988 lines
44 KiB
Plaintext
988 lines
44 KiB
Plaintext
![]() |
===========================================================================
|
|||
|
OFFICAL NPA RELEASE DOCUMENT
|
|||
|
TRANSCRIPT: TAP ISSUE #70
|
|||
|
DATE: 10/24/87
|
|||
|
TYPED BY: THE AESTHETIC INDIVIDUAL
|
|||
|
===========================================================================
|
|||
|
|
|||
|
|
|||
|
TAP
|
|||
|
No. 70
|
|||
|
November-December 1981
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
====================
|
|||
|
NAKED CAME THE CROOK
|
|||
|
====================
|
|||
|
|
|||
|
A nude man who came in from the cold to rob a gas station early
|
|||
|
yesterday had a decided advantage, police said. The attendant was female.
|
|||
|
She fled, leaving the unarmed man free to empty the cash register, then
|
|||
|
scroll casually from the scene of the crime.
|
|||
|
|
|||
|
|
|||
|
==================
|
|||
|
FREEBASING COCAINE
|
|||
|
==================
|
|||
|
|
|||
|
By Dr. Atomic
|
|||
|
|
|||
|
Frebasing cocaine is basically a California phenomenon, but it's a
|
|||
|
practice that is popular with entertainers and with others who can afford
|
|||
|
to indulge in the pleasures of cocaine. Freebase cocaine is smoked in a
|
|||
|
special, glass water pipe called a freebase pipe, and after taking a toke
|
|||
|
the onset of the high is quick; it comes on faster than snorting and
|
|||
|
almost as quick as an I.V. injection -- it's like injecting cocaine
|
|||
|
without using a needle. After inhaling the freebase cocaine vapors, your
|
|||
|
hearing drops, and you get an incredible rush even before enough time
|
|||
|
passes to exhale the smoke. Unfortunately, the rush and the high don't
|
|||
|
last long, and the desire to smoke some more coke is compulsive. In
|
|||
|
fact, it is so impulsive that people who hang around the freebase pip,
|
|||
|
impatiently waiting to get another toke, are known in the vernacular as
|
|||
|
"freebase vultures". But, before the cocaine can be smoked, it must
|
|||
|
first be prepared.
|
|||
|
|
|||
|
The cocaine purchased on the street is usually coaine hydrochloride
|
|||
|
(HCl), a water soluble salt of cocaine that is suitable for snorting
|
|||
|
or injecting, but not for smoking. Cocaine HCl burns at a high
|
|||
|
temperature, about 200oC, an if it's smoked, much of the cocaine gets
|
|||
|
carbonized, burned up, instead of reaching your lungs as vapors. But, by
|
|||
|
changing the cocaine HCl to cocaine freebase, you get more of the desired
|
|||
|
cocaine vapors and less carbon because the freebase vaporizes at a much
|
|||
|
lower temperature than the cocaine HCl does.
|
|||
|
|
|||
|
All it takes to change the cocaine HCl into cocaine freebase is a
|
|||
|
little home chemistry. It's easy: if you can bake brownies by following a
|
|||
|
cook book, you can freebase coke. The only supplies needed are some
|
|||
|
inexpensive chemicals and equipment that are easily obtainable at your
|
|||
|
local paraphernalia shop.
|
|||
|
|
|||
|
|
|||
|
Equipment and Supplies
|
|||
|
----------------------
|
|||
|
|
|||
|
1 Freebase water pipe, glass
|
|||
|
2 Screens, fine mesh, for pipe
|
|||
|
1 Glass freebase vial, 1 oz with top (1)
|
|||
|
1 Mirror
|
|||
|
1 Single edge razor blade
|
|||
|
1 Box baking soda
|
|||
|
1 bottle of petroleum ether or ethyl ether (2)
|
|||
|
1 book matches or butane lighter
|
|||
|
|
|||
|
NOTE 1: Ethyl ether and petroleum ether will dissolve many plastics, so
|
|||
|
the tops of freebase vials are specially made of ether
|
|||
|
resistant plastic.
|
|||
|
|
|||
|
NOTE 2: Use caution when handling ether. The vapors of both ethyl ether
|
|||
|
and petroleum ether will ignite explosively near an open flame.
|
|||
|
Make sure that the room is well ventilated when extracting with
|
|||
|
ether. When freebasing in the kitchen, make sure the pilot
|
|||
|
lights are out on the stove and the hot water heater if they
|
|||
|
are nearby. Also, don't smoke or light matches while there are
|
|||
|
still fumes in the air.
|
|||
|
|
|||
|
|
|||
|
The Freebase Process
|
|||
|
--------------------
|
|||
|
|
|||
|
1) To a 1 oz glass freebase vial, add 4ml to 6ml of warm water. Less
|
|||
|
than 1/4 of the vial is more than sufficient water.
|
|||
|
|
|||
|
2) Dissolve 1/4 to 1/2 gram of cocaine HCl in the water to make a
|
|||
|
cocaine solution. Shake or stir if necessary to dissolve the
|
|||
|
cocaine.
|
|||
|
|
|||
|
3) Add about 1/4 gram, more or less, of baking soda to the coaine HCl
|
|||
|
solution. It is better to have an excess of baking soda than not
|
|||
|
enough. Next shake well. This changes the cocaine HCl to the
|
|||
|
freebase.
|
|||
|
|
|||
|
4) Using a glass eyedropper, add 2ml to 3ml of ether. Shake well. The
|
|||
|
ether extracts the freebase cocaine from the water layer. As a rule
|
|||
|
of thumb, use half as much ether as water. Since ether and water do
|
|||
|
not form a solution, the ether will rise to the top and form a
|
|||
|
distinct layer.
|
|||
|
|
|||
|
|
|||
|
___________
|
|||
|
|\ /|
|
|||
|
| \_______/ | __________ Ether Resistant Cap
|
|||
|
|___________|
|
|||
|
|
|||
|
| |
|
|||
|
| |
|
|||
|
| |
|
|||
|
| |
|
|||
|
| |
|
|||
|
|___________|
|
|||
|
| | --------- Ether Layer
|
|||
|
|___________|
|
|||
|
| |
|
|||
|
| | --------- Water Layer
|
|||
|
|___________|
|
|||
|
|
|||
|
|
|||
|
Because the cocaine freebase is more soluble in ether than in water,
|
|||
|
the ether layer will contain most of the freebase; in effect, the
|
|||
|
ether has extracted the freebase cocaine from the water layer. This
|
|||
|
first ether extraction is known as the "first wash". The water
|
|||
|
layer can be washed one or two more times with ether to extract the
|
|||
|
small amount of freebase remaining after the first wash.
|
|||
|
|
|||
|
5) Siphon off the ether layer with the eyedropper, making sure not to
|
|||
|
take any of the water layer. Drop the freebase saturated ether
|
|||
|
carefully onto a clean mirror or glass surface. When the ether
|
|||
|
evaporates, a white powder should remain; this is the cocaine
|
|||
|
freebase, and it's ready to smoke. So what are you waiting for?
|
|||
|
|
|||
|
|
|||
|
The freebasing process removes some of the water soluble contaminants
|
|||
|
(cuts) like mannitol and lactose, so the yield, i.e. the weight of the
|
|||
|
cocaine freebase obtained will weigh less than the cut-coke that was
|
|||
|
started with; however, no significant amount of cocaine is lost, only the
|
|||
|
cut is removed. Thus, a gram of cocaine HCl that is only 25% pure is not
|
|||
|
a gram of cocaine but a 1/4 gram of cocaine, and the yield of freebase
|
|||
|
cocaine, for this particular sample, will be slightly less than 1.4 gram.
|
|||
|
|
|||
|
The cocaine freebase, however, is nearly pure, compared to the starting
|
|||
|
material, and a smaller dose of the freebase will be just as potent as a
|
|||
|
larger amount of the cut cocaine. So, start with a small hit, a match
|
|||
|
size line or less (20mg to 50mg). Remember, just like snorting ot
|
|||
|
injecting, you can consume too much by smoking. Be careful how much you
|
|||
|
smoke, and be careful, too, for police and informers: cocaine is still
|
|||
|
illegal. Have fun with your chemistry projects, stay high, and stay
|
|||
|
free.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=========================
|
|||
|
MAN NABBED IN PHONE FRAUD
|
|||
|
=========================
|
|||
|
|
|||
|
EAST BRUNSWICK - A man who described himself as an electronics engineer
|
|||
|
has been arrested on charges stemming from the use of a "blue box", a
|
|||
|
gadget the size of a calculator that emits electronic signals that
|
|||
|
bypasses regular telephone billing equipment.
|
|||
|
|
|||
|
Tarkeshwar Singh, 50, of 16 Manor Place, was freed on his own
|
|||
|
recognizance after he was arrested yesterday in a public phone booth at a
|
|||
|
Route 18 department store, Detective Donald Henschel reported.
|
|||
|
|
|||
|
Singh was charged with possesion of a burglary tool, the "blue box",
|
|||
|
and theft of $300 of services from New Jersey Bell Telephone Co. police
|
|||
|
said.
|
|||
|
|
|||
|
Investigator James Witanek of the phone company's security division in
|
|||
|
Newark said the investigation had been inprogress for several months.
|
|||
|
During that time, he said, Signh used the device for $300 worth of phone
|
|||
|
calls to Japan and Hong Kong.
|
|||
|
|
|||
|
In addition to the "Blue Box", investigators confiscated a schematic
|
|||
|
design of the insturment which they said had been sent to Signh by an
|
|||
|
aquaintance in West Germany.
|
|||
|
|
|||
|
"These electronic devices are a continuing problem to the telephone
|
|||
|
company," Witanek said.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=======================
|
|||
|
THE POSTAL (DIS)SERVICE
|
|||
|
=======================
|
|||
|
|
|||
|
The Department of Agriculture recently completed a major survey, packed
|
|||
|
up its findings in some 1,300 boxes and mailed them off to its Des
|
|||
|
Moines, Iowa, processing center. While in the fumbling hands of the
|
|||
|
Postal Service, more than 600 of the parcels were damaged, lost or
|
|||
|
delivered to the wrong address.
|
|||
|
|
|||
|
We trust that when the Agriculture Department lodged its complaint, it
|
|||
|
had the good sense to call rather than drop a letter in the mail.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=====================================
|
|||
|
DO-IT-YOURSELF CALL FORWARDING DEVICE
|
|||
|
=====================================
|
|||
|
|
|||
|
Dear TAP:
|
|||
|
|
|||
|
In Response to several pleas from your pub, enclosed is some technical
|
|||
|
data on the Pacific Telephones in Pasadena.
|
|||
|
|
|||
|
On Hook: 45 VDC
|
|||
|
Off Hook: 7.5 VDC @ 6ma Phone Input res: 200 ohms
|
|||
|
|
|||
|
Ring: Approx 50 VAC (My cheap multi-meter doesn't read AC mils)
|
|||
|
|
|||
|
T1 (Mic Button) res: 600 ohms
|
|||
|
U3 (Ear Piece) res: 20 ohms (leads feeding earpiece show 80 ohms
|
|||
|
across them.)
|
|||
|
|
|||
|
Ringer Coil Res: approx 3K ohms. Only one Coil.
|
|||
|
|
|||
|
Ring Back #6105-6: (Prefix)-1-(Prefix) gets a wierd "ticky-tock" sound;
|
|||
|
(Prefix)-0002 gets a nice 1000 cps tone;
|
|||
|
(Prefix)-1118 gets a real LOUD tone;
|
|||
|
(Prefix)-0000 gets a central office recording which
|
|||
|
includes the unlisted phone number for
|
|||
|
the office (in this case, 576-6119);
|
|||
|
|
|||
|
What was supposed to be the verifying number (Prefix)-1111, gets the
|
|||
|
"Not in service" recording;
|
|||
|
|
|||
|
(Prefix)-0003 gets the referral operator;
|
|||
|
(Prefix)-0119 is a private party's home fone;
|
|||
|
|
|||
|
I'm trying to come up with a design for a "Dial Through Cheese Box"
|
|||
|
sort of a gimmick, but it's not what I want. I could do it if we had T-T
|
|||
|
phone hereabouts, but we're stuck with impulse dials. Drat. Any ideas?
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MATERIALS:
|
|||
|
|
|||
|
C1- 1.0mfd @ 400 VDC
|
|||
|
RL1- 4P.DT Relay, 115 vac coil
|
|||
|
T1- Audio Isolation xformer, approx 600 ohms imped, 100 to 200 ohms DC
|
|||
|
res.
|
|||
|
M1- Timer Motor. 115 VAC 60 CPS
|
|||
|
|
|||
|
SW1a- First section of timer switch, set for approx 3min closed, 10 sec
|
|||
|
open (due to circuit configuration, timer will self index to "open"
|
|||
|
position of this switch).
|
|||
|
|
|||
|
SW1b- Second section of timer switch. Set for minimum possible duration
|
|||
|
"on". Indexed to close AFTER SW1A has come OUT of detent. This is the
|
|||
|
critical factor in choosing the type of timer. "On" duration must be LESS
|
|||
|
than time required for "name caller" to finish dialing.
|
|||
|
|
|||
|
ADDITIONAL ITEM REQUIRED, BUT NOT SHOWN:
|
|||
|
|
|||
|
1 ea battery powered "Name Caller" dialing machine or equivalent.
|
|||
|
|
|||
|
NOTE: Over-ride disconnect switch (Tone Send. Relay?) may be connected
|
|||
|
at point x-x.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
================
|
|||
|
CALLING HIS BUFF
|
|||
|
================
|
|||
|
|
|||
|
LAS VEGAS (AP) - What do you say to a naked burglar?
|
|||
|
|
|||
|
That's what police were wondering at 5am Sunday when they arrested
|
|||
|
Karl Hunsaker, 30 of Las Vegas, as he was climbing down a ladder in the
|
|||
|
buff carrying household goods from an apartment.
|
|||
|
|
|||
|
Hunsaker was booked for investigation of burglary.
|
|||
|
|
|||
|
Officers gave no reason as to why Hunsaker had no clothes on.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
====================
|
|||
|
JAIL PHONE LINE BUSY
|
|||
|
====================
|
|||
|
|
|||
|
DELAND, Fla. - A defendant usually gets to make one free phone call,
|
|||
|
but for a few inmates at the Volusia County jail that apparently wasn't
|
|||
|
enough. Using coin-operated telephones in the jail, at least six inamtes
|
|||
|
made at least $32,000 worth of illegal telephone calls, according to
|
|||
|
Assistant State Attorney Horace Smith. The inmated charged the calls to
|
|||
|
fake credit cards or to telephone numbers of unsuspecting citizens in
|
|||
|
this central Florida city, he said. Three inmates have been found guilty
|
|||
|
of charges in connection with the telephone case, and three others are
|
|||
|
awaiting trial, Smith said.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
====================
|
|||
|
PHONE CENTER PARADOX
|
|||
|
====================
|
|||
|
|
|||
|
Michigan Bell Telephone Co., the giant corporate institution that
|
|||
|
touches all of our lives and wallets, gets absolutely giddy whenever we
|
|||
|
reach for the telephone. Bell spends millions of dollars around the clock
|
|||
|
and calendar for advertising and public relation to persuade us to reach
|
|||
|
more often.
|
|||
|
|
|||
|
We are taught, however, obliquely, that we are disadvantaged unless we
|
|||
|
have telephones handy in every room of the house and office, or if we do
|
|||
|
not use them to facilitate every communication. Shop by phone; sell
|
|||
|
aluminum siding by phone; solicit and collect money by phone. Telephone
|
|||
|
your mother, lover, great uncle and your entire graduating clas at least
|
|||
|
once a week, just for the kick of it. Get a separate line for the kids!
|
|||
|
Get a car phone! Give a phone to a poor person! And, do invest in one
|
|||
|
of those recording devices so you will never, never miss a call, even a
|
|||
|
wrong number. That way Michigan Bell will never miss collecting for the
|
|||
|
call. We will all live happily ever after.
|
|||
|
|
|||
|
|
|||
|
ONE RINGY-DINGY......
|
|||
|
|
|||
|
All this, and more, is the implied message of Bell's advertising. I
|
|||
|
have no argument with it. I would rather write than phone, or recieve a
|
|||
|
letter than a call. Written words are special to me. Spoke words
|
|||
|
transmitted by electronic devices may be special to other people. The
|
|||
|
absurdity that intriges me is not in the advertising or even the concept
|
|||
|
of the telephone as an extension of the human mouth and ear.
|
|||
|
|
|||
|
Here's the absurdity: In it's ever-dilligent determination to expand
|
|||
|
service, the telephone company has opened 35 new Phone Centers around the
|
|||
|
state during the past 18 months or so. These are retail stores, more or
|
|||
|
less, in which you can purchase telephones (Bell calls them
|
|||
|
"instruments") and also arrange for installation when necessary,
|
|||
|
strighten out billing problems and generally do your telephone buisness.
|
|||
|
|
|||
|
These places are designed as walk-in centers, however. Therefore - and
|
|||
|
here it comes - they are not included in telephone book listings. This
|
|||
|
is not an oversight. The Phone Centers have unlisted telephone numbers.
|
|||
|
This is what I call absurd, remembering everything Bell has said about
|
|||
|
how essential telephone communication is to life itself.
|
|||
|
|
|||
|
I know about this because a fellow named Jerry Moons (I think)
|
|||
|
telephoned me to tell me about it. He had seen one of these Phone Centers
|
|||
|
near Telegraph and 13 mile and wanted to dial it up to ask telephonic
|
|||
|
questions.
|
|||
|
|
|||
|
TWO RINGY-DINGIES....
|
|||
|
|
|||
|
"I couldn't find a listing," he said, "so I dialed the information
|
|||
|
operator. It rang 20 times and I hung up. Then, I dialed Bell
|
|||
|
headquarters, and someone there told me the number is unlisted. The
|
|||
|
person said Bell doesn't want its people bothered by phone calls. I swear
|
|||
|
to you that's what I was told."
|
|||
|
|
|||
|
I believe him. I confirmed it with a telephone company spokeman. He
|
|||
|
said, "The Phone Centers do have telephones, but we discourage telephone
|
|||
|
contacts. It's supposed to be a face-to-face operation. You know, a
|
|||
|
retail outlet to shop for phones."
|
|||
|
|
|||
|
He told me a lot of other things. He said Bell workers at the Phone
|
|||
|
Centers do not have access to central records and are not really set up
|
|||
|
to help with billing problems or repair problems. He said they have to
|
|||
|
refer all those things to other departments, that that's a nuisance for
|
|||
|
them and a hold-up for customers. He said the main job of the phone
|
|||
|
centers is to sell phones and to arrange for service, and that having an
|
|||
|
unlisted number helps. All that translates to me as the same thing as
|
|||
|
"Bell doesn't want it's people bothered by phone calls."
|
|||
|
|
|||
|
I love it. Finding a giant absurdity is as exciting as finding the
|
|||
|
great pumpkin. Now, it's your turn.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
========================
|
|||
|
COMPUTER 'ERASES' PHONES
|
|||
|
========================
|
|||
|
|
|||
|
A malfunctioning computer bulletin board almost caused a total
|
|||
|
communications blackout yesterday at the Union County administrative
|
|||
|
complex in Elizabeth.
|
|||
|
|
|||
|
All 945 telephones at the County complex went dead shortly before
|
|||
|
11:30am. when a memory board in the telephone operations room burned
|
|||
|
out, according to James Delaney, director of central services.
|
|||
|
|
|||
|
Delaney said critical county operations, such as police and emergency
|
|||
|
communications, had been carried out over the county's radio system
|
|||
|
during the nearly four hours it took for the telephone company to restore
|
|||
|
service.
|
|||
|
|
|||
|
In the meantime, the county's work force either waited until the
|
|||
|
telephones were operative, or opted to "hoot it" between various floors
|
|||
|
or buildings in an effort to maintain communications until the system was
|
|||
|
repaired just after 3pm.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
==================
|
|||
|
WRONG LINE, INDEED
|
|||
|
==================
|
|||
|
|
|||
|
TEMPLE, Texas (AP) - If you're one of those people who always seem to
|
|||
|
be caught in the slowest-moving line at the bank, you might understand
|
|||
|
the predicament a would-be robber found himself in recently.
|
|||
|
|
|||
|
The fellow stepped up to a teller at the First National Bank of Temple
|
|||
|
and demanded that she fill his sack with money.
|
|||
|
|
|||
|
"Give me the money, this is a stickup," the unarmed man told Claudine
|
|||
|
Holder.
|
|||
|
|
|||
|
Holder barely glanced at the canvas bag on her counter. Instead, the
|
|||
|
teller, whom bank vice-president Sam Farrow described as "feisty and very
|
|||
|
quick-witted," informed the man that he was in the wrong line.
|
|||
|
|
|||
|
She directed him to stand in a line across the lobby, and while he
|
|||
|
waited meekly for service, she called police.
|
|||
|
|
|||
|
The suspect was arrested and charged with attempted bank robbery.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=======================================
|
|||
|
ARMY WANTS TO FIND LONG-DISTANCE CHEATS
|
|||
|
=======================================
|
|||
|
|
|||
|
TACOMA - The Army wants to reach out and touch a few individuals who
|
|||
|
like to make illegal long-distance calls at Fort Lewis.
|
|||
|
|
|||
|
One soldier phoned a number in the Dominican Republic and charged the
|
|||
|
$1,296 call to the base.
|
|||
|
|
|||
|
Another has been calling from a pay telephone on Fort Lewis to a pay
|
|||
|
phone outside the Howard Johnson Restaurant in Trenton, NJ and been
|
|||
|
charging those calls to a number on the post. Worse yet, says Bill Wood,
|
|||
|
a base spokesman, return calls from Trenton are billed to the same
|
|||
|
number.
|
|||
|
|
|||
|
Ordinarily, long-distance bills going through the Fort Lewis
|
|||
|
Communications Center average $2,000 a month. In May, the bills came to
|
|||
|
$4,500. "Probably half or more of them are fraudulent," Wood says, "but
|
|||
|
we are checking and we will find those people."
|
|||
|
|
|||
|
Those making such calls could be imprisioned for five years for the
|
|||
|
offense.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
==============================
|
|||
|
ABUSE OF REMOTE ACCESS SYSTEMS
|
|||
|
==============================
|
|||
|
|
|||
|
John Petrie has a problem. Petrie (not his real name) is the
|
|||
|
communcations manager for a medium size company in the Midwest. His
|
|||
|
company has installed a long-distance control system to monitor usage and
|
|||
|
get better utilization of long distance facilities. Because the company
|
|||
|
has a large number of people traveling, remote access to the company's
|
|||
|
long distance facilities was installed to reduce the number of credit
|
|||
|
card calls. A series of inward WATS lines are connected to the long
|
|||
|
distance control system at headquarters. When traveling, company
|
|||
|
representatives can simply dial an "800" number and then their personal
|
|||
|
authorization code to get access to the company's long distance
|
|||
|
facilities including toll and outward WATS.
|
|||
|
|
|||
|
The remote access system seemed to be working great. Credit card calls
|
|||
|
had been all but eliminated and the overall cost had been reduced. Then
|
|||
|
about six months ago, Petrie was in the midst of doing the detailed
|
|||
|
monthly billing of calls to station users when he noticed that one person
|
|||
|
had been making a large number of 800 number calls via the remote access.
|
|||
|
Petrie thought to himself, "This guy's got to be a stupid fool to dial
|
|||
|
our 800 number to place a free 800 number call!" When questioned about
|
|||
|
the calls, the man denied making any remote access calls at all that
|
|||
|
month.
|
|||
|
|
|||
|
Totally confused at this point, Petrie called several of the 800
|
|||
|
numbers listed in the billing report. In every case, when the call was
|
|||
|
answered, the familiar toned indicated entrance to a remote access system
|
|||
|
were heard. A phone freak was clearly at work!
|
|||
|
|
|||
|
Petrie immediately changed all codes, pauses and methods of gaining
|
|||
|
access to the company's system. That night, the mysterious caller tried
|
|||
|
60 times before he finally figured out the new procedures and codes.
|
|||
|
Petrie made another major change, but the caller cracked that in about 20
|
|||
|
tries, and then placed a call to germany. Petrie removed international
|
|||
|
dialing from the system and called the telephone company security
|
|||
|
department.
|
|||
|
|
|||
|
Meanwhile, he decided to have some fun by calling the 800 numbers on
|
|||
|
the billing report, contacting each company's switchboard operator and
|
|||
|
asking to be connected to the communications manager. According to
|
|||
|
Petrie, "The moments of silence were deafening when I told these managers
|
|||
|
how I had reached them."
|
|||
|
|
|||
|
After about a week, the telephone company security people showed up and
|
|||
|
after reviewing the documentation were amazed. They traced all of the
|
|||
|
called numbers, and came up with nothing but remote access numbers,
|
|||
|
"meet-me" conference numbers and services such as Time and Temperature in
|
|||
|
upstate Michigan. They did their best to trace calls back to the
|
|||
|
originating number, and came up with calls from California out of another
|
|||
|
company's remote access system.
|
|||
|
|
|||
|
Petrie says that to date his company has been hit with about 6,000
|
|||
|
fraudulent calls, which cost about $10 an hour. "Even with all this," he
|
|||
|
says, "I don't feel we look too bad compared to companies I know who have
|
|||
|
been hit for in excess of $2,500 a month on international calls alone. He
|
|||
|
seems to take great delight in calling Hertz Rent-A-Car in Guam."
|
|||
|
|
|||
|
John Petrie's problem is not unique. An informal survey by BCR reveals
|
|||
|
that a number of large companies, although by no means all have had some
|
|||
|
type of a problem with unauthorized use of remote access facilities.
|
|||
|
Indeed, at least one large consulting firm has been investigating this
|
|||
|
problem for several clients.
|
|||
|
|
|||
|
The difficulty in getting access to a companie's long distance
|
|||
|
facilities via remote access varies considerably. The system used by
|
|||
|
Petrie's company is one of the more difficult ro crack in that it
|
|||
|
trquires knowing the proper inward WATS number plus a valid authorization
|
|||
|
code. The system used in AT&T's Dimension PBX may be less secure in that
|
|||
|
there is one common access code for eveyone. In some systems, no access
|
|||
|
of authorization code at all is required. Simply dialing the special
|
|||
|
local or inward WATS number gives the caller immediate access to the long
|
|||
|
distance facilities. The communications manager of one large company
|
|||
|
says that his organization once used inward WATS to access long distance
|
|||
|
facilities thriugh a Centrex system without any restriction. A caller
|
|||
|
simply dialed "9" and got access to the world. In one month there was
|
|||
|
$5,000 to $6,000 in unauthorized calls to destinations such as Israel,
|
|||
|
Hong Kong and Portugal. Belatedly, the company charged the system to
|
|||
|
restrict remote access calls to the company's tie line network.
|
|||
|
|
|||
|
A consultant who has studied the problem believes that most abuse of
|
|||
|
remote access to long distance facilities involves insiders or other
|
|||
|
persons closely associated with the company. Often, it is a consumer or
|
|||
|
a supplier who finds out how to use the remote access. Sometimes it is
|
|||
|
just the difficulty in keeping authorization codes from becoming common
|
|||
|
knowledge within an organization. One company the consultant recalls was
|
|||
|
using MCI Execunet service, and the authorization code was supposed to be
|
|||
|
known by only a small group of persons. Eventually, it came to be known
|
|||
|
by a very large group. "I don't know how much security you can really
|
|||
|
put into it," the consultant says, "because once you tell the secretaries
|
|||
|
and they have to write memos to someone else, it is very hard to clamp
|
|||
|
down on it."
|
|||
|
|
|||
|
One of the country's largest manafacturing firms uses an
|
|||
|
operator-controlled system in which someone calling from outside wanting
|
|||
|
to use the long distance facilities must give the operator a four
|
|||
|
character code. The communications manager told BCR that while abuse is
|
|||
|
"not a significant problem for us, we know that there are people using
|
|||
|
the network who are not authorized to do it. Some of them are retiries
|
|||
|
from the company who have been around for a while and know the score.
|
|||
|
With 10,000 authorization codes, it's not too difficult to find a good
|
|||
|
one."
|
|||
|
|
|||
|
It appears that most cases of abuse are the result of people wanting to
|
|||
|
make free telephone calls. But there also seems to be an element of
|
|||
|
pranksterism involved. One company in the East, located near a large
|
|||
|
university, found they had a lot of outsiders accessing their telephone
|
|||
|
system. Suspecting university students, they got persmission to install
|
|||
|
a call data recorder on the main university Centrex system. The data
|
|||
|
they collected confirmed that the students were, indeed, living up to
|
|||
|
their reputation for technical wizardry. they had not only found out how
|
|||
|
to access the company's long distance facilities, but its computer system
|
|||
|
as well. Fortunately, they had not yet found out how to obtain or
|
|||
|
manipulate data in the computer.
|
|||
|
|
|||
|
John Petrie says one of the prankster's tricks "is to place a call to
|
|||
|
Company A's remote access. From Company A's system, they then call
|
|||
|
Company B's remote access; then call from Company B to Company C; then
|
|||
|
call from Company C back again to Company A and finally to a
|
|||
|
non-releasing Time and Temperature number that, of course, will never
|
|||
|
hang up. By doing this on a Friday evening (none of the companies being
|
|||
|
aware of it until Monday morning), they can tie up entire systems for
|
|||
|
many hours of overtime charges."
|
|||
|
|
|||
|
How easy is it to find a remote access number? If you have some
|
|||
|
association with a company that has one or with the telephone company,
|
|||
|
the answer is probably: not too hard. But, if you have no inside
|
|||
|
information, the difficulty is much greater.
|
|||
|
|
|||
|
To find out how hard it might be for an outsider, we decided to beomce
|
|||
|
a phone freak, and to try to find an inward WATS line connected to a
|
|||
|
remote access. AT&T says that there are about 40,000 interstate inward
|
|||
|
WATS lines, of which about one-half have unlisted numbers. Presumably, a
|
|||
|
small percentage of these unlisted nunbers are for remote access. Our
|
|||
|
experience suggests that they are not easy to find.
|
|||
|
|
|||
|
Knowing nothing about how the telephone company assigns inward WATS
|
|||
|
numbers, we began by consulting a readily available directory of listed
|
|||
|
800 numbers to see if there was any pattern to how numbers are assigned.
|
|||
|
Our assumption was that unlisted numbers would follow the same pattern as
|
|||
|
listed numbers, an assumption that seems to be true.
|
|||
|
|
|||
|
It appears from the directory that 800 numbers do have some pattern;
|
|||
|
that the digits in the exchange code vary with the geographical area.
|
|||
|
WATS lines in New York, for example, have exchange codes that begin with
|
|||
|
a different digit than WATS lines in California. (We deducted the
|
|||
|
location from the fact that the listing said that the number was good
|
|||
|
anywhere except New York or except California.)
|
|||
|
|
|||
|
Knowintg that a lot of company headquarters are located in New York, we
|
|||
|
selected some exchange codes that appear to be used very frequently in
|
|||
|
New York. We dialed these codes with varying combinations of the last
|
|||
|
four digits. After gerring three answers and six recorded announcements
|
|||
|
saying the number was no good on the first ten tries (one answer did not
|
|||
|
answer), we further analyzed the numbers and dialed 30 good numbers out
|
|||
|
of the next 40. None of these numbers, however, was connected to remote
|
|||
|
access. After these 50 unsuccessful attempts, we got bored and gave up,
|
|||
|
deciding we were not cut out to be a phone freak. But had we more
|
|||
|
perserverance or an automatic dialer, perhaps eventually we would have
|
|||
|
found a remote access system. Of course, even if we had, we would be only
|
|||
|
half-way home if the system required an authorization code.
|
|||
|
|
|||
|
It is this difficulty in getting through the security precautions that
|
|||
|
makes most observers believe abuse of remote access results generally
|
|||
|
from inside information. For the user being hit, this distinction might
|
|||
|
seem academic but it does suggest that a company can cut its losses
|
|||
|
substantially by concentrating on more internal security. The following
|
|||
|
are some effective measures:
|
|||
|
|
|||
|
1. Require a proper authorization code in addition to the access
|
|||
|
number.
|
|||
|
|
|||
|
2. Assign remote access authorization codes to a minimum number of
|
|||
|
people.
|
|||
|
|
|||
|
3. Provide enough digits in the authorization code so that you need
|
|||
|
assign only a small percentage of the maximum number of
|
|||
|
combinations.
|
|||
|
|
|||
|
4. Change authorization codes frequently.
|
|||
|
|
|||
|
5. When someone with a code leaves the company, retire the code.
|
|||
|
|
|||
|
6. If possible, install asystem which tells you if a series of invalid
|
|||
|
codes had been dialed in.
|
|||
|
|
|||
|
7. Never give information on remote access to someone you do not know.
|
|||
|
A while back, an individual posing as an Action Communications
|
|||
|
Systems employee was calling WATSBOX users and asking for remote
|
|||
|
access numbers and codes, ostensibly to update Actions's records.
|
|||
|
The caller was not from action.
|
|||
|
|
|||
|
These precautions should minimalize abuse of romote access, but they
|
|||
|
will not eliminate it. Ask John Petrie. He knows.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
==================================
|
|||
|
HOW TO CHEAT YOUR ASS OFF IN SKOOL
|
|||
|
==================================
|
|||
|
|
|||
|
"I have only learned by copying"
|
|||
|
|
|||
|
- Pablo Picasso
|
|||
|
|
|||
|
|
|||
|
MAKING IT: Nice people just don't cheat. This is a fact of life. If you
|
|||
|
do cheat, you are most likely a rotten no good stinker with
|
|||
|
commie friends, dirty underwear and a host of social
|
|||
|
diseases. The REVOLUTIONARY 3 STOOGES try to discourage
|
|||
|
this type of behaviour. It is both tacky and
|
|||
|
unsophisticated. We suggest that instead, you foloow the
|
|||
|
advice of our firends from TAKE OVER, in Madison Wis. by
|
|||
|
just forgetting the entire mess. Fuck Skool! Forget
|
|||
|
cheating. Print up your own degree instead and get on with
|
|||
|
living.
|
|||
|
|
|||
|
(1) Borrow a friend's diploma, put your name in it and make a
|
|||
|
copy suitable for framing. You can take the signature from
|
|||
|
the old diploma, and get a fascimile when the new President
|
|||
|
is named - he will probably have his signature in the papers
|
|||
|
or on all kinds of documents.
|
|||
|
|
|||
|
(2) If you have a Gemini friend, get the friend's transcript and
|
|||
|
put your name at the top - if the friend has a degree.
|
|||
|
Again, make a copy.
|
|||
|
|
|||
|
Or, if you have been here one semester - and don't rush, you
|
|||
|
have 4 years to graduate the TakeOver way - you can get your
|
|||
|
own transcript and simply fill it in with courses it might
|
|||
|
have been nice to take. Reduce-xerox your work to fit the
|
|||
|
form.
|
|||
|
|
|||
|
Consolidated Company in Chicago, a Saturn (discreet) firm
|
|||
|
will sell you a seal that works like a notary's seal for the
|
|||
|
transcript - you must emboss your list of courses and grades
|
|||
|
to give it that offical look. You design the embossing seal
|
|||
|
yourself; put your birth sign in the center if you like,
|
|||
|
some Latin on the outside, with the words "University of
|
|||
|
Wisconsin." For Latin phrases we suggest a little joking,
|
|||
|
such as "PECUNIA LOQUIT" (Money talks) or "OSCULA ASCULA"
|
|||
|
(Kiss my Ass)
|
|||
|
|
|||
|
(3) Two-thirds graduated already, thank your lucky stars and
|
|||
|
proceed to the next part of your education: references.
|
|||
|
Choose or aquire three friends who are careful about getting
|
|||
|
their mail. Appoint them Deans or Faculty members,
|
|||
|
depending on what stationery you can get or contacts you can
|
|||
|
aquire, have them write glowing reccomendations for you, and
|
|||
|
when your file is built, put it in an employment office.
|
|||
|
Some employment offices, such as the University Placement
|
|||
|
Bureau, will furnish forms for reccomendations, so you won't
|
|||
|
have to get the stationery yourself.
|
|||
|
|
|||
|
After your file is put in an employment office, job offers
|
|||
|
will be sent to you, and, as you apply for them, the
|
|||
|
companies may contact your references - let them do it by
|
|||
|
mail and you can write replies yourself.
|
|||
|
|
|||
|
Freed of the ignorance and cruelty of the Capricorns, you
|
|||
|
will have time to learn instead of just becoming passive.
|
|||
|
You can make life easier for yourself, too, by following
|
|||
|
your star on food stamps and welfare, or get a new name by
|
|||
|
writing for the copy of a birth certificate of someone your
|
|||
|
own age who died young. With this certificate you're on
|
|||
|
your way to a social security card, driver's license, phones
|
|||
|
in other names, bills falling forgotten into abandoned
|
|||
|
mailboxes, etc.
|
|||
|
|
|||
|
You can have four years of life, not the living death of
|
|||
|
crawling from class to class.
|
|||
|
|
|||
|
But, some object, "What about knowledge?" The person who has
|
|||
|
spent time at the university may just turn their eyes up at
|
|||
|
such a question, hardly able to believe that someone who
|
|||
|
could think he/she would learn anything of the slightest use
|
|||
|
while sitting in a lecture hall is not an extraterrestrial
|
|||
|
alien. The knowledgable believe that Education, under the
|
|||
|
influence of venus, is not at all lovely, but a sort of
|
|||
|
venereal disease, a cerebellic gangrene, for which this
|
|||
|
paper may be used as a condom (more mundane disease
|
|||
|
prevention may be obtained at the WSA pharmacy or the Blue
|
|||
|
Bus on Spring St).
|
|||
|
|
|||
|
|
|||
|
FAKING IT: It was the morning after. After, that is, dragging myself
|
|||
|
from the gutter in front of the Moonlight Bar to the back
|
|||
|
seat of my car. A bristly black hairy tarantula ran
|
|||
|
screaming from my mouth. Unknown substances mingled with
|
|||
|
cigarette butts in my hair. I had a mid-term exam in
|
|||
|
ancient Chinese history in 2 hours. You could say that I
|
|||
|
was unprepared. I asked myself, "What would a Mao Tse-fly do
|
|||
|
in a case like this?" But the Red Guards were nowhere in
|
|||
|
sight. I was on my own. I entered the class, paused and
|
|||
|
slowly labeled my blue book #2. I took the time writing a
|
|||
|
single grandiloquent concluding paragraph and handed it in.
|
|||
|
The professor later apologized for losing my first blue book
|
|||
|
and gave me a B. A cheat must always be resourceful.
|
|||
|
|
|||
|
1) Change the answers on graded tests. Bring them back to
|
|||
|
the prof and say, "Hey, I had this answer right."
|
|||
|
|
|||
|
2) Carry in completed blue books to the exam.
|
|||
|
|
|||
|
3) At the end of the quarter professors leave graded tests
|
|||
|
and term papers in the halls for their students. Take the
|
|||
|
best ones and save them for future use.
|
|||
|
|
|||
|
4) Keep all tests and papers to use again and again, use
|
|||
|
your friends' and visit fraternity files.
|
|||
|
|
|||
|
5) Remember to never put down what you plagerized from as a
|
|||
|
source. Use master theses from other colleges, the
|
|||
|
papers kept by departments at other colleges for the
|
|||
|
"serious researcher" and obscure books from other
|
|||
|
libraries.
|
|||
|
|
|||
|
6) Despite propaganda, term paper companies are OK.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
TAKING IT: I know of one student who walked into the school print shop
|
|||
|
as exams were being run off, sat down on an inked gally and
|
|||
|
walked off with a set of tests on his pants.
|
|||
|
|
|||
|
1) Bribe or get friends who can get tests, such as janitors
|
|||
|
and print shop workers.
|
|||
|
|
|||
|
2) Go through wastepaper cans for copies.
|
|||
|
|
|||
|
CRIBING IT: What I have come to call the "Ethiopian Shuffle" was given
|
|||
|
to me by a foriegn exchange student and has proven to be one
|
|||
|
of the best crib notes in the buisness. Taking a long
|
|||
|
narrow strip of paper that is folded like an accordion into
|
|||
|
a tiny book, you are able to write 10 times the amount of
|
|||
|
info that a normal crib sheet holds. It is then manipulated
|
|||
|
with thumb and forefinger.
|
|||
|
|
|||
|
1) Magic shops have special pensils which write invisible
|
|||
|
notes that can only been seen with special glasses.
|
|||
|
|
|||
|
2) Intelligence is transmitted to several cheaters through
|
|||
|
an elaborate signal system. Pen point is up, down is
|
|||
|
false. In multiple choice, fingers at chin level mean
|
|||
|
number of question - at waist level, number of answer.
|
|||
|
|
|||
|
3) Put cribs on the seat near your crotch. Open your legs to
|
|||
|
see it, close them to hide it.
|
|||
|
|
|||
|
4) Transistorized tape recorders can be camoflauged as
|
|||
|
hearing aids.
|
|||
|
|
|||
|
5) Be imagnitive. Hide notes everywhere. On skin and
|
|||
|
fingernails. As scrolls in objects such as watches and
|
|||
|
pens. On kleenex, gum and cigarettes. Write on the sole
|
|||
|
of your shoe for easy reading when crossing legs. On
|
|||
|
tape in the folds of clothes and behind sheer nylon.
|
|||
|
|
|||
|
|
|||
|
Viva Larry, Curly & Moe,
|
|||
|
Pancho White Villa
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=====================================
|
|||
|
TRANSIT EMPLOYEE SOLVES TOKEN PROBLEM
|
|||
|
=====================================
|
|||
|
|
|||
|
A Transit Worker who took it upon himself to tackle the TA's
|
|||
|
$1-million-a-year problem with slug token has come up with an ingenious
|
|||
|
$1 solution.
|
|||
|
|
|||
|
Thomas Costa, a 46-year-old turnstile foreman from Astoris, invented
|
|||
|
what he calls a "roll-pin" device at home.
|
|||
|
|
|||
|
"We were having a problem at the Greenpoint Ave. Station" where thin
|
|||
|
steel slugs were showing up reguarly in token clerk buckets, he
|
|||
|
explained.
|
|||
|
|
|||
|
"I came up with it for this one particular slug, but when I brought it
|
|||
|
in we found out it worked on all kinds."
|
|||
|
|
|||
|
The device works by measuring the width of the phony coins and dropping
|
|||
|
through those coins that don't fit the dimensions of legitimate tokens.
|
|||
|
|
|||
|
Forty copies of Costa's home invention were tested in several
|
|||
|
high-volume stations in Manhattan with "excellent success," a Transit
|
|||
|
Authority spokesman said yesterday.
|
|||
|
|
|||
|
This week, the TA ordered devices for the installation in every
|
|||
|
turnstile in the system.
|
|||
|
|
|||
|
Slugs and foreign coins, which have plagued the subway system since it
|
|||
|
was opened nearly 80 years ago, have been used at epidemic proportions
|
|||
|
since the fare was hiked to 75 cents last month.
|
|||
|
|
|||
|
Nearly 30,000 fare beaters have dropped phony tokens into turnstiles
|
|||
|
every week according to transit police.
|
|||
|
|
|||
|
A peak in slug use was reached in 1976 when 100,000 phony tokens a week
|
|||
|
were being used.
|
|||
|
|
|||
|
Costa submitted his invention to the TA through its employee suggestion
|
|||
|
program, which means he gives up all patent rights to the device.
|
|||
|
|
|||
|
"The TA couldn't pay [employees] for all the stuff they've come up
|
|||
|
with," Costa laughed.
|
|||
|
|
|||
|
"What did he get for developing this thing?" Costa's boss, Joe Spencer,
|
|||
|
was asked.
|
|||
|
|
|||
|
"I kissed him twice," Spencer said.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
=======================================
|
|||
|
COMPUTERS MONITOR PHONE LINES FOR FRAUD
|
|||
|
=======================================
|
|||
|
|
|||
|
New electronic "watchdogs" are making it increasingly difficult to fool
|
|||
|
Ma Bell.
|
|||
|
|
|||
|
The watchdogs are computer monitoring systems that have been set up to
|
|||
|
fight telephone toll fraud, which cost New Jersey Bell Telephone Co.
|
|||
|
millions of dollars last year through phony credit card numbers,
|
|||
|
fraudulent third-party billing and the use of eletronic devices to
|
|||
|
bypass automatic billing equipment.
|
|||
|
|
|||
|
The loss due to electronic fraud only can be guessed at, since the
|
|||
|
devices work by circumventing company billing, but Bell spokesman Ted
|
|||
|
Spencer said the company had lost $2.3 million through more conventional
|
|||
|
fraud-schemes in 1980. The costs eventually are passed on to customers.
|
|||
|
|
|||
|
Company officals say telephone bill cheaters come from all segments of
|
|||
|
society, including college students, immigrants, middle-class
|
|||
|
suburbanites, buisnessmen and the poor.
|
|||
|
|
|||
|
* * *
|
|||
|
|
|||
|
For example, a 70-year-old Patterson woman recently was caught charging
|
|||
|
more than $7,000 in overseas telephone calls to Greece using s "blue
|
|||
|
box," a device that emits tones reproducing the signals that guide
|
|||
|
telephone switching equipment.
|
|||
|
|
|||
|
Last week an Israeli couple was charged with making calls to Israel
|
|||
|
with a blue box from pay telephones throughout Union and Middlesex
|
|||
|
counties.
|
|||
|
|
|||
|
After in investigation by the telephone company, a computer analyst
|
|||
|
making $45,000 a year was charged with making fraudulent credit card
|
|||
|
calls on his lunch hour to Iran.
|
|||
|
|
|||
|
John T. Cox, Bell's district staff manager, said the detection systems
|
|||
|
for illegal electronic devices were getting better all the time.
|
|||
|
|
|||
|
"If you're using a blue box on a regular basis in New Jersey, you're
|
|||
|
going to be caught," he said flatly. "I can almost guarantee it."
|
|||
|
|
|||
|
Escorting a visitor through s seldom-seen computer room at Bell, Cox
|
|||
|
pointed out teletype monitors that can pick up the use of the device and
|
|||
|
immediately tell investigators where a call is being made from, so that
|
|||
|
cheaters frequently are arrested by local police while still on the
|
|||
|
phone.
|
|||
|
|
|||
|
Those found guilty of using a Blue Box can be fined, jailed and forced
|
|||
|
to make restitution.
|
|||
|
|
|||
|
* * *
|
|||
|
|
|||
|
A blue box is nothing more than a tone generator that gives its user
|
|||
|
access to the telephone company's long-distance lines by fooling
|
|||
|
automatic equipment. Users generally dial an 800-toll-free number and
|
|||
|
send a pulse that allows them to dial anywhere in the world without the
|
|||
|
calls registering as a toll call.
|
|||
|
|
|||
|
The device was named for the color of the first boxes sold through
|
|||
|
underground publications, but they have grown in sophistication. Cox
|
|||
|
displayed several confiscated boxes built into small handheld calculators
|
|||
|
and boxes the size of a cigarette pack. A young electronis ebgineer from
|
|||
|
Verona was arrested two years ago with a blue box he built directly into
|
|||
|
his telphone.
|
|||
|
|
|||
|
"The devices sell for up to $500, but it's not worth it." Cox
|
|||
|
commented.
|
|||
|
|
|||
|
Bell prosecutes every blue box case it uncovers and works with police
|
|||
|
departments to move quickly in catching users. Because the Blue Boxes
|
|||
|
show no record of calls, Bell has run across cases of criminals involved
|
|||
|
in drugs and prostitution using the devices.
|
|||
|
|
|||
|
Cox said the use of blue boxes was falling off, explaining "People are
|
|||
|
realizing they're going to get caught."
|
|||
|
|
|||
|
* * *
|
|||
|
|
|||
|
Since January, Bell investigators have come across 32 cases that have
|
|||
|
resulted in 12 arrests and 11 convictions.
|
|||
|
|
|||
|
Computer monitoring equipment can also pick out the use of other
|
|||
|
devices, such as black boxes, which avoid charges for incoming calls to a
|
|||
|
phone, and red boxes, which generate the sound of coins dropping in a pay
|
|||
|
phone. Cox said new billing control systems would seeon eliminate the
|
|||
|
electronic boxes.
|
|||
|
|
|||
|
Of more concern is nonelectronic fraud, which Cox said was growing
|
|||
|
nationwide. It can range from charging a long-distance phone call to a
|
|||
|
stranger, to using a stolen credit card, but computers are being put to
|
|||
|
use here.
|
|||
|
|
|||
|
Bell plans to introduce a special billing system that will need
|
|||
|
personal codes to operate, similat to automatic tellers being used by
|
|||
|
banks. Customers also will be able to stop anyone from billing a call to
|
|||
|
their number with an automatic computer block that signals an operator
|
|||
|
not to accept such calls.
|
|||
|
|
|||
|
However, it is impossible to stop all-fraud. Cox pointed out, "The
|
|||
|
people who are perpetrating the frauds know our systems."
|
|||
|
|
|||
|
|
|||
|
===========================================================================
|
|||
|
OFFICAL NPA RELEASE DOCUMENT
|
|||
|
TRANSCRIPT: TAP ISSUE #70
|
|||
|
DATE: 10/24/87
|
|||
|
LINES:987
|
|||
|
TYPED BY: THE AESTHETIC INDIVIDUAL
|
|||
|
===========================================================================
|
|||
|
|