textfiles/phreak/PHREAKING/bob-3.phk

3793 lines
172 KiB
Plaintext
Raw Normal View History

2021-04-15 11:31:59 -07:00
Guide to: Hacking, Carding Phreaking By: The Dark Lord
Introduction:
~~~~~~~~~~~~~~
This is a text file is Made By The Mickey Mouse Club and
would ask that it would be distibuted to others for there use.
This file is going to go into depth on how to Hack, Phreak, and
card. There will be information that should help everyone,
Hopefully!!
Hacking:
~~~~~~~~~~
Hacking is a long hard process, unless you get lucky. There are
many programs and aids out to make the job a lot easier, but the
concept is the same no matter how you use it. First, at least on
most things that you hack, you need to get some type of account or
vacancy, etc... This is done by randomly entering numbers and or
letters until you come up with the proper combination to find the
account. Knowing the size of the account number makes this job
one-hundred times easier. Thats why I suggest you find out from
someone who allready has one or card one. By carding the account,
it will die quickly but at least it will give you the length of the
account numbers (More on that topic will be expained in the carding
section). The accound numbers, do not always just contain numbers
or have numbers at all in it. If it has a mix, it makes it a hell
of a lot harder to get. You will just have to experiment to find
out what charactors are contained in the account. Some Examples of
ones that do have mixes of numbers and letters would be Pc Persuit
accounts. The forms of them are usuall as such:
Account: Pgp014764g
Password: 23632k
It looks from these that you are pretty much screw because of
the way letters are mixed with numbers, thats what makes having a
program so much easier. In a lot of circumstances, getting the
account is the hardest part that is why having a good background of
the system is a major plus in your favor. Once you have got the
account, it is time to get the password for this account. Once
again having the length and such makes this process not only
easier, but faster. just keep entering random passwords of the
length or the thought length in until you get a stoke of luck and
get it. You MUST remember that 99.5 out of 100 times, this is a
long process, and you have to have patience. If you don't you
might as well forget ever getting on to the system or have someone
else do it for you. Once you have gotten the password, look it
over long and hard. Write it down and keep it, examine it. 99% of
the time there is a pattern to all the account passwords. Things
to look at is the password in reference to the account number.
check to see if things have been added to the end or beginning like
00 or 01 or 99 of 0010 thing like that. If you see no relations,
- 141 -
the only other way to really find out the pattern in to get another
one. Look at both of them together, see if there the same or it
account 400's password is 3456 and 402's password is 3458 (they go
in order) then just those as a reference to other passwords, take
away so much from accounts with a lower number and add the required
amounts to accounts with a higher number, etc.... But bassicly,
LOOK FOR A PATTERN! Once you have got the password and the account,
you have got yourself a passage way in.
Although this is what you do to succeed, you have to take many
precautions. They do NOT like us messing with the system and they
obviously want you to pay just like the others, so they will take
necessary means to nail you. They trace like you wouldn't belive.
They will trace right as you get on, if you happen to be unlucky,
you will never know when they are doing it either, you must ALWAYS
be aware of the dangers and take precautions! Even on things that
you wouldn't think that they would trace you but, be carfull.
Whether they trace depends on a couple of things, here are a few
major ones:
1. There bank balance
2. There desire to catch you
3. The amount of infestation in there system
There are things that you can do to protect yourself, these are not
all of them and none of them are sure fire ways, but hey, cutting
down your chances of getting caught makes a world of difference,
because remember, All the fun is taken away if you caught. Some
things to do to protect yourself is:
1. Use a diverter
2. Use false information about you
3. Never stay On-line too long
4. Call during late or early hours, were there is most likely
no one monitoring the system
5. Don't call frequently or during the same hours, regulate it
Once again these are not all of them but these are some of the
"More" helpfull things. If you follow all the step, you can reduce
the change of getting caught by about 40%. f you do get caught
there is not a whole lot that you can do, but some tips are, first,
don't reveal any information on what you have done. Deny all
charges. Sencond, plea bargin with knowladge of things, like
hacked sytems etc.. But never admit that you did it. Three, and
most important, get a GOOD LAWYER!!!!!!!
DIFFERENT TYPES OF SYSTEMS:
Pc Persuit Cp\m, Trw, Unix, Vmb, Vms
- 142 -
These are just a few systems, if I made a complete list There would
be pratically no end to it, there are millions.
Phreaking:
~~~~~~~~~~
Phreaking, Ahhhwwww, the wonderfull world of phreaking. Well to
start with Phreaking is "The use of Telecommunications to others
besides people of the Phone Company". Well thats my version of the
definition at least. Using codes is wuit easy, there are different
parts to it, the Dial-up, the code, and the number. First you will
have to dial in the dial-up and on most dial ups you will get a
tone or a buzz or click or something to that effect. Once you hear
this, and you will know when you hear it you dial in the code.
Sometime you will get another tone or beep etc. and when you do
that is when you dial in the number. If you do not get another
tone or whatever you just dial in the number right after you
enter the code. You might have to have a test dial up to see how
the tones go. In dialing the number once agian the nubers differ.
You must enter the area code and then the nuber. Some require that
you have a one before the area code but most that I have used do not.
You can tell if the code worked right after the number has been put
in not just by the error recording that you get but if right off the
bat the phone begins to ring, it doesn't work. A code can also be busy.
If it is busy it could mean that the code is dead or that too many
people are using it at once. You might experiance this often. There
are numbers that make phreaking much safer, they are called diverters.
What the do is when the number that you have dial is being traced it
diverts it to that number. Unless this is virgin or nobody else uses
it, you will find that with in a couple of days after it is out, it
will be busy, that is the annoyance about diverters, and they are
also hard to get. Hacking is also put into play in phreaking by
using programs to get dial ups and the codes. Getting these are done
in the same way you hack anything else. Just get a program like code
thief or code hacker, or make one yourself, it is quite easy. There
is a danger with useing the codes. If you hack a code yourself, not
just the code but the dial up amd no one else has it you can pretty
well bet that it is safe. A newly hacked dial-up/code is considered
"Virgin". those Ma bell is not having the problem with people
phreaking off of it so they don't bother doing anything with it.
But after a while, it will either Die (No Longer work) or they will
start tracing off of it. The whole pain about it is, is you will
never positively no when they started doing traces or things like
that. The codes might be being traced but you are getting the luck
of the draw. On most codes they don't trace on every call, they
just file it away and watch for like the 50th or 100th caller and
then that person gets nailed. You might think if they do trace every
100 calls, that means you have a 1 in 100 chance of getting caught and
those are really good odds. Well the odd is 100 to 1 but the is a lot
of people that live in areas that they can call with that code. If you
figure about 10 million people could use it then about 100,000
- 143 -
of them are. 100,000, hummmmmmm, how odes your odds look now.
In a couple minute time spand 99 peoplecould have used it, and
lucky you might be the 100th caller. A lot of times the take like
every hundered calls and then when they get the 100th caller, that
don't just trace one, they trace 100, 101, 102, 103, 104 200, 201,
202 etc. So you chances of getting caught when the heat is on the
code is pretty good. There are a couple different types of codes
and the two major ones are 1-800's and 950's. 800's can pretty much
be dialed from anywhere in the states, but 950's stay in certain
areas. Some 950 dial ups are:
9501001
9500266
9500355
9501388
And there are others, but like take me for example, where I live
you cannot use 9500266. It will tell you that you cannot use that
number from your dialing range or it just won't work. You might
get to the point where the dial-up works but not the code. If this
is the case it will say: "Invalid authorization Code" Some examples
of 1-800's are as follows:
1-800-255-2255
1-800-759-2345
1-800-959-8255
There are many others but those are just a few, very few. There
are also 1-800's and others that will send you directly to the
operator, you must tell her the code and the number you are
dialing. These are NEVER safe to use. but in one case they are
alot better. I am out of town a lot so I have to use pay phones
right? Well, you are safe with anything with pay phones, so that
is a good way to call people. The real good thing them though, is
since you must go throught th operator, the codes stay valid for up
to 10 times as long as the others. But thenm again another draw
back is it is not a line that you want to give real names or
numbers over. Because these are often tapped, since the
operator know that you used the code, they will listen in quite
often, and you will never even notice. Another problem experianced
with them is if you are what MMC calls
"Petite Flowers", our home made word for , someone that sounds like
a little kid, then they really give you a hastle about using the
code. I have had a lot of people ask me if the person you are
calling with the codes can get busted. The answer is "No". They
cannot do anything to the person, just ask him who is calling him
with the codes, and they rarely do that. Just let the person you
are talking to, if they don't already know, not to tell anyone that
you are calling with the codes. The phone companies do have to option
of setting up a trace on that persons line and bust you when you do call
- 144 -
him with a code. I have never seen this done but do be aware that
the phone companies are made up of intellegent adults and they are
very smart and can and will nail you in many ways. I am a firm beliver
that you should share a the information that you other phreakers and
hackers as they should do the same with you. I also see an execption,
inexperianced people. They can run it for everyone be not have the
knowladge and screwing up. I realize that they need someway to build
themselves up to a good phreaker but be cautions in what you give to
them. Codes die really often and you really have to keep up with the
phone company. Its kinda of a pain to keep up with it on your own as
quickly as they work but thats why there is phreaking communities and
groups such as Fhp and MMC, the gives the edge to the phreakers in the
way that, you have help in keeping up with the phone companies, and in
most cases if the groups or communities are working well together,
you can eve stay one step ahead of good 'ole Ma bell and others.
You really need to find ways of getting codes either from getting
acess to the phreaking sections on the pirate boards you call or
throught friends, Vmb's Loops, Confrences, etc., just try to find a
good connection to people that are into phreaking too.
Carding:
~~~~~~~~~
Although everything talked about in the text file to this point is
illegal, and you will get busted if you get caught, this is one one
the one that you can get in some major shit over. About the only
thing I have talked about that this falls short of is hacking a
government compter, and thats one of the Grand daddies of them all.
Well, although it is a major crime, it is really cool!!!! This is
the process in which you find the card number of someone and use it
to purchase things. In order to card, there are a few things that
you must have or it will not work. You will need to have........
1. The Card Number
2. The Experation date
3. Card type (Master Card, Visa, etc...)
Those are the main things tha you will need. Having the name of
the owner is very helpfull but it is not a must. You can get by
without it. You have to order everything you want by mail. A
couple of "Beginner" carder that I talked to didn't understand how
you would do it, but thats when they had the misconception that you
actually go to the store and purchase things. That is a complete No,
no. You do everything from a phone ordering service. When you call make
sure that you are a t a pay phone. Don't do it your house or anywhere
where it can come back to you. When you order the merchandice, once
again do send it to anywhere that it can come back to you like your
home, work, etc. Find a vacant house or building or anywhere else
that you can send it to. Also, don't send it to a P.O. box that you
have, just as dangerous.
- 145 -
When you do order it and you think its around the time that you
will be reciving it, check the mailbox frequently. But do it
during odd hours. I mean, hows it going to look you taking a
package from a vacant house? Most bills are sent at the end of the
month or at the biginning, so try to time it to where the bill
won't come to the person untill a couple of days after you have
recived the package. Ok heres how to figure it. I have found out
that the bills are sent out up around the 26-30th of the month, so
they will actually recive the bill around the 31-4th. Have it sent
right after you think the bill has been sent. Find what you want,
but try to order it from the place that guarentees the fastest
delivery. When you order the item, make sure they have it in stock
and don't have to get the item in first. Order the highest class
of delivery but not COD or next day service. Thats cutting it too
close. It should take around 2-4 weeks before you get it and if
you timed it right, then it sound get there right before the person
gets the bill. You need to have it in your possesion before the
bill gets to the person because if they complain, they can keep it
from being sent, or watch who actually gets it even while its going
throught the mail process. Don't order more than a couple of things
or overcharge the card, if the people at the Credit card office,
see irregular charging on the card, they will follow up on it. To
actually order the item you will call up the place that you will be
ordering from, and when the operator answers let her know what you
need to as far as what you are purchasing, etc. When she ask how you
will be paying just tell her "Charge" and the the type of card like
Master Card, Visa, ect. Then Tell them your name, if you don't know
the name of the actuall owner of the card, Make up a false name that
has NO relation to your name, not the same first, last middle what
ever, nothing relating to your real name. Then continue answering all
the operators questions, address (Not your own remember!) state, area
code etc. They will also ask for your phone number. Make one up, not
your own. If something happens to go wrong as far as delivery or if
they are checking if you are who you say, then your screwed, unless of
course, hehehe, the number is ALWAYS busy. Find the busiest number
there is and leave them that. When they ask for the card number and
experation, just tell them and do what all else you need. Wish them a
good day, and hope you get it. Ok heres how you check if the card is
good, and how much money can be charged on the card.......
1. Dail 1-800-554-2265
2. it will ask for the type of the card. you must put in 10 for
Master Card and 20 for Visa, I am not sure about the others.
3. Next it will ask for the Identification. You will need to enter
1067
4. After all that you will have to enter the Mecrchant number,
which you will either need to put in 24 or 52. One of them
should work.
- 146 -
5. You will then have to enter (When Prompted) the card number
itself.
6. Next, the experation date of the card.
7. Last but not least the amount you want to try to get on the
card. The procedure for this is enter dollars, astricks, then
cents. (Example:) 100*30 = One hundred dollars and thirty cents.
One thing I do need to mention, after you type in everything you
must press pound (#). Like when it asks you for the type of card,
if you had a Master Card you would put: 10#. when it asked for
identification you would enter 1067#. If it says invalid, that
either means that the card is no good or you can't charge that
amount on the card. Try it again, but try a lower amount. If
you get down to $1 and it still doesn't work, hehehe, you can
probably guess that the card is no good. You might not be ordering
just merchandice you might be ordering accounts and things like that
and if you are, fine, but you have to remember, the accounts do not
stay good for very long, the owner of the card gets the bill,
complains and its no longer any good. And when you card and
account, Nine out of ten times, they won't kill the account, they
will trace in and that is when you butts really in a sling. So
carding accounts and things, isn't the safest way to go, of course.
nothing we have talked about it, right?
Conclusion:
~~~~~~~~~~~~~~
Well thats about it for now, there should be a BIG newsletter by
The mickey Mouse Club comming out soon that you have to be sure NOT
to miss. I sincerely hope that you have gotten alot out of this
newsletter and I would like to ask for suggestions and Ideas to
make MMC a better orginazation. At this time myself and Cardiac
Arresst have a Vmb at: 1-800-444-7207 [Ext] 4001. All ideas and
suggestions, please bring there. Also, since your making the trip
anyways, bring along some phreaking codes and all and any types of
accounts. I would be greatly appreciated by: The Mickey Mouse
Club.
- 147 -
LOD/H BUST By Pizza Man
" U.S. computer investigation targets Austinites "
------------------------------------------------------
[ The above caption high-lighted the Saturday March 17, 1990
edition of the Austin American-Statesman [ Austin, Texas ]. The
article has been copied in its entirety, and the main point for
typing this up was because of the involvement of the LOD/H
throughout the article. ]
The U.S. Secret Service has seized computer equipment from two
Austin homes and a local business in the past month as part of a
federal investigation into electronic tampering with the nation's
911 emergency network. Armed Secret Service agents, accompanied by
officers from the Austin Police Department, took the equipment in
three March 1 raids that sources say are linked to a nationwide
federal inquiry coordinated by the Secret Service and the U.S.
attorney's office in Chicago. While federal officials have declined
to comment on the investigation - which focuses on a bizarre mix of
science fiction and allegations of high-tech thievery - the Austin
American-Statesman has learned that the raids targeted Steve
Jackson Games, a South Austin publisher of role-playing games, and
the home of Loyd Blankenship, managing editor at the company. A
second Austin home, whose resident was acquainted with Jackson
officials, also was raided. Jackson said there is no reason for the
company to be investigated Steve Jackson Games is a book and game
publisher of fiction, he said, and it is not involved in any
computer-related thefts. The agents, executing search warrants now
sealed by a judge from public view, took computer equipment,
including modems, printers, and monitors, as well as manuals,
instruction books and other documents. The equipment has been
forwarded to federal officials in Chicago. The Secret Service,
best-known for protecting the president, has jurisdiction in the
case, government officials say, because damage to the nation's
telephone system could harm the public's welfare. In addition,
the system is run by American Telephone & Telegraph Co., a
company involved in the nation's defense. The 911 investigation
already has resulted in the indictment of two computer "hackers"
in Illinois and sources say federal authorities now are focusing
on Austin's ties to a shadowy underground computer user's group
known as the Legion of Doom.
The hackers, who live in Georgia and Missouri, where indicted in
Chicago. they are believed to be members of the Legion of Doom and
are charged with seven counts, including interstate transportation
of stolen property, wire fraud, and violations of the Computer
Fraud and Abuse Act of 1986.
The government alleges that the defendants stole a computerized
copy of Bell South's system that controls 911 emergency calls in
nine states. The information was then transferred to a computer
- 148 -
bulletin board and published in a hacker publication known as
Phrack! A trial in the case is scheduled to begin in June. U.S.
agents also have seized the final drafts of a science fiction
game written by the Austin-based game company. Sources say the
agents are trying to determine whether the game - a dark,
futuristic account of a world where technology has gone awry - is
being used as a handbook for computer crime. Steve Jackson, the
owner of the local company and a well-known figure in the
role-playing game industry, said neither he nor his company has
been involved in tampering with the 911 system.
No one in Austin has been indicted or arrested as a result of the
investigation. "It is an on-going investigation. That is all I
can say," said Steve Beauchamp, special agent-in-charge of the
Secret Service Austin field office. "Until we can put it all
together, we just do not comment," he said.
Bob Rogers, Jackson's Dallas attorney, said federal officials have
assured him that neither Jackson nor Jackson Games is the target of
the probe. The authorities would not tell Rogers whether the
inquiry focused on other company employees. As for the science
fiction game, called Cyberpunk, Jackson said federal authorities
have mistaken a fictional work for a technical manual [E.N. Why
does this sound all too familiar?] . "It's not a manual for
computer crime any more than a Reader's Digest story on how to
burglar-proof your house is a manual for burglars," said Jackson,
36. "It's kind of like the hints you get on safe-cracking from a
James Bond movie."
Blankenship, the author of the book, said his attorney has advised
him not to comment on the book or the Secret Service investigation.
Jackson said he guesses his company was linked to the 911 probe by
its use of a computer bulletin board system, called Usenet. The
board, one of hundreds throughout the country, is a sort of
electronic Town Square, where personal computer users from
throughout the world can tap into the system via phone lines and a
modem.
The network, free and relatively unregulated, is an information
exchange where users can post information, exchange electronic
messages and debate with keyboards everything from poetry and
politics to nuclear war. One of the world's largest networks -
boasting more than 600,000 users - Usenet was tapped by Chinese
students in North America to organize support for students during
the pro-democracy demonstrations last year. The network also was
infected in 1988 by a now-famous computer "virus" unleashed by
college student Robert Morris. Jackson said his company has
maintained a bulletin board on the Usenet network on which it posts
advanced copies of its role-playing games. The firm posts the games
and requests that the users of the network comment on the text and
propose improvements. The Jackson bulletin board, called Illuminati,
greets users with the
- 149 -
company's logo and a message that states: "Welcome to the
World's Oldest and Largest Secret Conspiracy." Over the past
several months, the company has been posting drafts of Cyberpunk
for review. The resident of the second Austin home raided by the
Secret Service was acquainted with Jackson and had made comments
about the game on Usenet. He asked to remain anonymous. Typical
of Cyberpunk literature, the game is set in a bleak future, much
like the world portrayed in Max Headroom, formerly a network
television program. Computers and technology control people's
thoughts and actions and are viewed both as a means of oppression
and as a method of escape. Portions of Jackson's Cyberpunk viewed
by the Austin American Statesman include a detailed discussion on
penetrating government computer networks and a list of fictitious
programs used to break into closed networks. Bruce Sterling, an
Austin science fiction writer and one of the world's best-known
Cyberpunk writers, said Jackson's game and its computer-related
discussions are hardly unusual for the genre. "Cyberpunk is
thriller fiction." Sterling said. "It deals to a great extent
with the romance of crime in the same way that mysteries or
techno-thrillers do." He said the detailed technical discussions
in the Jackson games are what draws people to them. "That's the charm
of simulating something that's supposed to be accurate. If it's
cooked up out of thin air, the people who play these games are going
to lose interest."
Jackson, though, said he has been told by Secret Service agents
that they view the game as a user's guide to computer mischief. He
said they made the comments where he went to the agency's Austin
office in an unsuccessful attempt to reclaim some of his seized
equipment. "As they were reading over it, they kept making
outraged comments," Jackson said. "When they read it, they became
very, very upset. "I said, 'This is science fiction.' They said,
'No. This is real.'" The text of the Cyberpunk games, as well as
other computer equipment taken from Jackson's office, still has not
been returned. The company now is working to rewrite portions of
the book and is hoping to have it printed next month. In addition
to reviewing Cyberpunk, sources say federal authorities currently
are investigating any links between local computer hackers and the
Legion of Doom. The sources say some of the 911 information that
is the subject of Chicago indictments has been traced to Austin
computers. Jackson's attorney said federal officials have told him
that the 911 information pilfered from Bell South has surfaced on
a computer bulletin board used at Steve Jackson games. But the
information apparently has not been traced to a user. Jackson
said that neither he nor any of his employees is a member of
the Legion of Doom. Blankenship, however, did consult with the
group in the course of researching the writing the Cyberpunk game,
Jackson said. Further, the group is listed in the game's
acknowledgments for its aid in providing technical information used
in Cyberpunk. For these reasons he believes Blankenship is
- 150 -
a local target of the federal probe, though none of the
investigators has yet confirmed his suspicion. "My opinion is that
he is (being investigated)," Jackson said, "If that's the case,
that's gross. he had been doing research for what he hoped would be
a mass-market book on the computer underground," Jackson said. The
other Austin resident raided by the authorities, who asked to
remain anonymous, acknowledged that he is the founding member of
the Legion of Doom and that copies of the 911 system had surfaced
on the group's local bulletin board. The 20-year-old college
student said the information hardly posed any threat to the 911
system. "It was nothing," he said. "It was garbage, and it was
boring." In the Chicago indictment accuses the group of a litany of
electronic abuses, including: disrupting telephone service by
changing the routing of telephone calls; stealing and modifying
individual credit histories; stealing money and property from
companies by altering computer information; and disseminating
information about attacking computers to other computer hackers.
The Austin Legion of Doom member said his group's worst crime is
snooping through other people's computers. "For the most part,
that's all we do," he said. "No one's out ripping off people's
credit cards. No one's out to make any money. "We're just out to
have fun." The group member said the fact that the legion is shrouded
in mystery adds to its mystique - and to the interest law enforcement
agents have in cracking the ring. "It's an entirely different
world," the student said. "It's a very strange little
counter-culture. "Everybody who exists in that world is familiar
with the Legion of Doom," he said. "Most people are in awe or are
intimidated by it."
A shadowy gang of computer hackers with ties to Austin has become
the target of a massive federal probe into the nation's high-tech
underground. Federal and local authorities involved in the inquiry
seized evidence from three Austin homes and a business in March.
They say some action on the local cases, possibly including
indictments or arrests, is expected in the next month.
The computer crime crackdown - the largest ever launched by the
U.S. government - has resulted in the temporary disbanding of the
Legion of Doom, a notorious national group of young computer
hobbyists with at least two Austin members. State and federal
investigators say the 6-year-old group, which once boasted more
than 150 members in nearly every U.S. state, has been connected
to a string of computer crimes in Texas, Georgia, Arizona,
Illinois, California and New Jersey. Officials say group members
have electronically stolen money and long-distance telephone access
numbers, changed credit reports, planted datadestroying computer
viruses in government networks, attempted to tamper with hospital
patient records, and distributed information that, if used, could
have debilitated the nation's 911 emergency response network. So
far, only four Legion of Doom members have been indicted for the
crimes, and none has gone to trial. However, an investigation team
- 151 -
coordinated by Assistant U.S. Attorney William Cook in Chicago and
including the secret Service, the U.S. Department of Justice, the
FBI and a handful of state attorney generals, has in the past six
months raided the homes and businesses of about a dozen suspected
legion members across the country. In Austin, Secret Service agents,
local police and officers from the University of Texas Police
Department seized computer equipment and documents from three homes
as part of the probe. One local business, a role-playing game-
publishing company called Steve Jackson Games, also was raided in
the March crackdown, but officials say the firm is not a primary
target of the hacker investigation. The firm is believed to have
been raided because investigators wanted to examine equipment used
by an employee. The search warrants used in the raids remain sealed
from public view, and Secret Service and UTPD officials declined to
comment on the case. Law enforcement sources say one of the targets
of the Austin investigation is a juvenile who is not believed to be
a member of the hacker group. The two other Austinites under
investigation are legion members, authorities say, and have been
linked to the 911 probe centered in Chicago. According to law
enforcement sources, the two men helped circulate information about
the 911 system's software through a national bulletin board network
that hackers could call by using a telephone, a computer and a modem.
In addition, details about ways to tamper with the emergency system
were published in Phrack, a legion newsletter. While no one in Austin
has been indicted or arrested, officials said they expect some action
on the local cases in the next month. And state and federal authorities
involved in the national investigation say they are preparing dozens of
additional indictments aimed at the entire membership roster of the
Legion of Doom. "It doesn't matter whether you commit a burglary by
telephone or by breaking into a building," said Gail Thackeray, an
assistant attorney general in Arizona, one of a handful of state
investigators working solely on computer crime. "Did they expect that
the rest of us would sit by and let every idiot kid in America break
into our 911 system?" she said. "I do not respect the right of hackers
to learn what they want to learn at the expense of the rest of us."
Thackeray, who helped investigate a hacker's attempt to break into
the computer system at the Barrow Neurological Institute in Phoenix,
said the recent legion crackdown is a result of improved coordination
among law enforcement agencies with jurisdiction over computer crime.
In addition, she said, the effort has been boosted by a new breed of
investigators with computing expertise. Because of the potential
for widespread damage to both government and business computer
systems, officials say the hacker probe has caught the eye of the
Justice Department, which is pushing U.S. attorneys throughout the
country to beef up their computer crime-fighting capacity. "There
is a push on Capitol Hill to shore up our activity in this area,"
said an assistant U.S. attorney who asked not to be named. "I
think this is the beginning of a boom." Said Thackeray: "There's
more computer crime going on out there than any one agency can
- 152 -
handle. We're totally flooded." For members of the Legion of Doom,
the unwanted law enforcement attention is nothing new. Formed in 84
and named for a gang at took on Superman and other heroes in the
television cartoon Superfriends, the group has survived two other
waves of criminal investigations. The first, in 1985, resulted in
the Arrrest and conviction of five of the legion's founders for credit
card fraud and theft by wire. After a brief resurgence, group
members again were arrested en masse in 1987, only to revive again
in 88. But according to investigators familiar with the group,
pressure form the recent legion crackdown is the most intense to
date. Several of the investigators said the legion has shut down,
at least for now. A history of the group written by one of its
founders and obtained by the Austin American- Statesman seems to
bear out investigators' suspicions. The 10- page document recounts
significant developments in the group's history, from its founding
in 1984 (an event "that would ulti- mately change the face of the
computer underground forever," the brochure states), to its
current, besieged status. The pamphlet acknowledges that "there is
no indication that points to a resurgence in the future" and ends
with the words "Legion of Doom (84-90)." The brochure also takes
potshots at federal investiga- tors and the media, often accused by
legion members of exaggera- ting their crimes and sensationalizing
the group. "The Legion of Doom has been called everything from
'organized crime' to a 'communist threat to national security' to
an 'international conspiracy of computer terrorists bent on
destroying the nation's 911 service,'" the brochure states.
"Nothing comes closer to the actual truth than 'bored adolescents
with too much spare time.'" Finally, the legion history includes an
"alumni" list that conttains the code names of 38 current and former
members. According to the legion's own accounting, 14 of the 38 people
on the list have either been convicted of computer crimes or are under
investigation. Officials familiar with the group say the legion's
characterization of itself as a clique of bored whiz kids is
inaccurate. Instead, they portray group members as sophisticated
and organized malcontents who do not accept conventional concepts
of respect and trust. "These are not just wacky kids," Thackeray
said. "They have absolute contempt for the rest of us." "They are
constantly in a high-level skill kind of game, part of a thrill.
They've totally lost touch with reality." William Murray, a systems
security fellow for the Ernst & Young accounting firm, said even
though hackers take advantage of the tremendous power of personal
computers, they still view their crimes as an electronic game of
cat and mouse. "This whole sense of excitement and joy is not
tempered," Murray said. "Nobody has told them that they have a
responsibility for polite behavior." Some states, including
Arizona, are developing treatment programs for hackers. Patterned
after Alcoholics Anonymous and drug-treatment centers, the programs
are aimed at rehabilitating hackers who have grown dependent on
their craft. "It is absolutely addictive behavior," Thackeray said.
"When they get their hands on tools as powerful as these computers,
they lost all judgement."
- 153 -
Operation "Sun-Devil" by Phreak_Accident
=====================
May 9th and 10th brought on two day thats would be marked in
every hackers history book. The reason we assume these days will
be important to many, is that maybe it's time we opened are eyes
and saw the witch hunt currently in progress. In less than 48
hours, 150 Secret Service men and other law officials served 30
search warrents in 14 cities around the nation (This thing was
hudge). Operation "Sun-Devil" (As the Attorney General in Phoenix
called it), was a success on their part. "The investigation though
is not over, and there are more warrents to be executed.", said
Jim Folwer of L.A's Secret Service. Any details of the
investigation are not being given out at this time. The Asst.
Attorney General of Pheonix told Phrack Inc. that there were
other problems involving the investigation and that it was an
ongoing investigation for the last TWO years. It is my
understanding that Gail Thackeray and the Secret Service are not,
taking this lightly. She told Phrack inc. that they are not
distinquishing pirates, hackers, or phreakers. Basically, it's any
kid with a modem that calls a BBS with an alias. Yes, we are the
witches, and we are being hunted.
The following are Two news releases obtianed via fax through the
U.S. Secret Service for Phrack Inc.
N E W S R E L E A S E
FOR IMMEDIATE RELEASE CONTACT: Gail Thackeray
------------------------ Assitant Attorney General
May 9, 1990 @ 11:00 A.M. (602) 542-4266
Attorney General Bob Corbin announced today that in connection with
an eighteen-month joint investigation into computer crime conducted
with the United States Secret Service and the United States
Attorney's office, the Arizona Attorney General's office has
executed seven search warrants in which computers, electronic
bulletin boards, telephone test equipment and records have been
seized. The Organized Crime and Racketeering Division investigation
involved complaints by Arizona and out of state victims of
substantial financial losses resulting from credit card fraud and
theft of long distance telephone and data communications services,
and by victims of attacks on computer systems operated by
government agencies, private corporations, telephone companies,
financial institutions, credit bureaus, and a hospital. The Arizona
Attorney General's office received information and technical
assistance from the Glendale, Arizona Police Department's Computer
Crime Unit, and from many private sector sources, including Bellcore
(Bell Communications Research), American Express, Communications
carriers U.S. Sprint, AT&T, MCI,Com Systems, MidAmerican
Communications, LDL Communications, and Shared Use Network. Without
the cooperation of these companies and of numerous federal,
- 154 -
state and local law enforcement agencies around the country, this
investigation would have been impossible. The privacy of our citizens
and the health of our economy depend upon secure, reliable computer
systems. Computer fraud and attempts to compromise senstitive public
and private computer systems will not be tolerated. Individuals who
commit these offenses in Arizona can expect to be prosecuted.
.end.
P R E S S R E L E A S E
FOR IMMEDIATE RELEASE Contact: Wendy Harnagel
Wednesday, May 9, 1990 United States Attorney's Office
---------------------- (602) 379-3011
PHOENIX -- Stephen M. McNamee, United States Attorney District of
Arizona,
Robert K. Corbin, Attorney General for the State of Arizona, and
Henry R. Potosky, Acting Special Agent in Charge of the United
States Secret Service Office in Phoenix, today announced that
approximately twenty-seven search warrants were executed on Monday
and Tuesday, May 7 and 8, 1990, in various cities across the nation
by 150 Secret Service agents along with state and local law
enforcement officials. The warrants were issued as a part of
Operation Sundevil, which was a two year investigation into alleged
illegal computer hacking activities. The United States Secret
Service, in cooperation with the United States Attorney's Office,
and the Attorney General for the State of Arizona, established an
operation utilizing sophisticated investigative techniques,
targeting computer hackers who were alleged to have trafficked in
and abuse stolen credit card numbers, unauthorized long distance
dialing codes, and who conduct unauthorized access and damage to
computers. While the total amount of losses cannot be calculated at
this time, it is estimated that the losses may run into the millions
of dollars. For example, the unauthorized accessing of long distance
telephone credit cards have resulted in uncollectible charges. The
same is true of the use of stolen credit card numbers. Individuals are
able to utilize the charge accounts to purchase items for which no
payment is made. Federal search warrants were executed in the following
cities: Chicago, IL - Cincinatti, OH - Detroit, MI - Los Angeles, CA
Miami, FL - Newark, NJ - New York, NY - Phoenix, AZ - Pittsburgh, PA -
Plano, TX - Richmond, VA - San Diego, CA San Jose, CA
Unlawful computer hacking imperils the health and welfare of
individuals, corporations and government agencies in the United
States who rely on computers and telephones to communicate.
Technical and expert assistance was provided to the United States
- 155 -
Secret Service by telecommunication companies including Pac Bel,
T&T, Bellcore, Bell South, MCI, U.S. Sprint, Mid-American,
Southwestern Bell, NYNEX, U.S. West, and by the many corporate
victims. All are to be commended for their efforts for their
efforts in researching intrusions and documenting losses. McNamee
and Corbin expressed concern that the improper and alleged illegal
use of computers may become the White Collar crime of the
1990's. McNamee and Corbin reiterated that the state and federal
government will vigorously pursue criminal violations of statutes
under their jurisdiction. Three individuals were arrested yesterday
in other jurisdictions on collateral or independent state charges.
The investigations surrounding the activities of Operation Sundevil
are continuing. The investigations are being conducted by agents of
the United States Secret Service and Assistant United States
Attoryney Tim Holtzen, District of Arizona, and Assistant Arizona
Attorney General Gail Thackery.
.end.
_________________________________________________________________
RIPCO May 8th, 1990
----- -------------
Operation Sun-Devil claimed more than just a few "Codelords" around
the states, it claimed one of the oldest and more popular boards.
Nobody knows when or if RIPCO shall return. Reportedly, Dr. Ripco
was charge on a hand-gun violation after his house was searched.
Phrack inc. can't comment on this. The following is the exact
transcript of the message left on RIPCO's answering
maching after Operation Sun-Devil.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This is 528-5020. As you are probably aware, on May 8, the Secret
Service conducted a series of raids across the country. Early news
reports indicate these raids involved people and computers that
could be connected with credit card and long distance toll fraud.
Although no arrests or charges were made, Ripco BBS was confiscated
on that morning. It's involvement at this time is unknown. Since
it is unlikely that the system will ever return, I'd just l say
goodbye, and thanks for your support for the last six and a half
years. It's been interesting, to say the least.
Talk to ya later.
{Dr. Ricpo}
*** END OF VOICE MESSAGE ***
_________________________________________________________________
{C}omputer {E}mergency {R}esponse {T}eam
----------------------------------------
Some call it "Internet Police" -- Others call it "just stupid."
CERT however is a mix. But I do give them credit -- After all,
have your number one goal being 'making the Internet more secure'
has to be a tough task. Therefore, we give them credit. However,
- 156 -
CERT is funded by DARPA, which is a government agency. And
anything in my book that the government runs is bad news. Yes,
the government pays the 6 man salary and keep their hot-line active
24 hours a day. Ahh.. What do you know about CERT? "Nothing" you
say? Well, the following is the press release and other reprints
of information about CERT.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Richard Pethia <rdp@SEI.CMU.EDU>
DEAR XXXXXXXXX,
I have been reviewing our correspondence files and have discovered
that your request for information may not have been filled. I
apologize for the delay and hope that the information is still
useful to you. If, after reading the following, you have
additional questions or would like to subscribe to one of
our information lists, please send email with your
question/request.
The Computer Emergency Response Team (CERT) was established by the
Defense Advanced Research Projects Agency in November of 1988 to
serve members of the Internet Research community. The press
release below describes the general role of the CERT. More
specifically, the CERT supports individual Internet sites by:
-Working with site personnel to help resolve individual computer
security incidents. Contact potentially affected sites to warn
them of possible security breaches. Work with sites to change the
conditions that allowed incidents to occur. -Issuing advisories
that alert the community to specific system vulnerabilities or
intrusion techniques, as well as the methods to protect against
them. -Working with the community and system (primarily Unix) vendors
to reslove specific system vulnerabilities. -Maintaining and
operating moderated mailing lists that: (1) provide a discussion
forum for tools and techniques to improve the security of Unix
systems, and (2) provide a discussion forum and alert mechanism for
PC viruses, trojan horses, etc. Over the past year we have developed
hundreds of working relationships with members of the Internet and
other communities and have established an extensive information
collection and dissemination network. Because of this network of
cooperating individuals and organizations, we are often able to
advise the community of problems allowing them to take corrective
action before being affeceted by those problems.
No. 597-88
(202) 695-0192 (Info.)
(202) 697-3189 (Copies)
IMMEDIATE RELEASE 12 6, 1988 (202) 697-5737 (Public/Industry)
DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM
The Defense Advanced Research Projects Agency (DARPA) announced
- 157 -
today that it has established a Computer Emergency Response Team
(CERT) to address computer security concerns of research users of
the Internet, which includes ARPANET. The Coordination Center for
the CERT is located at the Software Engineering Institute (SEI),
Carnegie Mellon University, Pittsburgh, PA. In providing direct
service to the Internet community, the CERT will focus on the
special needs of the research community and serve as a prototype
for similar operations in other computer communities. The National
Computer Security Center and the National Institute of Standards
and Technology will have a leading role in coordinating the
creation of these emergency response activities. The CERT is
intended to respond to computer security threats such as the recent
self-replicating computer program ("computer virus") that invaded
many defense and research computers. The CERT will assist the
research network communities in responding to emergency situations.
It will have the capability to rapidly establish communications
with experts working to solve the problems, with the affected
computer users and with government authorities as appropriate.
Specific responses will be taken in accordance with DARPA policies.
It will also serve as a focal point for the research community for
identification and repair of security vulnerabilities, informal
assessment of existing systems in the research community,
improvement to emergency response capability, and user security
awareness. An important element of this function is the development
of a network of key points of contact, including technical experts,
site managers, government action officers, industry contacts,
executive level decision-makers and investigative agencies, where
appropriate. Because of the many network, computer, and systems
architectures and their associated vulnerabilities, no single
organization can be expected to maintain an in-house expertise to
respond on its own to computer security threats, particularly
those that arise in the research community. As with biological
viruses, the solutions must come from an organized community
response of experts. The role of the CERT Coordination Center at
the SEI is to provide the supporting mechanisms and to coordinate
the activities of experts in DARPA and associated communities. The
SEI has close ties to the Department of Defense, to defense and
commercial industry, and to the research community. These ties
place the SEI in a unique position to provide coordination support
to the software experts in research laboratories and in industry
who will be responding in emergencies and to the communities of
potentially affected users.
The SEI is a federally-funded research and development center,
operating under DARPA sponsorship with the Air Force Systems
Command (Electronic Systems Division) serving as executive agent.
Its goal is to accelerate the transition of software technology to
defense systems. Computer security is primarily a software
- 158 -
problem, and the presence of CERT at the SEI will enhance the
technology transfer mission of the SEI in security-related areas.
-END-
QUESTIONS AND ANSWERS: DARPA ESTABLISHES CERT, 12/6/88
Q: Can you provide background on earlier break-ins?
A: On November 2, 1988, thousands of computers connected to
unclassified DoD computer networks were attacked by a virus.
Although the virus did not damage or compromise data, it did
have the effect of denying service to thousands of computer
users. The computer science research community associated
with the Defense Advanced Research Projects Agency (DARPA),
along with many other research laboratories and military sites
that use these networks, quickly responded to this threat.
They developed mechanisms to eliminate the infection, to block
the spread of the self-replicating program, and to immunize
against further attack by similar viruses. Software experts
from the University of California at Berkeley, with important
contributions from the Massachusetts Institute of Technology
and other network sites, rapidly analyzed the virus and
developed immunization techniques. These same software
experts also provided important assistance in the more recent
Internet intrusion of 27-28 November. As the events unfolded,
DARPA established an ad hoc operation center to help
coordinate the activities of software experts working around
the clock and to provide information to appropriate government
officials. The operations center had three main tasks. It
facilitated communications among the many groups affected, it
ensured that government organizations were promptly informed
of developments, and it provided initial technical analysis in
DoD. Although the threat was contained quickly, a more
maliciously designed virus could have done serious damage. The
recent events serve as a warning that our necessarily
increasing reliance on computers and networks, while providing
important new capabilities, also creates new kinds of
vulnerabilities. The Department of Defense considers this an
important national issue that is of major concern in both the
defense and commercial sectors. The DoD is developing a
technology and policy response that will help reduce risk and
provide an emergency reaction response.
Q: Who will be on the CERT?
A: The CERT will be a team of over 100 experts located throughout
the U.S. whose expertise and knowledge will be called upon
when needed. When not being called upon, they will continue
their normal daily work. As noted in the release, these
experts will include: technical experts, site managers,
government action officers, industry contacts, executive-level
decision-makers and representatives from investigative
agencies. recommendations that will be acted upon by DoD
authorities.
- 159 -
Q: Is the CERT fully operational now?
A: We are in the very early stages of gathering people for the
CERT. We are first concentrating on collecting technical
experts. A staff is in place at SEI, but details are still
being worked out.
Q: Will there just be one CERT?
A: The intent is that each major computer community may decide to
establish its own CERT. Each CERT will therefore serve only a
particular community and have a particular technical
expertise. (The DARPA/SEI CERT will serve, for example, the
research community and have expertise in Berkeley-derived UNIX
systems and other systems as appropriate.) The National
Computer Security Center and the National Institute of
Standards and Technology will support the establishment of the
CERTs and coordinate among them.
Q: What are the special needs of the research community that
their CERT will serve?
A: The special challenge of the research community is improving
the level of computer security without inhibiting the
innovation of computer technology. In addition, as is often
DARPA's role, their CERT will serve as a prototype to explore
the CERT concept so that other groups can learn and establish
their own.
Q: Does the CERT Coordination Center have a press point of
contact?
A: No. Their function is to serve as a nerve center for the user
community.
.end
_________________________________________________________________
USA Today and the devil
-----------------------
Many controversies have been made of the article printed in USA
Today after Operation Sun-Devil took it's toll.
Phrack inc. tried to contact the author, and with no luck she wast
accepting phone calls. Please remember, this is only a USA Today
article -- C'mon, get real USAT.
byline 'Debbie Howlett, USA Today' reads:
A network of computer hackers operating in 14 cities -- which
bilked phone companies of $50 million -- has been unplugged, police
say.
- 160 -
"We're not talking about somebody who played Space Invaders too
many times," says Tim Holtzen, spokesman for the U.S. attorney in
Phoenix.
The hackers -- the largest such ring discovered in the USA --broke
into phone company and bank computer systems to obtain account
numbers and run up an unknown total in debts, police say.
"The main thing is the life-threatening information these computer
hackers were trying to get into," says Richard Adams of the Secret
Service. "It goes beyond being monetary to totally mischievous."
The ring was uncovered 18 months ago, when members tried and failed
to infiltrate computers at Barrows Neurological Institute in
Phoenix.
They later tried to block incoming calls to the 911 emergency
service in Chicago. The motivation? "The primary reason is as
kind of a malicious hobby." says Gary Chapman of Computer
Professionals for Social Responsibility. "People are interested in
testing their skills against security measures." But, Adams says,
"I hate to minimize it by saying it was just for kicks."
Police seized 40 computers and 23,000 disks during searches Tuesday
in 14 cities, officials said Wednesday. Five men, between the ages
of 19 and 24, have been arrested.
What's been uncovered so far, says Holtzen, may be "just the tip of
the iceberg."
- 161 -
THE ART OF INVESTIGATION By The Butler
There are many ways to obtain information about individuals. I am
going to cover some of the investigative means of getting the low
down on people whom you wish to know more about.
Some of the areas I will cover are:
Social Security Checks
Driving/Vehicular Records
Police Reports
FBI Records
Insurance Records
Legal Records
Credit Bureau Checks
Probate Records
Real Estate Records
Corporate Records
Freedom Of Information Act
Governmental Agency Records
Maps
Tax Records
To obtain information from some organizations or some individuals
one must be able to "BULLSHIT"!!! Not only by voice but in writing.
Many times you must write certain governmental bodies requesting
info and it can only be done in writing. I can't stress enough the
need for proper grammer and spelling.
For you to obtain certain information about another person you must
first get a few KEY pieces of info to make your investigation
easier. The persons Full Name, Social Security Number, Date &
Place of Birth will all make your search easier and more complete.
First of all in most cases you will know the persons name you want
to investigate. If not you must obtain it any way you can. First
you could follow them to their home and get their address. Then
some other time when they are gone you could look at their mail or
dig through their trash to get their Full Name. While in their
trash you might even be able to dig up more interesting info like:
Bank Accout Numbers, Credit Card Numbers, Social Security Number,
Birth Day, Relatives Names, Long Distance Calls Made, etc.
If you can't get to their trash for some reason take their address
to your local library and check it against the POLKS and COLES
Directories. This should provide you with their Full Name, Phone
Number, Address, and how long they have lived at the current
location.
You can also check the Local Phone Book, Directory Assistance,
- 162 -
City Directories, Post Office, Voter Registration, Former
Neighbors, Former Utilities (water, gas, electric, phone, cable,
etc.)
If you know someone who works at a bank or car dealer you could
have them run a credit check which will reveal all of their credit
cards and if they have ever had any late payments or applied for
any loans. If you are brave enough you could even apply for a loan
impersonating the individual under investigation The Credit Bureau
also has Sentry Services that can provide deceased social security
numbers, postal drop box address and known fraudulent information.
You can get an individuals driving record by sending a letter to
your states Department of Revenue, Division of Vehicles. You can
also get the following:
Driver Control Bureau For Driving Record send Name, Address, Date
of Birth and usually a $1 processing fee for a 5 year record.
Titles & Registration Bureau For ownership information (current and
past).
Driver License Examination Bureau To see what vision was rated.
Motor Carrier Inspection & Registration Bureau To check on
licensing and registration of trucks/trucking companies.
Revocation Dept Can verify if someone's driver's license has ever
been suspended or revoked.
You can even obtain a complete vehicle history by sending the
vehicle description, identification # for the last registered
owner, and a small fee. Send this info to your states Dept of
Vehicles. It is best to contact them first to get their exact
address and fees. I would advise using a money orders and a P.O.
Box so they cannot trace it to you without a hassle.
Police Records
All Police and Fire Records are Public record unless the city is
involved. You can usually get everything available from the police
dept including: Interviews, maps, diagrams, misc reports, etc.
FBI Records
If the individual you are inquiring about is deceased the FBI will
provide some info if you give them Full Name, SSN, Date & Place of
Birth. Contact you local FBI office to get the details.
- 163 -
Real Estate Records
Recorder of Deeds offices in each county maintain land ownership
records. Most are not computerized and you have to manually search.
Then you must review microfilm/fiche for actual deeds of trust,
quit claim deeds, assignments, mortgage, liens, etc.
A title company can run an Ownership & Equity (O&E) search for a
fee ($80-$100) which will show ownership, mortgage info,
easements, taxes owned, taxes assessed, etc.
Most county assessors will provide an address and value of any real
property if you request a search by name.
Social Security Records
Social Security Administrator
Office of Central Records Operations
300 North Greene Street
Baltimore, Maryland 21201
301-965-8882
Title II and Title XVI disability claims records, info regarding
total earnings for each year, detailed earnings information show
employer, total earnings, and social security paid for each quarter
by employer.
Prices are approximately as follows:
1st year of records $15.00
2nd-5th year of records $ 2.50 per person
6th-10th year of records $ 2.00 per person
11th-15th year of records $ 1.50 per person
16th-on year of records $ 1.00 per person
** Call for verification of these prices. **
Social Security records are a great source of information when
someone has been relatively transient in their work, or if they are
employed out of a union hall.
If you want to review a claim file, direct your request to the
Baltimore office. They will send the file to the social security
office in your city for you to review and decide what you want
copies of.
The first three digits of a social security number indicate the
state of application.
- 164 -
The Social Security Number
SSA has continually emphasized the fact that the SSN identifies a
particular record only and the Social Security Card indicates the
person whose record is identified by that number. In no way can the
Social Security Card identify the bearer. From 1946 to 1972 the
legend "Not for Identification" was printed on the face of the
card. However, many people ignored the message and the legend was
eventually dropped. The social security number is the most widely
used and carefully controlled number in the country, which makes it
an attractive identifier.
With the exception of the restrictions imposed on Federal and some
State and local organizations by the Privacy Act of 1974,
organizations requiring a unique identifier for purposes of
controlling their records are not prohibited from using (with the
consent of the holder) the SSN. SSA records are confidential and
knowledge of a person's SSN does not give the user access to
information in SSA files which is confidential by law.
Many commercial enterprises have used the SSN in various
promotional efforts. These uses are not authorized by SSA, but SSA
has no authority to prohibit such activities as most are not
illegal. Some of these unauthorized uses are: SSN contests;
skip-tracers; sale or distribution of plastic or metal cards;
pocketbook numbers (the numbers used on sample social security
cards in wallets); misleading advertising, commercial enterprises
charging fees for SSN services; identification of personal
property.
The Social Security Number (SSN) is composed of 3 parts,
XXX-XX-XXXX, called the Area, Group, and Serial. For the most
part, (there are exceptions), the Area is determined by where the
individual APPLIED for the SSN (before 1972) or RESIDED at time of
application (after 1972). The areas are assigned as follows:
000 unused 387-399 WI 528-529 UT
001-003 NH 400-407 KY 530 NV
004-007 ME 408-415 TN 531-539 WA
008-009 VT 416-424 AL 540-544 OR
010-034 MA 425-428 MS 545-573 CA
035-039 RI 429-432 AR 574 AK
040-049 CT 433-439 LA 575-576 HI
050-134 NY 440-448 OK 577-579 DC
135-158 NJ 449-467 TX 580 VI Virgin Islands
159-211 PA 468-477 MN 581-584 PR Puerto Rico
212-220 MD 478-485 IA 585 NM
221-222 DE 486-500 MO 586 PI Pacific Islands*
223-231 VA 501-502 ND 587-588 MS
232-236 WV 503-504 SD 589-595 FL
237-246 NC 505-508 NE 596-599 PR Puerto Rico
247-251 SC 509-515 KS 600-601 AZ
- 165 -
252-260 GA 516-517 MT 602-626 CA
261-267 FL 518-519 ID *Guam, American Samoa,
268-302 OH 520 WY Northern Mariana Islands,
303-317 IN 521-524 CO Philippine Islands
318-361 IL 525 NM
362-386 MI 526-527 AZ
627-699 unassigned, for future use
700-728 Railroad workers through 1963, then discontinued
729-899 unassigned, for future use
900-999 not valid SSNs, but were used for program purposes
when state aid to the aged, blind and disabled was
converted to a federal program administered by SSA.
As the Areas assigned to a locality are exhausted, new areas from
the pool are assigned. This is why some states have non-contiguous
groups of Areas. The Group portion of the SSN has no meaning other
than to determine whether or not a number has been assigned. SSA
publishes a list every month of the highest group assigned for each
SSN Area. The order of assignment for the Groups is: odd numbers
under 10, even numbers over 9, even numbers under 9 except for 00
which is never used, and odd numbers over 10. For example, if the
highest group assigned for area 999 is 72, then we know that the
number 999-04-1234 is an invalid number because even Groups under
9 have not yet been assigned.
The Serial portion of the SSN has no meaning. The Serial is not
assigned in strictly numerical order. The Serial 0000 is never
assigned.
Before 1973, Social Security Cards with pre-printed numbers were
issued to each local SSA office. The numbers were assigned by the
local office. In 1973, SSN assignment was automated and
outstanding stocks of pre-printed cards were destroyed. All SSNs
are now assigned by computer from head-quarters. There are rare
cases in which the computer system can be forced to accept a manual
assignment such as a person refusing a number with 666 in
it.
A pamphlet entitled "The Social Security Number" (Pub. No.05-10633)
provides an explanation of the SSN's structure and the method of
assigning and validating Social Security numbers.
Tax Records
If you can find out who does the individuals taxes you might be
able to get copies from them with the use of creative social
engineering. If you want to run a tax lien search there is a
service called Infoquest. 1-800-777-8567 for a fee. Call with a
specific request.
- 166 -
Post Office Records
If you have an address for someone that is not current, always
consider writing a letter to the postmaster of whatever post
office branch services the zip code of the missing person. Provide
them the name and the last known address and simply ask for the
current address. There might be a $1 fee for this so it would be
wise to call first. City Directory, Polk's, Cole's, etc.
Information in these directories is contained alphabetically by
name, geographically by street address, and numerically by
telephone number, so if you have any of those three pieces of info,
a check can be done. The Polk's directory also shows whether the
person owns their home or rents, their marital status, place of
employment, and a myriad of other tidbits of information. However,
these books are not the be-all and end-all of the information as
they are subject to public and corporate response to surveys. These
directories are published on a nationwide basis so if you are looking
for someone outside of your area, simply call the public library in
the area you have an interest and they also can perform a crisscross
check for you.
You can also call a service owned by Cole's called the National
Look up Library at 402-473-9717 and either give a phone number and
get the name & address or give the address and get the name and
phone number. This is only available to subscribers, which costs
$183.00 dollars for 1991. A subscriber gets two free lookups per
day and everyone after that costs $1.25. A subscriber can also
mail in a request for a lookup to:
National Look Up Library
901 W. Bond Street
Lincoln, NE 68521-3694
A company called Cheshunoff & Company can, for a $75 fee, obtain a
5-year detailed financial analysis of any bank.
505 Barton Springs Road
Austin, Texas 78704
512-472-2244
Professional Credit Checker & Nationwide SSN-locate.
!Solutions! Publishing Co.
8016 Plainfield Road
Cincinnati, Ohio 45236
513-891-6145
1-800-255-6643
Top Secret Manuals
- 167 -
Consumertronics
2011 Crescent Drive
P.O. Drawer 537-X
Alamogordo, New Mexico 88310
505-434-0234
Federal Government Information Center is located at
1520 Market Street
St. Louis, Missouri
1-800-392-7711
U.S. Dept of Agriculture has located aerial photos of every inch of
the United States.
2222 West 2300 S.
P.O. Box 36010
Salt Lake City, Utah 84130
801-524-5856
To obtain general information regarding registered agent,
principals, and good standing status, simply call the Corporate
Division of the Secretary of State and they will provide that
information over the phone. Some corporate divisions are here:
Arkansas Corporate Division 501-371-5151
Deleware Corporate Division 302-736-3073
Georgia Corporate Division 404-656-2817
Indiana Corporate Division 317-232-6576
Kansas Corporate Division 913-296-2236
Louisiana Corporate Division 504-925-4716
Missouri Corporate Division 314-751-4936
New York Corporate Division 518-474-6200
Texas Corporate Division 512-475-3551
Freedom Of Information
The Freedom of Information Act allows the public to request
information submitted to, or generated by, all executive
departments, military departments, government or government
controlled corporations, and regulatory agencies. Each agency, as
described above, publishes in the Federal Register, descriptions
of its central and field organizations and places where and how
requests are to be directed. Direct a letter to the appropriate
person designated in the Federal Register requesting reasonably
described records be released to you pursuant to the Freedom of
Information Act. Be sure to follow each agency's individually
published rules which state the time, place, fees, and procedures
for the provisions of information. The agency should promptly respond.
- 168 -
How to Find Information About Companies, Ed. II, 1981, suggests,
"Government personnel you deal with sometimes become less helpful
if you approach the subject by threatening the Freedom of
Information Act action - it's best to ask for the material
informally first." While this will probably enable you to find
the correct person to send your request to, be prepared to spend
at least half an hour on the phone talking to several people before
you find the person who can help you. The book also has a brief
description of what each governmental agency handles.
If you want to see if someone you are trying to locate is a
veteran, has a federal VA loan, or receives some sort of disability
benefit, use Freedom of Information and provide the person's SSN.
You will get a bill but you can ask for a fee waiver if this
contributes to a public understanding of the operation of the
government. You can also request an opportunity to go through the
files yourself and then decide what you want copied.
Insurance Records
PIP carrier records (may contain statements, medical records, new
doctors/hospital names, records of disability payments, adjuster's
opinions, applications for insurance coverage, other claim info,
etc.)
Health insurance records (may contain medical records, record of
bills, new doctors/hospital names, pre-existing conditions
information, info regarding other accidetns/injuries, etc.)
Often you will have to go through the claims office, the
underwriting dept, and the business office to get complete records
as each individual dept maintains its own seperate files.
Workers Compensation
Some states will let you simply request records. Just submit your
request including the SSN and Birthdate, to the Department of Human
Resources, Division of Worker's Compensation. They will photocopy
the records and send you the copies. Other states require an
authorization to obtain these records.
You can always call your local Private Investigator pretending you
are a student doing a research paper on the methods of getting
personal information about people or even trash his place to find
tips on tracking down people.
- 169 -
Frankie's Fireside Phreak Primer
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
A few words of advice that apply to phreaks every-where. Whether
a telecom veteran, or a K0dez Kid, the following guidelines may
keep you out of trouble and make life in the Computer Underground
a little more pleasant. Brought to you by the CULT, o'course.
>> A CULT Publication by High Priest and Scribe, Franken Gibe <<
-cDc- Cult of the Dead Cow Dissemination Council -cDc-
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=I
think we could all use a little refresher on Phreak Safety and
Hygiene. It seems that phreaks are getting more and more
careless...and it's when you think you can't get caught
that...yeah: You do. Most of you know these, or think about them
occasionally, but try to put the following stuff into practice. A
Safe Phreak is an Informed Phreak; A Safe Phreak is a Phreak who
Respects the Telecom Medium. Those are trite epigrams, but very
true.
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
1) Due to the proliferation of Traffic Pattern Monitoring software
among independent carriers, it is DEADLY to scan. If you must
scan, NEVER use big name IC's (notably MCI [Real Time Toll Fraud
Detection System], U.S. Sprint [those 950's are NOT fun-and-games],
etc). If you MUST scan, remember these few commandments:
A) Thou shalt never scan sequencially.
B) Thou shalt never scan in predictable or detectable patterns.
C) Thou shalt never scan a single access port all night, in
closely-spaced increments. Best not to scan. Best to have
some little kid who doesn't know you scan.
2) Alternate codes as MUCH as you can. Using a code-a-call isn't
a bad idea if you have those kinds of resources. Coupled with
the no-scanning doctrine, though, notebooks full of codes will
not be so common.
3) This is the important corollary to number 2...NEVER EVER EVER
overuse codes, nor use codes that you've abused earlier in a
given month later on in the same month (generally, after the
20th, when d'bills start to roll out).
4) Do as MUCH remote phreaking as is humanly possible. If you can
roll your computer out to some fortress fone, and hook up an
acoustic coupler, AND not attract attention...Go for it.
(Heck, I'd do it!)
5) Local access ports and AT&T WATS access ports are generally
safer than 950's. WATS #'s owned by Ind. Carriers are DEADLY.
Here's a little list of advantages and disadvantages of all
the above...
- 170 -
A) Local Access Ports: Depending on the size of the LDS, these
ports can be more or less safe. Almost NEVER have any sort
of ANI hooked up, but if abuse becomes notable, they CAN
install an incoming trap, discover a phreak's Central Office
Code, and then put an outgoing trap in his CO. After that,
it's only a matter of time. Traffic Pattern software can
give an LDS a good idea of what action it needs to take.
B) AT&T WATS numbers: Not a free ride by ANY means, but
generally pretty safe. According to No Severance, AT&T WATS
lines receive no ANI information. Like the local ports, the
area from which a phreak is calling can be determined, but
abuse would have to be pretty dramatic. Between local and
AT&T WATS, I'd take WATS ("But what about the 800 Excessive
Calling List?" Well, if it exists, then it's best not to use
WATS too much...i.e. Do NOT Scan).
C) Most 950's are safe, contrary to popular belief. There are a
number of Feature Groups into which these numbers fall. I
don't really remember what they are, and it doesn't really
matter. I just wouldn't be too anxious to use these 'cause
they're sorta bizarre, and they're VERY abused (never a good
thing). But if you must, it's better than...
D) Independent Carrier-Owned WATS numbers: God, DO NOT use
these. When an IC owns its own carrier, it receives KP + II
+ 10Dig (YOUR phone number) + ST. In other words, these guys
are generally ANI equipped. How can you tell? Well, if
you've got an 800 access port, and the exchange is NXX
(i.e., you've got a number :1-800-NXX-XXXX), then FIRST dial
1-800-NXX-0000. If you get the "You have reached the AT&T
Long Distance Network" recording, the # is AT&T. If you get
a "Your call cannot be completed " recording, DO NOT use
that WATS number. Simple.
6) [or whatever number...sigh] PLEASE...for your own good, and
that of Phreakdom, DO NOT advertise what you do. Yeah, some
kids at school might think it's pretty k-radical. Those same
kids are the ones to nark, or to mention stuff to the friendly
administrators should they ask around. The less non-phreaks
know the better. Keep your MOUTH SHUT.
That reminds me of poor Disk Demon [of 915]. The kid really wasn't
expecting trouble, but he made the fatal mistake of talking:
probably to someone he trusted, and probably he didn't say much.
All he mentioned was bringing a pirated disk to school the next day
over the phone which was all the cops needed to search his house,
and bam...they have him with telecom fraud evidence. The cops don't
need much to get a warrant to monitor your telfo. It's a scary
reality in a nation that takes less and less seriously the Bill of
Rights.
- 171 -
8) NEVER phreak voice calls. Sigh. I know, I'm sure there are a
thousand screams of "Oh, COME ON, that's going too far". Okay,
let me qualify that, then. Voice-phreak only if you're 1) sure
you're not monitored (and who is ever sure?) and 2) know that
the recipient can handle possible threats and unpleasantness
from the friendly operator who may give him a buzz. Feds and
investigators ain't stupid...or at least, not THAT stupid. As
long as no one admits anything, it's okay. But the minute you
start voice-phreaking, you open a lot of loose ends. Some
suggestions, then, for voice phreaking:
A) Try to remain anonymous. Not too hard.
B) IF you're talking to strangers, don't mention where you're
calling from, much less leave a number. Yeah, just common
sense.
C) Don't talk about phreaking over the line if you don't think
the line is secure. Duh!
D) If you trust the kid you're calling, tell him you've
phreaked a call to him. Ask him if it's "cool". Make sure he
can handle possible (and usually improbable) inquiries. Make
sure his 'rents know NOTHING.
9) That's another thing. This doesn't have to do with safe
phreaking, but with keeping phreaks safe. Know what you'll say
if you ever get called by an operator or investigator type. If
you have a bbs or data line, great. If not, have a story ready
and rehearsed. When you think about it, it IS kinda hard for
these people to believe that you don't know WHO called you for
5 hours last Sunday night...be prepared. (Ee! Boy scouts
rule.)
This file was just to be a short set of definitions for those of
you who don't know all the phreaking terms. This was requested by
a few people on a small 312 board called The Magnetic Field Elite
(312-966-0708, call, board has potential) like The Don. But I have
decided against making this small file that is common in many
places but instead to make something that I have never
seen before. Not just a common file but one of high technical use.
With a printout of this you will never need to missout on a
definition again. But that's not all. The file will discuss,
indepth, the working of each of these operations below. If you are
viewing this file simply for the sake of finding one meaning I
suggest that you get the entire thing and then never need to call
and view phreak files again.
Topic 1: The Phone/Modem
Scince phreaking is impossible without a phone or modem you I will
start with the most important and most complex part of phreaking.
The Phone. Now, the phone is a device that transfer sounds as
sound enters a receiver, is transfered to an amount of
- 172 -
voltage, sent through the telephone lines and decode back to sound.
A modem is based on a universal language of sounds transfered
through the modem. Modem stands for the work
Modulator/Demodulator. This is like receiveing and sending. Now,
with most modems, before connecting, tones just are just the same
as the tones that a common phone can make. But the phone can make
many tones and some have purposes that are very useful, tones that
are reserved for At&t, and thus dangerous. To go through all the
tone would be senseless and a book on tones alone could be written
(Hmm...maybe I could...) so I will not go into that. But, assuming
that you know what a box is I will explain what the odd types of
modems can do. If you own an Apple Cat modem you may use it to
generate any tone. This is very useful. Some people are against
the Cat for various. I will remain neutral on the topic but if you
have no understand then phreak the way you see easiest and safest.
The ther way is by using an acoustic modem. You may modify a phone
to make certain tones and you may make then send these tones through
the acoustic modem by placing the headset of the phone on the
acoustic's couplers. You may also attempt to make the box
modfications directly to the modem but if you error and damage the
modem alot of money is wasted while you could have used an acoustic
and messed up a twenty dollar phone. Basicaly the common phone can
make 18 tones. For example, when you press a number on the phone two
tones are made together and make the signal for the number or charater
you hit. This is the entire phone to line explantion of the phone.
Now the actual internal working of the phone is very complex and can be
best under stood by getting a book from the library on it.
Topic 2: The Calling of Numbers
When you call a local number as soon as you hit a number other
than one you the phone knows that you are calling localy. Once
seven digits are entered the numbers are sent to the nearest
switching station and you call goes out. The station deter mines
the units per minute and start billing as soon as the called phone
answers. All calls are automaticaly one minute long. If you hit
a one as the first digit you dial the phone recignizes this as a
long distance call and sends you to either the At&t switching
station or to another long distance service if you have chose to
use other than At&t. If you are using a At&t the call goes through
the long distance switching station where unit per minute is
determined and then it is refured to the number you called. The
call may be slowed down depending on how many times the switching
station changes between you and the place you are calling. If it
changes between ESS and X-Bar (described below) one it would go through
fast. If it changed between them 50 times it would be a very slow
call going through. Plus the sound quality may decrease but that is
not a fact, just an understanding I have come to when callign long
distance with At&t. If you are calling through any other service,
such as MCI, Alnet, Teleco, US Sprint or any of the other endless
companies,
- 173 -
then things are not the same for long distance calls. You call
first goes to the company you call through and price of call is
determined by any of the ways a company determines price. The call
then goes out through the lines to the long distance companie's
station nearest to the number you dialed and tres to
go though. If the number is too far away from a station you may
get a "The number you have dialed cannot be reached from your
calling area." Thus, you have the basic information of how call
goes out. Now to get to phreaking and the real reson you read this
file.
Topic 3: The Long Distance Company and Codes.
The way of using a different long distance company or not paying a
quarter when calling from a payphone. Using the phone card or the
code.Names for these numbers: 950's, 800's, Extenders, PBX's, 950
ports, Port, Code port, (Company name) port
The above mentioned names are the phreaks lifeline. They are
places where you call and enter a code, then the area code of the
place you want to call and finally the number for the place you
want to call. When the code is entered it is checked if it is
valid and then the person how owns the code pays for the call. If
the code is not valid you normaly get a message saying that the
code you entered is not valid. When a call goes through it is the
same as a normal long distance call except that it is charged to
the owner of the card. Some places may require that you enter a
nine or a one before you enter the code. Now, the phreak uses these
places by calling them over and over again until they get a code.
But they do this with a computer and a program such as
Hack-a-Matic, Hacking Construction Set (often called HCS), Hack
This Buddy, Intellihacker (Old), C at-(and then a name, for the
Apple Cat. Has to many names to list), and some others. These are
all Apple programs but there are also code hackers for the Commodor
64, 128, Amiga, IBM (of course) and so on. Most computers have
them. One thing I have found useful is to use a Radio Shack
portable computer with a built in modem and hack from other houses,
this is much safer. Secrity in these companies run from really
tough (MCI) to sad (like the places that tryo to scare off hackers
with tape recordings). 950 ports in the ESS area are set up to
trace and could do so very easily but for some reson they are against
it. Possibly the time and modey to cheack the calls and pay for
tracing. Places have gotton tougher though, if three people get
busted off a number in one week and this has never happened before
then you can almost be sure that they have stepped up security and
that it is time to use a new port.
Now I will discuss some of the things used by the Phreak.
Topic 4: The Loop
- 174 -
Loops, although they may seem fun they are really rather useless.
They work as follows. Two numbers are looped together. Usually
they are almost the same just a digit different from one another.
If you call the lower number you will wait a few secounds and then
hear a 1000mhz. tone. If you call the higher number you will hear
nothing. If you can one number (dosen't matter which) and someone
else calls the other number you will be able to talk to each other.
The purpose of these is to test trunk lines. This way they could
make sure there was no break in each trunk. Now the old purpose
for loops was that they where free to call so one person would call
one and another would call the other and they would get to talk for
free. Also, one person might call one number and just wait and talk
to whoever called the other number. Like a two line bridge. Today you
cannot call these without being charged because the phone company
caught on. But you can split a phone call with these so if there
is a loop between you and a person you want to talk to you can only
pay for half by calling the loop. And the phone company dosen't care
because either way they get their money. The billing service for a
loop is one all by itself, not like normal local calling and for this
reson I might almost belive the rumor that Blue Box tones can be used
to call loops. The loops billing service didn't exist awhile back so a
call to one was free. Now, if you call this new billing system picks
it up. But the loops billing system is just something that At&t
scraped together and there are most likly some holes in the system
(like not recording blue box tone generation numbers).
Topic 5: The Diverter
The diverter has been a very simple, yet incredibly usefulthing
through the years. To use one you must call, after hours and let
someone answer the phone, don't answer them, let them hang up and
get a faint dialtone. Then you dial again and call from the
diverter. Before, you could use a diverter and call through it.
The you would only be charged for the call to the diverter, not the
one after it. That bill went to the diverter itself. But they fix
this problem easily and now you still get charged if you are in the
ESS area. Also before, you could use a diverter to call a number
that traces and instead of being traced to your number it is traced
to the diverter. But ESS eliminated that too. But you can still
use a diverter to call hard to reach numbers. Like if you called
a place and it gave you a "The number you have dial cannot be reach
from your calling area" then if you knew of a diverter in the area
of the number you could call through it to the unreachable number
and get through. The way a diverter works is after hours when you
call a place the call is forwarded to another place. Then, when
you don't answer the person at the other place hangs up and your
call tries to disconnect from the forwared number and you end up
at the diverter with it's dialtone.
- 175 -
HACKING TYMNET
AS MOST OF YOU ALREADY KNOW, TYMNET IS AN INFORMATION SYSTEM
ACCESSABLE BY COMPUTERS WITH MODEMS FROM ALMOST ANYWHERE IN THE
COUNTRY. TYMNET INCLUDES MANY SUB-SYSTEMS OF INFORMATION WHICH CAN
BE USEFUL FOR BUSINESSES OR JUST PHUN. ONE SUB-SYSTEM WHICH I WILL
WRITE A SEPARATE ARTICLE ON IS THE ATPCO'S ELECTRONIC TARIFF
SYSTEM. BUT FOR NOW, I'LL MAKE ALL OF YOU EXPERTS IN TYMNET SO YOU
CAN HAVE AS MUCH PHUN AS YOURS TRUELY.
ACCESS NUMBERS
--------------
FOR YOUR LOCAL ACCESS NUMBER YOU COULD CALL THE NICE PERSON AT
800-336-0149 AND REQUEST IT FOR YOUR AREA. IF YOU LIVE NEAR A
METROPOLITAN AREA ASK FOR THAT AREA CODE SINCE THEY RARELY HAVE
ACCESS NUMBERS FOR OUT-OF-CITY AREAS. FOR THOSE OF YOU IN THE 914
AREA YOU CAN USE: POUGHKEEPSIE : 914-473-0401 WHITE PLAINS :
914-684-6075
LOGGING IN TO TYMNET
--------------------
1. WHEN YOU HAVE CONNECTED WITH THE NETWORK, THE FOLLOWING REQUEST
WILL BE DISPLAYED: PLEASE TYPE YOUR TERMINAL IDENTIFIER ENTER YOUR
TERM.IDENTIFIER ACCORDING TO THE FOLLOWING CHART:
KEY: IDENT = IDENTIFIER
ASC = ASCII
EBCD = EBCD CORRESPONDENCE
<R> = CARRIAGE RETURN
SPEEDS ARE GIVEN IN CPS (CHARACTERS PER SECOND). TO TRANSLATE TO
BAUD RATE JUST MULTIPLY BY 10.
IDENT CODE SPEED TERMINAL TYPE
----- ---- ----- -------------
A ASC 30,120 PERSONAL COMP.
WITH CRT
[ MOST EVERYBODY AT HOME WILL USE THIS OPTION SO IF YOU AREN'T SURE
USE A ]
B ASC 15 ALL TERMINALS
C ASC 30 IMPACT PRINTMRS
D ASC 10 ALL TERMINALS
E ASC 30 THERMAL PRINTERS
F ASC 15 IN BETA TERMINALS
30 OUT
G ASC 30,120 BELT PRINTERS
G.E. TERMINET
I ASC 120 MATRIX PRINTERS
P<R> EBCD 14.8 SELECTRIC-TYPE
TERMINALS (E.G., 2741)
- 176 -
IF THE MESSAGE DOES NOT APPEAR JUST WAIT A FEW SECONDS THEN ENTER
IT. NOTE THAT ONLY P IDENTIFIERS NEED A <R> THEM BUT SINCE MOST
OF YOU WON'T BE USING P FORGET IT.
2. TYMNET WILL THEN DISPLAY THE NUMBER OF THE REMOTE ACCESS NODE TO
WHICH YOU ARE CONNECTED, FOLLOWED BY THE NUMBER OF YOUR PORT ON THE
NODE, AND WILL DISPLAY THIS REQUEST:
-NNNN-PPP-
PLEASE LOG IN:
3. TYPE YOUR USER NAME AND <R> THIS USER NAME SEEMS TO BE THE
ABBREVIATION FOR THE COMPANY WHO OWNS THE SUB-SYSTEM. FOR EXAMPLE,
FOR ELECTRONIC TARIFF THE USER NAME
IS ATP WHICH STANDS FOR AIRLINE TARIFF PUBLISHING, THE COMPANY THAT
RUNS THE ELECTRONIC TARIFF.
4. TYMNET WILL THEN REQUEST:
PASSWORD:
TYPE YOUR PASSWORD AND <R>. THE PASSWORD MAY NOT BE DISPLAYED ON
YOUR SCREEN.
5. TYMNET WILL THEN DISPLAY SOME CHARACTER OR MESSAGE INDICATING
THAT YOU HAVE LOGGED ON. SINCE BUSINESSES DON'T REALLY GET
COMPLICATED WITH PASSWORDS AND THE SUCH, JUST ENTER VALID USER
NAMES AND FOR PASSWORDS YOU CAN FORGET CTRL-CHARACTERS... PASSWORDS
HAVE A LENGTH OF 8 CHARACTERS (AS FAR AS I KNOW).
TYMNET CONTROL CHARACTERS
-------------------------
CTRL-CHAR OPERATION
-------- ---------
H HALF-DUPLEX
P EVEN PARITY
R ALLOWS THE TERMINAL TO
CONTROL THE INCOMING FLOW
OF DATA WITH X-ON/OFF
CHARACTERS (SEE BELOW)
S X-OFF CHARACTER
Q X-ON CHARACTER
ACCESSING DATAPAC
-----------------
THE STANDCRD PROCEDURE FOR ACCESSING A HOST ON THE DATAPAC NETWORK
IS DESCRIBED BELOW. TYMNET'S INFORMATION DIRECTORY INCLUDES FILES
OF MATERIAL ABOUT DATAPAC AND TYMNET'S INTERNATIONAL SERVICES.
- 177 -
LOGGKNG IN TO DATAPAC
---------------------
1. DIAL-UP TYMNET (SEE ABOVE)
2. ENTER YOUR TERMINAL IDENTIFIER
3. AT THE "PLEASE LOG IN:" PROMPT, ENTER THE LOG-IN COMMAND,
SPECIFYING: THE DATAPAC NETWORK (DPAC), A SEMICOLON (A SECOND
SEMICOLON WILL ECHO AT YOUR END) , THE DATAPAC NETWORK
IDENTIFICATION CODE (3020), THE 8-DIGIT HOST ADDRESS AND <R>.
E.G., DPAC;;3020HOST ADDRESS <R>
IF YOU NEED TO ENTER FUTHER USER DATA ENTER A COLON AFTER THE HOST
ADDRESS THEN A <R>.
E.G., DPAC;;3020HOST ADDRESS:USER DATA <R>
5. DATAPAC WILL THEN DISPLAY A MESSAGE OR CHARACTER TO SHOW THAT
YOU ARE ON-LINE.
THIS LITTLE BIT OF INFORMATION SHOULD GET SOME OF YOU GOING. MY
EXPERIENCES WITH TYMNET HAVE BEEN MAINLY RESTRICTED TO THE ATPCO
SYSTEM SO COMMANDS MAY DIFFER.
- 178 -
THE PHREAKER'S HANDBOOK #1 by Phortune 500
----------------------------------------------
a useful source for the phreaker covering both the basics and
advances of phreaking
GENERAL NOTE
------------
The purpose of this newsletter is purely educational. It has been
released in order to teach and advance the knowledge of today's
declining phreaks. However, the author does not take any
responsibility over the misuse of the herein contained
information, and the newsletter itself does not encourage or
support the above type of activity. Also, any wrong or old
information in this document is not to the responsibility of the
author, and the reader accepts any consequences due to information
that may be mistaken in this manner.
NOTE TO ABUSERS
---------------
All information contained within this document was intended towards
educational purposes. Any misuse or illegal use of the information
contained in this document is strictly at the misuser's risk. The
author assumes NO responsibility of the reader's actions following
the release this document (in otherwords, you're on your own if you
get nailed!)
TPH Issue #1, Volume 1 Release Date::July 3, 1989
Introduction To TPH #1
======================
This phile was written for beginning as well as those
uninformed "advanced" phreaks who need something as a
reference when reading or writing philes concerning phreaking or
fone phraud. Of course, you could be a beginning phreak and use
this phile to B.S. your way into a big group by acting like you
know a lot, or something, but that is up to you. Anyway, I
compiled this listing phrom various sources, the majority is
listed as references at the end of this phile.
This phile's only goal is to educate and inform. Any
illegal or fraudulent activity is neither encouraged nor
supported by the author of this phile, not by the majority of
the >TRUE< phreaking community. The author assumes NO
responsibility for the actions of the reader.
Also, I know that some of the stuff covered in this release of
TPH will be old and outdated; however, I will try to clean that up
by the next release of TPH, and will notify you, the reader,
of the changes due to these revisions.
- 179 -
The Phreak's Vitals:
====================
True Definition Of The Phreaker
-------------------------------
"Many people think of phone phreaks as slime, out to rip off Bell
for all she is worth. Nothing could be further from the truth!
Granted, there are some who get their kicks by making free
calls; however, they are not true phone phreaks. Real phone
phreaks are 'telecommunications hobbyists'who experiment, play
with, and learn from the phone system. Occasionally, this
experimenting and a need to communicate with other phreaks,
without going broke, leads to free calls. The free calls are but
a small subset of a >TRUE< phone phreak's activities."
- Wise Words Of The Magician
The Phone Phreak's Ten Commandments
-----------------------------------
I. Box thou not over thine home telephone wires, for those
who doest will surely bring the wrath of the Chief
Specialent down upon thy head.
II. Speakest thou not of important matters over thine home
telephone wires, for to do so is to risk thine right of
freedom.
III. Use not thine own name when speaking to other phreaks,
for that every third phreak is an FBI agent is well known.
IV. Let not overly many people know that thy be a phreak, as to
do so is to use thine own self as a sacrificial lamb.
V. If thou be in school, strive to get thine self good grades,
for the authorities well know that scholars never break the
law.
VI. If thou workest, try to be an employee and impressest thine
boss with thine enthusiasm, for important employees are
often saved by their own bosses.
VII. Storest thou not thine stolen goodes in thine own home, for
those who do are surely non-believers in the Bell System
Security Forces, and are not long for this world.
VIII.Attractest thou not the attention of the authorities, as
the less noticeable thou art, the better.
IX. Makest sure thine friends are instant amnesiacs and
willst not remember thou hast called illegally, for
their cooperation with the authorities willst surely
lessen thine time for freedom on this earth.
X. Supportest thou TAP, as it is thine newsletter, and without
it, thy work would be far more limited.
The Phreaker's Glossary
=======================
1XB - No.1 Crossbar system. See XBAR for more information.
- 180 -
2600 - A hack/phreak oriented newsletter that periodically
was released and still is being released. See Phile 1.6 for more
information on the magazine and ordering.
4XB - No.4 Crossbar system. See XBAR for more information.
5XB - No.5 Crossbar system. The primary end office switch of
Bell since the 60's and still in wide use. See XBAR for more
detail.
700 Services - These services are reserved as an advanced
forwarding system, where the forwarding is advanced to a
user-programed location which could be changed by the user.
800 Exceptional Calling Report - System set up by ESS that will
log any caller that excessively dials 800 numbers or directory
assistance. See ESS for more information.
800 Services - Also known as WATS. These services often contain
WATS extenders which, when used with a code, may be used to
call LD. Many LD companies use these services because they are
toll-free to customers. Most 800 extenders are considered
dangerous because most have the ability to trace.
900 Services - Numbers in the 900 SAC usually are used as
special services, such as TV polls and such. These usually are
$.50 for the first minute and $.35 for each additional minute.
Dial (900)555-1212 to find out what the 900 services currently have
to offer.
950 - A nationwide access exchange in most areas. Many LD
companies have extenders located somewhere on this exchange;
however, all services on this exchange are considered dangerous
due to the fact that they ALL have the ability to trace. Most 950
services have crystal clear connections.
ACCS - Automated Calling Card Service. The typical
0+NPA+Nxx+xxxx method of inputting calling cards and then you
input the calling card via touch tones. This would not be possible
without ACTS.
ACD - Automatic Call Distributor.
ACD Testing Mode - Automatic Call Distributor Test Mode. This
level of phreaking can be obtained by pressing the "D" key down
after calling DA. This can only be done in areas that have the
ACD. The ACD Testing Mode is characterized by a pulsing dial
tone. From here, you can get one side of a loop by dialing 6,
the other side is 7. You may also be able to REMOB a line. All
possibilities of the ACD Test have not been experimented with.
See silver box for more details.
- 181 -
ACTS - Automated Coin Toll Service. This is a computer system
that automates phortress fone service by listening for red box
tones and takes appropriate action. It is this service that is
commonly heard saying, "Two dollars please. Please deposit two
dollars for the next three minutes." Also, if you talk for more
than three minutes and then hang up, ACTS will call back and demand
your money. ACTS is also responsible for ACCS.
Alliance - A teleconferencing system that is apart from AT&T
which allows the general public to access and use its conferencing
equipment. The equipment allows group conversations with
members participating from throughout the United States. The
fone number to Alliance generally follows the format of
0-700-456-x00x depending on the location the call originates from
and is not accessible direct by all cities/states.
AMA - Automated Message Accounting. Similar to the CAMA system;
see CAMA for more info.
analog - As used for a word or data transmission, a
continuously varying electrical signal in the shape of a wave.
ANI - Automatic Number Identification - This is the system you
can call, usually a three digit number or one in the 99xx's of
your exchange, and have the originating number you are
calling from read to you by a computer. This is useful if you
don't know the number you are calling from, for finding
diverters, and when you are playing around with other fone
equipment like cans or beige boxes. The ANI system is often
incorporated into other fone companies such as Sprint and MCI
in order to trace those big bad phreaks that abuze codez.
ANIF - Automatic Number Identification Failure. When the ANI
system of a particular office fails.
APF - All PINs Fail. This is a security measure which is
designed to frustrate attempts at discovering valid PINs by a
hacking method.
aqua box - A box designed to drain the voltage of the FBI
lock-in- trace/trap-trace so you can hang up your fone in
an emergency and phrustrate the Pheds some more. The apparatus
is simple, just connect the two middle wires of a phone wire and
plug, which would be the red and green wires if in the jack, to
the cord of some electrical appliance; ie, light bulb or radio.
KEEP THE APPLIANCE OFF. Then, get one of those line splitters
that will let you hook two phone plugs into one jack. Plug the end
of the modified cord into one jack and your fone into the other. THE
APPLIANCE MUST BE OFF! Then, when the Pheds turn their lame tracer
on and you find that you can't hang up, remove your fone from the
- 182 -
jack and turn the appliance ON and keep it ON until you feel safe; it
may be awhile. Then turn it off, plug your fone back in, and start
phreaking again. Invented by: Captain Xerox and The Traveler.
BAUDOT - 45.5 baud. Also known as the Apple Cat Can.
BEF - Band Elimination Filter. A muting system that will mute the
2600 Hz tone which signals hang-up when you hang up.
beige box - An apparatus that is a home-made lineman's handset.
It is a regular fone that has clips where the red and green
wires normally connect to in a fone jack. These clips will
attach to the rings and tips found in many of MA's output
devices. These are highly portable and VERY useful when messing
around with cans and other output devices the fone company has
around. Invented by: The Exterminator and The Terminal Man.
BITNET - Nationwide system for colleges and schools which
accesses a large base of education-oriented information. Access
ports are always via mainframe.
bit stream - Refers to a continuous series of bits, binary
digits, being transmitted on a transmission line.
black box - The infamous box that allows the calling party to
not be billed for the call placed. We won't go in depth right
now, most plans can be found on many phreak oriented BBS's. The
telco can detect black boxes if they suspect one on the line. Also,
these will not work under ESS.
bleeper boxes - The United Kingdom's own version of the blue
box, modified to work with the UK's fone system. Based on the
same principles. However, they use two sets of frequencies,
foreword and backwards.
Blotto box - This box supposedly shorts every fone out in
the immediate area, and I don't doubt it. It should kill
every fone in the immediate area, until the voltage reaches the
fone company, and the fone company filters it. I won't cover
this one in this issue, cuz it is dangerous, and phreaks
shouldn't destroy MA's equipment, just phuck it up. Look for this
on your phavorite BBS or ask your phavorite phreak for info if you
really are serious about seriously phucking some fones in some area.
blue box - An old piece of equipment that emulated a true
operator placing calls, and operators get calls for free. The
blue box seizes an open trunk by blasting a 2600 Hz tone
through the line after dialing a party that is local or in the
800 NPA so calls will be local or free for the blue
- 183 -
boxer. Then, when the blue boxer has seized a trunk, the boxer may
then, within the next 10-15 seconds, dial another fone number via
MF tones. These MF tones must be preceded by a KP tone and
followed with a ST tone. All of these tones are standardized by
Bell. The tones as well as the inter-digit intervals are around
75ms. It may vary with the equipment used since ESS can handle
higher speeds and doesn't need inter-digit intervals. There are
many uses to a blue box, and we will not cover any more here. See
your local phreak or phreak oriented BBS for in depth info
concerning blue boxes and blue boxing. Incidentally, blue boxes
are not considered safe anymore because ESS detects "foreign"
tones, such as the 2600 Hz tone, but this detection may be
delayed by mixing pink noise of above 3000 Hz with the 2600 Hz
tone. To hang up, the 2600 Hz tone is played again. Also, all blue
boxes are green boxes because MF "2" corresponds to the Coin
Collect tone on the green box, and the "KP" tone corresponds to
the Coin Return tone on the green box. See green box for
more information. Blue boxing is IMPOSSIBLE under the new
CCIS system slowly being integrated into the Bell system.
blue box tones - The MF tones generated by the blue box in
order to place calls, emulating a true operator. These dual
tones must be entered during the 10-15 second period after you
have seized a trunk with the 2600 Hz tone.
700: 1 : 2 : 4 : 7 : 11 : KP= Key
Pulse
parallel Frequencies 900: ** : 3 : 5 : 8 : 12 : ST= STop
2= Coin Collect 1100: ** : ** : 6 : 9 : KP : KP2= Key
Pulse 2
KP= Coin Return 1300: ** : ** : ** : 10 :KP2 : **= None
(green box tones) 1500: ** : ** : ** : ** : ST :
: 900:1100:1300:1500:1700: 75ms
pulse/pause
BLV - Busy Line Verification. Allows a TSPS operator to
process a customer's request for a confirmation of a
repeatedly busy line. This service is used in conjunction with
emergency break-ins.
BNS - Billed Number Screening. break period - Time when the
circuit during pulse dialing is left pen. In the US, this
period is 40ms; foreign nations may use 33ms break periods.
break ratio - The interval pulse dialing breaks and makes the
loop when dialing. The US standard is 10 pulses per second.
- 184 -
When the circuit is opened, it is called the break interval. When
the circuit is closed, it is called the make interval. In the US,
there is a 60ms make period and a 40ms break period. This is
often referred to as a 60% make interval. Many
foreign nations have a 67% make interval.
bridge - I don't really understand this one, but these are
important phreak toys. I'll cover them more in the next issue of
TPH.
British Post Office - The United Kingdom's equivalent to Ma Bell.
busy box - Box that will cause the fone to be busy, without
taking it OFF-HOOK. Just get a piece of fone wire with a plug on
the end, cut it off so there is a plug and about two inches of
fone line. Then, strip the wire so the two middle wires, the tip
and the ring, are exposed. Then, wrap the ring and the tip
together, tape with electrical tape, and plug into the fone jack.
The fone will be busy until the box is removed.
cans - Cans are those big silver boxes on top of or around
the telephone poles. When opened, the lines can be manipulated
with a beige box or whatever phun you have in mind.
calling card - Another form of the LD service used by many
major LD companies that composes of the customers fone number and
a PIN number. The most important thing to know when questioned
about calling cards are the area code and the city where the
calling card customer originated from.
CAMA - Centralized Automatic Message Accounting. System that
records the numbers called by fones and other LD systems. The
recording can be used as evidence in court.
CC - Calling Card.
CC - Credit Card.
CCIS - Common Channel Inter-office Signaling. New method
being incorporated under Bell that will send all the signaling
information over separate data lines. Blue boxing is IMPOSSIBLE
under this system.
CCITT - The initials of the name in French of the
International Telegraph and Telephone Consultative Committee. At
CCITT representatives of telecommunications authorities,
operators of public networks and other interested bodies meet
to agree on standards needed for international intermarrying of
telecommunications services.
CCS - Calling Card Service.
- 185 -
CCSS - Common Channel Signalling System. A system whereby
all signalling for a number of voice paths are carried over one
common channel, instead of within each individual channel.
CDA - Coin Detection and Announcement.
CF - Coin First. A type of fortress fone that wants your money
before you receive a dial tone.
Channel - A means of one-way transmission or a UCA path for
electrical transmission between two or more points without
common carrier, provided terminal equipment. Also called a circuit,
line, link, path, or facility.
cheese box - Another type of box which, when coupled with
call forwarding services, will allow one to place free fone calls.
The safety of this box is unknown. See references for information
concerning text philes on this box.
clear box - Piece of equipment that compromises of a telephone
pickup coil and a small amp. This works on the principal that
all receivers are also weak transmitters. So, you amplify your
signal on PP fortress fones and spare yourself some change.
CN/A - Customer Name And Address. Systems where authorized
Bell employees can find out the name and address of any
customer in the Bell System. All fone numbers are listed on
file, including unlisted numbers. Some CN/A services ask for
ID#'s when you make a request. To use, call the CN/A office
during normal business hours, and say that you are so and so from
a certain business or office, related to customers or something
like that, and you need the customer's name and address at
(NPA)Nxx-xxxx. That should work. The operators to these
services usually know more than DA operators do and are also
susceptible to "social engineering." It is possible to
bullshit a CN/A operator for the NON PUB DA number and policy
changes in the CN/A system.
CO Code - Central Office code which is also the Nxx code. See Nxx
for more details. Sometimes known as the local end office.
conference calls - To have multiple lines inter-connected in
order to have many people talking in the same conversation on the
fone at once. See Alliance and switch crashing for more
information.
credit operator - Same as TSPS operator. The operator you get when
you dial "0" on your fone and phortress fones. See TSPS for more
information.
- 186 -
CSDC - Circuit Switched Digital Capability. Another USDN service
that has no ISDN counterpart.
DA - Directory Assistance. See directory assistance.
DAO - Directory Assistance Operator. See directory assistance.
data communications - In telefone company terminology,
data communications refers to an end-to-end transmission of
any kind of information other than sound, including voice, or
video. Data sources may be either digital or analog.
data rate - The rate at which a channel carries data, measured in
bits per second, bit/s, also known as "data signalling rate."
data signalling rate - Same as "data rate." See data rate.
DCO-CS - Digital Central Office-Carrier Switch.
DDD - Direct Distance Dialed.
Dial-It Services - See 900 Services.
digital - A method to represent information to be discrete
or individually distinct signals, such as bits, as opposed to a
continuously variable analog signal.
digital transmission - A mode of transmission in which all
information to be transmitted is first converted to digital form
and then transmitted as a serial stream of pulses. Any signal,
voice, data, television, can be converted to digital form.
Dimension 2000 - Another LD service located at (800)848-9000.
directory assistance - Operator that you get when you call
411 or NPA-555-1212. This call will cost $.50 per call. These
won't know where you are calling from, unless you annoy them, and
do not have access to unlisted numbers. There are also
directory assistance operators for the deaf that transfer BAUDOT.
You can call these and have interesting conversations. The fone
number is 800-855-1155, are free, and use standard Telex
abbreviations such as GA for Go Ahead. These are nicer than
normal operators, and are often subject to "social
engineering" skills (bullshitting). Other operators also
have access to their own directory assistance at
KP+NPA+131+ST.
diverter - This is a nice phreak tool. What a diverter is is a
type of call forwarding system done externally, apart from the
fone company, which is a piece of hardware that will foreword the
call to somewhere else. These can be found on many 24 hour
plumbers, doctors, etc. When you call, you will often hear
- 187 -
a click and then ringing, or a ring, then a click, then another
ring, the second ring often sounds different from the first. Then,
the other side picks the fone up and you ask about their
company or something stupid, but DO NOT ANNOY them. Then
eventually, let them hang up, DO NOT HANG UP YOURSELF. Wait
for the dial tone, then dial ANI. If the number ANI reads is
different from the one you are calling from, then you have a
diverter. Call anywhere you want, for all calls will be billed to
the diverter. Also, if someone uses a tracer on you, then they
trace the diverter and you are safe. Diverters can, however,
hang up on you after a period of time; some companies make
diverters that can be set to clear the line after a set period
of time, or click every once in a while, which is super annoying,
but it will still work. Diverters are usually safer than LD
extenders, but there are no guarantees. Diverters can also be
accessed via phortress fones. Dial the credit operator and
ask for the AT&T CREDIT OPERATOR. They will put on some lame
recording that is pretty long. Don't say anything and the
recording will hang up. LET IT HANG UP, DO NOT HANG UP. Then
the line will clear and you will get a dial tone. Place any call
you want with the following format: 9+1+NPA+Nxx+xxxx, or for local
calls, just 9+Nxx+xxxx. I'd advise that you call ANI first as a local
call to make sure you have a diverter.
DLS - Dial Line Service.
DNR - Also known as pen register. See pen register.
DOV - Data-Over-Voice.
DSI - Data Subscriber Interface. Unit in the LADT system that
will concentrate data from 123 subscribers to a 56k or a 9.6k
bit-per-second trunk to a packet network.
DT - Dial tone.
DTF - Dial Tone First. This is a type of fortress fone that gives
you a dial tone first.
DTI - Digital Trunk Interface.
DTMF - Dual-Tone-Multi-Frequency, the generic term for the touch
tone. These include 0,1,2,3,4,5,6,7,8,9 as well as A,B,C,D. See
silver box for more details.
DVM - Data Voice Multiplexor. A system that squeezes more out
of a transmission medium and allows a customer to transmit
voice and data simultaneously to more than one receiver over the
existing telefone line.
- 188 -
emergency break-in - Name given to the art of "breaking" into a
busy number which will usually result in becoming a third
party in the call taking place.
end office - Any class 5 switching office in North America.
end-to-end signalling - A mode of network operation in which
the originating central office, or station, retains control
and signals directly to each successive central office, or PBX,
as trunks are added to the connection.
ESS - Electronic Switching System. "The phreak's nightmare come
true." With ESS, EVERY SINGLE digit you dial is recorded,
even mistakes. The system records who you call, when you call,
how long you talked, and, in some cases, what you talked
about. ESS is programed to make a list of people who make
excessive 800 calls or directory assistance. This is called
the "800 Exceptional Calling Report." ESS can be programed to
print out logs of who called certain numbers, such as a bookie,
a known communist, a BBS, etc. ESS is a series of programs
working together; these programs can be very easily changed to
do whatever the fone company wants ESS to do. With ESS, tracing
is done in MILLISECONDS and will pick up any "foreign" tones on
the line, such as 2600 Hz. Bell predicts the whole country will be
on ESS by 1990! You can identify an ESS office by the
functions, such as dialing 911 for help, fortress fones with DT
first, special services such as call forwarding, speed dialing,
call waiting, etc., and ANI on LD calls. Also, black boxes and
Infinity transmitters will NOT work under ESS.
extender - A fone line that serves as a middleman for a fone
call, such as the 800 or 950 extenders. These systems usually
require a multi- digit code and have some sort of ANI to trace
suspicious calls with.
facsimile - A system for the transmission of images. The
image is scanned at the transmitter, reconstructed at the
receiving station, and duplicated on some form of paper. Also known
as a FAX.
FAX - See facsimile for details.
FiRM - A large cracking group who is slowly taking the place of PTL
and the endangered cracking groups at the time of this writing.
fortress phone - Today's modern, armor plated, pay fone. These
may be the older, 3 coin/coin first fones or the newer, 1
coin/DT first fones. There are also others, see CF, DTF, and PP.
Most phortresses can be found in the 9xxx or 98xx series of your
local Nxx.
- 189 -
gateway city - See ISC.
Gestapo - The telefone company's security force. These nasties are
the ones that stake out misused phortresses as well as go
after those bad phreaks that might be phucking with the fone
system.
green base - A type of output device used by the fone company.
Usually light green in color and stick up a few feet from the
ground. See output device for more information.
green box - Equipment that will emulate the Coin Collect, Coin
Return, and Ringback tones. This means that if you call
someone with a fortress fone and they have a green box, by
activating it, your money will be returned. The tones are,
in hertz, Coin Collect=700+1100, Coin Return=1100+1700, and
Ringback=700+1700. However, before these tones are sent, the MF
detectors at the CO must be alerted, this can be done by
sending a 900+1500 Hz or single 2600 Hz wink of 90ms followed
by a 60ms gap, and then the appropriate signal for at least 900ms.
gold box - This box will trace calls, tell if the call is
being traced, and can change a trace.
grey box - Also known as a silver box. See silver box.
group chief - The name of the highest ranking official in any
fone office. Ask to speak to these if an operator is giving you
trouble. high-speed data - A rate of data transfer ranging upward
from 10,000 bits per second.
H/M - Hotel/Motel.
ICH - International Call Handling. Used for overseas calls.
ICVT - InComing Verification Trunk.
IDA - Integrated Digital Access. The United Kingdom's
equivalent of ISDN.
IDDD - International Direct Distance Dialing - The ability to
place international calls direct without processing through a
station. Usually, one would have to place the call through a 011,
station, or a 01, operator assisted, type of setup.
IDN - Integrated Digital Networks. Networks which provide
digital access and transmission, in both circuit switched and
packet modes.
- 190 -
in-band - The method of sending signaling information along with
the conversion using tones to represent digits.
INS - Information Network System. Japan's equivalent of ISDN.
Intercept - The intercept operator is the one you get
connected to when there are not enough recordings available to
tell you that the number has been disconnected or changed.
These usually ask what number you are calling and are the lowest
form of the operator.
intermediate point - Any class 4X switching office in North
America. Also known as an RSU.
international dialing - In order to call across country borders,
one must use the format PREFIX + COUNTRY CODE + NATION #. The
prefix in North America is usually 011 for station-to-station
calls or 01 for operator-assisted calls. If you have IDDD, you
don't need to place this prefix in.
INTT - Incoming No Test Trunks.
INWARD - An operator that assists your local TSPS '0'
operator in connecting calls. These won't question you as long
as the call is within their service area. The operator can ONLY
be reached by other operators or a blue box. The blue box
number is KP+NPA+121+ST for the INWARD operator that will help you
connect to any calls in that area ONLY.
INWATS - Inward Wide Area Telecommunications Service. These are
the 800 numbers we are all familiar with. These are set up in
bands; 6 total. Band 6 is the largest, and you can call band 6
INWATS from anywhere in the US except the state where the call
is terminated. This is also why some companies have a separate
800 number for their state. Band 5 includes the 48 contiguous
states. All the way down to band 1, which only includes the states
contiguous to that one. Understand? That means more people can
reach a band 6 INWATS as compared to the people that can access a
band 1 INWATS.
IOCC - International Overseas Completion Centre. A system which
must be dialed in order to re-route fone calls to countries
inaccessible via dialing direct. To route a call via IOCC with
a blue box, pad the country code to the RIGHT with zeroes until
it is 3 digits. Then KP+160 is dialed, plus the padded country
code, plus ST.
IPM - Interruptions Per Minute. The number of times a certain
tone sounds during a minute.
- 191 -
ISC - Inter-Nation Switching Centers. Most outgoing calls
from a certain numbering system will be routed through these
gateway cities" in order to reach a foreign country.
SDN - Integrated Services Digital Network. ISDN is a
lanned hierarchy of digital switching and transmission
ystems. Synchronized so that all digital elements speak the same
language" at the same speed, the ISDN would provide voice, data,
nd video in a unified manner.
TT - This is another large LD service. The extenders owned by
his company are usually considered dangerous. The format is
CC-ESS#,(NPA)Nxx-xxxx,1234567.
kpk - Key Pulse. Tone that must be generated before inputting a
one number using a blue box. This tone is, in hertz, 1100+1700.
P2 - Key Pulse 2. Tone that is used by the CCITT SYSTEM 5 for
pecial international calling. This tone is, in hertz, 1300+1700.
ADT - Local Area Data Transport. LADT is a method by which
ustomers will send and receive digital data over existing customer
oop wiring. Dial-Up LADT will let customers use their lines
or occasional data services; direct access LADT will transmit
imultaneous voice and data traffic on the same line.
LAN - Local Area Network.
LAPB - Link Access Protocol Balanced.
LD - Long Distance
leave Word And Call Back - Another new type of operator.
local loop - When a loop is connected between you and your CO.
his occurs when you pick the fone up or have a fone OFF-HOOK.
Loop - A pair or group of fone lines. When people call these
lines, they can talk to each other. Loops consist of two or
more numbers, they usually are grouped close together somewhere
in the Nxx-99xx portions of your exchange. The lower number in a
loop is the tone side of the loop, or the singing switch. The
higher number is always silent. The tone disappears on the lower
# when someone dials the other side of the loop. If you are the
higher #, you will have to listen to the clicks to see if
someone dialed into the loop. There also are such things as Non-
Supervised loops, where the call is toll-free to the caller. Most
loops will be muted or have annoying clicks at connection, but
otherwise, you might find these useful
- 192 -
goodies scanning the 99xx's in your exchange. Some loops allow
multi-user capability; thus, many people can talk to each other
at the same time, a conference of sorts. Since loops are genuine
test functions for the telco during the day, most phreaks scan and
use them at night.
MA - Ma Bell, the Bell Telesys Company. Telco, etc. See Ma Bell
for more information.
Ma Bell - The telephone company. The Bell Telesys Phone Company.
The company you phreak and hack with. The company that doesn't
like you too much. The company you often phuck with, and sometimes
phuck up. The company that can phuck u up if u aren't careful.
make period - The time when, during pulse dialing, the
circuit is closed. In the US, this period is 60ms; however,
foreign nations may use a 67ms make period. Make periods are
also referred to in percentages, so a 60ms make period would be
60%, a 67ms as 67%.
marine verify - Another type of operator.
MCI - Yet another LD service that owns many dial-ups in most
areas. However, the codes from various areas may not be
interchangeable. Not much is known about MCI; however, MCI
probably has some sophisticated anti-phreak equipment. The format
is ACC-ESS#,12345,(NPA)Nxx-xxxx.
MCI Execunet - The calling card equivalent of the regular
MCI LD service, but the codes are longer and interchangeable. For
the local access port near you, call (800)555-1212. The
format for the port will be ACC-ESS#,1234567,(NPA)Nxx-xxxx.
Metrofone - Owned by Western Union. A very popular system among
fone phreaks. Call Metrofone's operator and ask for the local
access number at (800)325-1403. The format is
ACC-ESS#,CODE,(NPA)Nxx-xxxx. Metrofone is alleged to place trap
codes on phreak BBS's.
MF - Multi-Frequency. These are the operator and blue box tones.
An MF tone consists of two tones from a set of six master
tones which are combined to produce 12 separate tones. These
are NOT the same as touch tones. See blue box tones for
frequencies.
mobile - A type of operator.
NAP/PA - North American Pirate/Phreak Association. A large group of
bbs boards which include a lot of pirates/phreakers. I'm not quite
sure where the group will go from here.
- 193 -
NON PUB DA - A reverse type of CN/A bureau. You tell the service
the name and the locality, they will supply the fone number.
However, they will ask for you name, supervisor's name, etc.
Use your social engineering skills here (aka, bullshitting
skills). You also can get detailed billing
information from these bureaus.
NPA - Numbering Plan Area. The area code of a certain city/state.
For example, on the number (111)222-3333, the NPA would be
111. Area codes never cross state boundaries sans the 800, 700,
900, and special exchanges.
Nxx - The exchange or prefix of the area to be dialed. For
example of the number (111)222-3333, the Nxx would be 222.
OGVT - OutGoing Verification Trunk.
OFF-HOOK - To be on-line, to have the switchhook down. To have a
closed connection. At this point, you also have a local loop.
ON-HOOK - To be off-line, to have the switchhook up. To have an
open connection.
ONI - Operator Number Identification. Identifies calling numbers
when an office is not equipped with CAMA, the calling number is
not automatically recorded by CAMA, or has equipment failures, such
as ANIF.
OPCR - Operator Actions Program. Standard TBOC or equivalent
"0" operator.
OPEN - Northern Telecom's Open Protocol Enhanced Networks
World Program.
OSI - Open System Interconnection. Form of telecommunication
architechture which will probobly fail to SNA.
OST - Originating Station Treatment.
OTC - Operating Telefone Company.
out-of-band - Type of signaling which sends all of the signaling
and supervisory informations, such as ON and OFF HOOK, over
separate data links.
output device - Any type of interface such as cans, terminal
sets, remote switching centers, bridging heads, etc., where the
fone lines of the immediate area are relayed to before going to
the fone company. These often are those cases painted light
green and stand up from the ground. Most of these can be opened
with a 7/16 hex driver, turning the security bolt(s)
1/8 of an inch counter-clockwise, and opening. Terminals on
- 194 -
the inside might be labeled "T" for tip and "R" for ring.
Otherwise, the ring side is usually on the right and the tip side
is on the left.
OUTWATS - Outward Wide Area Telecommunications Service. These are
WATS that are used to make outgoing calls ONLY.
Paper Clip Method - This method of phreaking was illustrated in
the movie War Games. What a phortress fone does to make sure money
is in a fone is send an electrical pulse to notify the fone
that a coin has been deposited, for the first coin only.
However, by simply grounding the positive end of the
microphone, enough current and voltage is deferred to the ground
to simulate the first quarter in the coin box. An easy way to
accomplish this is to connect the center of the mouthpiece to the
coin box, touch tone pad, or anything that looks like metal with
a piece of wire. A most convenient piece of wire is a bend out
of a paper clip. Then you can send red box tones through the
line and get free fone calls! Also, telco modified fones may
require you to push the clip harder against the mouthpiece,
or connect the mouthpiece to the earpiece. If pressing harder
against the mouthpiece becomes a problem, pins may be an easier
solution.
PBX - Private Branch eXchange. A private switchboard used by some
big companies that allow access to the OUTWATS line by
dialing a 8 or a 9 after inputting a code.
PCM - Pulse Code-Modulated trunks.
PC Pursuit - A computer oriented LD system, comparable to
Telenet, which offers low access rates to 2400 baud users. Hacking
on this system is virtually impossible due to the new password
format.
pen register - A device that the fone company puts on your
line if they suspect you are fraudulently using your fone. This
will record EVERY SINGLE digit/rotary pulse you enter into
the fone as well as other pertinent information, which may
include a bit of tapping. Also known as DNR.
Phortune 500 - An elite group of users currently paving the way
for better quality in their trade.
PHRACK - Another phreak/hack oriented newsletter. See
reference section, phile 1.6 for more information.
PHUN - Phreakers and Hackers Underground Network. They also
release a newsletter that is up to #4 at the time of this writing.
See phile 1.6 for more information on finding this phile.
- 195 -
PIN - Personal Identification Number - The last four digits
on a calling card that adds to the security of calling cards.
plant tests - test numbers which include ANI, ringback, touch
tone tests, and other tests the telco uses.
Post Office Engineers - The United Kingdom's fone workers.
PP - Dial Post-Pay Service. On phortress fones, you are
prompted to pay for the call after the called party answers. You
can use a clear box to get around this.
PPS - Pulses Per Second.
printmeter - The United Kingdom's equivalent of a pen register.
See pen register for more info.
PTE - Packet Transport Equipment.
PTL - One of the bigger cracking groups of all time. However, the
group has been dying off and only has a few nodes as of this
writing.
PTS - Position and Trunk Scanner.
PTT - Postal Telephone Telegraph.
pulse - See rotary phones.
purple box - This one would be nice. Free calls to anywhere via
blue boxing, become an operator via blue box, conference
calling, disconnect fone line(s), tap fones, detect traces,
intercept directory assistance calls. Has all red box tones. This
one may not be available under ESS.
rainbow box - An ultimate box. You can become an operator. You
get free calls, blue box. You can set up conference calls. You
can forcefully disconnect lines. You can tap lines. You can
detect traces, change traces, and trace as well. All incoming
calls are free. You can intercept directory assistance. You have
a generator for all MF tones. You can mute and redial. You have
all the red-box tones. This is an awesome box. However, it does
not exist under ESS.
RAO - Revenue Accounting Office. The three digit code that
sometimes replaces the NPA of some calling cards.
RBOC - Regional Bell Operating Company.
red box - Equipment that will emulate the red box tone generated
for coin recognition in all phortress fones.
- 196 -
red box tones - Tones that tell the phortress fone how much money
was inserted in the fone to make the required call. In one slot
fones, these are beeps in pulses; the pulse is a 2200+1700 Hz
tone. For quarters, 5 beep tones at 12-17 PPS, for dimes it is 2
beep tones at 5-8.5 PPS, and a nickel causes 1 beep tone at
5-8.5 PPS. For three slot fones, the tones are
different. Instead of beeps, they are straight dual tones. For a
nickel, it is one bell at 1050-1100 Hz, two bells for a dime,
and one gong at 800 Hz for a quarter. When using red box
tones, you must insert at least one nickel before playing the
tones, cuz a ground test takes place to make sure some money has
been inserted. The ground test may be fooled by the Paper
Clip Method. Also, it has been known that TSPS can detect
certain red box tones, and will record all data on AMA or CAMA of
fraudulent activity.
regional center - Any class 1 switching office in North America.
REMOB - Method of tapping into lines by entering a code and
the 7 digit number you want to monitor, from ACD Test Mode. A
possibility of this may be mass conferencing.
ring - The red wire found in fone jacks and most fone equipment.
The ring also is less positive than the tip. When looking at a
fone plug on the end of typical 4 wire fone line from the top,
let's say the top is the side with the hook, the ring will be
the middle-right wire. Remember, the ring is red, and to the right.
The three "R's" revived!
ring-around-the-rosy - 9 connections in tandem which would
cause an endless loop connection and has never occurred in fone
history.
ringback - A testing number that the fone company uses to have
your fone ring back after you hang up. You usually input
the three digit ringback number and then the last four digits
to the fone number you are calling from.
ring trip - The CO process involved with stopping the AC
ringing signal when a fone goes OFF-HOOK.
rotary phone - The dial or pulse phone that works by hooking and
un-hooking the fone rapidly in secession that is directly
related to the number you dialed. These will not work if
another phone with the same number is off-hook at the time of
dialing.
Rout & Rate - Yet another type of operator; assists your TSPS
operator with rates and routings. This once can be reached at
KP+800+141+1212+ST.
RPE - Remote Peripheral Equipment.
- 197 -
RQS - The Rate Quote System. This is the TSPS operator's
rate/quote system. This is a method your '0' operator gets info
without dialing the rate and route operator. The number is
KP+009+ST.
RSU - Remote Switching Unit. The class 4X office that can
have an unattended exchange attached to it.
RTA - Remote Trunk Arrangement.
SAC - Special Area Code. Separate listing of area codes, usually
for special services such as TWX's, WATS, or DIAL-IT services.
SCC - Specialized Common Carriers. Common Nxx numbers that
are specialized for a certain purpose. An example is the 950
exchange. sectional center - Any class 2 switching office in North
America. service monitoring - This is the technical name of phone
tapping.
SF - Supervision Control Frequency. The 2600 Hz tone which seizes
any open trunk, which can be blue boxed off of.
short-haul - Also known as a local call.
signalling - The process by which a caller or equipment on
the transmitting end of a line in: forms a particular party or
equipment at the receiving end that a message is to be
communicated. Signalling is also the supervisory information
which lets the caller know the called know the called party
is ready to talk, the line is busy, or the called party has
hung up.
silver box - Equipment that will allow you to emulate the DTMF
tones A,B,C,D. The MF tones are, in hertz, A=697+1633,
B=770+1633, C=852+1633, D=941+1633. These allow special
functions from regular fones, such as ACD Testing Mode.
Skyline - Service owned by IBM, Comsat, and AEtna. It has a
local access number in the 950 exchange. The fone number is
950-1088. The code is either a 6 or 8 digit number. This company is
alleged to be VERY dangerous.
SNA - System Network Architechture, by IBM. A possible future
standard of architechture only competed by OSI.
SOST - Special Operator Service Treatment. These include calls
which must be transferred to a SOST switchboard before they
can be processed; services such as conferences, appointments,
mobile, etc.
- 198 -
SPC - Stored Program Control. Form of switching the US has
heavily invested in.
Sprint - One of the first LD services, also known as SPC. Sprint
owns many extender services and is not considered safe. It is
common knowledge that Sprint has declared war on fone phreakers.
SSAS - Station Signaling and Announcement System. System on
most fortress fones that will prompt caller for money after the
number, usually LD numbers, has been dialed, or the balance
due before the call will be allowed to connect.
stacking tandems - The art of busying out all trunks between
two points. This one is very amusing.
STart - Pulse that is transmitted after the KP+NPA+Nxx+xxxx
through operator or blue boxed calls. This pulse is, in hertz,
1500+1700.
station # - The last four digits in any seven digit fone number.
STD - Subscriber Trunk Dialing. Mechanism in the United Kingdom
which takes a call from the local lines and legimately elevates
it to a trunk or international level.
step crashing - Method of using a rotary fone to break into a
busy line. Example, you use a rotary fone to dial Nxx-xxx8 and
you get a busy signal. Hang up and dial Nxx-xxx7 and in
between the last pulse of your rotary dial and before the fone
would begin to ring, you can flash your switchhook extremely
fast. If you do it right, you will hear an enormous
"CLICK" and all of a sudden, you will cut into your party's
conversation.
STPS - Signal Transfer PointS. Associated with various
switching machines and the new CCIS system.
switchhook - The button on your fone that, when depressed, hangs
the fone up. These can be used to emulate rotary dial fones if used
correctly.
SxS - Step-By-Step. Also known as the Strowger Switch or the
two-motion switch. This is the switching equipment Bell began
using in 1918. However, because of its limitations, such as
no direct use of DTMF and maintenance problems, the fone
company has been upgrading since. You can identify SxS switching
offices by lack of DTMF or pulsing digits after dialing DTMF,
if you go near the CO it will sound like a typewriter testing factory,
lack of speed calling, lack of special services like call
forwarding and call waiting, and fortress fones want your money
first, before the dial tone.
- 199 -
TAP - The "official" phone phreak's newsletter. Previously YIPL.
T&C - Time and Charge.
tapping - To listen in to a phone call taking place. The fone
company calls this "service monitoring."
TASI - Time Assignment Speech Interpolation. This is used on
satellite trunks, and basically allows more than one person to use
a trunk by putting them on while the other person isn't talking.
Telenet - A computer-oriented system of relay stations which
relay computer calls to LD numbers. Telenet has a vast array
of access ports accessible at certain baud rates.
Tel-Tec - Another LD company that usually give out a weak
connection. The format is (800)323-3026,123456,(NPA)Nxx-xxxx.
Tel-Tex - A subsidiary of Tel-Tec, but is only used in Texas.
The number is *800)432-2071 and the format is the same as above.
terminal - A point where information may enter or
leave a communication network. Also, any device that is capable
of sending and/or receiving data over a communication channel.
tip - The green wire found in fone jacks and most fone equipment.
The tip is the more positive wire compared to the ring. When
looking at a fone plug from the top, lets say the hook side is
the top, the tip will be the middle wire on the left.
toll center - Any class 4 switching office located in North
America.
toll point - Any class 4P switching office in North America.
Toll LIB - Reverse CN/A bureau. See NON PUB DA for more info.
touch tone phone - A phone that uses the DTMF system to place
calls.
touch tone test - This is another test number the fone company
uses. You dial the ringback number and have the fone ring back.
Then, when you pick it up, you will hear a tone. Press your
touch-tone digits 1-0. If they are correct, the fone will beep
twice.
trace - Something you don't want any fone company to do to you.
This is when the fone company you are phucking with flips a
- 200 -
switch and they find the number you are calling from. Sometimes
the fone company will use ANI or trap and trace methods to
locate you. Then the local Gestapo home in and terminate the caller
if discovered.
trap and trace - A method used by the FBI and some step offices
that forces a voltage through the line and traces
simultaneously, which mean that you can't hang up unless the
Pheds do, and pray you aren't calling from your own house. Trap and
trace is also known as the lock-in-trace.
trap codes - Working codes owned by the LD company, not a
customer, that, when used, will send a "trouble card" to Ma
Bell, no matter what company the card is coming from, and ESS
will immediately trace the call. Trap codes have been in use for
some time now, and it is considered safer to self-hack codes
opposed to leeching them off of BBS's, since some LD
companies post these codes on phreak oriented BBS's.
Travelnet - Service owned by GM that uses WATS as well as local
access numbers. Travelnet also accepts voice validation for its LD
codes.
TSPS - Traffic Service Position System. Operator that usually is
the one that obtains billing information for Calling Card or 3rd
number calls, identifies called customer on person-to-person
calls, obtains acceptance of charges on collect calls, or
identifies calling numbers. These operators have an ANI board and
are the most dangerous type of operator.
TWX - Telex II consisting of 5 teletypewriter area codes. These
are owned by Western Union. These may be reached via
another TWX machine running at 110 baud. You can send TWX messages
via Easylink (800)325-4122.
USDN - United States Digital Network. The US's version of the
ISDN network.
videotext - Generic term for a class of two-way, interactive
data distribution systems with output typically handled as in
teletext systems and input typically accepted through the telephone
or public data network.
WATS - Wide Area Telecommunications Service. These can be IN or
OUT, see the appropriate sections.
WATS Extender - These are the LD companies everyone hacks and
phreaks off of in the 800 NPA. Remember, INWATS + OUTWATS = WATS
Extender.
white box - This is a portable DTMF keypad.
- 201 -
XBAR - Crossbar. Crossbar is another type of switching equipment
the fone company uses in some areas. There are three major
types of Crossbar systems called No.1 Crossbar (1XB), No.4
Crossbar (4XB), and No.5 Crossbar (5XB). 5XB has been the primary
end office switch of MA since the 60's and
is still in wide use. There is also Crossbar Tandem (XBT) used
for toll-switching.
XBT - Crossbar Tandem. Used for toll-switching. See XBAR.
YIPL - The classic "official" phreak's magazine. Now TAP.
Other Fone Information
======================
Voltages & Technical Stuff
--------------------------
When your telephone is ON-HOOK, there is 48 volts of DC
across the tip and the ring. When the handset of a fone is
lifted a few switches close which cause a loop to become
connected between you and the fone company, or OFF-HOOK. This is
also known as the local loop. Once this happens, the DC current is
able to flow through your fone with less resistance. This causes
a relay to energize which causes other CO equipment to realize
that you want service. Eventually, you will end up with a
dial tone. This also causes the 48 VDC to drop down to around 12
VDC. The resistance of the loop also drops below the 2500 ohm
level; FCC licensed telephone equipment must have an OFF-HOOK
impedance of 600 ohms.
When your fone rings, the telco sends 90 volts of pulsing
AC down the line at around 15-60 Hz, usually 20 Hz. In most
cases, this causes a metal armature to be attracted alternately
between two electromagnets; thus, the armature often ends up
striking two bells of some sort, the ring you often hear when
non-electronic fones receive a call. Today, these mechanical
ringers can be replaced with more modern electronic bells
and other annoying signaling devices, which also explains why
deaf people can have lights and other equipment attached to their
fones instead of ringers.
When you dial on a fone, there are two common types of
dialing, pulse and DTMF. If you are like me, you probably
don't like either and thought about using MF or blue box
tones. Dialing rotary breaks and makes connections in the
fone loop, and the telco uses this to signal to their equipment
that you are placing a call. Since it is one fone that is
disconnecting and reconnecting the fone line, if someone
else picks up another fone on the same extension, both cannot
make pulse fone calls until one hangs up. DTMF, on the other
hand, is a more modern piece of equipment and relies on tones
generated by a keypad, which can be characterized by a
0,1,2,3,4,5,6,7,8,9/A,B,C,D keypad. Most fones don't have
- 202 -
an A,B,C,D keypad, for these frequencies are used by the
telco for test and other purposes.
Scanning Phun Fone Stuff
------------------------
Scanning is the act of either randomly or sequentially
dialing fone numbers in a certain exchange when you are
looking for several different things. These things could be
carriers, extenders, ANI, "bug tracers," loops, as well as
many other interesting "goodies" the fone company uses for test
purposes.
When scanning for carriers, your local BBS probably has
some scanning programs, as these became popular after the movie
WARGAMES, but what these do are to call every fone in an
exchange, or a specified range of fone numbers in certain
exchanges to look for possible carriers and other
interesting computer equipment. So, if your computer finds a
carrier, or what seems like a carrier, it will either print it
out or save it in some file for later reference. With these
carriers one finds, one can either call them and find out what
each is or, if one of them is interesting, one can hack or
attempt to break into some interesting systems available, not to
the general public, of course.
Scanning telephone "goodies" requires time and patience.
These goodies usually cannot be traced by most unmodified
modems, as the frequencies and voice transmissions cannot be
differentiated from other disturbances, such as the annoying
operator saying, "We're sorry... blah blah..". Anyway, to scan
these, you usually get a regular carrier scanner and, with the
modem speaker on, sit by your wonderful computer and listen in
on the scanning for any interesting tones, voices, or silences,
which could be telco fone phun numbers, for us of course!
Then write these down, and spread them around, use, abuze, etc.
if you dare. Anyway, most telefone goodies are
located in the 99xx suffixes of any fone exchange. If you found
everything you think in the exchanges you have scanned, try the
0xxx and 1xxx suffixes in that order. You might even find loops,
ANI, and other phun things if you mess around enough.
References & Suggested Reading
==============================
The following is a list of references and suggested
reading for the beginning, as well as advanced phreak. See you
local fone phreak for these, or call your local phreak
oriented BBS for information regarding these publications.
2600 Magazine
Aqua Box, The By Captain Xerox & The Traveler
- 203 -
Basic Alliance Teleconferencing By The Trooper
Bell Hell By The Dutchman & The Neon Knights
Better Homes And Blue Boxing By Mark Tabas
BIOC Agent 003's Course In Basic Telecommunications
By BIOC Agent 003
History Of British Phreaking, By Lex Luthor & The Legion Of Doom
Home Phone Tips By 13th Floor Enterprises
How To Build A Blotto Box By The Traveler
How To Build A Cheese Box By Mother Phucker
Introducing The Beige Box - Construction & Use
By The Exterminator and The Terminal Man
Integrated Services Digital Network [ISDN]
By Zander Zan
LOD/H Technical Journal
Loops I've Known And Loved By Phred Phreak
PHRACK Magazine
Edited By Taran King and Knight Lightning UMCVMB
- 204 -
950's: The Real Story: by Jester
Ever heard (actually, seen) people on various hacking boards
around the country telling you how you are going to get caught for
sure if you use the in state-WATS (950) telephone numbers to make
your phreaks off of? This file is to tell you what the story is
with 950's and how to SAFELY use them. The 950 prefix was created
by the old Bell System for all the SSC's (Specialized Common
Carrier), or Extenders as they are called, to place their services
upon. This was done for the long distance company's benefit so
they could have the same dialup in all cities across the USA. For
some reason, the Long Distance companies rejected the 950 prefix in
favor of local lines and 1-800 numbers.
Disadvantages to 950's are that they are run on a special ESS
of their own that can trace you call before you can say 'shit!'.
But tracing only occurs on special occasions. The companies on
950's will only trace when the computer controlling the calls sees
that there is an unusually high number of calls to the extender on
that particular day. The computer then will auto-trace every
100th call or so. Which means that, if used in moderation, 950's
are fantastic!
Advantages: By having the same dialup in all cities, you can
go on vacation and just hack codez to use for while you are there
on your favorite 950 extender. Being a free call (in most cases,
some phones not) from a pay phone, this is very advantageous.
Also, and anyone who has used a 950 knows this, the connections on
950 extenders are VERY clear usually, making for excellent
error-free data transfer on AE lines, etc.
With the breakup of the Bell System in January of 1984, the
950 prefix was supposed to be dragged down with it and the
companies were supposed to have switched over to either local or
1-800 numbers, but as is very typical of the phone company, they
never got around to it.
Here is the list of the 950's that are currently in use in
the U.S. :
950-1000..........Southern Pacific Communications
950-1022..........MCI Exec-U-Net
950-1033..........U.S. Telephone
950-1044..........AllNet
950-1066..........Lexitel
950-1088..........SBS Skyline
Personally, I favor the use of 950-1088, because it has many
users and the codez (which, by the way are 6 digits, but they are
switching over to 8 igits) are easy to hack out from a
pay phone. You may want to try the other services so you can have
a few codez from each available for use.
- 205 -
Automatic Number Identifier: By Jester
Automatic Number Identification
Automatic Number Identification (ANI) is nothing more than
automatic means for immediately identifying the Directory Number of
a calling subscriber. This process made it possible to utilize
CAMA* (Centralized Automatic Message Accounting) systems in SxS,
Panel, and Xbar #1 offices. The identity of the calling line is
determined by ANI circuits installed in the types of CO's mentioned
above. Xbar#5 offices have their own AMA (Automatic Message
Accounting) equipment and utilize an AMA translator for
automatically identifying the calling line.
Before ANI was developed, each subscriber line (also called a
local loop) had a mechanical marking device that kept track of toll
charges. These devices were manually photographed at the end of the
billing period and the amount of the subscribers bill was
determined from that. This process was time consuming, so a new
system (ANI) was developed.
The major components of the ANI system used in SxS and Crossbar #1
are: Directory number network and bus arrangement* for connecting
the sleeve (the lead that is added to the R(ing) and T(ip) wires of
a cable pair at the MDF* (Main Distribution Frame)); A lead of each
line number through an identifier connector to the identifier
circuit; Outpulser and Identifier connector circuit to seize an
idle Identifier; Identifier circuit to ascertain the calling
party's number and send it to the outpulser for subsequent
transmission through the outpulser link to the ANI outgoing trunk;
An ANI outgoing trunk to a Tandem office equipped with a CAMA system.
The following is a synopsis of the ANI operations with respect
to a toll call through a #1Xbar office. The call is handled in the
normal manner by the CO equipment and is routed through an ANI
outgoing trunk to a Tandem office. The identification process
starts as soon as all digits of the called number are received by
the CAMA sender in the Tandem office and when the district juncture
in the Xbar office advances to its cut-through position (a position
of the connecting circuits or paths between the line-link and
trunk-link frames in the CO).
Upon receiving the start identification signal from the CAMA
equipment, the ANI outgoing trunk (OGT) establishes a connection
through an outpulser link to an idle outpulser circuit. An idle
identifier is then seized by the outpulser circuit through an
internal Identifier connector unit. Then the identifier through
the connector unit connects to the directory number network and
bus system.
- 206 -
At the same time, the identifier will signal the ANI trunk to
apply a 5800Hz identification tone to the sleeve lead of the ANI
trunk. The tone is transmitted at a two-volt level over the S lead
paths through the directory number network and bus system. It will
be attenuated or decreased to the microvolt range by the time the
identifier circuit is reached, necessitating a 120dB voltage
amplification by the amplifier detector equipment in the
identifier to insure proper digit identification and registration
operations.
A single ANI installation can serve as many as six CO's in a
multi-office building. The identifier starts its search for the
calling line number by testing or scanning successively the
thousands secondary buses of each CO. When the 5800Hz signal is
detected, the identifier grounds corresponding leads to the
outpulser, to first register the digit of the calling office and
then the thousands digit of the calling subscriber's number. The
outpulser immediately translates the digit representing the calling
office code into its own corresponding three digit office code. The
identifier continues its scanning process successively on the
groups of hundreds, tens, and units secondary buses in the calling
office, and the identified digits of the calling number are also
registered and translated in the outpulser's relay equipment for
transmission to the tandem office. The outpulser is equipped with
checking and timing features to promptly detect and record troubles
encountered (This process may be responsible for some of the cards
found while trashing). Upon completion of the scanning process, it
releases the identifier and proceeds to outpulse in MF tones the
complete calling subscriber's number to the CAMA equipment in the
tandem office in the format of KP+X+PRE+SUFF+ST where the X is an
information digit. The information digits are as follows:
0-Automatic Identification (normal)
1-Operator Identification (ONI)*
2-Identification Failure (ANIF)*
(There is also other types of outpulsing of ANI information if the
calling line has some sort of restriction on it).
When all digits have been transmitted and the ANI trunk is
cut-through for talking, the outpulser releases.
In the tandem office, the calling party's number is recorded on
tape in the CAMA equipment together with other data required for
billing purposes. This information, including the time of when the
called station answered and the time of disconnect, goes on AMA
tapes. The tapes themselves are usually standard reel to reel
magnetic tape, and are sent to the Revenue Accounting Office or RAO
at the end of the billing period.
- 207 -
So, to sum the entire ANI process up:
The toll call is made. The CO routes the call through ANI trunks
where an idle identifier is seized which then connects to the
directory number network and bus system while signalling the ANI
trunk to apply the needed 5800Hz tone to the Sleeve. The identifier
begins a scanning process and determines the calling office number
and the digits of the calling subscriber's number, which is sent by
way of the outpulser in MF tones to the CAMA equipment in the
tandem office. The call information is recorded onto AMA tapes and
used to determine billing.
Note that your number does show up on the AMA tape, if the
circumstances are correct, (any toll call, whether it is from a
message-rate line or from a flat-rate line). However, the AMA tapes
do not record the calling line number in any separated format. They
are recorded on a first-come, first-serve basis.
Misc. Footnotes (denoted by an asterisk in the main article)
---------------
* ANIF-Automatic Number Identification Failure. This is when the
ANI equipment does not work properly, and could occur due to a wide
variety of technicalities. When ANIF occurs, something called ONI
(Operator Number Identification) is used. The call is forwarded to
a TSPS operator who requests the calling line number by saying
something similar to 'What number are you calling from?'
* CAMA-Centralized Automatic Message Accounting. CAMA is a system
that records call details for billing purposes. CAMA is used from
a centralized location, usually a Tandem office. CAMA is usually
used to serve class 5 End Offices in a rural area near a large city
which contains a Tandem or Toll Office. CAMA is similar to LAMA,
except LAMA is localized in a specific CO and CAMA is not.
* The Directory Number Network and bus system is a network involved
with the ANI process. It is a grid of vertical and horizontal
buses, grouped and classified as Primary or Secondary. There are
100 vertical and 100 horizontal buses in the Primary system. In the
Secondary system, there are two sub-groups: Bus system #1 and Bus
system #2, both of which have ten horizontal and vertical buses.
These buses as a whole are linked to the Identifier in the ANI
trunk and are responsible for identifying tens, hundreds, thousands
and units digits of the calling number (After the Identifier begins
its scanning process).
* MDF-Main Distribution Frame. This is the area where all cable
pairs of a certain office meet, and a third wire, the Sleeve wire,
is added. The Sleeve wire is what is used in gathering ANI
- 208 -
information, as well as determining a called lines status (off/on
hook) in certain switching systems by presence of voltage. (voltage
present on Sleeve, line is busy, no voltage, line is idle.)
* ONI-Operator Number Identification. See ANIF footnote.
NOTE: There are also other forms of Automatic Message Accounting,
such as LAMA (Local Automatic Message Accounting). LAMA is used in
the class 5 End Office as opposed to CAMA in a Toll Office. If your
End Office had LAMA, then the ANI information would be recorded at
the local level and sent from there. The LAMA arrangement may be
computerized, in which it would denoted with a C included (LAMA-C
or C-LAMA).
- 209 -