, ESS use s an^artificitt computer generated ring. Rbtfitti To inform a subscriber of an incoming call, the telco sends 90 volts (PK) of pulsing DC down the line (at around 15 to 60 Hz; usually 20 Hz). In most femes this causes a metal armature to be attracted alternately between two electromagnets thus striking 2 bells. Of course, the standard bell (patented in 1878 by Tom A- Watson) can be replaced by a more modem electronic bell or signalling device. Also, you can have lights and other similar devices m lieu of (or in conjunction with) the bell. A simple neon light (with its corresponding resistor) can simply be connected, between the red and green wires (usually Ll and L2 on the network box) so that it lights up on incoming calls. Be advised that 90 VDC can give quite a shock. Exercise extreme caution if you wish to further pursue these topics. Also included in the ringing circuit k a capacitor to prevent the DC current from interfering with the bell (a capacitor will pass AC and pulsing DC while it will prevent straight DC from flowing — by storing it)- Another reason that telcos hate black boxes is because ringing uses a lot of commotvcontrol equipment in the CO, which use a lot of electricity. Thus the ringing generators are being tied up while a free call is being made. Usually calls that are allowed to “ring** for a long period of time will be construed as suspicious. Some offices may beset up to drop a trouble card for lopg periods of ringing and then a “no-no" detection device may be placed on the line. Incidentally, the term “ring trip" refers to the CO process involved to Stop the AC ringing signal when the calling fone goes off hodk. h is suggested that you actually dissect fonts to help you better understand them (regardless of whether or not you want to build anw devices). It will afro help you to better understand the concepts here you actually prove them to yourself. For example, actually take tht- voltage readings on yanr fone line (any simple multi-tester (a must) will do). Pbreaking and/or teaming is an interactive process, not a passive one! (Any questions on the above? Write us and weli try to answer them,} 1-41 1 PRIVA CY LOST r^- The Rise of ihe Computer State by David Burnham wf foreword by Walter Cronkite Vantage Books $6$5 paperback 273 pp. Several yean ago on -Surly Minutes^ segment was presented where all of the checks that one person had written In h» lifetime were examined, and then a fairly accurate portrait of the person V life was painted by the discrete bits of information, Information like (hit is called transactional information and we leave huge amounts of it behind as we livr our lives, whether in tons of paper or megabyte* of data. In The Rise of the Computer State, David Burnham says that an event as demonstrated by the Sixty' Minuses team could happen and many similar ones do occur. He surveys many of the ways that computers and technology cam be used to intrude upon our privacy; the governmental mandates, for such intrusion; and how, in ^ocral, computer abuses have affected history, Burnham begins with a review of computer history and the importance of computers on our lives- While always implying a global connection, he concentrates upon the United States where "industries engaged in the processing of information,.- now generate about half the GNP.” Later Burnham brings up legal points which are supported by examples- He also discusses legislative battles and presidential direct- ives both for and against the public good. Overall, The Rise of the Computer State reveals in technical and ethical terms how dose we ate to Orwell technocracy. Christopher Evans, a psychologist and computer scientist said that if during the 30 years from 1945 to 1975, the automobile had developed as fast as the computer* the Rolls Royce would cost $2,75, would have —^enough power to push the Q.E. 1] across the Atlantic, and would get 3 r million miles to the gallon. The computer has that amazing ability to quickly and efficiently move and sort through vast amounts of information, and this is why they are being used in all aspects of society including the FBI, police, banks, phone companies, and credit companies. They are used by most businesses for payroll, personnel, inventory, accounting. They are used by most government agencies including the IRS, FBI, CIA, SSA, NSA, HEW,FRB. and a large number of others, In fact, he devotes an entire interesting chapter on the National Securely Agency (NSA) which was obviously written before The Puzzle Paiace, a rather thorough examination of the NSA, was published. (A future issue of 2600 will look at the NSA.) Computers are used to compile lists, store data, pay employees, transfer funds, make airplane reservations or phone calls, com- municate, write letters, address envelopes, detect incoming ICBM^ price goods at supermarkets and department stores, tell time, and keep track of America's airplanes and trains to prevent them from Craslung. There are literally millions of things computers can do to benefit humankind. But the most amazing or these computers are controlled by big government or a few corporations. Transactional information about our lives is often bought and sold and traded without our permission. In bank computers lie copies of the checks we wrote. In our hospital computers are our medical records. I n many States, computer files are kept on all prescriptive medicine. In many law enforcement computers lie arrest and conviction records, often incomplete or inaccurate as Burnham points out. * Our movements can be kept track of by looking at our phone charges, airline, bus, train, and car rental records, or our gas receipts. * In Pittsfield. Mass., people’s buying habits are computerized and compared to the special dose of commercial* that are sent to only their ■ F- ^ .televi&tan sets. If we get supermarket credit cards, then every item, all of our individual buying habits, can be examined, * Information from the JWemsus was used to round up Japanese into concentration camps. If another thoughtless government wanted to do something again, it wont be hard, * In Los Angeles there is a registry of "undesirable” tenants that can be accessed for a fee. The information is often just heresay or the opinion of a past landlord. If the information is negative, the potential tenant U turned down. ■ The FBI pouetsea the fingerprints of 66 million people in its crinuniL or civil iderrtificatioa files. Burnham brings up the topic of criminal records a lot— about how past arrests and convictions can follow a person, even if a case is dismissed, Thk information is available to law enforcement agencies government personnel departments, and private companies. These databases of criminal records, which only one out of every live state* have ever checked for accuracy, were created in order to apprehend criminals. But if these records are used to keep suspected criminals or ex-cons out of governmental and private jobs and thus keep them unemployed, these people art practically forced to return to crime. By cross matching files, politicians can locate key groups to appeal to in order to makedecnioru or win elections. By cross matching file*, likely suspected comm musts can be systematically tortured, or customers for a new store can get junk mail designed just for them. In the casi'anything-berione chapter, we are left to hope that some laws or presidential orders are Created to stop cross matching of information between government agencies. There are example* where things are done (and undone again} in an effort to preserve privacy, but as we ree much information about u * is public. Until recently, the sdcctivt service wax aware of who got free ice cream from Farrow 3 1 2600 , p. 1-45). It wcn\ be long until all of the Flintstone vitamin peddler* will be buying up the list of the cabbage patch parents from Coleco. Companies are always buying information about us to pin an economic advantage. Business controls money and hence information. This information gives them direct power and often a marketable item. TRW and Other lesser known credit companies sell information to other businesses for about a buck a report, but to check your own record in order to see if the report is accurate costs $12. Mailing lists pass hands tike stocks on Wall Street. But are wc threatened now? When it comes to criminal records;] RS H and credit stuff the info is being used widely. The federal government is tightening up on documents it makes public. But often Mr. Burnham is telling us what ix possible which is not tar from the actual. He doesn^ stress the importance that the Freedom of Information Act had which is being gutted by the Reagan Administration. What Mr. Burnham could have done to make his case even mare effective is to include actual examples of the vast personal data and create a small autobiography based on his own credit history, bank records, FBI files, criminal records, motor vehicle records, college records, and other similar sources He could have gotten some expert* to examine all of his transactional information and then compare it to himself. But iiH all right for Burnham not to do this, because he suggests to us that such a thing can be done. Burnham goes on and on citing legal abuses, privacy intrusions, and political and economic manipulation. The book read* like those old TRW adt- "Imagine a day when.. ."and it ends the same way: That day ix today. Write to ux— well tell you all about ft " Burnham tells us almost all about "it" too. He does not mention the danger to a computer state where a disgruntled employee or little kiddie at a terminal can crash a huge system permanently, or a clever sad ist can create a viral program that can spread throughout a database and wipe out fiie after file! Burnham does not mention the technological pioneers who hack and explore and understand the world that is approaching and encroaching and who warn others of the danger. M r. Burnham would appreciate the work of some of the people like that, just as we can appreciate the warning* in his book about the power of the technological elite. 77rr Rise of the Computer State represent* one of the many books that should be read to prepare for the future as well a* the present. Mr. Burnham has managed to condense an immense amount of inform- ation on the power and threat of computers and data colletiing agencies. His book is well researched, but he needs that extra something to retain the sympathy of those who have "nothing to hide” and the interest of those who cannot relate to terms like "dchumant* zatioa”and "values”. The Rise of the Computer State startles one with a slap Of hidden reality, and this is what we need now. ABC 2 MNO 6 OPER 1 OPER 0 Big Brother No Longer Watching Miami AUOcilLEj f'fCMi City officials who stirred up visions of George Orwell s ^Big Brothry” when they instated video cameras todettci street crime have decided the project wasn't such a good idea after all. So three yean and almost $300,000 later, the city has abandoned its “Television Police Protection* system, saying it failed to record one crime. The city had the cameras installed in February 1$82 but for numerous technical reasons the system wasn^t turned on until that June. The project called for 20 cameras to be mounted on a rotating basis in 100 camera bousing; mounted on poles, thus keeping criminals off guard. Another larger camera was mounted atop a !4-**ory building on Lincoln Road to sweep the length of both streets fora broad overview. But the system had trouble. *Wc had continual maintenance problems with constant adjustment of the microwave, " Police Chief Kenneth Classman said. One civilian made so much fuss about police watching the monitors and not patrolling the streets that the depart- ment look police off the project. Another problem was in lack of interest from civilian volunteers assigned to watch the monitors. Many [bites, even the few working monitors went unwatched. Computers Seized as Summer Games Begin IVm.H PnW'Wiv The home computers of four Huntsville, Alabama teenagers were seized by the FBI last month afteran illegal tap into NASA computers. The unauthorized taps, according to the FBI, destroyed records and blocked scientists from using the computers. The FBI seized computers, printers, floppy disks, and software that allegedly were used to tap into two computers at NASA^i Marshall Space Flight Center. They contained iu classified information, according to NASA officials. Cecil Mok, special agent in charge of the FBI k Birmingham office, said an investigation is continuing He said no charges have been filed, but may be later. House: Hacking is Bad r^vnbined hrCTnft«jrafc h The House of Representatives has voted 395-0 for a bill that would make it a federal crime to gain access to computer memory banks without permission. The legislation would combine the attack on hackers with an attempt to slop those who manufacture or posses fraudulent credit cards or me someone's credit card number without his or her knowledge More PC JrV, Less Z-IOOls for Soviets n»Nt* l imk Vm* The United States, 13 NATO allies and Japan have jointly agreed to impose broad, rw w export controls on the salt of small computers and sophisticated telephone equipment to nations of the Soviet bloc; The agreement comes after iwo and a half years of difficult negotiations, . The accord, which was reached at the urging of the US .expands the existing NATO embargo on the sale of large sophisticated computers to include smaller models that Could have military applications. This means that many of the more expensive personal computers now available at retail outlets in the United Slates will be subject to capon controls m the futurc- Also, The agreement sets maximum lewis of technological sophisti- cation for digital switching and other telephone equipment supplied to the Eastern bloc by Western corporations. The Reagan Administration took the most restrictive line throughout the embargo review talks, diplomats say, with the Europeans and Japanese advocating a more liberal approach to trade wiih the Communist world. The U,S,, though, did agree to liberalize the sale of some less advanced computers to the Eastern bloc countries in return for joint Western restrictions on the sale of certain powerful email computers. In addition, the Western powers have undertaken to ban the export of “ruggedized” computers, built to withstand rough treatment and thus suitable for battlefield use. - Federal Express Offers “E-Maii” Tint Memphis-based Federal Express, which pioneered next-day private postal service, is now promising even greater speed with ZapMail. its long-awaited version of electronic mail. Fora* little as $25 fora missive of five pages or less and up to $50 fora maximum of 20 pages. Federal Express will zap letters and documents acres the U,S, within two hours. Unlike other outfits, Federal Express does not require its customer* to use computer keyboards to enter messages. Instead a courier comes and picks it up, lakes it to a Federal Express office, where clerks feed it into a document tCarmCr for Iransimsskm over land lines. At the receiving Federal Express office, a laser printer will spew out copies for couriers to deliver immediately. [No, this is mt electronic mail in the bona fide sense.) The firm even vows to give full refunds if documents are late. ITT Wiping Out Fee AMuUud Prtti On September I . Il l will drop the monthly service fee in charges users of its Ibng-di&t&ncc telephone service. The fees currently are $5 a month for residential customers and $10 a month for business users, JTT also said it would introduce discounts for high-volume callers, and said its residential customers would be able to reach any telephone in the continental United Slates. Previously, only iTT's butinCH Customers had nationwide calling. ITT is ranked eighth among long- distance carriers with about 125,000 customers. 800 Directories Now Available A. FViCrtJly Irfpm^kwi Oprarfw Starting in the middle of September AT&T will at last start offering directories to toll-free numbers. Previously, the only way to gel such a directory was through scanning, trashing, or buying ■ directory printed by an outside company. There are two versions being offered. One is for people and sells for $6.25 while the other is for businesses and sells for $G75, 1 nfo can be had by calling B0Q2424634. if that doesn't work from yrvur area, call 8005551212 and demand an explanation. Billing won^ be done through your phone bill, as one might expect. 44 We donlt hare that kind of capability yet," they said to us. Ice Cream Chain Aides Selective Service lteTfewYiwkTimn The Selective Service System has defended its iae of a mailing list compiled by a national chain of ice cream Stones to advise young men that they were liable for draft registration. However, the government will be returning the computerized list of 167.000 names to the company. Alexander Hehmeytr, executive vice president and general counsel of Farrell^ Ice Cream Parlor Restaurant, a chain of almost 100 ice cream stores, said both he and the company were H upscl and outraged"* by this *aci of big brother government," For many years the retail outlets of Farrell^ have had customers fill out a birthday form so that they would gel birthday cards from the company entitling them to free ice cream sundaes. The Selective Service bought the Farrells list in 19G3 from a list broker in New Jersey. Last October, the system began using the list to malt 1 300 to 3,500 warning cards a month to young men whose listed birthdays indicated they were about to turn IJt, Besides commercial lists, the Selective Service relies on state agencies thal license driven and the Defense Department, which compiles a list of high school graduates.. 1-45 3 BE NICE TO YOUR TELCO Over the years, some bad things have happened to my telephone. Once a silly caller terminated his call but did not hang up. 1 calfed the phone company (New Yorit Telephone) from a neighbor's phone, but they said they were unable to do anything- They said they could not even tell me where the caller"? phone was located. Acting on a hunch., I cruised my neighborhood looking for pay-phones. 1 found the phone 1 was interested in, but it was in a locked building, and I clearly saw the receiver dangling. The next morning 1 was able to hang up the phone, and my phone service was back to normal. Another time the clever sewer workers hauled out my trunk and knocked out my phone. It was restored, but l was not getting any incoming service after that, The ever more clever phone man came over, dialed the Automatic Number Iden- tification, and ki and heboid I had a new number. They fixed that too. My phone company has been generally nice to me even though 1 played some jokes on them. 1 suggest you do not do the following, as 1 have done in the past: • Fold, spindle, and mutilate your billing card. READER FEEDBACK DoitJMW: Here^ the latest info on phone scramblers. Phone scramblers/ descramblers area type of device which allows one to communicate over the phone without anyone being able to hear your conversation in between the source and destination of the call. They are perfectly legal to own and operate, but there is oik catch. (The following information wa* obtained from a phreak who worked with an cx-ClA agent — to verify the validity of this statement.) The CIA, working in conjunction with AT&T, has the right to legally tap up to 60Q phone lines in the U.S. The way that they are able to do this is that Bell Telephone can ^test" your line any time it likes to see if it is working in proper order. Under the new ESS telephone system, finding scramblers;' de- scramblers is very easy and once yoriart found, an instant file is generated on both the sender and the receiver of the call. They (CIA) will also do their best to try and crack your scrambler code. I have been told that they arc extremely good at this. My advice to those of you out there thinking about building such a device is to seek other ways and for those of you currently using them to stop. Using these devices is simply waving a flag to AT&T and CIA saying, **l\c got something important to say, and I don't want you to hear it." Agent Orange Dear Agent: Thanks for the info and for the warning. While youVe most probably correct about the powers that be taking a strong interest in any person using such a device, it seems absurd that we should have to constantly live in fear of having our privacy stripped, simply because we desire a little privacy t We face some real problems in the near future if surveillance continues to grow and not enough is done by individuals to curb it. Technology is a deadly weapon for anyone.. Sta y a live, awake, and ind ignant— y ou can 1 ! lose^Thanks for writing. Dtw2606: 1 just had a horrible experience. As a faithful subscriber to this magazine, I keep all of my copies in a special loose-leaf book. This comes in very handy because they're not scattered all over the house, like most other thing* 1 possess. But last week, l dropped my loose-leafbook on the floor and of course it opened, scattering all of the pages here and there. Now, t have no trouble piecing together the first page of each issue, but I can't remember where the other ones belong, since they don't have any dale on them! Can you help me piece them back * Punch extra holes in it to increase your bill 110,000 or more, ■ Cross out the line of numbers in magnetic ink at the bottom of your bill or check. * Make out your check to a penny less or a penny more than what is due. * Order as many free phone books for as many areas as possible. * Older phone books for obscure areas covered by private phone companies. * When you have free checking, pay with more than one check (10 or 30 per phone bill, for example). * Write with thick black marker the word ffUOi at the bottom of your check where the space for memos is located. These activities cause the phone company to put more work into serving you. It causes them to process your bill by hand, to spend money printing and mailing phone books, and to read your unfriendly message. Don * do this or vour rates will go up, (Please contact 2600 tM MEDIATELY if you know of other abuses currently making the rounds.) together and take steps to ensure that this tragedy doesn’t reoccur in the future? Thanks. Miserable In Philadelphia Dear M1P: You\e raised a very good point, one which we overlooked completely. While most of our stories are essentially timeless", it does help to know whena certain article was printed. For this reason, we have begun (as of this issue) to number our pages in manual format. For instance, this is page 1-46 which means Volume 1 1 Page 46 of the year. We hope this eases the suffering. As far as previous issues, we will be coming out with ^summary sheet towards the end of the year which well send to all ^ subscribers. Well try to get yours out early. And if anyone else knows of something we\e overlooked or wants to make a suggestion, please write. Dear 2640: I'm working on a book that gives the hackers 1 viewpoint and explains why he /she penetrates computer systems, 1 believe that even though I’m currently incarcerated, 1 could get a publisher to publish such a book To get this viewpoint I need help. L need the input of people who are active— the more the better. I also need the views of people who trash systems too. AIU Vcever seen is the viewpoint of the law enforcement agencies, media, business, and hackers that are caught etc, etc. etc. It 1 * time your views were heard. What I would do is just edit letters etc. sent to me and use these as basis for the book. By edit 1 mean pick the ones to be used in their. entirety. People interested in helping me with this can write to me under handles or pen names at the following address. Do not use your real name or address as nty ntaii is censored by officials here. John Gregg Box IM Marion, 1L 62959 A CORRECTION In our last issue, we erroneously gave our MCI Mill ID as 2600. We didn’t think there would beany problem in obtaining that ID, but there was. TV MCI Mail computer apparently can ’t handle all-digit usernames. Our MCI Mall ID therefore, is, ' 26HUNDRED. Write to va there or a tow mailing addrea or-, our mew telex address, all of which are listed om page one. (Especially write to us if you can think of any new ptaeslo have an address!) 1-46 2600 page® '■■"V ZOl 2 02 203 204 203 306 207 208 208 212 213 214 215 216 217 218 219 301 302 303 304 305 306 307 306 309 312 313 314 313 m 3ie 319 401 402 403 404 405 406 407 406 409 412 413 414 415 416 417 418 4 IS 501 502 503 304 505 506 507 181 512 513 514 515 516 517 516 201- 676-7070 202- 364-96Z0 203 204- 205- 206- 617' 303- 415- 516" 213- 214- 412- 614- 217- 402- 317- 301- 412- 303 304- 912- 306- 303- 402 217- 312- 768 313- 223 314- 726 510-471 519- 504-245 402-345 617-787 402- 345 403- 425 812-784 405-236 303-283 ******* -763- -849- -988- 382- 7B7 j ■293- ■546- 471" >301’ ■696- ■633- ■464- -525- ■ 345 - ■265- ■534- ■ 633 - -283- - 344 - 7B4- -347^ ■2S3“ '345- ■525" -6615 ■0900 ■7000 -9000 ■5300 ■2333 -0116 B1U ■3255 ■8711 -5600 *2345 -7000 ■0600 -4634 -1168 ■5600 2333 9041 0440 2878 2333 -0600 '7000 ■9600 8680 7142 -9111 l=3i§3 -5330 -0600 -5300 -0600 -2632 -0440 -6121 -2333 ***** 415-543-6374 713-820-41 1Z 412-633-5600 617-787-5300 608-252-6932 415 416 314 514 614 405 502 503 >4 i3 546- 922- 726- 297- 464- 236- 583- ■241- 0107 6686 7142 5151 2345 6121 2861 3440 0 3 506-648-3041 402-345-0600 ************ 206-382-8000 512-826-2501 014-464-2345 514-267-5151 402-345-0600 518-471-0111 313-232-6690 516-471^9111 518 601 602 603 604 605 BOB 607 609 609 612 613 614 615 616 617 616 619 701 702 703 704 705 706 707 708 709 712 713 714 m 717 71B 719 601 602 803 604 905 906 807 808 809 612 813 914 615 BIG Bi7 BIG 619 901 902 m 803 806 607 908 609 912 913 914 915 916 817 816 819 416-922-6686 G01 -961 -0877 303-293-2333 617-767-3300 ♦CLOSED 3/62 102-345-0600 502-503-2861 516- 471-81 1 1 414- 252-6032 201 -G7G-7070 402-345-0600 416-922-6686 614- 4B4-2345 615- 373-3781 319 = 989=8188 402-345-0600 415- 546-0110 804-747-1411 012-704-9111 416- 922-6686 ****N/A***«* 415-546-0107 ************ ****N/A«ft*## 402-345-0600 713-820-4112 213- 501-3255 mm-m 412-G33-5600 518-471-6111 ************ 303- 293-2333 517- 7B7-5300 912-704-0440 304- 344-6040 415- 546-0118 512-828-2501 416- 822-6688 212-334-4336 212- 334-4338 317-265-4B34 813-226-7871 412-633*5600 217-525-7000 816-275-2762 214- 698-9711 213- 501-3255 514-207-5151 6 1 5-373-5791 902-421-4110 tt«*«N/A#**** 912-704-0440 #»**N/A***** 313-223-8680 #***N/A***** ************ ************ 812-764-0440 § 16-275-2702 18-471-6111 512-628-2501 415-546-0118 ************ 403-236-6121 912-784-0440 Mtojutm Wtkmtw Jtttofiff YOUR ( Bermuda On 1 v 1 1-47 5 200 210 2Z0 230 !7( 201 „ 211 „ 221 .. 231 „ 241 251 .. 261 .. 271 201 „ _ 202 _ 212 _ 222 * 232 _ 2*2 _ 252 . 262 :» 203 213 223 233 243 253 263 ::: III ~ 2M 245 ZC9 _. 207 209 709 Z14 ... Z15 ... 2lG _ 217 ._ 218 ... 219 224 223 ZZ9 227 — 228 — 229 234 ... 233 „ 239 ... 237 ... 238 239 244 245 248 247 248 _ 249 254 233 239 237 _ 258 ... 259 294 293 299 297 _ 298 299 82::: SI — IS n: S7 — IS = zao 300 310 320 330 340 350 m 370 300 390 400 410 420 430 +40 450 460 470 400 4S0 500 Sit 530 530 540 550 560 570 291 202 293 294 ZB 296 297 298 209 i . _ 301 302 303 30+ 305 306 307 300 M M M 309 j. 311 32 : ^,— Ui 312 322 — ^ 313 223 — 314 324 — 315 325 — m — $ — 310 320 — E MW*- 331 352 333 ■ — ■■ 23+ 335 336 337 338 MMM 338 jmwmWm mm 341 2+2 m 344 3+5 340 WH 347 J >M 340 MMW 349 35: 352 353 354 355 336 . _ 35 7 350 339 361 3GZ 263 364 , 305 .MM 366 MM 367 ^ M t 368 — 389 mwm 371 372 373 374 375 376 ■ ; ■ 377 370 379 MMM 361 362 363 204 385 m MBiM 397 MMM 388 — 309 MMM 291 401 — 392 4C2 — 393 403 — $ ■ - — 395 405 — 396 406 — $ — - 300 (00 — 39} 400 419 “ 4i: 412 413 4H 415 _ _LM 416 +17 410 MM 421 422 423 424 423 ™T 1 ■ # 426 427 m M M 420 -m 428 MMM 431 432 433 434 433 436 MMM 437 ♦38 43E MMM 4+1 4+2 447 444 445 446 JUB-M 447 440 MMW 449 MMM 451 452 453 45+ 4B =__M 456 MMMi 457 430 459 MMM +61 462 463 +64 495 406 jt.jm.wm. 467 ■HMM 460 463 MMM 471 472 473 474 475 476 *77 470 478 MMM 481 462 403 434 405 406 467 MMM 406 ■TMM 409 a-MM £ 91 492 (S3 mJmMmJU. 434 495 496 W IT- 497 — 406 499 MIT — 501 m 503 mLmJU aJH 504 505 506 MM rw 307 LB. 500 — 509 MMM 511 512 513 514 315 _ 516 517 519 M MB| 518 MM.M 521 522 523 524 525 ■ 52)6 MMM 527 320 329 -LM. 53i 532 533 534 535 336 537 530 539 MMW 541 542 543 544 545 546 MMM 547 VMM 340 349 alJiftl 551 561 571 500 301 500 _ 59 1 601 fill BJM^ MW. 621 630 621 6+0 641 650 651 660 g 70 — 661 SB 5 BO 690 __ G91 691 552 552 572 502 592 G02 s;2 sz: 632 642 052 553 503 573 503 593 603 613 £23 m 643 653 m 574 594 594 S£tt 61* 624 634 644 654 ” I" ^ ”1 567 HI 575 . 505 . 595 . £05 _ £15 - 625 . 655 _ 645 . £55 _ „ 576 5S6 .. 536 .. BOS £16 KG 636 „ 646 .. 656 557 567 577 507 587 507 617 627 637 647 657 578 556 590 600 518 626 638 640 659 ___ 579 ... 500 599 — 609 _ 619 ___ 629 ___ 630 649 ™ E59 700 710 720 730 740 750 760 770 700 790 800 810 8Z0 830 050 600 070 SBC 090 900 910 930 930 940 950 ETCH 990 731 741 751 761 771 761 761 901 m 021 031 941 051 be: 071 061 981 801 Til 621 £31 0*; 051 961 971 -QA* 981 ■ MM ■Ji DEM. __ j— DBiJ U1 DD1 ut ev«r 1$ — — LM III — tnr t \r - — uw — UMU IM _j 662 593 694 695 1 696 697 599 699 702 ■LL M M 703 _ 70+ 705 706 MM. 707 MMM 709 709 712 713 714 715 ■ 716 717 719 719 MMM ^ 722 ja _l m 722 72+ •JIMM 725 726 MM. 727 MMM 720 .MM 728 MMM 732 733 . 734 735 736 737 73S TBM-. 738 __ |Jl 74Z 743 744 745 746 . 747 M"I" — 740 748 ^ 752 753 75+ 755 756 757 750 756 702 703 764 705 766 767 760 7© 772 773 774 775 . 77S .... 777 770 773 MMM 702 763 704 795 766 707 798 799 7K 793 764 795 796 707 798 709 902 603 904 605 806 u 007 ■ 009 MMM 809 M.M 012 £-3 8:4 815 816 017 018 819 A I 1 ■■ 022 023 m 025 £6 927 028 MMM 829 022 033 934 035 936 B37 639 639 942 _l aa. 0+3 &U 045 846 847 048 849 ■ ■ TT 052 053 954 655 056 957 _4__ 950 053 982 063 664 065 886 867 068 809 ■ MM 072 373 974 975 ' ■ 976 977 S3 M-ii-to- 079 082 003 384 605 886 987 ess 809 982 093 88+ 0S5 896 B87 see 899 31 902 903 904 903 906 807 90S 809 *12 913 314 915 916 — 1-J-W 917 sie 619 922 923 MMM 624 925 MMM 926 MMM 827 MMM 920 929 A M J_ ja u. 632 *““i — 933 934 J _ _ 93? 936 937 930 939 942 MMM c ui u r M. M 944 945 946 847 . gift urC 949 -- 352 962 — 953 963 954 964 — r +r -r fi — i : ^7 — 950 960 — 959 SS9 — .. _ 972 973 974 975 876 877 970 979 382 983 904 m 806 887 988 90S LM . 992 MM. 993 MMM 994 . . M 995 MMM yOD .MM 987 - ■ 098 Sfifl The HmktrsGukkio Ansa Cotk C — CmriMT Office E - Etedronfc or Dfcit*l Office S — Step Office A - AT* I G — GTE 1 — ITT N — Northern Telecom ■ Ehrtt Completed 1-48