Documente Academic
Documente Profesional
Documente Cultură
1984
AHOYI -an Introduction to 26<Xl. FBI GOES AFTER ADS HACKERS -FBI Investigator unwlttlngly reveals tactics and recent activities.
FLASH LlCA dlscusses GTE raids, AT&T credit cards, wireless phone trouble; THE TRUTH BEHIND THOSE. 9999 NUMBERS -a toll free error
story, DATA. vanous White House extenSions; HACKING ON TELENET-how to's of Telenet use; ESS ORWELL'S PROPHECY the first In a
series on the fun and dangers of ESS, FLASH directory assistance changes, computer air-ban. AT&T credit cards, etc . SOME THOUGHTS
ON GARBAGE PICKING--flrst of a series of trashing for valuable Information as related to a diSCUSSion of !;rosstdlk, DATA COUNTRY
CODES---every last country code for overseas dialing, THE CONSTITUTION OF A HACKER-a diSCUSSion of hacking, ALTERNATE LONG
DISTANCE MCI-hlstory, systems, and services; FLASH 71R Connecticut Wiretaps, Sweden person numbers, etc , THE FIRST ATOMIC
BOMB-an InSide story on the ?vent as related to our nation's phone system, DATA ARPANET HOSTS --list of acceSSible hosts, WHOSE
STRIKE WAS THAT ANYWAY? -a startling analYSIS of summer 83 phone strike, THE TROUBLE WITH TELEMAIL ----dIscussion of GTE's
IrresponSibility In protecting their syst�m, FLASH AT&T credit cards, portable prisons. 414's plead, etc . A TRUE SAGA O F
TELECONFERENCING--what con happen on a teleconference, DATA MCI ACCESS NUMBERS-DIALUPS FOR MCI MAIL, PHONE BOOK
COLLAGE #1 ----ou r artistic heritage In phone book designs; THE SIMPLE PLEASURES OF A STEP OFFICE - -dISCUSSion of inS and outs of
antiquated phone systems; IBM'S AUDIO DISTRIBUTION SYSTEM-USing vOice messaging technology, FLASH 414 sentencing. equal
access, bank record privacy, etc. THE WOES OF HAVING A SMALL-TIME RURAL PHONE COMPANY -a true story, DATA AVAILABLE
NETWORKS ON THE DEFENSE DATA NETWORK-a lIst IncludIng base addresses, EASYLINK ACCESS NUMBERS, ARPANET HOPPING
AMERICA'S NEWEST PASTIME -how It works and tipS for Its use, ELECTRONIC SWITCHING ADVANCES ,-some of tile possible services
and drawbacks; FLASH: Directory assistance charges, 2600 writer Indicted, demise of E-COM. etc; THE DARK AND TRAGIC SIDE OF THE
GREAT BREAK-UP-a frank diSCUSSion; LEITERS_ sysop problems, 518· 789 an XY step, etc , DATA E-COM ACCESS NUMBERS ---dIal ups
for the (now-defunct) serVice, NY TELEPHONE "LEITER OF DOOM" -a copy of a law enforcement monitOring notIce, "LOOK OUT, HE '5 GOT
A COMPUTERI" -a defense of the hacker viewpoint, MCI MAIL THE ADVENTURE CONTINUES -an analYSIS of the well knovvn faulty E-mail
system, FLASH_ computenzed meter-maid. blue box arrests, anti-hack legislation, INTRODUCING THE CLEAR BOX' post-I--lay" payphone
deVice, LETTERS: new SWitching equipment, 99 scanning, repulsive operator story, etc , SPf:CIAL REPORT TRW -BIG BUSINESS IS
WATCHING YOU-how to use TR.W, and an assessment of the potential of thiS system. BUT HOW DOES IT WORKl a �llnple explanation of
the phone system, wiring. voltages, black boxes. flng, etc . PRIVACY LOST-a review of DaVid Burnham's book "The Rise of the Computer
State", BE NICE TO YOUR TELCO -how IndiViduals are abUSing their tekos, FLASH Big Brother In Miami, NASA computer break In
computer export controls, 800 directOries; LEITERS phone scramblers, page numbers, tlilcker's book, etc , OAT A CNA NUMBERS -list of
CNA's, A HACKER'S GUIDE TO AN AREA CODE--a Simple scheme to help "map out" exchanges In your area, HISTORY OF BRITISH
PHREAKING-an account of the tllstory and tectlnlques, MORE ON TRASHING-what to look for, where to go. how to dCt, A FRIEND IN HIGH
PLACES -story of a fnendly operator; FLASH NSA inseCUrity, hacker caught, private directOries, LEITERS phone 1<X»p, WATS, TAP, etc_.
DATA A NON-COPYRIGHTED DIRECTORY, NY TELEPHONE "BIG BROTHER" LEITERS-touch tone Without permIS�lon, etc, GETIING
CAUGHT HACKER'S VIEW-a story of the personal effects of hacking; VITAL INGREDIENTS -what makes the ptlOnes work operators,
switching. FLASH NSA wants better phones, crime-computer VictIm, wiretap loopholes, 911 attacker caught LETTERS BBS diSCUSSion,
Comsec Letter, Computer Crime Data, others; DATA NY TELEPHONE SECURITY NUMBERS, MCI ANECDOTE ----ads. vulgarisms. MCI
chairman profile; PHONE BOOK COLLAGE #2, EXPLORING CAVES IN TRAVELNET-an mterestlng extender explained. FUN WI TH
FORTRESS FONES-what a pay phone does, how- people beat them. FLASH,' SS computer foul ups, Alrione, Wiretaps, 81 8, pay phone attack,
LEITERS book 1151. Silver boxlnY, another hacker's Vlevv, DATA IC'S AND CARRIER IDENTIFICATION CODES -gUide to 950 exchange, MCI
MAIL "TROUBLE LEITER" -the h:Hassment begins. A TIME FOR REFLECTION -the year In reView, MCI MAIL AND EASYUNK -electronic
mall horror stones; THE SCARIEST NUMBER IN THE WORLD-true story, FLASH campaign computer, Pentagon by pilOne. students bog
computer, electronic JaiL federal ptlOne upgrade; SURVEY --reader survey responses, SOME, BUT NOT ALL ELECTRONIC MAIL SYSTEMS,
list and price compansons plus .'olce messaging companies, REACH OUT AND GOOSE SOMEONE -lJst of many unique dial 1I numbers
1985
THOSE HORRIBLE HACKERSSTRH<E AGAIN-analysIs of Newsweek InCident; WIRETAPPING AND DIVESTITURE - a lineman discusses
these tOPICS, GEITING IN. THE lhCK DOOR�a gUide to some popular operating systems Including TOPS, 10, TOPS-20, and UNIX, 2600
INFORMATION BUREAU: our phone bill. our thanks, and other notices; FLASH' IRS and telco data, GEISCO, KKK computer, LETIERS BBS
nglHs, Easylink, Canada loops, Ifltern.atlonal phreak day, BITNET TOPOLOGY--a schematiC of the BITnet, THE THEORY Of- BLUE
BOXING" history, future, and how they are used. TRASHING ALASKA STYLE -a real trashing adventure story, SURVI:YING THE
COSMOS --a beginner's gUide to COSMOS, Bell's computer program. FLASH phreak roundups. real TRW crime, 26(X) BBS, 8CX) data,
LEITERS Bell problems, telco discount. marine calling, many questions; 2600 INFORMATION BUREAU - acronym list of useful teleptlone
Jargon, NAZI BSS A CHALLENGE TO HACKERS-the role of the hacker, ARE YOU A PHREAK??? -humourous review of phreaklng, HOW TO
GET INTO A C 0, -a tour of a centrai office, FLASH, custom calling. Kenyan pay phones, hacker coke machine, IRS computer screw-up,
LETIERS reading liSt, tracing afld law enforcement. UNIX Into, NSA phone n, 26(X) INFORMATION BUREAU -Interesting phone numbers,
how to dlnl a telephone, New Yort.. Tel message, CNA LIST, NSA CIPHER DISK, WHAT A WHITE BOX CAN DO -how to build and the use of a
portable touch-tone generator; A PHONE PHREAK SCORES -another successful SOCial englneenng story, HACKING PACKARD --useful
Information about the HP2000; FLASH: talking clock, computers for communists, robot kills man, war games, Silver pages. LETT ERS Tom
TCllnpldls. secure telephones and cryptography; 2600 INFORMATION BUREAU-MILNET hosts by location, PEOPLE EXPRESS TO BE
HACKED TO PIECES --a look at People's nevv anonymous reservatIon service, HOWTO RUN A SUCCESSFUL TELECONFERENCE --complete
gUide to Alliance TeleconferenCing SerVice, FLASH hacker bust, police hacker, Reagan doesn't dial kids, dlal-a"dlrectory, LETIERS
computer networks, Silver boxes. 950, remob. tracing, 2600 INFORMATION BUREAU--Alllance TeleconfererlClng materiaL iNTERESTING
PHONE NUMBERS; UNBELIEVABLE ADVERTISEMENT, GUIDE TO THE tSRAELI PHONE SYSTEM, SHERWOOD FORES T SHUT DOWN BY
SECRET SERVICE, SOME WORDS ON HACKER MORALITY, OUT OF THE INNER CIRCLE REVIEWED-an ex-hacker s new book, FLASH who
invented the phone, porno phone wiretap award, AT&T computer steals, LETIERS Information charges, AT&T cutoff, marine calling, 2600
INFORMATION BUREAU-BCX) prefixes by state; SYSTEMATICALLY SPEAKING goodbye to meter readers, Thai phone books. tracking
deVIces, TINA, 'Call Me'· Card; FROM SHERWOOD FOREST INTRO TO HACKING-what to do and not to do, INTERESTING THINGS TO DO
ON A DEC-20-how to use varluus commands and some things to look for, BANKING FROM YOUR TERMINAL A LOOK AT PRONTO -
ElectroniC banking, how It WO! K.S With a focus on Chemical's system, FLASH $2 billion error, lIT crackdo-Nn, monitoring, 2600
INFORMATION BUREAU-Mllnet TAC dlalups by locatton; SYSTEMATICALLY SPEAKING MCI goes optical, 1CX)% ESS, GTE bigger than
AT&T, SEIZED! 2600 BUllETIN BOARD IS IMPLICATED IN RAID ON JERSEY HACKERS-an accurate account of the Private Sector BBS,
COMMENTARY THE THREAT T0 US ALL-what BBS seizures mean; FLASH_ 2600 a hacking victim. Middlesex Courthouse, MOVING
SATELLITES, ,WHAT WAS Rft..LLY GOING ON]---polnt by POint correction of New Jersey prosecutors' fallaCIOUS charges, WHY
COMPU rERS GET SNATCHEO-- .....hy law enforcement seizes equipment. SOME IMPORTANT QUESTIONS TOASK --pruvocatlvequestlons
about these events, HOW CAN SYSOPS PROTECT THEMSELVES?; A GUiDE TO VMS ,how to use DEC's VAX operatlnQ system, THE
INFINITY TRANSMIITER--·an ole bug explained; REACHING OUT ON YOUR OWN-blue boXing verification, PURSUIT FOR PEOPLE-GTE
Telenet s computer to computer !lnk.,up serVice, FLASH phone-In registration. BOO word numbers, war game addICt, hacker extortionISt.
2600 INFORMATION BUREAU-- Telenet directory 01 Interesting addresses, SYSTEMATICALLY SPEAKING Dick Tracy toys, computer
directory aSSistance, Bell propag.mda films. Europe standardIZIng telcoms, MANY FAMiliAR TONES, AND THEY CALL US CROOKS] - ,story
of a phone phreak who can't sei' hiS expertise, AN INTERESTING DIVERSION------call dlverters and how they are abused. MORE INFO ON
VMS -second IOstallment of an �n·depth gUide to VMS, FLASH ,---computer electIons, big phone bill, Navy phreaks, phone booth captures
man, U:: TIERS' BBS suggestIon, ':01 leges are a goldmlne, recommended reading; 26CXJ INFORMATION BUREAU---8lue Box plans, THE NEW
AT&T HOSTAGE PHONE--unbeLlevable ad, SYSTEMATICALLY SPEAKING hackers scare bUSinesses. DuPont bypasses telco, computer
campaign Info, phone compute.s, divestiture woes, RSTS A TRICK OR rwo --some aspects of thiS operating system, THE SECRET
REVEALED-the problem with GTE's GTD#S SWItch, HISTORY OF ESS, EQUAL ACCESS MAY NOT BE HEQUAL TO MODEMS-some
problems that may anse, FLASH, columnist attacks AT&T, feds dial-It too much, little town phones, Spnngsteen mania, LEITERS some
advice, CIC's and free calls, British phreak, blue boXing gone?; CHASE BANK is CRACKED; 2600 INFORMATION BUREAU - many Interesting
test numbers; SYSTEMATICALLY SPEAKING' aVOId phones In storms, rural unequal access, police cellular phones, toll-free from wherel,
AT&T to read e-mail; OUR WISHES FOR '86 AND BEYOND-some of what we'd lIke to see In the future; FUN WITH COSMOS --how to
mterpret and use parts of the phone company computers; FLASH French phones, racist banter. Cltyphone; SURVEY-reader survey
responses, 2600 INFORMATION BUREAU-BBS numbers, SYSTEMATICALLY SPEAKING AT&T e-mail. German phones, super pay phone
STAFFBOX
Editor-In-Chief
Emmanuel Goldstein
26()() (/.).) \ (}7.JY-385I ) /\ I,uhl",/rct/ (1IIlJr/t'rll Iq- _lfd}(j rllf/',/lrhG /fI( . ;-' ')fI(!lIg" I aui' ..')"(,lauAt'l. \ r 1/733
) ( ' ( 01/£1 du\\ I)()\/agl' /wrIJ1I1/Jt'/Idlllg lif .)('t(lliACI. \ {'II } urI..
encrypted . Not easily intercepted by private need more than a few C i rcuits at once . Can be .:
ind i vidua l s . relatively eas i l y i ntercepted by a wide band �
scanner connected to a very stable block down .:::
,"'pring /988 2600 .\lagazine Page:;
monitoring phone calls
� converter. Easy for private individuals to either a satellite transponder carrying an FM
� .
� Intercept. FDM-SSB signal (this may involve restricting
i 6. FDMA-PCM. otbIrwiu known II SCPC-PCM or the I F bandwidth with a filter as some
·2 SPADE- transponders carry more than one FDM-FM
� This technique is the international standard signal), or pointing the antenna at a nearby
:' Intelsat method of establishing telephone terrestrial microwave transmitter and tuning the
§ connections between places that don't have receiver for maximum signal.
� enough been tuned in,
�
traffic to warrant permanently assigned Once the FDM-FM signal has
FDM trunks. Each direction of each telephone the single sideband receiver can be used to
.s call is assigned a channel by the central control search the baseband (typically .3 Mhz to 6 or 8
� station. Stations transmit a PSK keyed carrier on Mhz) for telephone conversations, data
� that channel for the duration of the call. Each transmissions, and other private line circuits.
carrier contains one 8 Khz sampled PGM Individual channels will appear as USB or LSB
bitstream along with some error correction and signals at precise 4 Khz intervals. In fact, the
synchronizing bits. As far as I know encryption is whole baseband is organized into 1 2 channel
not used. The signal can be intercepted by a groups, 60 channel supergroups, and 600
sophisticated individual but intercepting it channel mastergroups according to a standard
requires a rather large dish as the effective frequency plan (the AT&T plan as usual is
radiated power per carrier is very much less than d i f f e r e n t f r o m t h e GGIlT o n e u s e d
domsat SGPC carriers use. A few domestic intemationally).
satcom SGPC users use PCM. probably with
some form of encryption. Hard for a private "Nothing in the Electronic
individual to intercept.
7. FM-FDM-FM (SUllClrrllrl on Video t.IIJ. Communications Privacy
As most TVRO owners discover. many of the Act of 1986 requires carriers
video feeds contain additional subcarriers that
carry unrelated or tangentially related material.
to increase the security of
I ncluded among these are cue and coordination radio or satellite links. "
channels that may occasionally carry telephone
like conversations. There are no regular Most channels have completely suppressed
telephone circuits on video subcarriers however. carriers, although certain channels will seem to
These subcarriers are trivially easy to intercept have a carrier in them (but slightly off frequency)
as m o s t TV R O ' s h a v e t u n a b l e a u d i o which is something called a pilot tone, used to
demodulation. monitor circuit continuity and control overall
On FM·FDM·SSB gain. Depending on how archaic the telephone
All it takes to recover FM-FDM-SSB signals is trunk equipment is on a particular trunk. it may
a suitable wideband FM receiver connected to a have a 2600 hz SF signalling tone in it when it is
stable general coverage SSB receiver that tunes idle which is dropped when the channel is in use
the frequency range used for the baseband . for a call. Trunks which use SF signalling also
TVRO receivers have the correct bandwidth for often use MFKP (multi-frequency key-pulsing-
many such signals and often incorporate the famous blue box version of tone dialing) to
provisions for I F filters that can be used to better pass telephone numbers on to the destination
adapt the receiver to the narrow band signals switch. More modem trunks use GGIS (common
found on some transponders. And modem general control interoffice signalling) which is a packet
coverage SSB receivers and transceiver receiver network replacement for the earlier and less
sections with synthesized tuning, digital secure in band signalling that uses separate
frequency display, and narrow IF filters are well signalling channels to carry all the signalling for
suited to recovering the audio on a particular all the trunks in a trunk route.
channel. Obviously, a single signal usually carries only
Listening to FM-FDM-SSB signals can be. half a telephone conversation so it is necessary
accomplished by tuning the TVRO receiver to to use two receivers and TVRO's to pick up both
g roups rather than contai ning all the trunks from , subSCribers , the requi red expert ise is orders of -
for example, Chicago to West Bend . '"'
:::
magnitude greater than that requi red to i ntercept
On PSK TOM FM - F M D - S S B S i g n a l s a n d the equ i pm e n t __
The most secure techn ique In cornmerc lal
servi ce , and probabl y the tech n i que that w i l l
req u i red IS specialized and not widely avai lable
( Decoders for TDM -PCM b it streams could be
�
�
We're happy to announce our affiliation the producers of this program looked at
with another computer bulletin board the positive aspects-the adventure,
system, our third to dIlte. It's located in imagination, and intelligence involved. It
Columbus, .'Vebraska and can be reached wasn't just that they gave hackers a
24 hours a dIly at 402-564-45/S. We positive image-they used their brains
expect to have more 2600 bulletin and created a different way of viewing a
boards on line by the sununer. topic. That's something we can all use a
We've also been getting a lot of bit more of. Our thanks to John Urake
positive press response in the past couple for making this possible.
of months, including a spot on a most It's possible the press is finally
incredible television program, .'Vetwork 7 growing up and realizing that hacking
on England's Cham;eI4. This program involves so much more than electronic
ought to be seen by every reporter in this bandits. It's a symbol of our times and
country who wants to do a story on one of the hopel' of the future. If that
computer hacking. Instead of looking at sounds crazy to you, wander through
the "problem" of hackers and what they our pages and it may start to make
could be doing to you in the same way sense.
we've seen hundrem of times already,
opportunity to f i l l in some of the gaps and give system that is tai lored to ,un very wel l under V M .
260as readers a more complete picture of V M . • Other operating systems that are of ten run
• The other genera l class of V M system i s telminal . These are 3270 d i sp lay (C RT, v ideo)
fairly large , run n i ng o n a C P U such a s a 3081 o r t e rm i n a l s (Ill m a n y f l a v o rs) , 274 1 /3767
3090. These systems are often modified , bo t h to (typewri ter-like terminals), and ASC I I term inals
prov ide function and security Some of these such as the I BM 3101, m's , and ASC I I C RT's
mods are described bel ow . Many of these mods (such as the VT-100) in l i lle mode . A PC that
are passed around at conferences , workshops, or emu lates one of these can also be used . To
by a conferencing (BBS) system (wh ich w i l l support A SC I I C RT's in f u l l screen, a protocol
remain nameless) converter is needed . Both hardware and software
• The VM system lends itself to mod i f icat ion versions of protoco l converters are avai l ab l e .
because most of the source code is distributed These make the ASC I I C RT look to the V M
with it For a long t i me , I BM treated VM as an system a s if i t were a 3270 terminal . Various
orphan stepchild and tried to bury it The users escape sequences are used to simu late 3270
wou ldn't let them , and I BM finally recognized it functions that the ASC I I C RT may not have .
as a going system VM has now passed through To cover Lex Luthor's article point by point
e l e v e n r e l eases , and the t we l f t h has been (When I refer to commands , I w i l l use the I BM
announced . s t a n d a rd n a m e s S o m e i n s t a l l a t i o n s have --
.
• VM (or C P , the two terms are often used mod i f ied these names . ) "
i n terchangeably) is not an "operating system" in • While it was late in corning , VM has had �.
the usual sense of the term . You can't run "Jobs" o n l i ne help for some t i me . I t's slow , it's c l umsy , �
( p rocesses) under it Rather, you run operat ing but i t's there . Enter " H E L P H E L P" to get started . �
systems under i t and each user runs an opera t i ng • Whi l e the system i s somewhat �
system . Each logged on user gets a "virtual cumbersome , that's mainly because of the wea l th �
machine" to run his operating system in. Each of funct ions ava i l ab l e . I f you found it hard to :::
virtual machine has a C P U , memory (storage), l earn, then either you d idn't have the manuals is
d i sk s , tapes , and unit record ( card or printer) that are needed , or you had a poor teacher (or !
!-'pring 1988 2600 Magazine Page 9
VM/CMS CORRECTIONS
;; both). VM/CMS is just too big to pick up on your as well as show other information.
� own without some guidance. • Some VM security packages use a
=:- • I won't comment on the acronym list except password up to 24 characters long. (More on
.S";:
co to say that it only scratches the surtace.
• The "." prompt is only seen logging on via
them later.)
• Lex is correct that the only currently used
� an ASCII terminal, and is a "go ahead" signal. IBM logon qualifier is "NOIPL", but others such
� Most other terminals supported by VM can have as terminal type or altering the virtual storage
E; their keyboards locked by VM It can be tumed size are common mods. An obsolete qualifier of
� off, and a common modification is to replace it, "MASK" used to be used to tell VM to type a
§ sometimes with a "bell" character. mask (overprinted lines of ".", "H", and "S " ) so
� • The "VM/370 ONLINE" prompt (followed that when you typed your password over the
� by the list of acceptable commands in newer mask, it could not be read. MASK is now the
versions of V M ) is the only IB M-supplied default, and will be ignored if entered. Most
connection prompt. It is often replaced by the larger installations use the password suppression
system or company name. The other connection option.
responses Lex mentions are from front end • A common mod is that if an invalid userid is
processors or networks, and precede the actual entered, prompt for the password anyway, and
connection to the VM system. then reject the attempt no matter what password
• While some other IBM systems do require is entered.
it, it is not correct that userids (or passwords or • Messages waming of exceeding the invalid
even commands) in VM ICMS have to start with a password threshold are sent to the system
letter. An all numeric userid or password is valid o p e r a t o r a n d /o r t h e s y s t e m s e c u r i t y
(but not commonly used). and the "national" administrator. I t i s also recorded In the system's
characters " $ ", "@", and "#" can also be used. joumal (accounting) file.
Certain characters are used as editing • The reason that "BONEHEAD" (to use Lex's
characters. A pound siqn ("#") is a logical line example) is "not valid before logon" is that
end. It can be used to separate multiple because of the extensibility of VM/CMS,
commands or data lines entered at one time on BONEHEAD could very possibly be a valid
one terminal line. An at sign ("@") is a character command, either local to one user, a group of
delete character. One Oimore at signs will delete users, or systemwide.
the same number of previously entered • In a large system, it will be very unlikely to
characters, perhaps saving the retYPing of a long find any passwords that are the same as the
line. For example, if "aaa@@bc" is entered, it userid, or are still at the IBM-supplied defaults.
would be interpreted as "abc". For total foul-ups, Many security packages force a user to change
the cent sign will tell VM to ignore everything to his password at regular intervals.
the left of it so you can start again For ASCII • Just because you see a userid, don't make
terminals that don't have a cent sign, the VM any assumptions about what it does. For
system uses the left square bracket instead. And example, a large American university has a userid
what do you do if you want to enter one of these up and running which is the name of the security
characters as data? That's where the fourth one package they use. It's a dummy, and the security
comes into play. If any of them is preceded by a package actually runs under a very innocent
double quote, the character pair will be treated as userid.
a single data character; I.e. "# will be treated as a • The DIAL command is used when the
pound sign without being used as an editing operating system running in a virtual machine is a
character. All of these can be changed to multi-user system such as TSO, CICS, ICCF,
whatever character (not A-Z or 0-9) you wish or another copy of VM, etc. DIAL establishes a
they can be tumed off. The character-delete is connection between a real terminal, and a virtual
often set to a backspace character if the terminal port defined for the multi-user system Security
has that key (most IBM typewriter terminals in this case is the responsibility of the multi-user
don't). The "QUERY TERMINAL" command will system, except that an available mod requires a
display the current settings of these characters password to do a DIAL. Other available mods
«Olll Illucd Oil /JiI!{C / l)
Page 1 0 2600 Magazine Spring / 988
BELL ATLANTIC CUSTOMERS RECENTLY RECEIVED THIS BLURB ON A
PLASTIC BAG CONTAINING THEIR NEW YELLOW PAGES. WE'RE GLAD
SOMEONE'S FINALLY REALIZED THE DANGERS THAT YELLOW PAGES
CAN POSE TO KIDS.
::- will bring the security administrator down on you of USERS and NET will be the number of users in
§ in many systems. In
� .
most VM systems, the the first and last parts respectively of the QUERY
;; operator could not give you the password, as he NAMES list. The DIALED number is the number
� has no access to the directory. In many larger of users connected to multi-user systems.
§ systems, the OPERATOR id (which doesn't have • One type of multi-user system you could
§ to be called OPERATOR) is disconnected and is DIAL to is called a "session manager". This
.::: running a program called PROP (PRograrrmed allows you to create several "Logical Terminals"
OPerator). PROP will respond to routine and log each one onto a different userid (or DIAL
messages, and route others to "logical operators" to a different system). These logical terminals
such as disk operator, tape operator, or security will show in a QUERY NAMES list as " Lxxx "
admin. where xxx is a three-digit hex number which can
• On the monitoring and recording of invalid range from 000 to FFF. For logical terminals, the
and privileged commands, this is available as program accepts the data that is to be displayed
part of standard VM. Because the VM monitor on the teonlnal, and simulates entering data on
function has high overhead, it is (usually) not the keyboard. In many systems, creation of a
done on a regular basis, but is tumed on for logical device is made a privileged function to
sample periods or when a problem is suspected reduce the likelihood of a hacker making a "trojan
There are mods and packages available which horse". The session manager allows you to
will record all valid and invalid command usage SWitch between your various sessions, with the
and the resources that the command consumes active one showing on the real terminal. Session
with minimal overhead managers are usually used with video terminals
• The QUERY NAM!':S command could (on a (CRTs).
large system) show several hundred logged on
users. An available mod limits it to users in the "Whi l e t he system is
same group as yours, either by using the account
somewh a t cumbersome,
code or a portion of the userid. The order shown
has no connection with the order that users thats mainly hecause qlthe
logged on. It is simply following an intemal
�1' e a II h of fu n c ti OilS
chained list of all users, and it stops when it gets
back to you. This list has three parts. Above the availahle. "
"VSM-...... " line, users are logged in with
locally attached (or in some cases, TYMNET or • A disconnected user (shown on a QUERY
its ilk) terminals. The tnree-digit (four in some NAMES as HDSC") can remain logged on
larger systems) hex number following the userid indefinitely. It will only be logged off by the
is the hex hardware address of the terminal. If system after 1 5 minutes (modifiable) if it tries to
your userid is shown in this section, your userid read from the terminal it doesn't h�ve. DSC users
will be the last one in the list. The "VSM-. " are usually service machines such as security,
line identifies the "VTAM SERVICE MACHINE". accounting, utility, database, and other
This is the link into an IBM SNA (System functions. Some large systems have 50 to 1 00 of
Network Architecture) network Users listed them running
below there are connected to VM through a • "Userid NETLOG" is located on your logon,
V T A M network wh ich could span many and contains information on files that you SEND
processors and many m:les. The name following to others, and that you RECEIVE from others. It
the userid is the LU (Logical Unit) name of the is logged when you receive the file. not when
terminal, which is used as a network address. they send it to you The "USERID" In the name
These two portions of the list will be absent if the will be your userid, not the userid you sent the file
VM system is not connected to an SNA network. to.
The last portion will be missing if the system is
2 . Search for a f i le w l l h fi letype of E X EC 011 only seven o f which are u sed in star;,j ard I BM
any currently accessed disk . C M S uses the code ) by exam i n l llg real storage I fl the C P U I t
'standard search order" ( f i lemodes A- Z ) The t akes class C o r E t o exam l fle rea l storage V M Ifl
table of acl i ve ( open ) f i les IS searched f i rst . An concert W i th various security 01 mOil i lonng
open f i le may be used ahead of a f i le that reSides packages can record cMlmand usage , bo th failed
on a disk earl ier in the search order . and successfu l . I n V M proper, t h i S mon itor
3. Search for a valid synonym ( system and funct ion I S h i gh overhead and i s ( usua l l y ) used
user supplied synonym l ists ) for a storage only for sample intervals or when a problem is
resident EXEC . suspected . O ther packages are avai lable that
4 . Search for a valid synonym for a d i sk w o u l d m o n i t o r c o m m a n d s w i t h m i n i m a l
:::'
resident EXEC . overhead
5 . Search for a nucleus extension command . • In the Q SEARCH output , the 1 9 E ( Y ) d i sk
These are storage resident commands that can is usua l l y used to stare any commands that are
replace or front end standard or user commands, local to t h i S system . The 1 90 ( S ) disk IS usua l l y -
or can be unrelated to standard commands and t he I BM supp l ied code The Y / S means that If a _
j ust kept residents to reduce overhead of load ing request to get something from the S d i sk is
them mu l t iple t imes . Some commands make issued , and I t IS not there , the Y disk will be ::::
themselves into nucleus extensions the f i rst t ime searched as an extension of the S d i sk . The �
they are cal led so that subsequent ca l l s w i l l have vol ume name (also known as the vol i d or volser) �
lower overhead .
.�pring 1988 2600 ,1 1agazine Page 13
VM/CMS CORRECTIONS
� i s not processed b y C M S . contains one o r more system data areas ) , and the
curren t l y l ogged on users have 44 m inidis ks on
� • The l i lemode letter is the same as the d isk
:; the l i le resi des on is accessed as . II you release this pack . ThiS can be 4 4 users a l l with the same
.� ( logical detach ) a disk and access it as a different m i n i d l s k , 44 d i f f e re n t m r n i d l s k s , or some
f letter, L l ST F I L E w i l l then show the same f i les comb i nation . SYSWK1 I S on 1 54 , has no system
::- with the new letter . I f you add the option data areas , and at the moment is i n use by one
� "LABEL" to the L l STF I L E , a lot more inlonnatlon user w i th one m l n i d i sk . Real address 249 is
:; lor each I i le w i l l be shown . This includes the l i le attached ( ded icated ) to user VS E I P O as his
� size , record lonnat ( 1 l xed or variable ) , record V i rtual address 246
§ length , last updated date- t ime , etc • There IS noth i ng In t h e D I R M A I N T package
§ • In the l ist 01 l i letypes , there are some that requi res its userid to be D I R M A I N T . It of ten
� erro rs . System help f l ies have a l i letype 01 I S because that is the defau l t name unless the
" H E L Pxxxx " where ")()()()(" IS a subpart 01 the sysprog changes II durrng installation The D I RM
system such as "C M S " , "C P" , " R EXX" , etc . L I N K command can only be done I f you know the
These help I i l es are ( usua l l y ) lound on the 1 9D password for the l i nk mode you are ask ing for.
d i sk . U nder the LAN G U A G E S item, programs nle d i sk 's owner I S n o t i f i ed when you get a l ink in
wri tten in rexx wou ld nonnal l y have a f i letype of t h i S way Many D I RM A I N T commands can be
EX EC . L I ST I N G I i les can contain anyth ing . Their l o c a l l y d i sabled as an option dUring installat ion
dist inguishing characteristic is that they usua l l y Enter D I RM 7 for a l ist 01 commands, or D I RM ?
con tain printer carnage control characters a s t h e command for deta i l s on a g i ven command
l i rst byte 01 each l i ne . M O D U L E l i les can be any • The system d i rectory can have any name
executable program , system or local . TEXT IS but usua l l y has a f l l et ype of D I R EC T . Another
usual ly used for compi ler output . X E D I T is the common nanle IS V M U S E R S . Where Lex shows a
f i letype used for X E C iT ( the system edi tor) "tYPical" en try in U S E R D I R ECT , Ignore the l ines
macros , which are usua l l y writ ten I n rexx or start i ng W i th V M U 0 1 These are sequence
exec 2 . The ed i tor can create a l i le of any f i letype numbers In columns 73-80 01 the f i le which have
Lex's deSCription 01 the f i lemode numbers IS been broken I I1to 2 l i n es for some reason . Most
essen t i a l l y correc t . There are many ways to l ikely you or t ile system has defau lted the l i ne
break the f i l emode zero security so I t should not len g t h of the term i nal to 72 . The two storage
be rel ied upon . sizes ( 1 M and 3M ) are the defau l t size and the
• Re Passwords The "PASS=" keyword is maximum you can ask for (With the D E F ine
op t io n a l . If used , be sure to put a space after I t . ( I STO Rage command ) The I P L staternellt says
am not sure i l that was a typo o r a Lex error ) to automatically I P L ( I n i t ial P rog ram Load ) the
There IS no VM restric t I On to using the same systerll ilamed C M S at logon . The C O N S O L E l i ne
password lor login and d i sk s , and a l l three disk def ines that the user's logon tellll inal IS to look
passwords can be t he same Some security l i ke a 32 1 5 ( I BM typewrr ter tellll inal ) at address
systems fomid thiS, and I t I S not a good Idea in OOD 009 or 01 F are more common l y used
any case conso le add resses . The three S P O O L staternen ts
• Re the Q DA S D command shown . I I you def ine the V i rtual card reader, card punch , and
have gotten onto a privi leged I d , this W i l l show l i ne printer ava i l able to t h i S user The three L I N K
the real dasd that the ell t l re system has . In this statemen ts get access t o the C M S systenl d isks
case , a "Q V i rtual DAS D request Will show your
" In conc l USion , I hope that I have been able t o
own d i sk s . In the d i splay as shown , "SYSRES" is correct most of the errors and misconcep t ions
the volser of t he real disk that these mlnldlsks are that Lex has g i ven you . As he d i d , I have om i t ted
a part of A part ial listing of the real d i sks might several t h i ngs that wou ld be dangerous for a
look l i ke thiS hacker to k,lOW abou t V M Internals There were a
DASD 1 30 CP OWNED VM I PO E 0044 lot of holes In a V M / C M S SYSterll but most of
DASD 154 CP SYSTEM SYSW K I 000 1 these have been plugged by I B M or users I hope
DASD 249 ATTACH TO VSEIPO 246 that both Lex's art ic les and m i ne have been of
What t h i S l ist i n g shows IS that VM I PO E on Interest to the readersh i p of 2600
rea l address 1 30 , IS "OWN ED by C P ( I . e . , I t
T H E S E A R E W E A T H E R T R A K C O D E S . W H E N D I A LI N G T H E
W E A T H E R T R A K S E R V I C E , S I M P L Y E N T E R O N E O F T H ES E TO R E C E I V E
T H E F O R ECAST F O R T H A T P A R T O F T H E W O R L D . W E U N D ERSTA N D
TH E R E A R E SO M E H I D D EN C O D E S A S W E L L. T H E N E W Y O R K ACCESS
N U M B E R I S ( 2 1 2) 355- 1 2 1 2 . TO F I N D OUT THE N U M B E R N EA R EST Y O U ,
C A L L 800-247-3282 O R ( 2 1 4 ) 556- 1 1 22 .
hackers . One such incident took place in Los done that include the place o f employmen t , the
A n g e l e s , w i t h p h o n e p h reaks and h ac k e r s phone number and the owner of that number ,
a t t a c k i n g t h e B e l l S y " t em m a s t e r c o n t ro l driver's l icen se , h ea l t h records , and the l i ke.
computers and trying t o t 'J m off all the phones in Other security checks require that a prospec t i ve
the c i ty w i t h the except ion of the emergency user be recommended by another user to gain
circu i t s . This attack was for the most part access . and then the new user is granted a lower
successfu l resul t ing in tM l oss of phone service status than most users unt i l he proves his worth
for thousands, but not complete in its goal . i n t he hacker worl d . The chance o f a law
But this writer's opin ion about t he attack is enfo rc ement person gaining access is thereby
that it was very successful showing the abi l i ty of greatly reduced . O t her aspects of the sec u r i t y of
certain persons who were able to shut down some the boards is t h a t some of them have a c lause at
of the phone servi ce in the city. If such act ions the sign-on that states that t he board is not
can be performed by persons who do not have responsible for the infonnat ion posted and that
inside i nfonnation or access to the fac i l i t ies . then any infonnat ion placed on the board is for
i t is a very real s i t uation . Such attacks can be i nfonnational purposes on ly and that the person
Nickel
F I GCRE 2
_ D ime
_ -i - i -� 1 i ��ti
�- - i�
- ±j hlLt L � Ll�
F I Gu R E )
Quar t e r
· ; l lIUU l l
-+---- -}
o I S e c on d
T H E S E O S C I L LO S C O P E R E A DI N G S C A M E F R O :\'! T H E :\ E W J E R S E Y B E L L
I N \' E S T I G A T I O N O F T H E P R I \' A T E S E C T O R 2 6 0 0 B l " I . L E T I N B O A R D
S Y S T E M B A C K I I'i 1 98 5 . T H E Y A R E M E A N T T O P R O V E T H A T O l R S Y S T E \1
O P E R A T O R I N T E N D E D TO D E F R A t : D T H E P H O N E C O \1 P A :\ Y B Y l S l :'II G
H I S C O M P l ' T E R TO I M IT A T E T H E so n · i D O F «W ' i S D l W P P I N G I N TO A
PAYPHON E. THEY DON T EXPLAIN HOW H E WOl U) H A V E DRAGGED
H I S N O N - P O R T A B L E C O M P l - n: R O l T S ID E T O A P A Y P H O N E T O
A C C O .\1 P Ll S H T H I S . B l - T T H E Y D O S A Y L O T S O F O T H E R I N T R I G U N G
T H I N G S A N D W E 'V E R E P R O Dl T E D O :\ E O F T H E L ET T E R S F R O M T H E S E
T E C H N O L O G I C A L G E N I l- S E S F O R Y O l; R E N J O Y M E N T O N T H E
FOLLOW I N G TWO PAGES.
Bell
Communicat ions
Research
-
T e l e phone N e twork S e c u r i t y
E l e c t ro n i c To l l F r a u d Blue
E � a m l na t i on o f E v i d e n c e
Fl l e-2
Hr. R. K. P a p rc ka
S e c u r i t y R e p r e s e n t a t i ve
N o ., J e r s o y B e U
5 5 0 B road S t ree t
5 t h F l oor
N e ., a r k , NJ 07101
Of
Dear Mr. P a p r cka :
The m a rk " l�'! P 7 / 2 2 " alsp appe a r ed on t he label and at the t ime of my
. � . m i n a t 1 o n I a d d e d my m a rk " B CR-Wl-TH 7 / 2 4 / 8 5 . "
-
t he p r o g ram is to produce a va r i e t y of tones u s e d" i n the t e l ephone system,
i nc l u d l n� of a T ou c h T o neR t runk
-o f
the 9 i gn a l s dial, the 2 6 00 H z idle s ignal
and the tones of the 2 o ut 6 m u l t i f r e q ue n c y k e y p u l s i ng ( MT K P ) code used in
the l o ng d i £ t a n c: e t e l ephone n e t 'Jo r k and the coin depos i t S i g na l s prod uced by
coin t e l e p hone sets wh e n coins are depo s i t ed . A t one g e ne ra t o r p roduc ing
2 6 0 0H z and the lIF K P aignals r e p r e s e n t i ng the ten digits snd the cont rol
s i g na l s KP aod ST can be used to re d i re c t l ong d i s t ance calls to neu
d e s t i n a t i !') n s 8 c OM1l o n l y
-
wh i l e b y p a s s i ng b i l l i ng e q u i p ment . S uc h g e ne ra t o r is
ca l l ed a " bl ue bo x . A Signal generator tha t simul ates coin depos i t dgnah
i. c a l led a " r e d hox . -
Pa t r o lman ::; r e n n l e r loaded the p rog ram "The Ca t ' s H � o W' : " f r om t he 5 1/4 inch
f l e x i bl e t:3 1 s v:' Into t he c O:::J. p u t � r and pres sed the let ter D on the key�oard to
select the dial f ea t ure of t he program. P rog r e ss of t �. e p r o g r a Cl was o bs e r ve d
on t he monl toi screen� The aud i o output was fed to 8 1 g na � a n a l Y l l ng eq u I pment
"h l c h I nc l u d e d a IH l c o m '1 o d e l T l aG Tone S l g na U ng FFT Ana ' vze r erd a Gould
Dig i tal S t orage Osc i l loscope , Hod e l 05 4 0 2 0 used wi t h • Gould B rus h 220
Rec o rde r .
N e Jlt t , P a t r o l !:l a n G renn i e r pres ged the let ter M to put t he dia ler Into t he
mul t i f requency mode and then entered the s e q ue nc e 1 t h r o ug h 0, f o l l ow e d by K,
5, a nd �. Ta bl e V s h o lJ' s t he a na l y ze r output wh i c h ident ifies the s i g na l s as
the HF KP t r u n k s i g n a l l i ng c o d e .
The f l.�ibl. d i sk y o u b r o u g h t i. re t u rn e d to y o u h e r e w i t h .
'l a l t e r H . H e i n z e
M e� b e r o f T e c h n i c a l S t a f f
!l V C - Jl C R 2 3 1 3 1 -III :H - l j Ne t " o r k S e c u r i t y
At t s .
S w o r n S t a t ement
F igure. 1 t h r ou h g
T a bl e s I t h r ough V I r
'.
la unching program and you 're asking I ', • • '\ " ' • 1 " " . : • • •• 1" , 1 1 1'0 . m . " • • ..,, ,,, 1 " y J • • : 1 . ' _ T , • • •
:
' ., " "'" '
: :: : :�. . ' : :: ." :':: :: : :::: ':" '. , I "� : .:,,' l'� ( :«.t lar" Pn ,-k l I- ' -l I "' l I l " r
.' � - . . . . . . . ' . ,.
us if WE k n o w an ything about these
' . . .. ' . " " ""
s ys tems? Either this is an incredible " .: � � '�::,f ·, \ � · '·�· ',:,';,,!, :':t,r ; �1: ' ;:;1 I t ) l" F i n ' I )" I un-I I I i t ' i l I
,',"
2 600
.
t-o . . .
!.� :�:: :�'r::' : �l:: :�I ;�:.', �.�: '��;:: ;=.: : :'::':J�'� �:;
'" '"
�;�;l'"�;,\�tl�
;"��� ���lf�("�i" !"i
On the off chance that what you 're
s a y in g is t r u e , y o u ' r e b e t t e r o f f
sh o wing us what these s ystems can do
rather than waiting until it 's too la te or
telling the wrong person. A nonymity
.hn "" n """ " " � ... . ... ,.In .. .1 lI"'" t., ... >o1
guaranteed.
-
t
F o r i f we really w i s h to l e a r n a nd f i n a l l y
You will be 9''''''' two spectal accesa
c o n tr o l , we n e e d c o m m o n p l a c e s , numbers. One you WIll keep, the other
you will gIve to your fellow con_
3.
!
where w e c a n g o t o d raw o n a nd t h e n AI the meebng hme. """")Orl8 calls their
speoal access number and IS automal
expa nd o u r know l edg e .
·
Attention Readers!
2600 i s a l ways l ook i n g for i n fo r m a t i o n t h a t we c a n pass on
to you . Whether i t i s a n a rt i c l e . data. o r a n i nte rest i n g news
item-if you h a ve somet h i ng to offer, send it to u s !
Remember, much o f 2 600
is written by YOU, our readers.
NOlE: WE WILl. ONLY PRINT A BY·UNE IF SPEClFlCAIl..Y REGUESTED.
C a l l o u r off ice or B B S ' s to a r r a n g e a n u p l o a d . Send U S m a i l to
2600 E d itorial Dept .
Box 9 9
M id d l e I s l a n d , N Y 1 1 9 5 3 - 00 9 9
( 5 1 6 ) 7 5 1 - 2 600
�
r
IT' :>
�
(j) :A
m m
:u
m 0
-< I
c
:u m
z :;0 ""0 ;;\1 0
-< o. n JJ
I
:A ()
n H
(fJ :t o lJ ()
"T1 m. n > 0
0 \J"! 0 -< JJ
:u >
.... Ct1 ';O "D
� (J) 0
::E m a ""O JJ
r
=i :;o x o :t> }-
.. .;0
m ) -<
(5
I
" N> --I
G
�
-<
1: 0 ....
m .t'" H
Q c
z
z
� -< c'
m £00
Z W
z .... 2 W
-< 0
-<
-< �
0 0 m
m :;0 -<
Z � JJ
(fJ 0
c "D
:u }-
m .... JJ
" .t'" �
:u 0'
0
" 0 JJ
m N
:u
()
g
I
:u m
m o
0 N �
r
�
m
-1 ...... r
N ;u
o
0' :t> z
...... -< m
C»
m
�
C» -<
o
JJ
�
t h e l im e s o m e t h ing g u e s p i c k i ng u p t h e re c e i v e r a no p u n c h
i n g i n t h e ri n g i n g l i n e b u tt o n . T h a t
lin£'. .. t i o n t ra d it i o n a l , way of do i n g
t h i ng s . W h y t h e R O L M p eo p l e
c h o s e t o a b a n d o n t h i s si m p l e w a y
a vo i ce m e s s ag e s y st e m that is o f a n s w e ri n g t h e p h o ne I S co m
fai rly flexible, but not a t ru e pletely beyond u s A s off ic e w o r k
re p l ace m e nt for one's ow n e rs a n d p r of e s so rs t h r o u g h o u t t h e
a n s w e ri n g m ac h i n e . M e s s a g e s d o c a m p u s h av e f o u n d o u t , p i c k i n g u p
g e t l o s t , m a i l bo x e s get f u l l m u c h t h e p h o n e t h e " o l d " way w i l l i m m e
f a s t e r t h a n a n sw e r i n g m a c h i n e di ate l y disco n n ect t h e c a l l e r .
t a p e s , th e system i s easy t o break It IS true t h at t h e u ni versity
i n t o m a i n l y d u e to t h r e e - d i g i t
d e f a u l t p a s s w o rd s a n d t h e f a c t (continued o n next page)
c a l l s . N o d at a co m m u n i c at i o n s s y st e m b y d i scou ra g i n g u s e r p ro
( re m e m b e r , e v e ryt h i n g h a s t o g o g r a m m i ng .
t h ro u g h t h e m o d e m p o o l ) . N o T h e most u s e f u l f e at u re o n t h e
i n t e rco m s ( t h e p h o n e s y s t e m now s y s t e m i s t h e R e p e rt o ry D i a l i n g
i nco rpo r a t e s these, too) . No butto n . I t ' s l i k e a s pe e d d i a l butto n
a n sw e ri n g m ac h i n e s (t h a n k s t o e x c e pt i t c a n be p ro g ra m m e d t o
P h o n e m a i l ) . C o m p l e t e a n d tot a l i n c o r p o r a t e a l l k i nd s of o t h e r f e a
i nt e g rat i o n . C o m p l e t e a n d tot a l t u re s . I n o t h e r w o rd s , o n e " re p d i a l "
paralysi s . butto n c a n d u p l i c a t e a n y ot h e r f e a
R e c e n t l y , U n i v e rs i t y H o s p i t a l t u r e b u t t o n o r c o m b i n e s e v e ra l
h a d a s e ri o u s o u tag e . N o bo d y w a s f e at u re s , o r do s o m et h i ng e n ti re l y
a b l e to d i a l a n yt h i n g . Eve nt u a l l y , if d i f f e r e n t . A f ew of t h e s e butto n s
not a l re a d y , t h i s s y s t e m w i l l c l a i m wo u l d a l low f o r g re at f l e x i bi l i t y f o r
some live s . u s e rs B u t g e t t i n g m o re t h a n o n e
O cc a s i o n a l l y , i n t h e wo rds o f a o f t h e m i s co m p l e t e l y i m po s s i b l e .
R O L M switc h roo m e m p lo y e e , p r e A pot e n t i a l l y po s i t i ve a p p l i c at i o n i s
v e n t at i v e m a i n t e n a nc e re q u i r e s t h e re f o re t u r n e d i nto yet mo re f r u s
t h e p h o n e s y st e m t o co m e dow n . t rat i o n .
A n d t h at i s w h e re t h e e n g i n e e ri n g C a l l p i c k i n g i s a n o t h e r f e at u r e
a n d h u m a n p e rs p e c t i v e s o f t e l e t h at co u l d b e u s e f u l fo r s o m e I f a
p h o n e s co m e i nt o co nf l i ct . P h o n e p h o n e i s ri ng i n g a n d you ca n't get
s y st e m s c a n not b e t r e at e d a s i f t o i t , y o u s i m p l y h i t t h e "pick" but
t h e y w e r e l a rg e , m u l t i - u s e r co m ton and e n t e r t h e e xt e n s i o n t h at ' s
p u t e r s y st e m s t h a t o cc a s i o n a l l y ri ng i n g It w i l l t h e n m a g i c a l l y
c ra s h . P h o n e s a re d l f f e r e n t - - t h e y appe a r o n your l i n e The only
a re v i t a l a nd p e r s o n a l . p ro b l e m w i t h t h i s i s t h a t t h e re ' s n o
U se l e s s n e s s s t o p p i n g i t l As l o n g a s s o m e o n e
To t h i s d a y , t h e v ast m a j o r i t y o f k n o w s t h e n u m b e r o f a ri n g i n g
p h o n e u s e r s d o n o t u s e m o s t of e x t e n s i o n , t h e y c a n d i v e rt i t to t h e i r
t h e f e at u re s of the p h o n e s y st e m , l i n e . C a l l p i c k i ng ca n a l so b e u s e d
e i t h e r b e c a u s e t h e y h av e n o i d e a t o s n a t c h c a l l s t h a t a re o n h o l d ,
of how to u s e them o r becau s e a l t h o u g h t h a t " f e at u re " i s n ' t d o c u
t h e y h a v e n o d e s i re to . A s a re s u l t , m e nt e d . T h i s k i n d of a f e atu re
most o f t h e p h o n e s h a v e a t l e a st works f i n e i n o f f i c e s w h e re e v e r y
f o u r co m p l e te l y u se l e s s b u tt o n s o n one is presu mably wo rk i n g
t h e m . I f t h e u s e r w a n t s a d i ff e re nt towards t h e same goal . But o n a
co nf i g u rat i o n of butto n s i nco rpo ra t co l l e g e c a m p u s of more t h a n
i n g t h o s e f e a t u re s , t h at t h e y can 2 0 , 0 0 0 peo p l e , t h i s " k i d n a p " a b i lity
u s e , t h e y ' re t o ld t h at i t ' s " n ot po s s i i s I I I - co n s i d e re d a n d d a n g e ro u s
b l e " . T h a t ' s n o t w h at R O L M o r t h e A l t h o u g h i t h a s l o t s of u n u s e d
u ni v e rs i t y s a i d b e f o r e t h e s y s t e m po t e n t i a l , t h e fl O L M C B X I I 9 0 0 0
was i n st a l l e d . R O L M i t s e lf h a s i s , b y a n d l a rg e , p o o r l y d e s i g n e d
i n h i bi t e d t h e pot e nti a l o f i t s own f o r offi c e s A s i mp l e featu re l i k e
! , ( }I I I I I I I I . . d " l I l I i ' I I / ' ilge )
.�
� t u rn o n e l i n e off a n d l e ave a n ot h e r as c r u d e as a pri n t e d co p y of o u r
o n ! T h e o n l y w a y t o h av e acc e s s work cou l d h av e s a v e d us so
m u c h t ro u b l e . C ru d e b a c k u p s
m u st a l s o e x i st o n o u r new p h o n e
s y st e m s s o t h at w h e n t h e y d o
NOTE u n p r e d i ctab l e t h i n g s , w e ' l l be a b l e
t o g e t acc e s s to t h e b a s i c s , l i k e a n
O n c e Y O ll h a v e l i f t e d t h e receiver t o o u t s i d e d i a l to n e .
a n swe r a c a l l , do n o t press the l i n e but W h at ' s p a rt i c u l a r l y u n f o rt u n a t e
t o n D O i n g so W i l l d i s c o n n e c t t h e c a l l i n t h e St o n y B ro o kJ R O L M s c e n a r i o
-______________ i s t h e p a i r i n g of a h u g e co rpo rati o n
w i t h a huge b u r e a u c racy . A s i m p l e
h u m a n b e i ng i s no m a t c h f o r t h i s
t o a l l of t h e l i n e s i n you r office a n d u g ly combi nati o n . He is t h u s
h av e d i st i nctive ri n g i n g f o r e a c h i s pu s h ed a ro u nd a n d fo rc e d to a lt e r
to h av e a d i ff e r e n t i n s t ru m e nt fo r h i s w a y of d o i n g t h i n g s b e c a u s e
e ac h li n e . Tru ly b ri l l i a n t . t h at is t h e way it h as b e e n
Fo r t h o s e t h at h ave r e a l i z e d d e c r e e d . I n re a l i t y , h e s h o u l d b e
t h at R O L M d o e s n't p rovide a l l t h e t h e o n e ru n n i ng t h e s h o w .
a n swe rs a n d ca u s e s a good d e a l C l e a rl y , m o r e u s e r p a rt i c i p a t i o n
o f t h e p ro b l e m s , t h e u n i v e r s i t y i s e s s e n t i a l , bo t h i n t h e c h o o s i n g
ad m i n i st r at i o n b u re a u c ratica l l y for of a n i n s t i t u t i o n a l p h o n e s y s t e m
b i d s u s e rs f ro m i n st a l l i ng t h e i r own a nd i n i t s o p e rat i o n s . T h e s e s y s
s y st e ms o r even i n d i v i d u a l p h o n e t e ms m u st b e d e s i g n e d based o n
l i n e s . T h i s c r e at e s a n i n c o n v e co m m e nt s a n d s u g g e s t i o n s f ro m
n i e nc e - - a n d a d a n g e r . t h e o rd i n a ry u s e rs , not j u st t h o s e
A s w e s a i d e a r l i e r , w h at's h ap who u nd e rsta nd all the
p e n e d a t S t o n y B ro o k is h a ppe n c o m p ut e r/p h o n e j a rg o n . T h e c o r
i n g i n o t h e r p l a ce s . I t repre s e n t s po rat i o n s a n d t h e i n st i t u t i o n s h ave
s o m et h i ng sca ry a b o u t o u r e m e rg g o t t o st a rt l i st e n i n g and act i n g
i n g t e c h n o logy. W h i l e g reat t h i ng s swift l y to c o r rect m i s t a k e s a n d
are po s s i b l e , so are b i g probl e m s . i n adequate faci l it i e s .
A n d not h i n g w i l l l e ad t o d i s a s t e r Ot h e rwi s e , a n i n c re a s i ng n u m
q u i ck e r t h a n a n u n w i l l i n g n e ss t o b e r o f u s w i l l beco m e d i s c o n n e ct
prepare fo r t h o s e worst-case sce- ed a ltoget h e r .
Thank You ,
41l?�
George B
D,V,Sion of Consurner
Hanna
AHaI C s
000 Ra te Q u a l e System ( RO S ) ( 1 )
001-005 S pa r e ( 2 )
0 0 6 - 0 0 8 R e s e r ved ( 3 )
009 ROS
0 1 0 R e s e r ved
Oil I n t e r na t i o na l Or i g i na t i o n To l l Ce n t e r ( I O TC I ( 151
0 1 4 TWX S w i t c h i ng P l a n ( Ca n a d a ) (1)
015 -071 c pa r e
072 079 R e s e r ve d
DAD 081 S pa r e
082-087 R e s e r ved
088 S pa r e
089 R e se r ved
09 0 - 099 S pa r e
100 Plant Te s t - ba l a nc e t e r m i na t i on
101 Plant Te s t - test boa r d
1 0 2 P l a n t Te s t - M i l l i wa t t tone ( 1004 htz l
1 0 3 P lant Tes t - s i g na l i n g test t e r m i na t i o n
104 Plant Te s t 2 - wa y t r a n s m i s s i o n a n d no l s o tes t
105 Plant Tes t - A u t o ma t i c T r a n s m i s s i o n M e a s u r i n g S y s t e m/ R e m o t e O f f ice
Te s t L i ne ( R OT L )
1 0 6 P l a n t Tes t - CeSA l oop t r a n s m i s s i o n t e s t
107 Plant Te s t pa r me t e r gene r a t o r
108 Plant Tes t - C C S A l o o p e c h o s li p p o r t ma i n t e n a n c e
109 P lant Te s t - echo ca nc e l e r test l i ne
110- 119 O pe r a t o r C od e s
115 Ope r a t o r Leave Wo r d
116 I n wa r d D A
1 2 0 N e t wo r k E m e r g e n c y Ce n t e r (7)
121 I n wa r d Ope r a t o r (9 )
1 2 2 AT&T R ead y l i ne I N WATS ( 4 )
1 2 3 - 1 3 0 R e s e r ved
131 D i rectory Ass i s tance
J ) 2 -1 )7 R e s e r ve d
1)8 I DDD for Eq u a l Ac c e s s 17)
1 ) 9 - 1 4 0 R e s e r ved
1 4 1 Ra te and Route ( 10 )
1 4 2 1 4 7 R e s e r ved
148 P o i n t s n o t o n a n N P A - H e r mo s i l l o , Me x i c o (5)
1 4 9 P e s � r v e r1
I S O Ca b l e C o n t r o l ( Sate l l i te Av o i d a n c e j - H a wa i i (5)
151 I n t e r na t i o na l As s i s t a n c e
1 5 2 - 1 S 7 R e s e r ved
158 Ope r , t or As s i s ta nce for Equa l Ac c e s s (7)
160 I n t e r na t i o na l O pe r a t o r Ce n t e r ( l OC I (6)
1 6 1 T r u n k T r o u b l e R e p o r t i ng
1 62-167 Reser ved
1 6 8 P u i n t s n o t o n a n N P A - G r e nada
1 6 9 - 1 7 0 R e s e r ved
1 7 1 Po i n t s not on a n NPA- Mont e r e y . Me x i c o
172 Points not o n a n N P A � Dom i n i ca n R e pu b l i c , Pue r t o R i co , Vi rg i n
4 o r 5 d I g i t codes ( 8 )
1 1 �O / 1 1 50 1 Un i v e r s a l o r CO I n Ca l 1 bd c k
1 1 � 1 , 1 1 5 1 1 C o n f e r � ll c e O p e r a t o r ( 1 1 J
1 1 �2, 11S21 Mob i l e S e r v i ce/A i r G r u u I,d
1 1 53, 1 1 5 3 1 Hd r l n � :: e r V l l' e ( 1 2 1
l I �4, 1 1S41 Tu l l T e r rn l r, d l
1 l � �J , l I 5 � 1 T l l : , t- d " d C h <.i f q e s c d l l b d c k
l l rj b , 1 1 S 6 1 H l) t \� l ' � " t e l , · ei l l t.. ,1 ( Y,
1 1 �, '1 , 1 1 1) 7 1 1 � ' T I.' d ( ( P ., S t r l: fl Y-
1 ! �) d , 1 1 �, H I 1 1 . .... ..1 r d c o m p l e t l (, fl d � S J s t d n c p ( Bnr l
1 1 ' . 9 , 1 1 ) 9 1 I I I IN d r d B u � 'i L i n � V': r l t i L' J t i v n ( B I I(� )
1 1 F. 0 , 1 1 ( 0 1 I ,j l l i r l (j \'-J l d \', d i d d l j , 1 1 - ,! : ei l t , ,; L , t' e ' l u i [ . ::,l' ; , t ( 1 1 )
l i t. 1 , 1 1 t 1 1 C ei ! I I I I IJ CJ r d \'a l i d d t l (..J n D T H F e q u 1 f, m e l . t
1 1 6 ! , 1 1 6 2 1 Cd ! ! l l ] Ca r J VJ I I J c.i t l l r, f:" � l t l f r l.· q U l.· l , c y ( HF ) P q U i Pi1ld, t
NnTES :
( 1 ) T h � R a t e Q u () t e Sys t e m I S d VG l �e r e s po n s e � y � t e m u � !! d by
" i , � r l t l) r � t. u ( d J t J i r, r o u t i n g i n f u r i1l,.., t i n n , T h e :i y :; t t' fli , n l ) IN l- t ' i n q
fJ l . ...L, '· , } (J ' l t , W d �, I I :" l.· d d S d n a l t t' I n .J t l 'J e t o l . : d l l t , y t i lt: K i t e � tL.. C1 t l-
o p t: r J t o r . (J r,� r a t 0 r � w o u l d kt� J' I I , r t.: y u l r e d [ o u t i n g l l , t c r n'.J t l l , 1 1 .J f . . � .:l
'c' 1' " t I. 1.' . 1 7 .!' 1 '" , ; , ' .... J u l d r e s rJ () ! " j ON
l hJ h t �, l:' �� '..: : I ., :.. t l l ;
LJ r t' r .J l i , 1 . 4 ; , () I �' r d t .::; r s n o .... o L I ..Jl I ! ! , , ' ; l l n '"J 1 1 . L, r lnd t i (, fj f ! C.. m c n H P I S
l : � e i J l, t e 1 [I I .
K P . Q Q ' ON P A t N X X ' T N P A ' N X X ' S T t o ge t the " rat• •tep" for t he cur r .nt
t i me of da y .
K P . 0 1 t X X X X X X X ( t ST q l ve s a t o ne c t, e c k d n d r e a d s o f f t he n umbe r s y''''
j U 3 t d l a l ed .
( 2 ) Wh e n a c o � e i s ma r k e d S P d r e , t h a t m e a n s t h a t t. h e r e i s n o r u r r t' n t
( l r p l d l i l ;t.� d rt e t w u r k w i d L' u :.. a g e . I t :.:. t i l l m -i y b e u t i l i z e d d S d rt c; l l -
� t d n d a [ J P O T S e x c tid r L y e for WATS ser v i ce by l ocd l l: o m p d n i e s .
( J ) Wh e n a c o d e i s ma r k e d r e s e r v e d i t me a n s t h a t t h e r e m a y be
p l a ll � e d n e t w o r k w i d e u s a g e .
K P t l 3 B t P l r t ST then K p t CC t c c t x x x x x t S T
KP t l ,O t P I CtST
( 1 0 ) T h ro J
n l mb� r fOT R a t r a m! R n l l t p W , l :' fl nfl+ 1 4 I t I 2 1 2 b u t t i d ::, w a s
d i � (� o n f i n ' l ,:, d s n mr t i JTlP Ll s t y e ,l e , wh"l1 � h n T :. r S O p E" T r1 t o n ; 'l n t �
r r. n l p u t p [ t p r m ; n .] l r a l l p (] rnMP T � , I n p��h st�te t h e r E" is an i n w� r d
wh i c h acts l ike a Ra t � a nd R o u t E" ( J P � [ � l O I . I TI N e w Y o r k it's 116+121 .
1 1 4 ! T tw ' , p J " (> f " n , l p ,,; i H f' I ! !," p n t () p [ r V i f� p rl l t p c n 'J t p r ", · : t i n 1 f "' r
p l p c l r fJ rw.' c h a n i c ,1 1 ::o w i t c h p :-; , S r I JflP oldpr f' l f' \ t r Q - JTl P '. ' ! l � :' : ' · 'J l �: w l t c h e s ,
f OT p X .l mp l e t ll P I S C r o � s - P rl r ( 5X8) c a r i ll o t O IJ t I" ] l � p O l l . r�c ( rc c -
( I 6 ) To m� k e i n t e r na t i o n� l ca l l s dial K P t O l l t r rr . S T w h e r e rrr = t h p
c o u n t r y c od e ; and t hen d i a l K P + C C 4 X X X X X X X + S T w h r r e C C = c i t y c o d e a l l ri
XXXXXXXc the t e lephone n u mb e r . Also see notes 5, 6, 7, 12, 14, and 15.
2600
PO BOX 9 9
Midd l e I s l a nd , NY 11953-0099
1 986
P R IVATE SECTOR R E T U R N I N G - Back o n l i n e soon but many questions on seizure rema i n THL BASICS D I VE S T I T U R E WHAT
HAPPE N E D ] a n exp l a n a t io n of !hat W h l c tl l $ conf u s i n g t h e popu l ac e , FLASH A T & T s t e a l s customers, Dom i n i c a n b l u e ooxers, corn p u t e r lled
hooky c a l e l l e r F d lw e : ! a t tacked by c o m p u t e r . an a s t r o n o m I C a l phone b i l L d l d l a porn update. phone boo t h v i c t o r i O U S , li n E R S G e t t i ng c r ed i t
f r o m a l t e r n a t e c a r r i e r s , t r a c i n g rn e t tl o d s , m o b i l e p h o n e s . M a n i t o b a r a i d , 2 600 I N F O R M A T I O N B U H EAU -- blue box programs,
S Y S T E MA T l C A L L Y SPEAK I N G !;O n f u s l fly p a y p t l 'J n e s code aouse softwa r e , c e n t r e x f e a t u res I I I y o u r h o u s e . VAX 8650, overcharge h u n t e l s ,
VMS THE SERIES C O N T I N U E S m o r e o n sec u r i t y t e a t u r e s , I r C O U LD H A P P E N TO Y O U I what t1appens when hackers tlave a light. D IAL
BACK S E C U R I TY h o l e s I n t h e systems, FLASH a b u s e 01 p a r t y line, u n iq u e obscene caller news on pen r e g i s t e r s , reporters s t e a l SWISS
phones, pay p h o n e c a u ses p a n i C , L E T I E R S a s k i n g Q u e s t i o n s , blue oox c o r r e c t i o n s , C o m p u t e l comp l a i n t , B B S sec u r i ty , 2 6(X) I N F O RMA nON
B U R EA U --assorted n u m be r s , S Y S T E MA T I CA L L Y S P E A K I N G S p r i n t a n d U S T e l ml�rge, w r i t e protect t a b s w r o n g , B e l l A t l a n t l c chooses M C I
c e l l u l a r p h o n e s I n E ng l a nd , I n f r a red beeper e l ec t r o n i C l a x r e t u r n s , a c o u s t i c t r a u m a , AN O V E R V I E W O F AUTOVON A N D S I LV E R B O X E S --the
m i l i t a r y phone network a n d how y o u r touch t o n E' p h o n e can p l a y along A.N A M E R I CA N E X P R E S S PHONE STORY -a memory of one of the
better I l a c k l n g escapade::., F I NA L WORDS O N V M S --sec u r i t y devlce� d l iLl a :. s o r t eu tipS, FLASH tldcker zap::; computer : T l a r q u ee , Sov i e t s
de n i ed c o m p u t e r access, c a l l i n g t h e s h u t t l e , new wdyS of stea l i ng d a t a , c o m p u t e r password forgott e n , LETI E R S c o r po r a t e r a t e s , defea t i ng
c a l l wa i t i ng . r l ng b a c k n U l ll be r s , w h e r e I S B l O C ? c r e d i t w h e r e I t ' S d u e , spec i a l tiOO n u m be r , T H I S M O N T H AT 26(X) P ( l v a t e Sector ' s r e t u r n
C o m p u t e l a n d C o rn p u s e r v e , T e l e p u b 86, a pos t a l m l f a c l e , S Y S T E M A T ICALLY � P E A K I N G J a m m I n g s a t e l l I t e s , T A S S n €\N S serVice, Soviet
computer upda t e . d , a l l n y t tw y e l l ow pages Northern T e l ecom to d e s t r o y C O ' s , more p h o n e s than e v e r , RSTS FOR B E G I N N E R S --baSIC
system f u nc t i o n s , l og i n p r oc ed u r es , M O B I LE P H O N E S T H E O R Y A N D C O N S T R U C T I O N --how to bu i ld y o u r own mobile phone, F LA S H
B r l t l s l l p h o n e bo u t h wedd i n g , a n o t l l e r l a r g e S p r i n t b i l l , b u d t e n a n t d a t a ba s e s , c a r b r e a t l l d i l l e r s , p h o n e p h r e a k f i ned, M a r cos pllOnes for f r e e ,
L. l TI E R S b l u e oox c od l n � , e l e c t r o n i C r o a d p r i C i n g III Hong K o n y , U N I X b u g s , m o r e on At 'l a c k i n g , A S T O R Y O F EA V E S D R O P P I N G --from
Wor l d W a r II. T H I S M O N T H A J 2 6CX) t r a n s c r i p t s o f P r i v a t e Sector r a id , r n o r e on C o m p u t e l ,� l' S T E MA T I CALLY S P E A K I N G 6 1 7 t o be d l v l ded
C u n g r e s s chooses A T & T , Baby B e l l s dOll t pay A T & T b i l l s , eq u a l access 800 n u m be r s , datu , - 'lcrypt l o n , DA f a i l u r e , AT&T loses Its zero,
E X P L O I T S I N OPE.RA J O R H E L L --- h a l a S S l n g o pe r a t o r s f r o m A l a s k a . T H E C O M P U T E L S C O O P . F LA:J : � B e l lcore p u b l l c a t l on s y o p u b i t c , US a n d
f- r a n c e l i n k p h o n e s , c o m p u t e r g r a m rn a r s h ower p h o n e , cel l l l i a r m od e r n , t1 ! g h t e c h p a r k i l l y rne t e f � C o n g r e s s i o n a l comp u t e r , LE TIE R S
f o r e i g n p l l o ntc syst e l l l s , R u S S i a n p h o n e tX)Q k s , n u m be r s to (1 l d l on a b l u e bo x , Boston A N I . C hes l w e l : a l �' l y s t , C N A w a y s of a n swe r t n g ttle
p l lO n e , 2 ljOO I N F O R M A T I O N B U R EA U - A u tovon n u m be r s a l te r n a t e p h r e a k l ng met hods f m a l t e r n a t e c a r r i e r s , S Y S T E MATICALLY
SPlAKING W r e s t l e m a n l a pinS B e l l , s t i ng oo a r d ::. un t h e r i se, AmerICan Network f e a r s h aCke r '.:> , free pay phones p l a g u e N e\N J er se y ,
d l sposa u l e p h o n e s , h a c k e r t e r r o r i s t s , C O M P U T E R C R I M E R E V I E W -a r e v i ew of t h e r e po r t / r o l n T Ile N a t i o n a l C e n t e r for Computer C r I m e
D a t a , H O W T O HACK A P I C K An i n t r od u c t i o n to t h e P i c k ope r a t i n g s y s t e m a n d w a y s of h a c k i n g I n t o I t . N O T H I N G N E W I N C O M P U T E R
U N D E R (; R O U N D - r e v i ew of a new IJook , F LA S H N ew Y o r k s new cum p u t e r c r l l l l e l a w . a S6 829 phone b i l l , hQ\N' big computer cnme pays
p u b l i C p l l O n e secrecy. C a p i t o l H i l i h a c k e r , C l t l b a n k money g a m e s , L E n E R S E n g l i s h p h r e a k l n g , ways 01 t r i c k i n g s t i n g B B S - s , c a l l ed party
<; u p e r V I S l o n 2 600 P h u n Book, C a p t a i n M ld n l g tl t , R C I , 26CX) I N F O R MA T I O N B U R EA U --some phone n u m be r s , R E S O U R C E S G U ID E ,
S Y S r E M "- T I C A L L Y S P EA K I N G H a nds a c r o s s T e l e n e L ca l l 1 l1g K i ev, N y n ex b u m p s off S o u t h w e s t e r n B e l l , stock m a rket c r a s l l , c e l l s i t e names,
v l deop l l U n e s , V I O LA T I N G A VAX - T rOj a n 1 1 o r s e s , collecting passwords, etc etc , T H E F R l t P H O N E S O F P H I LLY - - S k y l i n e prov l d m g
, o i l i p l e t e l y i r t�e ,> e r v l c e f r o m P d ,! p h o n e s , F LA S H town c r ippled by t e l c o s t r i k e . p r i so n e r s rnake I l l eg a l calls, h d cker degrees. New J e r sey tops
I dP S , e x / t·d I S t apped, water company w a n t s customers' s oc l d l secu r i t y numbers. computers str ike a g a m , f ed e r a l e m ployees " t racked
L E rTE HS ASSOC i a t io n of C l a ndest i n e R a d i O E n ! h u s l a s t s , ITT c o r r ec t i o n , NSA, more on V M S , T elemrnpu t l s t . a 9 50 t r lck, 26(X) I N F O R MA T I O N
B U K E.AU W o r l d N u m be r i n g l u n e s , S Y S T E MA T I CALL Y S P E. A K I N G A T & T se i l i n g pay p tl o n e s a u t o m a t ed ope r a t o r s . ce l l u l a r d l a l · by " volce,
flew B r l t l :, 1 1 phone � e r v lce no data p r o t ec t i o n for H o n y Kong Conyress l o n a l fraud hot l i n e . fe{jt� ( d l phone f a i l u res, I n d I a n a teko t h reatens
A I & r. K N O W I N G U N I X send l flg I I 1 d l l a n d g e n e r a l 11 d C k l f1 g , A T R I P TO E N G LAN D - a n d the f u n t t1 1 ng s you C d n do "" I t t l phones over t h e r e ,
f LA S H P l l o l w f r a u d I n gove r n o r s I-, o u se . B i g B r ot l lt-'! r , T e l tec f l( d h t s t'lack \/andd i l srn 9 1 1 c a l l s L f T I E R S Si1 U ! l lrlg dovv n systems, l eg a l
BBS s, VAX VMS tiPS, 2 600 I N F O R M A T I O N 8 U H E:.AU a l i st of t e l e o ::. , a l i s t of a r e a c od e S and n u m be r of e X C h a nges, SYSTEM ATICALLY
SPEAKING U S S R c o m p u t e r s , ATM s In China NYCE TV b i ll e boxes, gove r n m e n t phones, r u r a l r a d i O phones. SOME FACTS ON
SUPERVISION a n swer s u p e r v I S i o n e xp l a i n ed , RCI & OM S - 1 00 B U G S , ANOTHEK S T I N G E R IS STUNG M a x f i e l d exposed a g a i n , F LASH
N S A d r op s DES, h a c k e r s on s h o r tw a v e , B i g B ru t h e r traffIC cop, c r osst a l L<. saves a l i fe. I nd i a n phones, V i deo s i g n a t u res, FBI shopPing list,
i-lI f p t l O n e c i-t u ::.es confUSion, U:: nERS C a p l d l fl M ld n l g i l ! , d l l lluyance bureau. SL- 1 swtlches. c r ed l \ . PBX ::.. 8CX) wo r Ll - n u m be r s , publIC C NA ' s ,
2600 I N � O R MA n O N B U R EA u W i n n Ipeg n u rn bt:> r s , S Y S T E M A T l l:ALLV S P EA K I N G S p n n t over b i l l s , A T & T rdnkS �1, por t a b l e VAXes, ca l l
r t�JeC1lon U EA T H O F A PAY P H O N E - n a s t y b U S i n e s s , T R A S H I Nli AM E R I CA S S O U R C E f- O R l N f- O R MA T l O N s t i l i more t a c t i CS , F LAS H F B I
I Ilvest l g a t e s c o f f et:: I l l dc i1 I n l! , C I S cupy r t y i l l s p u b l i C softw a r e , N a vy 5Oftwa r e . H I:3 0 e n c r y p t i o n , I n d i a n a " F u n e s ' , LE TTE R S l'Ii ul nbers, telco
i 1 d r r a s s r n e n t , P u e r t o R i c a n tf'lepllUnes, 0 s a nd L s. 2 bOO I N f- O R M A T I O N B U R EA U O v e r s e a s n u m be r s , S Y S T EMATICALLY SPEAK I N G
l l t,c t r o l l l C t d x r e t u r n s , :. o i t w d r e ITl d k e r s d d S l 1 B B S , I C N U l t r a p i l o n e , E:. S S I n T a i w a n , N S A w a n t � new C t l l P , l e N MORE THAN ABARGAIN -
d l ou k dt 1 ) ( 1\' u f t h e w o r s t pilon l! com p a n l e s I I I t h e w o r l (l , MAS T e R I NG T H E: N E TWO R K S C O l Tl l 1 1 d r1 l c a t l n g on A r p a n e t . B i t ne t , etc , F LA S H
Heagdr l tur t u r es Pdt l e n t s , F B I d l 1 y e r s p a r e n \ ::. , II and l w n t r oversy, L E T T E R S T e l e n e t h a c k i n g , A "' I ' s , 81 1 9 16 problems, 2 600
I N F O R M A T I O N B U R E:. A U B r l t l s n B U S r l u m be r s , \/Vf�A T H 01- G O O S T R I K E S 2 bOO, S Y S T E MA T ICALLY SPEAKING Banks l i n k arms, Sprint
lidS tf)(1 I l l a r l ,!, l; u ::.h ) m e r s n e w P d y p l l o n e � , I 1 I C k n d i 1 1 e I I ::.t lflg::. c o m p u t e r col l ege. A L O C K AT T H t_ F U T U R I:: P H R EA K I N G WO R LU ---C e l l u l a r
t e l t� p l l ( H l e :, &. I , ow t l l e y work, H O W C E LL U LA f� P H O N l S C A M E A B O U T A N O W H A T Y O U C A N t. X P E C i , T H I N G S W E R E N O J S U P P O S E D T O
K. N O I.>V A B O u 1 , F LA S H A V O l d l llg reJect i o n , p l H ed k s t ie lllJ C l f C U l t S , N o r t h C a r o l i n a t l a c k e r s , I n t er na t l u n a l h a c k i n g , p a y i n g f o r t o u c h tones
w l r e t a p � , L E T T E:. ri S l q u d l dccess 800 n U f n Oe r ::. S i r d n y t" 1 1 u l n l) e r s . I r l s l 1 p h r e a k l n y . d i s a b l i ng c d l l w d i l l n g , 2600 I N FORMA T l u N d U R EA U
N e t lll d l i -, I t e s , S y S T [ M A T I C A L L Y S P E A K I N G F r ee d l r ec t u r l e s , I i nyerpr i n t 10 s y � t e t n . n d v l g a t l r H d W i t h C O s , swee p i n g f u r b u g s
MORE ON VM/CMS 9 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
WEATHERTRAK CODES 15 . . . . . . . . . . . . . . . . . . . . . . . . .
LETTERS . . . . . . . . . . . . . . . 24
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
A ROLM CATASTROPHE . 30 . . . . . . . . . . . . . . . . . . . . . .
�EN INGS . . . . . 3�
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2600 MARKETPLACE . . 41 . . . . . . . . . . . . . . . . . . . . . . . . . .
S E C O N D CLASS POST A G E
Permit Pending at