632 lines
34 KiB
Plaintext
632 lines
34 KiB
Plaintext
The THC Hack/Phreak Archives: PH08.TXT (779 lines)
|
||
Note: I did not write any of these textfiles. They are being posted from
|
||
the archive as a public service only - any copyrights belong to the
|
||
authors. See the footer for important information.
|
||
==========================================================================
|
||
<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>
|
||
<*> Joe Cosmo Presents..... <*>
|
||
<*> <*>
|
||
<*> Methods of Phreaking and Telco Security Measures <*>
|
||
<*> <*>
|
||
<*> June 16, 1988 1:30 am <*>
|
||
<*> <*>
|
||
<*> (updated 7/3/88 for CN/A list & Plus One Service) <*>
|
||
<*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*>
|
||
|
||
|
||
(formatted to 80 Columns)
|
||
|
||
|
||
|
||
Dedication: This phile is dedicated to all those great phreakers who taught
|
||
me all of this, and to all of the newcomers being born to the phreak world. For
|
||
the legends, it is here as their legacy, and for the newcomers, I hope they
|
||
will
|
||
use it as their guide in times of trouble, and may there always be phreakers in
|
||
the world.
|
||
|
||
|
||
TABLE OF CONTENTS
|
||
CHAPTER
|
||
I. Introduction: What Telephone Fraud Is
|
||
II. Who Does It and Why
|
||
III. The Systems That Are Fooled
|
||
IV. Electronic Toll Fraud
|
||
How Boxes Work
|
||
The Blue Box
|
||
Operation of a Blue Box
|
||
Pink Noise
|
||
The Black Box
|
||
The Red Box
|
||
The Cheese Box
|
||
V. Divertors
|
||
VI. Private Branch Exchanges
|
||
VII. Specialized Common Carriers
|
||
SCC Extenders List
|
||
VIII. PC Pursuit
|
||
How to Originate a PC Pursuit Call
|
||
IX. Cellular Phone Fraud
|
||
ESN Tampering
|
||
Obtaining ESN's
|
||
X. CN/A's
|
||
CN/A List (updated 7/3/88)
|
||
XI. Loops
|
||
XII. Alliance Teleconferencing
|
||
Billing an Alliance Conference
|
||
Starting a Conference
|
||
XIII. Telephone System Security Measure
|
||
ESS Detection Devices
|
||
Automatic Number Identification and Centralized
|
||
Automatic Message Accounting Tapes
|
||
Dialed Number Recorders
|
||
Trap Codes
|
||
The Lock In Trace
|
||
Stopping a Lock In Trace
|
||
4Tel (Updated 6/24/88 Thanx to Touch Tone of BC, Canada)
|
||
Evading 4Tel
|
||
Plus One Service (updated 7/3/88)
|
||
Common Channel Inter-office Signaling
|
||
XIV. Laws Governing the Rights of Phreakers
|
||
XV. Conclusion
|
||
|
||
|
||
|
||
|
||
I. Introduction: What Telephone Fraud Is
|
||
Telephone fraud is illegally using the communication facilities of
|
||
telephone companies. This is commonly known as "phreaking." The writer's
|
||
purpose
|
||
is to explore the methods of phreaking, and the various security measures of
|
||
telephone companies.
|
||
|
||
|
||
II. Who Does It and Why
|
||
The majority of people who phreak are owners of modems (MOdulators
|
||
DEModulators, devices which allow computers to communicate over telephone
|
||
lines)
|
||
and are usually between the ages of twelve and seventeen. When the person
|
||
reaches age eighteen, he or she usually stops, since after that age, if the
|
||
person in caught, the penalty can become very serious. Phreaking is the
|
||
violation of the law on Fraud In Connection With Access Devices, which carries
|
||
maximum penalties of 15 years imprisonment and a fine of $50,000, or twice the
|
||
value of the fraudulent activity.
|
||
Scattered throughout the country are many different computer bulletin
|
||
board
|
||
systems, or BBS's. These are computer systems established by private users or
|
||
large organizations for the exchange of public and private messages and
|
||
software. Most are not a local call, though. Since the normal user calls about
|
||
ten different BBS's, with even the lowest long-distance rates, the phone bill
|
||
each month can range from $100 to $1000. The solution is to phreak. When these
|
||
people learn how to phreak, they also realize that besides making free
|
||
long-distance calls from their home, they can also make free calls from
|
||
payphones. They also find that there are many other facilities that they can
|
||
used without paying.
|
||
|
||
|
||
III. The Systems That Are Fooled
|
||
Their are three types of telephone operating systems in the U.S., Step by
|
||
Step (SxS), Crossbar (XB), and Electronic Switching System (ESS). They are
|
||
described in detail in the following paragraphs.
|
||
|
||
Step by Step
|
||
Step by Step (SxS) was the first switching system used in America, adopted
|
||
in 1918 and until 1978 Bell had over 53% of all exchanges using Step by Step.
|
||
A
|
||
long, and confusing train of switches is used for SxS switching.
|
||
|
||
Disadvantages
|
||
A. The switch train may become jammed, blocking calls.
|
||
B. No DTMF (Dual-Tone Multi-Frequency), to be discussed later.
|
||
C. Much maintenance and much electricity.
|
||
D. No "Touch-Tone" dialing.
|
||
|
||
Identification
|
||
A. No pulsing digits after dialing or "Touch Tone".
|
||
B. Much static in the connections.
|
||
C. No Speed calling, Call forwarding, and other services.
|
||
D. Pay-phone wants money first before dial-tone.
|
||
|
||
Crossbar
|
||
Crossbar has been Bell's primary switcher after 1960. Three types of
|
||
Crossbar switchings exist, Number 1 Crossbar (1XB), Number 4 Crossbar (4XB),
|
||
and
|
||
Number 5 Crossbar (5XB). A switching matrix is used for all of the phones in an
|
||
area. When someone calls, the route is determined and is connected with the
|
||
other phone. The matrix is positioned in horizontal and vertical paths,
|
||
organizing the train of switches more effectively, and therefore, stopping the
|
||
equipment from jamming. There are no definite distinguishing features of
|
||
Crossbar switchings from Step by Step.
|
||
|
||
|
||
Electronic Switching System
|
||
ESS is the most advanced system employed, and has gone through many kinds
|
||
of revisions. The latest system to date is ESS 11a, which is used in Washington
|
||
D.C. for security reasons. ESS is the country's most advanced switching system,
|
||
and has the highest security system of all. With its many special features, it
|
||
is truly the phreaker's nightmare.
|
||
|
||
Identification
|
||
A. Dialing 911 for emergencies.
|
||
B. Dial-tone first for pay-phones.
|
||
C. Calling services, including Call forwarding, Speed dialing, and Call
|
||
waiting.
|
||
D. Automatic Number Identification for long-distance calls (ANI), to be
|
||
discussed later.
|
||
E. "Touch Tone"
|
||
|
||
|
||
IV. Electronic Toll Fraud
|
||
The ETF's are electrical devices used to get free long-distance calls. The
|
||
devices are more commonly known as colored boxes, and using them is known as
|
||
"boxing." Boxing is one of the oldest way to phreak, and therefore, it is also
|
||
the most dangerous, since the telephone companies are very much aware of their
|
||
existence. Colored boxes are not used only for phreaking. There are many types
|
||
which have other uses (such as the Tron Box, which lowers your electric bill),
|
||
so only those used in telephone fraud will be discussed.
|
||
|
||
How Boxes Work
|
||
In the beginning, all long distance calls were connected manually by
|
||
operators who passed on the called number verbally to other operators in
|
||
series.
|
||
This is because pulse (rotary) digits are created by causing breaks in the DC
|
||
current. Since long distance calls call for routing through various switching
|
||
equipment and AC voice amplifiers, pulse dialing cannot be used to send the
|
||
destination number to the end local office (CO).
|
||
Eventually, the demand for faster and more efficient long distance service
|
||
caused Bell to make a multi-billion dollar decision. They had to create a
|
||
signaling system that could be used on the LD Network. They had two options:
|
||
|
||
{1} To send all the signaling and supervisory information (eg., ON and OFF
|
||
HOOK)
|
||
over separate data links. This type of signaling is referred to as out-of-band
|
||
signaling.
|
||
|
||
{2} To send all the signaling information along with the conversation using
|
||
tones to represent digits. This type of signaling is called in-band signaling.
|
||
|
||
|
||
The second seemed to be the most economical choice, and so, it was incorporated
|
||
in ESS.
|
||
Then, in the 1960's, when the first ESS systems were employed, a toy
|
||
whistle was put in each box of Captain Crunch Cereal as a premium. A young
|
||
radio
|
||
technician in the United States Air Force became fascinated with the whistle
|
||
when he discovered that by blowing it into the telephone after dialing any long
|
||
distance number, the trunk line would remain open without toll charges
|
||
accounting. From then on, any number could be dialed for free. The truth was
|
||
that the whistle produced a perfect-pitch 2600 Hz tone, the one used to signify
|
||
a disconnect in ESS switching equipment. To overcome the initial charge for the
|
||
for the long distance call, he later used toll-free 800 numbers.
|
||
Being a skilled technician, Captain Crunch (he began to use the name as an
|
||
alias) soon went beyond the simple whistle and experimented with other
|
||
frequencies, creating many of the boxes discussed in the following paragraphs.
|
||
|
||
The Blue Box
|
||
The "Blue Box" was so named because of the color of the first one
|
||
discovered by the authorities. The design and hardware used in the Blue Box is
|
||
very sophisticated, and its size varies from a large piece of apparatus to a
|
||
miniaturized unit that is approximately the size of a "king size" package of
|
||
cigarettes.
|
||
The Blue Box contains 12 or 13 buttons or switches that emit the
|
||
multi-frequency tones used in the normal operation of the telephone toll (long
|
||
distance) switching network. In effect, the the Blue Box can let a person
|
||
become
|
||
the operator of a phone line. The Blue Box enables its user to originate
|
||
fraudulent toll calls by circumventing (fooling) toll billing equipment. The
|
||
Blue Box may be directly connected to a phone line, or it may be acoustically
|
||
coupled to a telephone handset by placing the Blue Box's speaker next to the
|
||
transmitter, or the telephone handset.
|
||
|
||
Operation of a Blue Box
|
||
To understand the steps of a fraudulent Blue Box call, it is necessary to
|
||
understand the basic operation of the Direct Distance Dialing (DDD) telephone
|
||
network. When a DDD call is originated, the calling number is identified as an
|
||
integral part of establishing the connection. This may be done either
|
||
automatically by ANI in ESS, or in some cases, by an operator asking the
|
||
calling
|
||
party for his telephone number. This information is entered on a tape in the
|
||
Centralized Automatic Message Accounting (CAMA) office. This tape also contains
|
||
the number assigned to the trunk line over which the call is to be made. The
|
||
information relating to the call contained on the tape includes the called
|
||
number's identification, time of origination of the call, and if the called
|
||
number answered the call. The time of disconnect is also recorded. The various
|
||
data entries with of the call are correlated to provide billing information for
|
||
use by the caller's telephone company's accounting department.
|
||
The typical Blue Box user usually dials a number that will route the call
|
||
into the telephone network without charge. For example, the user will very
|
||
often
|
||
call a well-known INWATS (toll-free) number. The Blue Box user, after gaining
|
||
this access to the network when somebody picks up and in effect, "seizing"
|
||
control of the line, operates a key on the Blue Box which emits a 2600 Hertz
|
||
(cycles per second, abbreviated as Hz) tone. This tone causes the switching
|
||
equipment to release the connection to the INWATS customer's line. The 2600 Hz
|
||
tone is the signal to the switching system that the calling party has hung up.
|
||
In fact though, the local trunk on the calling party's end is still connected
|
||
to
|
||
the toll network. The Blue Box user now operates the "KP" (Key Pulse) key on
|
||
the
|
||
Blue Box to notify the toll switching equipment that switching signals are
|
||
about
|
||
to be emitted. The user then pushes the "number" buttons on the Blue Box
|
||
corresponding to the telephone number being called. After doing so, he/she
|
||
operates the "ST" (Start) key to tell the switching equipment that signaling is
|
||
complete. If the call is completed, only the portion of the original call prior
|
||
to the operation of the 2600 Hz tone is recorded on the CAMA tape. The tones
|
||
emitted by the Blue Box are not recorded on the CAMA tape. Therefore, because
|
||
the original call to the INWATS number is toll-free, no billing is rendered in
|
||
connection with the call.
|
||
|
||
The above are the steps in a normal operation of a Blue Box, but they may
|
||
vary in any one of the following ways:
|
||
|
||
A. The Blue Box may include a rotary dial to apply the 2600Hz tone and the
|
||
switching signals. This type of Blue Box is called a "dial pulser" or "rotary
|
||
SF" Blue box.
|
||
|
||
B. A magnetic tape recording may be used to record the Blue Box tones. Such a
|
||
tape recording could be used in lieu of a Blue Box to fraudulently place calls
|
||
to the phone numbers recorded on the magnetic tape.
|
||
|
||
All Blue Boxes, except "dial pulse" or "Rotary SF" Blue Boxes,
|
||
must have the following four common operating capabilities:
|
||
|
||
A. It be able to emit the 2600 Hz tone. This tone is used by the toll network
|
||
to
|
||
indicate, either by its presence or its absence, an "on hook" (idle) or "off
|
||
hook" (busy) condition of a trunk line.
|
||
|
||
B. The Blue Box must have a "KP" tones that unlocks or readies
|
||
the multi-frequency receiver at the called end to receive the
|
||
tones corresponding to the called phone number.
|
||
|
||
C. The Blue Box must be able to emit DTMF, tones used to transmit phone numbers
|
||
over the toll network. Each digit of a phone number is represented by a
|
||
combination of two tones. For example, the 2 is 700 Hz and 900 Hz.
|
||
|
||
D. The Blue Box must have an "ST" key which consists of a combination of two
|
||
tones that tell the equipment at the called end that all digits have been sent
|
||
and that the equipment should start connecting the call to the called number.
|
||
|
||
The following is a chart of the multi-frequency (MF) tones produced by the
|
||
normal Blue Box.
|
||
|
||
700 : 1 : 2 : 4 : 7 : 11 : 2600 X
|
||
900 : + : 3 : 5 : 8 : 12 :
|
||
1100 : + : + : 6 : 9 : KP :
|
||
1300 : + : + : + : 10 : KP2 :
|
||
1500 : + : + : + : + : ST :
|
||
: 700 : 900 :1100 :1300 :1500 :
|
||
|
||
The "Dial Pulser" or "Rotary SF" Blue Box requires only a dial
|
||
with a signalling capability to produce a 2600 Hz tone.
|
||
|
||
|
||
Pink Noise
|
||
Since telephone companies have such advanced equipment to detect Blue
|
||
Boxes, to help avoid detection "pink noise" is sometimes added to the 2600 Hz
|
||
tone.
|
||
Since 2600 Hz tones can be simulated in speech, the detection equipment of
|
||
the switching system must be attentive not to misinterpret speech as a
|
||
disconnect signal. Thus, a virtually
|
||
pure 2600 Hz tone is required for disconnect. This is also the reason why the
|
||
2600 Hz tone must be sent rapidly; sometimes, it will not work when the person
|
||
called is speaking. It is feasible, though, to send some "pink noise" along
|
||
with
|
||
the 2600 Hz. Most of this energy should be above 3000 Hz. The pink noise will
|
||
not reach the toll network, where we want our pure 2600 Hz to hit, but it will
|
||
go through the local CO and thus, the fraud detectors.
|
||
|
||
The Black Box
|
||
The Black Box is the easiest type to build. The box stops a call from
|
||
being
|
||
charged to some one only if it is hooked to the line of the person being
|
||
called.
|
||
In the normal telephone cable, there are four wires: a red, a green, a
|
||
black, and a yellow. The red & green wires are often referred to as tip (T) and
|
||
ring (R).
|
||
When a telephone is on-hook (hung up) there is approximately 48 volts of
|
||
DC
|
||
current (VDC) flowing through the tip and ring. When the handset of a phone is
|
||
lifted, switches close, causing a loop to be connected (which is known as the
|
||
"local loop,") between the telephone and the CO. Once this happens DC current
|
||
is able to flow through the telephone with less resistance. This causes a
|
||
relay
|
||
to energize and signal to other CO equipment that service is being requested.
|
||
Eventually, a dial tone is emitted. This also causes the 48 VDC to drop down
|
||
into the vicinity of 13 volts. The resistance of the loop also drops below the
|
||
2500 ohm level. Considering that this voltage and resistance drop is how the CO
|
||
detects that a telephone was taken off hook, how a Black Box works is by
|
||
allowing the voltage to drop enough to allow talking, but not enough to signal
|
||
to the CO equipment to start billing. To do this, a 10,000 Ohm, .5 Watt
|
||
resistor
|
||
is incorporated in t{.b=
|
||
1.loop on the called party's line.
|
||
|
||
The Red Box
|
||
A Red Box is a device that simulates the sound of a coin being accepted by
|
||
a payphone. When a coin is put in the slot of a payphone, the first obstacle is
|
||
the magnetic trap. This will stop any light-weight magnetic slugs. If it passes
|
||
this, the coin is then classed as a nickel, dime, or quarter. Each coin is then
|
||
checked for appropriate size and weight. If these tests are passed, it will
|
||
then
|
||
travel through a nickel, dime, or quarter magnet as proper. These magnets start
|
||
an eddy current effect which causes coins of the appropriate characteristics to
|
||
slow down so they will follow the correct trajectory.
|
||
If all goes well, the coin will follow the correct path, striking the
|
||
appropriate totalizer arm, causing a ratchet wheel to rotate once for every
|
||
5-cent increment (eg, a quarter will cause it to rotate 5 times). The totalizer
|
||
then causes the coin signal oscillator to readout a dual-frequency signal
|
||
indicating the value deposited to the Automated Coin Toll Service computer
|
||
(ACTS) or the Traffic Service Position System (TSPS) operator. These are the
|
||
tones emitted by the Red Box.
|
||
For a quarter, five beep tones are outpulsed for 66 milliseconds (ms). A
|
||
dime causes two beep tones for 33 ms, while a nickel causes one beep tone at
|
||
also 33 ms. A beep consists of two frequencies, 2200 Hz and 1700 Hz. As with a
|
||
Blue Box, Red Box tones can be recorded on a magnetic tape.
|
||
Since any call from a payphone is originated with a "ground test," in
|
||
which
|
||
the TSPS operator or the ACTS computer checks for the presence of the first
|
||
coin
|
||
inserted into the phone, by verifying use of the magnetic, weight, and size
|
||
traps, when using a Red Box, it is necessary to put in at least one coin.
|
||
|
||
The Cheese Box
|
||
A Cheese Box lets a normal telephone emulate a payphone. By emulating a
|
||
payphone, using a blue box now becomes safe, because if the CO equipment
|
||
recognizes the call as one from a payphone, it does not record it on a CAMA
|
||
tape. Since a normal telephone does not have a slot to enter coins, a Red Box
|
||
is
|
||
needed to generate the sound of a coin dropping.
|
||
|
||
|
||
V. Divertors
|
||
A divertor is a special service that allows businesses to "divert" calls
|
||
if
|
||
no one answers after a certain number of rings. For example, a person calls a
|
||
company, and nobody answers. After about three rings, a few clicks are heard,
|
||
then a few fainter rings are heard. The building receiving the call has changed
|
||
from the company to another building, usually somebody's house. What has
|
||
happened is that the call has been re-routed from building A to building B. In
|
||
effect, the number called is not really changed, but instead, building A has
|
||
answered the call, called building B, and connected the two lines together. If
|
||
the person in building B disconnects, the caller is still connected to building
|
||
A. With the way the divertor equipment works in the telephone company, the
|
||
phone
|
||
line of building A will then emit a dial tone and the caller has total control
|
||
of the line, and can originate another call, charging it to building A.
|
||
|
||
|
||
|
||
VI. Private Branch Exchange
|
||
A Private Branch Exchange (PBX) is a system of out-WATS (Wide Area
|
||
Telephone Service) lines and in-WATS lines. An out-WATS line allows a business
|
||
to make as long-distance calls each month for a flat rate. An in-WATS line is a
|
||
toll-free number (800 number) that is also leased to businesses for flat rates.
|
||
PBX's save corporations much money when their salesmen, distributors, and
|
||
franchisees must make many calls from different parts of the country. It works
|
||
much like specialized common carriers (to be discussed later).
|
||
First, the employee calls the company on the in-WATS line. The switching
|
||
equipment picks up the phone, and send a tone to the employee indicating for
|
||
him
|
||
to enter the access code of the PBX. If the access code is correct, then the
|
||
line is connected to the out-WATS line, and the employee can make a call.
|
||
To use PBX's, phreakers must find the access code of the PBX. This can be
|
||
done very easily, since the code is usually only a few digits. One way is to
|
||
dial different combinations manually on the telephone keypad. The other way is
|
||
of the phreaker is the owner of a modem. A simple program can be easily written
|
||
to continuously dial digit combinations randomly or sequentially.
|
||
|
||
|
||
VII. Specialized Common Carriers
|
||
Ever since the break up of AT&T's monopoly on long-distance service, there
|
||
have been many other corporations that compete with AT&T in the long-distance
|
||
market, including Sprint, MCI, All-net, ITT, and Metrophone. These all boast
|
||
opportunities for large savings on long-distance calls. These companies are
|
||
called specialized common carriers (SCC's).
|
||
SCC's cost less because they do not use the AT&T's cable-based systems,
|
||
but
|
||
instead use microwave links. Some have also added fiber-optic lines to their
|
||
networks.
|
||
Another way they can save consumers money is by using AT&T's lines.
|
||
Instead
|
||
of connecting calls by the shortest route, the carrier will use a different
|
||
route, so the call goes through places where the long-distance traffic is
|
||
heavy,
|
||
and the rate is lower. The companies that do this are known as "resellers."
|
||
Most SCC's work nearly the same as PBX's. The 800 number is called, a tone
|
||
is hearl, the private identification number (PIN) is entered, and then the call
|
||
can be made. The length of the PIN number can range from four digit to fourteen
|
||
digits.
|
||
Besides 800 toll free numbers, in some areas, a 950 can be used. A 950
|
||
works exactly the same as an 800 number, the only difference is that the
|
||
consumer must enter only seven digits before dialing his PIN number instead of
|
||
ten with a toll-free number. 950's are free of charge and can be used both at
|
||
home and at pay phones.
|
||
The PIN numbers can be found the same way as PBX access codes. Since the
|
||
number of digits in a PIN is so great, using a computer is much more common
|
||
practice than manual dialing.
|
||
The following pages are lists of SCC's and their dialups, formats, and
|
||
special points. Note that some have many different dialups.
|
||
|
||
|
||
|
||
=============================================================================
|
||
{ SCC Extenders List }
|
||
{ 0-9 - Number of digits in code }
|
||
{ { } - Dial that exact number }
|
||
{ # - Area code + Prefix + Suffix }
|
||
{ : - Dial tone }
|
||
{ + - Continue dialing }
|
||
=============================================================================
|
||
\ Extender \ Dialing Format \ Company \ Comments \
|
||
-----------------------------------------------------------------------------
|
||
\ 800-223-0548 \ 8+{1}+# \ TDX \ \
|
||
\ 800-241-1129 \ 8+{1}+# \ TDX \ \
|
||
\ 800-248-6248 \ 6+{1}+# \ SumNet Systems \ (800)824-3000 \
|
||
\ 800-288-8845 \ 7:{1}+# \ TMC Watts \ (800)999-3339 \
|
||
\ 800-325-0192 \ {1}+#+6 \ MCI \ 950-1986 \
|
||
\ 800-325-1337 \ 7:{1}+# \ TMC Watts \ \
|
||
\ 800-325-7222 \ 6+{1}+# \ Max \ (800)982-4422 \
|
||
\ 800-325-7970 \ 6+{1}+# \ Max \ (800)982-4422 \
|
||
\ 800-327-4532 \ 8+# \ All-TelCo \ \
|
||
\ 800-327-9488 \ #:13 \ ITT \ 950-0488 \
|
||
\ 800-334-0193 \ {9}+# \ Piedmont \ \
|
||
\ 800-345-0008 \ {0}+#:14 \ US Sprint FON Cards \950-1033 also 9+#\
|
||
\ 800-368-4222 \ 8+# \ Congress Watts Lines \ \
|
||
\ 800-437-7010 \ 13 \ GCI \ \
|
||
\ 800-448-8989 \ 14+{1}+# \ Call US \ \
|
||
\ 800-521-8400 \ 8:# \ TravelNet \ 950-1088 (voice)\
|
||
\ 800-541-2255 \ 10 \ MicroTel \ \
|
||
\ 800-547-1784 \ 13 \ AmericaNet \ \
|
||
\ 800-621-5640 \ 6+{1}+# \ ExpressTel \ \
|
||
\ 800-637-4663 \ 5+{1}+# \ TeleSave \ \
|
||
\ 800-821-6511 \ 5+{1}+# \ American Pioneer \ (800)852-4154 \
|
||
\ 800-821-6629 \ 6+{1}+# \ Max \ (800)982-4422 \
|
||
\ 800-821-7961 \ 6+{1}+# \ Max \ (800)982-4422 \
|
||
\ 800-826-7397 \ 6:{1}+# \ Call U.S. \ \
|
||
\ 800-858-4009 \ 6+{1}+# \ NTS \ Voice \
|
||
\ 800-862-2345 \ 7:{1}+# \ TMC \ \
|
||
\ 800-877-8000 \ {0}+#:14 \ US Sprint Calling Card\950-1033 also 9+#\
|
||
\ 800-882-2255 \ 6:{1}+# \ AmeriCall \ False Carrier \
|
||
\ 800-950-1022 \ {0}+#:14 \ MCI Calling Card \ \
|
||
\ 800-992-1444 \ 9+# \ AllNet \ 950-1444 \
|
||
=============================================================================
|
||
|
||
|
||
|
||
VIII. PC Pursuit
|
||
Many modem users know Telenet as a packet-switching network through which
|
||
they can connect to different telecommunication services throughout the country
|
||
for an hourly rate of $2. With PC Pursuit, Telenet uses the same method as
|
||
SCC's, but instead of using microwave links, the call is routed through
|
||
computers. Since it is routed through computers, the service can be used by
|
||
only
|
||
owners of modems. Instead of paying the hourly rate, the consumer needs only to
|
||
pay a flat monthly rate of $25.
|
||
Using PC Pursuit is a little more difficult than using SCC's, because now
|
||
instead of combinations of only ten different characters (0-9), the whole
|
||
alphabet can be used in the access code. The following is a chart showing the
|
||
steps to originate a typical PC Pursuit call.
|
||
|
||
How to Originate a PC Pursuit Call
|
||
First, the users dials the local Telenet Access Center, which can be found
|
||
by dialing Telenet customer service at 1-800-336-0437.
|
||
|
||
Then:
|
||
|
||
Note: (cr) signifies the carriage return on a computY.Z+e =I9
|
||
|
||
Network Shows \ User Types \ Explanation
|
||
uuuuuuuuuuuuumuuE[]]]]]]][]]]]]][]]]]]]][]]]]q]][]]]]]]][]]]][]]]]]]][]]]]]k
|
||
\ (cr) (cr) \
|
||
\\
|
||
TELENET \ \ Telenet network called and
|
||
XXX XXX \ \ your network address.
|
||
\\
|
||
TERMINAL= \ "D1" (cr) \ Enter "D1" or press (cr)
|
||
\\
|
||
@ \ For 300 bps: \ CONNECT command. To access
|
||
\ "C(sp)DIALXXX/3,XXXX(cr)" \ a PC Pursuit city type a PC
|
||
\ \ Pursuit access code and
|
||
\ For 1200 bps: \ your user ID.
|
||
\ "C(sp)DIALXXX/12,XXXX(cr)" \
|
||
\\
|
||
PASSWORD= \ "XXXXXX" (cr) \ Type the password
|
||
\\
|
||
DIALXXX/X \ "ATZ" (cr) \ You are now connected to the
|
||
CONNECTED \ \ PCP city. Type ATZ (upper).
|
||
\\
|
||
OK \ "ATDTXXXXXXX" (cr) \ Dials a number in PCP city
|
||
\\
|
||
CONNECT \ \ Your are now connected to
|
||
\ \ your destination computer.
|
||
\\
|
||
|
||
If the number dialed is busy, the user will see BUSY. To call another
|
||
number in the same city, the user types "ATZ." The network will answer OK. The
|
||
user then types "ATDTXXXXXXX" (cr) to dial the next number.
|
||
To connect to a different PC Pursuit City, when the user sees BUSY, he
|
||
types "@" (cr). When a @ appears, you are in business, and ask for the owner of
|
||
the number. In some states, though, the operator will
|
||
ask for an ID number. In these cases, one must be guessed at.
|
||
There is also a type of reverse CN/A bureau, which is usually called a NON
|
||
PUB DA or TOLL LIB. With these numbers, somebody can find unpublished numbers
|
||
if
|
||
the caller gives the operator the name and locality. These are considerably
|
||
harder to use, since the operator will then request the caller's name,
|
||
supervisors name, etc.
|
||
The following is a list of current CN/A's.
|
||
|
||
|
||
|
||
1988 CN/A List (subject to change)
|
||
|
||
|
||
Area: CN/A Area: CN/A Area: CN/A
|
||
201: 201-676-7070 202: 304-343-7016 203: 203-789-6815
|
||
204: 204-949-0900 205: 205-988-7000 206: 206-345-4082
|
||
207: 617-787-5300 208: 303-293-8777 209: 415-781-5271
|
||
212: 518-471-8111 213: 415-781-5271 214: 214-464-7400
|
||
215: 412-633-5600 216: 614-464-0519 217: 217-789-8290
|
||
218: 402-221-7199 219: 317-265-4834 301: 304-343-1401
|
||
302: 412-633-5600 303: 303-293-8777 304: 304-344-8041
|
||
305: 912-752-2000 307: 303-293-8777 308: 402-221-7199
|
||
309: 217-525-7000 312: 312-796-9600 313: 313-424-0900
|
||
314: 816-275-8460 315: 518-471-8111 316: 913-276-6708
|
||
317: 317-265-4834 318: 504-245-5330 319: 402-221-7199
|
||
401: 617-787-5300 402: 402-221-7199 403: 403-425-2652
|
||
404: 912-752-2000 405: 405-236-6121 406: 303-293-8777
|
||
408: 415-546-1341 412: 412-633-5600 413: 617-787-5300
|
||
414: 608-252-6932 415: 415-781-5271 416: 416-443-0542
|
||
417: 816-275-8460 418: 614-464-0123 419: 614-464-0519
|
||
501: 405-236-6121 502: 502-583-2861 503: 206-345-4082
|
||
504: 504-245-5330 505: 303-293-8777 506: 506-657-3855
|
||
507: 402-380-2255 509: 206-345-4082 512: 512-828-2501
|
||
513: 614-464-0519 514: 514-394-7440 515: 402-221-7199
|
||
516: 518-471-8111 517: 313-424-0900 518: 518-471-8111
|
||
519: 416-443-0542 601: 601-961-8139 602: 303-293-8777
|
||
603: 617-787-5300 604: 604-432-2996 605: 402-221-7199
|
||
606: 502-583-2861 607: 518-471-8111 608: 608-252-6932
|
||
609: 201-676-7070 612: 402-221-7199 613: 416-443-0542
|
||
614: 614-464-0519 615: 615-373-5791 616: 313-424-0900
|
||
617: 617-787-5300 618: 217-525-7000 619: 415-781-5271
|
||
701: 402-221-7199 702: 415-543-2861 703: 304-344-7935
|
||
704: 912-752-2000 705: 416-443-0542 707: 415-781-5271
|
||
712: 402-221-7199 713: 713-961-2397 714: 213-995-0221
|
||
715: 608-252-6932 716: 518-471-8111 717: 412-633-5600
|
||
718: 518-471-8111 801: 303-293-8777 802: 617-787-5300
|
||
803: 912-784-9111 804: 304-344-7935 805: 415-781-5271
|
||
806: 512-828-2501 808: 212-226-5487 809: 404-751-8871
|
||
812: 317-265-4834 813: 813-228-7871 814: 412-633-5600
|
||
815: 217-789-8290 816: 816-275-8460 817: 214-464-7400
|
||
819: 514-861-6391 901: 615-373-5791 902: 902-421-4110
|
||
904: 912-752-2000 906: 313-424-0900 912: 912-752-2000
|
||
914: 518-471-8111 916: 415-781-5271
|
||
918: 405-236-6121 912: 912-752-2000
|
||
|
||
|
||
|
||
|
||
XI. Loops
|
||
The {k..is an alternative communication medium that has many potential
|
||
uses. Loops are phone lines that are connected when they are called
|
||
simultaneously. One use is when somebody wants another person to call them back
|
||
but is reluctant to give out their home phone number (eg., if they were on a
|
||
party line).
|
||
Loops are found in pairs that are usually close to each other (eg.,
|
||
718-492-9996 and 718-492-9997). On a loop, one line is the high end, and the
|
||
other is the low end. The high end is always silent. The tone disappears on
|
||
the
|
||
low end when somebody calls the high end.
|
||
It is truly only safe to use a loop during non-business hours. During
|
||
business, loops are used to test equipment by various telephone companies and
|
||
local CO's.
|
||
|
||
|
||
XII. Alliance Teleconferencing
|
||
Alliance Teleconferencing is an independent company which allows the
|
||
general public to access and use its conferencing equipment.
|
||
|
||
|
||
|