Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
2600: The Hacker Quarterly (Volume 3, Number 9, September 1986)

2600: The Hacker Quarterly (Volume 3, Number 9, September 1986)

Ratings:

5.0

(1)
|Views: 30|Likes:
Published by Ranko Kohime
New, 600dpi version, for clearer, easier reading.
New, 600dpi version, for clearer, easier reading.

More info:

Published by: Ranko Kohime on Aug 06, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/17/2011

pdf

text

 
2600
12.50
NC
.388.81
NC
7.25
SEPTEMBER,
1986
VOU!ME
THREE, Nl'lI-1BER
.\1\1:.
$2
some facts
on supervision
by
The
Kid
&
Co.
Answer supervision
is
the
teleo
tenn
for the signal sent backto indicate the call has been answered
and
billing shouldcommence.
Many
alternate long distance carriers
do
not
have
thisfeature,
so they
start
billing
after
a caller
has
been on a linefor
an
arbitrary
amouht
of
time (usually 20-30 seconds).
This
grace period
can
be spent listening
to
a ring, busy
signaLoreven
talking. Obviously, this
method
of
billing
can
result
in
billing
errors
of
great magnitude. Imagine what would
happen
if onechose to listen to a ring
or
busy
signal for 3 hours. This problemwas covered
in
detail in
an
article
appearing
in the November
19R5
issue
of
2{)00
on page
2~74.
There
is
a fair share
of
telephone
numbers out
there
that
arefree
to
call i.e
..
they
do
not supervise. These should not beconfused with
ROO
numbers. which
do
supervise.
but carry no
charge. Telephone
company
recordings arid various "secret"
numbers
often
don't
supervise".
Phones that
are
illegally hooked
upto
"black
boxes"
will defeat call supervision. The Tatter
is
imposs'ible in
an
electronic switching system (ESS).
..
To
determirie if answer supervision signa
Is
are
sent
back
by a
particularnumher.
one
only needs a
telephoneconnect~d
to anFSS made by
AT&T'
Western Electric. This
phone
must alsohe ab\ecto access the call forwarding feature. First,
attempt
to
forward
your
calls to the
numberto
be tested.
Make
sure
touse
a
carrier
which returns supervision if you
are
calling longdistance.
Jfyou don't
use
AT&T
ora
carrier
which uses
answer
supervision. the results
of
the test will he
inconclll~i\e
for
[fo,:
reasons
discussed
above and
in
the
other
article.
1
re
forwarding process will connect you to the
number
bein!! te'tee
for
supervision. After the call has becn "ansv.ered". hang
llrand
dial
your
own
phone
number. If you get a busy signal therthe call
forwardinr
has been reiected hecause the number
I-
unsupervised. Ca lis to that
numher
are free when using a carrierwhich
does
return supervision. If you get connected to the
numher.
then
it is
supervised. You have heen hilled for bothcalls and should
make
sure to unforward your calls.This
testis
useful when compiling lists
of
test
number,
thatwill be used
throughout
the
country.
It
would he a real pIll'.
\()
see supervisory information on the lists already
in
circulation
During
the research for this article
we
noted that equal acce"really
is
equa
.
I was surprised
to
find
that both
call forwarding
and
speed calling allow
an
optional 5-digit carrier access code
to
be specified. Therefore.
it is
possible to
detennine
whether
Or
not a long distance
carrier
returns true
answer
supervision.
To
test a
carrier
and ohtain
conclusive results. one should use thesupervision test
on
the carrier using a known unsupervised
phone
numher
(a
number that
tested unsuped using the
abont.
test with
AT&T
as the
I.D
carrier) and a
known
supervised one
(any home phone
will do). If the test
usingan
alternate carrier
does
not
return
the same results
as
AT&
T.
then the
carrier
does
not
return
proper
supervisor\'
infonnation.
ReI
&
DMS-IOO BUGS··
RCI.
the Rochester. NY -based long distance
company.
is
the
only alternatecarrier
we could find
that
still
has
the infamous
202bug.
This
bug
prevails on
corporate
extenders (800 dial
tone
numbers).
but
the long distance carriers as a rule haveweeded
it
out.Basically,
the
202
bug
is
a hole in the network. 202
is
the
area
code
for Washington,
DC.
which
is
the only
major
city in the
country
where you
do
not
have
to
dial a on., before
making
along distance call. Calls
can
be
made
by
just
dialing the area
code
followed
by
the
number.
This
holds
true for
parts
of
otherarea
codes (20
I.
914)
and for
all
of
at
least
one other
area code(516).
but
Washington.
DC
is
the only
major
citl"
where this canbe
done
and
that's
why the bug works there.
After
accessing RCI(950-1003)
and entering
a
\'alid
authorilation
code. a caller can dial202, then
another
area code
and
the first
four
digits
of
the seven digit number. Then.
after
pausing for
about
eight seconds. the caller can
enter
the
"C
r~maining
three digits
and
the call will go
through. No
bill
is
sent to the authori7ation code.
What
the caller has
done
is
route the call
through RCI's
phone
lines
in
Washington.
DC. The phone
line
there
ordinarily looks for a seven digit number. But by entering thefirst seven digits
of
a ten digit long distance
number.
you havetricked the
RCIcomputer
into thinking you
are makinga
call
in
the 202 area.
The phone
line dials
tho~e
seven digits and
"completes"the
ca
Il.lea\ing
you sitting
in
no
man
\
land.iust
asyou
\\ould
be if\"()u stopped dialing midway through from your
J-65
own phone.
It
takes
about
eight seconds
for
the
phone
line tofinish dialing what
you
told
it
todial.lt's
sometimes possible
to
hear
a little click as this
phone
line finishes dialing.
Fnteringthe
three final digits allows the call to be completed thr'eughWashington.
DC
It's fairly
obvious why
this
doesn't work
in
cities
that
requireone's hefore
area
codes. If the
RCI
computer
sees you dial212-141-5xxx
in
an attempt to
access
San
Franci~"Co
throughNew
York
City.
it
will sav.
"There
is
no
wav
onearth
an
exchange
in
212 can begin
"";ith
a
one"and
vou will
hear an RCI
error
message to
that
effect. Dialing
i02-415-xxxX
in
anattempt
to
do
the same
from Washington.
DC
will make the
computer
think you
are
trying
to
access the 415 exchange insidethe 202
area
code.
That
iswhy
it
attempts to
pla~e
the call.
It
hasnot been told that 415
or
any
exchange
that
is
also
an
area
code
is
imalid
in
202.
It
also gladly places calls
to
the
4ll~xchange
(infonnation)
or
the
911
exchange (police emergency)
in
anI"(Jrea
code where
if
has a
phone
line.
In these cases.
fqurdummy
digits have
to
be
added after
the exchange to convince the
RCI
computer
that
it's a real
phone
number.
(RCI
did
at
leastremember to lock out the 950 exchange.)If there were a
maior
city inside the 516
area
code. the bug,",ould
probahly
work there as well. Since there isn't.
RCI
doesnot lease lines
in
thala
rca code.
In
a lllikelihood. all calls to 516a re routed th rough 212. As
a
result. there
is
no
local
phone
lineto take
ad\antage of
in
516.
(continued
on
pa~e
3-72)
 
NSA Drops
DES
\"CClHo!'
"1.'P,ll'lflwnl
TheliS
!!overnment will
not
recertify the Da.ta
Encryption
Standard
(DES).
a
standard code
widely used hy
government
agencies
and industry to
protect sensitive
computerdata.
when
itis
reviewed
in
19RR.
Harold
Daniels.
deputy director
of
information
security for the
National Security
A!!ency fa
man
you all
oughtto know.]
says.
"The
use
of
the DES
al!!orithmhas
spread
to sensitive
applications.
which has
made
it
anincreasin!!Iy
attractive
target for
our
adversaries.
Therefore.
wehave
determined that
it
is
in the US interest
to introduce
newcrypto!!raphic
algorithms."The
policy will
cause
some confusion
among
computer
users.who
may
hesitate
to
hud!!et for new security
equipment
pending
the
government's action.
Hackers
On
Shortwave
A
Seattle ham radio operator and computer
enthusiast
is
calling
on
the Federal
CommunicationsCommissionto
setaside a small
portion
of
the
shortwave hand
for
microcomputer
users.
TheSeattleham
is
proposing
a packet-switch
n!!
puhlicdi!!ital
radio
service
(PDRS).
He
calls it a "high-speed digitalradio hi!!hway" for
computer
hohbyists.
DonaldStoner
proposes
that
a
portion
of
theamateur
radio
handwidth
(52-54 M H7) he set aside for
the
PDRS.
Key
to the
PDRS
would
be
the
development
of "smart"
transceivers.which would act
as network
access devices, mail-hoxes,
and
modems. These limited
radio
transceivers would
operate
at alltimes,
acting
as"the equivalent
of
nodes in conventional packetnetworks. As such, they would
constantly
monitor
the airwavesfor packets addressed
to
them
or
for packets they could pass
on.
BB
Traffic Cop
Galveston
County,
Texas, constables are
using
a
comhination
radar
unit, computer, and camera
that
automatically photographs motorists
driving
more than
10
miles
per
hour
above
the speed limit.
The photograph
includesthe
car's
license
plate, the driver's
face,
and the date,
time,
and
spccd.
Themotorist
later receives a violation notice in the mail,
and.
if
they wish, they can see
the actual photo.The equipment can
he set
on automatic
to
operate on
its
own
while placed
along
a highway.I n aiL 1.200 speeders have heen
photographed
since
May,morethan
all those ticketed last
year
by police in the precinct,where it
is
being tested.
Crosstalk Saves Old Lady
A 67-ye;,f-old
woman who
fell and
broke
her hip quietlyhe!!!!cd for help into a dan!!ling
telephone
rec~iver
for
two days
until
somcone
heard her.
Heronly
telephone
is
located
on
a
tahle
in
her
kitchen.
When
she reached
it
to dial
the operator,
she fell a!!ain, pullin!! thephone
to
thc
noor.
It
landed a few feet away, hut she said shewas
unahle
to raise
her
shoulders
or
arms to
retrieve it.
She
could
hear
a crackling noise
through
the receiver,howevcr.
and
he!!an
to
call
out
for the
operator.
More
than
4R
hours
latcr. a
neighbor
picked up
her phoneandheard
a
dim
voice crying. "I need help.
"The
neighhorthen
went
door
to
door
looking
for the source
of
the
anonymous
voice.
Phone company
officials called
the "cross talk"
a freakoccurrence.
Indian Phones Under Siege
More than
1,000
telephoneoperators
quit
work
in
NewDelhi, India to
protest
unanswered
demands that
police
arrest
apolitician
whostormed the phonecompany andorderedoperators
to place his call
to
Bomhay.Since long-distance calling from New Delhi was virtually
3-67
-----
-
-
---
----
--
--
-
---
-=
:
~ff!_=
=~==;=
==== == == ==
impmsihle. the
Indian
army took over
the
central
telcphone
exchange
and
hegan evicting the strikers.
They
were
demanding
the prosecution
of
Prakash ChandSethi.
a
former home
minister
and memher
of
the ruling
Congress
PartV'
in
Parliament. They
said Sethi hurst into asection
of
the main
domestic
lon!!-distance
hook
n!!
exchangewaving a pistol
anddemanding to
know why
hiscallto
Bomhay
had
not heen put through.Sethi denied he had
threatened
or
attacked anvone
and saidhe was
manhandled
hy
an
officer
of
the operator's
union.
"They
were
shouting and advancing toward me."
he said. "I
was only asking
why they did not connect my call.
It
is
m\'
rightas a
customer. This
is
the worst
telephone
system
in
the
world."
"Signature"
On
Video Transmitters
The Federal Communicat
ions
Commission proposed
asvstem
that
would
make
it
easier
to
find future
Captain
Midnights.
The
FCC
proposed
a rule requiring
that
all satellite v deo
transmitters
have a special
"signature."
so individual signalscould be identified quick
Iv.
As you should know.
Captain
Midnight used
an earth
station
to
override a
Home
Box Office cahle signal
and
insert his
own
message.
FCC
investigators only closed in on
him
because
of an
unusual
pattern
generated hy
the color bars
he used on histransmission.
Theproposed
rule would require
the"signature"
to hepresent
on
all transmissions
after Decemher
31.
19R7.
Commissioners also
discussed
whether
there should he
automatic transmitter
identification systems for
someradiooperators.
FBI Shopping List
Inf,'\\nrid
The
FBI
announced that
it is
planning to
huv
more than
g,()()()
desktop and porta
hIe
computers
for use in a wide range
of
activities.
The
FBI has asked
vendors to prepare
hids for
the
personal
computers,
which
must
meet
thegovernment's
Tempeq
specification
for
securing the
machines
from
unauthori7ed
surveillance.
According tothe
FBI hid request. the
machines
must have
the followingama7ingcharacteristics:
The
portables
must
fit in
a hriefcase
and
weigh less
than
25
pounds, and
have huilt-in
modems.
The
vendors
must allow
the
FBI
to
look at
future
products. and
will sign a non-disclosure agreement.
to
verify
that
the
machines
will he
able to
run software
on
a 32-hit chip.such
as the
Intel
ROJ86.
Vendors must
supply
Rhase
5000
or
ffiOO
with
Clout.
which
is
descrihed as the
FBI's "haseline"datahase management
system.
They
must supply a spreadsheet. a
word
processing package,
an accounting
system. as well
as
Pascal.
C
Prolog.
LISP.
and Assemhler.
The chosen
system will gradually replace
dumh
terminalscurrently hein!! used.f
Ahcm·l
Poor
Connection Starts Bomb Scare
Perhaps
it
was
the pitch
of
the caller's voice.
Perhaps
it
was
the
static. But
something madethe
friend
on theground
think
that
Flight 740 had a
homh on hoard.
The
woman on
the
plane
had
made
a call to her friend
in
Florida
using a new
air-to-ground
telephone. hut there was a lot
of
static.
"There
is
a
prohlem
with the
phone."
she said.
The
friend. however.
thought
she had said there was a
homh
on the
planeandtoldher hushand. The hushand
called
the
airline, theairline called the pilot.
and
when the plane arrivcd at La
Guardia Airport
in
New York. it was directed to a remote
corner of
the
airfield
and
a waiting
squad
of
anxious
policeofficers.
The woman who made
the call was removed from the plane
and taken to
police
headquarters
at the
airport.
The
policechecked witnesses
on
the plane as well as the friend
and
her
hushand
in
Florida and then
apologi7ed to the caller for theinconvenience.

Activity (4)

You've already reviewed this. Edit your review.
1 hundred reads
"Rufus" liked this
DarkZer0X liked this
AUMMM liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->