988 lines
44 KiB
Plaintext
988 lines
44 KiB
Plaintext
===========================================================================
|
||
OFFICAL NPA RELEASE DOCUMENT
|
||
TRANSCRIPT: TAP ISSUE #70
|
||
DATE: 10/24/87
|
||
TYPED BY: THE AESTHETIC INDIVIDUAL
|
||
===========================================================================
|
||
|
||
|
||
TAP
|
||
No. 70
|
||
November-December 1981
|
||
|
||
|
||
|
||
|
||
====================
|
||
NAKED CAME THE CROOK
|
||
====================
|
||
|
||
A nude man who came in from the cold to rob a gas station early
|
||
yesterday had a decided advantage, police said. The attendant was female.
|
||
She fled, leaving the unarmed man free to empty the cash register, then
|
||
scroll casually from the scene of the crime.
|
||
|
||
|
||
==================
|
||
FREEBASING COCAINE
|
||
==================
|
||
|
||
By Dr. Atomic
|
||
|
||
Frebasing cocaine is basically a California phenomenon, but it's a
|
||
practice that is popular with entertainers and with others who can afford
|
||
to indulge in the pleasures of cocaine. Freebase cocaine is smoked in a
|
||
special, glass water pipe called a freebase pipe, and after taking a toke
|
||
the onset of the high is quick; it comes on faster than snorting and
|
||
almost as quick as an I.V. injection -- it's like injecting cocaine
|
||
without using a needle. After inhaling the freebase cocaine vapors, your
|
||
hearing drops, and you get an incredible rush even before enough time
|
||
passes to exhale the smoke. Unfortunately, the rush and the high don't
|
||
last long, and the desire to smoke some more coke is compulsive. In
|
||
fact, it is so impulsive that people who hang around the freebase pip,
|
||
impatiently waiting to get another toke, are known in the vernacular as
|
||
"freebase vultures". But, before the cocaine can be smoked, it must
|
||
first be prepared.
|
||
|
||
The cocaine purchased on the street is usually coaine hydrochloride
|
||
(HCl), a water soluble salt of cocaine that is suitable for snorting
|
||
or injecting, but not for smoking. Cocaine HCl burns at a high
|
||
temperature, about 200oC, an if it's smoked, much of the cocaine gets
|
||
carbonized, burned up, instead of reaching your lungs as vapors. But, by
|
||
changing the cocaine HCl to cocaine freebase, you get more of the desired
|
||
cocaine vapors and less carbon because the freebase vaporizes at a much
|
||
lower temperature than the cocaine HCl does.
|
||
|
||
All it takes to change the cocaine HCl into cocaine freebase is a
|
||
little home chemistry. It's easy: if you can bake brownies by following a
|
||
cook book, you can freebase coke. The only supplies needed are some
|
||
inexpensive chemicals and equipment that are easily obtainable at your
|
||
local paraphernalia shop.
|
||
|
||
|
||
Equipment and Supplies
|
||
----------------------
|
||
|
||
1 Freebase water pipe, glass
|
||
2 Screens, fine mesh, for pipe
|
||
1 Glass freebase vial, 1 oz with top (1)
|
||
1 Mirror
|
||
1 Single edge razor blade
|
||
1 Box baking soda
|
||
1 bottle of petroleum ether or ethyl ether (2)
|
||
1 book matches or butane lighter
|
||
|
||
NOTE 1: Ethyl ether and petroleum ether will dissolve many plastics, so
|
||
the tops of freebase vials are specially made of ether
|
||
resistant plastic.
|
||
|
||
NOTE 2: Use caution when handling ether. The vapors of both ethyl ether
|
||
and petroleum ether will ignite explosively near an open flame.
|
||
Make sure that the room is well ventilated when extracting with
|
||
ether. When freebasing in the kitchen, make sure the pilot
|
||
lights are out on the stove and the hot water heater if they
|
||
are nearby. Also, don't smoke or light matches while there are
|
||
still fumes in the air.
|
||
|
||
|
||
The Freebase Process
|
||
--------------------
|
||
|
||
1) To a 1 oz glass freebase vial, add 4ml to 6ml of warm water. Less
|
||
than 1/4 of the vial is more than sufficient water.
|
||
|
||
2) Dissolve 1/4 to 1/2 gram of cocaine HCl in the water to make a
|
||
cocaine solution. Shake or stir if necessary to dissolve the
|
||
cocaine.
|
||
|
||
3) Add about 1/4 gram, more or less, of baking soda to the coaine HCl
|
||
solution. It is better to have an excess of baking soda than not
|
||
enough. Next shake well. This changes the cocaine HCl to the
|
||
freebase.
|
||
|
||
4) Using a glass eyedropper, add 2ml to 3ml of ether. Shake well. The
|
||
ether extracts the freebase cocaine from the water layer. As a rule
|
||
of thumb, use half as much ether as water. Since ether and water do
|
||
not form a solution, the ether will rise to the top and form a
|
||
distinct layer.
|
||
|
||
|
||
___________
|
||
|\ /|
|
||
| \_______/ | __________ Ether Resistant Cap
|
||
|___________|
|
||
|
||
| |
|
||
| |
|
||
| |
|
||
| |
|
||
| |
|
||
|___________|
|
||
| | --------- Ether Layer
|
||
|___________|
|
||
| |
|
||
| | --------- Water Layer
|
||
|___________|
|
||
|
||
|
||
Because the cocaine freebase is more soluble in ether than in water,
|
||
the ether layer will contain most of the freebase; in effect, the
|
||
ether has extracted the freebase cocaine from the water layer. This
|
||
first ether extraction is known as the "first wash". The water
|
||
layer can be washed one or two more times with ether to extract the
|
||
small amount of freebase remaining after the first wash.
|
||
|
||
5) Siphon off the ether layer with the eyedropper, making sure not to
|
||
take any of the water layer. Drop the freebase saturated ether
|
||
carefully onto a clean mirror or glass surface. When the ether
|
||
evaporates, a white powder should remain; this is the cocaine
|
||
freebase, and it's ready to smoke. So what are you waiting for?
|
||
|
||
|
||
The freebasing process removes some of the water soluble contaminants
|
||
(cuts) like mannitol and lactose, so the yield, i.e. the weight of the
|
||
cocaine freebase obtained will weigh less than the cut-coke that was
|
||
started with; however, no significant amount of cocaine is lost, only the
|
||
cut is removed. Thus, a gram of cocaine HCl that is only 25% pure is not
|
||
a gram of cocaine but a 1/4 gram of cocaine, and the yield of freebase
|
||
cocaine, for this particular sample, will be slightly less than 1.4 gram.
|
||
|
||
The cocaine freebase, however, is nearly pure, compared to the starting
|
||
material, and a smaller dose of the freebase will be just as potent as a
|
||
larger amount of the cut cocaine. So, start with a small hit, a match
|
||
size line or less (20mg to 50mg). Remember, just like snorting ot
|
||
injecting, you can consume too much by smoking. Be careful how much you
|
||
smoke, and be careful, too, for police and informers: cocaine is still
|
||
illegal. Have fun with your chemistry projects, stay high, and stay
|
||
free.
|
||
|
||
|
||
|
||
=========================
|
||
MAN NABBED IN PHONE FRAUD
|
||
=========================
|
||
|
||
EAST BRUNSWICK - A man who described himself as an electronics engineer
|
||
has been arrested on charges stemming from the use of a "blue box", a
|
||
gadget the size of a calculator that emits electronic signals that
|
||
bypasses regular telephone billing equipment.
|
||
|
||
Tarkeshwar Singh, 50, of 16 Manor Place, was freed on his own
|
||
recognizance after he was arrested yesterday in a public phone booth at a
|
||
Route 18 department store, Detective Donald Henschel reported.
|
||
|
||
Singh was charged with possesion of a burglary tool, the "blue box",
|
||
and theft of $300 of services from New Jersey Bell Telephone Co. police
|
||
said.
|
||
|
||
Investigator James Witanek of the phone company's security division in
|
||
Newark said the investigation had been inprogress for several months.
|
||
During that time, he said, Signh used the device for $300 worth of phone
|
||
calls to Japan and Hong Kong.
|
||
|
||
In addition to the "Blue Box", investigators confiscated a schematic
|
||
design of the insturment which they said had been sent to Signh by an
|
||
aquaintance in West Germany.
|
||
|
||
"These electronic devices are a continuing problem to the telephone
|
||
company," Witanek said.
|
||
|
||
|
||
|
||
=======================
|
||
THE POSTAL (DIS)SERVICE
|
||
=======================
|
||
|
||
The Department of Agriculture recently completed a major survey, packed
|
||
up its findings in some 1,300 boxes and mailed them off to its Des
|
||
Moines, Iowa, processing center. While in the fumbling hands of the
|
||
Postal Service, more than 600 of the parcels were damaged, lost or
|
||
delivered to the wrong address.
|
||
|
||
We trust that when the Agriculture Department lodged its complaint, it
|
||
had the good sense to call rather than drop a letter in the mail.
|
||
|
||
|
||
|
||
=====================================
|
||
DO-IT-YOURSELF CALL FORWARDING DEVICE
|
||
=====================================
|
||
|
||
Dear TAP:
|
||
|
||
In Response to several pleas from your pub, enclosed is some technical
|
||
data on the Pacific Telephones in Pasadena.
|
||
|
||
On Hook: 45 VDC
|
||
Off Hook: 7.5 VDC @ 6ma Phone Input res: 200 ohms
|
||
|
||
Ring: Approx 50 VAC (My cheap multi-meter doesn't read AC mils)
|
||
|
||
T1 (Mic Button) res: 600 ohms
|
||
U3 (Ear Piece) res: 20 ohms (leads feeding earpiece show 80 ohms
|
||
across them.)
|
||
|
||
Ringer Coil Res: approx 3K ohms. Only one Coil.
|
||
|
||
Ring Back #6105-6: (Prefix)-1-(Prefix) gets a wierd "ticky-tock" sound;
|
||
(Prefix)-0002 gets a nice 1000 cps tone;
|
||
(Prefix)-1118 gets a real LOUD tone;
|
||
(Prefix)-0000 gets a central office recording which
|
||
includes the unlisted phone number for
|
||
the office (in this case, 576-6119);
|
||
|
||
What was supposed to be the verifying number (Prefix)-1111, gets the
|
||
"Not in service" recording;
|
||
|
||
(Prefix)-0003 gets the referral operator;
|
||
(Prefix)-0119 is a private party's home fone;
|
||
|
||
I'm trying to come up with a design for a "Dial Through Cheese Box"
|
||
sort of a gimmick, but it's not what I want. I could do it if we had T-T
|
||
phone hereabouts, but we're stuck with impulse dials. Drat. Any ideas?
|
||
|
||
|
||
|
||
|
||
MATERIALS:
|
||
|
||
C1- 1.0mfd @ 400 VDC
|
||
RL1- 4P.DT Relay, 115 vac coil
|
||
T1- Audio Isolation xformer, approx 600 ohms imped, 100 to 200 ohms DC
|
||
res.
|
||
M1- Timer Motor. 115 VAC 60 CPS
|
||
|
||
SW1a- First section of timer switch, set for approx 3min closed, 10 sec
|
||
open (due to circuit configuration, timer will self index to "open"
|
||
position of this switch).
|
||
|
||
SW1b- Second section of timer switch. Set for minimum possible duration
|
||
"on". Indexed to close AFTER SW1A has come OUT of detent. This is the
|
||
critical factor in choosing the type of timer. "On" duration must be LESS
|
||
than time required for "name caller" to finish dialing.
|
||
|
||
ADDITIONAL ITEM REQUIRED, BUT NOT SHOWN:
|
||
|
||
1 ea battery powered "Name Caller" dialing machine or equivalent.
|
||
|
||
NOTE: Over-ride disconnect switch (Tone Send. Relay?) may be connected
|
||
at point x-x.
|
||
|
||
|
||
|
||
================
|
||
CALLING HIS BUFF
|
||
================
|
||
|
||
LAS VEGAS (AP) - What do you say to a naked burglar?
|
||
|
||
That's what police were wondering at 5am Sunday when they arrested
|
||
Karl Hunsaker, 30 of Las Vegas, as he was climbing down a ladder in the
|
||
buff carrying household goods from an apartment.
|
||
|
||
Hunsaker was booked for investigation of burglary.
|
||
|
||
Officers gave no reason as to why Hunsaker had no clothes on.
|
||
|
||
|
||
|
||
====================
|
||
JAIL PHONE LINE BUSY
|
||
====================
|
||
|
||
DELAND, Fla. - A defendant usually gets to make one free phone call,
|
||
but for a few inmates at the Volusia County jail that apparently wasn't
|
||
enough. Using coin-operated telephones in the jail, at least six inamtes
|
||
made at least $32,000 worth of illegal telephone calls, according to
|
||
Assistant State Attorney Horace Smith. The inmated charged the calls to
|
||
fake credit cards or to telephone numbers of unsuspecting citizens in
|
||
this central Florida city, he said. Three inmates have been found guilty
|
||
of charges in connection with the telephone case, and three others are
|
||
awaiting trial, Smith said.
|
||
|
||
|
||
|
||
====================
|
||
PHONE CENTER PARADOX
|
||
====================
|
||
|
||
Michigan Bell Telephone Co., the giant corporate institution that
|
||
touches all of our lives and wallets, gets absolutely giddy whenever we
|
||
reach for the telephone. Bell spends millions of dollars around the clock
|
||
and calendar for advertising and public relation to persuade us to reach
|
||
more often.
|
||
|
||
We are taught, however, obliquely, that we are disadvantaged unless we
|
||
have telephones handy in every room of the house and office, or if we do
|
||
not use them to facilitate every communication. Shop by phone; sell
|
||
aluminum siding by phone; solicit and collect money by phone. Telephone
|
||
your mother, lover, great uncle and your entire graduating clas at least
|
||
once a week, just for the kick of it. Get a separate line for the kids!
|
||
Get a car phone! Give a phone to a poor person! And, do invest in one
|
||
of those recording devices so you will never, never miss a call, even a
|
||
wrong number. That way Michigan Bell will never miss collecting for the
|
||
call. We will all live happily ever after.
|
||
|
||
|
||
ONE RINGY-DINGY......
|
||
|
||
All this, and more, is the implied message of Bell's advertising. I
|
||
have no argument with it. I would rather write than phone, or recieve a
|
||
letter than a call. Written words are special to me. Spoke words
|
||
transmitted by electronic devices may be special to other people. The
|
||
absurdity that intriges me is not in the advertising or even the concept
|
||
of the telephone as an extension of the human mouth and ear.
|
||
|
||
Here's the absurdity: In it's ever-dilligent determination to expand
|
||
service, the telephone company has opened 35 new Phone Centers around the
|
||
state during the past 18 months or so. These are retail stores, more or
|
||
less, in which you can purchase telephones (Bell calls them
|
||
"instruments") and also arrange for installation when necessary,
|
||
strighten out billing problems and generally do your telephone buisness.
|
||
|
||
These places are designed as walk-in centers, however. Therefore - and
|
||
here it comes - they are not included in telephone book listings. This
|
||
is not an oversight. The Phone Centers have unlisted telephone numbers.
|
||
This is what I call absurd, remembering everything Bell has said about
|
||
how essential telephone communication is to life itself.
|
||
|
||
I know about this because a fellow named Jerry Moons (I think)
|
||
telephoned me to tell me about it. He had seen one of these Phone Centers
|
||
near Telegraph and 13 mile and wanted to dial it up to ask telephonic
|
||
questions.
|
||
|
||
TWO RINGY-DINGIES....
|
||
|
||
"I couldn't find a listing," he said, "so I dialed the information
|
||
operator. It rang 20 times and I hung up. Then, I dialed Bell
|
||
headquarters, and someone there told me the number is unlisted. The
|
||
person said Bell doesn't want its people bothered by phone calls. I swear
|
||
to you that's what I was told."
|
||
|
||
I believe him. I confirmed it with a telephone company spokeman. He
|
||
said, "The Phone Centers do have telephones, but we discourage telephone
|
||
contacts. It's supposed to be a face-to-face operation. You know, a
|
||
retail outlet to shop for phones."
|
||
|
||
He told me a lot of other things. He said Bell workers at the Phone
|
||
Centers do not have access to central records and are not really set up
|
||
to help with billing problems or repair problems. He said they have to
|
||
refer all those things to other departments, that that's a nuisance for
|
||
them and a hold-up for customers. He said the main job of the phone
|
||
centers is to sell phones and to arrange for service, and that having an
|
||
unlisted number helps. All that translates to me as the same thing as
|
||
"Bell doesn't want it's people bothered by phone calls."
|
||
|
||
I love it. Finding a giant absurdity is as exciting as finding the
|
||
great pumpkin. Now, it's your turn.
|
||
|
||
|
||
|
||
========================
|
||
COMPUTER 'ERASES' PHONES
|
||
========================
|
||
|
||
A malfunctioning computer bulletin board almost caused a total
|
||
communications blackout yesterday at the Union County administrative
|
||
complex in Elizabeth.
|
||
|
||
All 945 telephones at the County complex went dead shortly before
|
||
11:30am. when a memory board in the telephone operations room burned
|
||
out, according to James Delaney, director of central services.
|
||
|
||
Delaney said critical county operations, such as police and emergency
|
||
communications, had been carried out over the county's radio system
|
||
during the nearly four hours it took for the telephone company to restore
|
||
service.
|
||
|
||
In the meantime, the county's work force either waited until the
|
||
telephones were operative, or opted to "hoot it" between various floors
|
||
or buildings in an effort to maintain communications until the system was
|
||
repaired just after 3pm.
|
||
|
||
|
||
|
||
==================
|
||
WRONG LINE, INDEED
|
||
==================
|
||
|
||
TEMPLE, Texas (AP) - If you're one of those people who always seem to
|
||
be caught in the slowest-moving line at the bank, you might understand
|
||
the predicament a would-be robber found himself in recently.
|
||
|
||
The fellow stepped up to a teller at the First National Bank of Temple
|
||
and demanded that she fill his sack with money.
|
||
|
||
"Give me the money, this is a stickup," the unarmed man told Claudine
|
||
Holder.
|
||
|
||
Holder barely glanced at the canvas bag on her counter. Instead, the
|
||
teller, whom bank vice-president Sam Farrow described as "feisty and very
|
||
quick-witted," informed the man that he was in the wrong line.
|
||
|
||
She directed him to stand in a line across the lobby, and while he
|
||
waited meekly for service, she called police.
|
||
|
||
The suspect was arrested and charged with attempted bank robbery.
|
||
|
||
|
||
|
||
|
||
=======================================
|
||
ARMY WANTS TO FIND LONG-DISTANCE CHEATS
|
||
=======================================
|
||
|
||
TACOMA - The Army wants to reach out and touch a few individuals who
|
||
like to make illegal long-distance calls at Fort Lewis.
|
||
|
||
One soldier phoned a number in the Dominican Republic and charged the
|
||
$1,296 call to the base.
|
||
|
||
Another has been calling from a pay telephone on Fort Lewis to a pay
|
||
phone outside the Howard Johnson Restaurant in Trenton, NJ and been
|
||
charging those calls to a number on the post. Worse yet, says Bill Wood,
|
||
a base spokesman, return calls from Trenton are billed to the same
|
||
number.
|
||
|
||
Ordinarily, long-distance bills going through the Fort Lewis
|
||
Communications Center average $2,000 a month. In May, the bills came to
|
||
$4,500. "Probably half or more of them are fraudulent," Wood says, "but
|
||
we are checking and we will find those people."
|
||
|
||
Those making such calls could be imprisioned for five years for the
|
||
offense.
|
||
|
||
|
||
|
||
|
||
==============================
|
||
ABUSE OF REMOTE ACCESS SYSTEMS
|
||
==============================
|
||
|
||
John Petrie has a problem. Petrie (not his real name) is the
|
||
communcations manager for a medium size company in the Midwest. His
|
||
company has installed a long-distance control system to monitor usage and
|
||
get better utilization of long distance facilities. Because the company
|
||
has a large number of people traveling, remote access to the company's
|
||
long distance facilities was installed to reduce the number of credit
|
||
card calls. A series of inward WATS lines are connected to the long
|
||
distance control system at headquarters. When traveling, company
|
||
representatives can simply dial an "800" number and then their personal
|
||
authorization code to get access to the company's long distance
|
||
facilities including toll and outward WATS.
|
||
|
||
The remote access system seemed to be working great. Credit card calls
|
||
had been all but eliminated and the overall cost had been reduced. Then
|
||
about six months ago, Petrie was in the midst of doing the detailed
|
||
monthly billing of calls to station users when he noticed that one person
|
||
had been making a large number of 800 number calls via the remote access.
|
||
Petrie thought to himself, "This guy's got to be a stupid fool to dial
|
||
our 800 number to place a free 800 number call!" When questioned about
|
||
the calls, the man denied making any remote access calls at all that
|
||
month.
|
||
|
||
Totally confused at this point, Petrie called several of the 800
|
||
numbers listed in the billing report. In every case, when the call was
|
||
answered, the familiar toned indicated entrance to a remote access system
|
||
were heard. A phone freak was clearly at work!
|
||
|
||
Petrie immediately changed all codes, pauses and methods of gaining
|
||
access to the company's system. That night, the mysterious caller tried
|
||
60 times before he finally figured out the new procedures and codes.
|
||
Petrie made another major change, but the caller cracked that in about 20
|
||
tries, and then placed a call to germany. Petrie removed international
|
||
dialing from the system and called the telephone company security
|
||
department.
|
||
|
||
Meanwhile, he decided to have some fun by calling the 800 numbers on
|
||
the billing report, contacting each company's switchboard operator and
|
||
asking to be connected to the communications manager. According to
|
||
Petrie, "The moments of silence were deafening when I told these managers
|
||
how I had reached them."
|
||
|
||
After about a week, the telephone company security people showed up and
|
||
after reviewing the documentation were amazed. They traced all of the
|
||
called numbers, and came up with nothing but remote access numbers,
|
||
"meet-me" conference numbers and services such as Time and Temperature in
|
||
upstate Michigan. They did their best to trace calls back to the
|
||
originating number, and came up with calls from California out of another
|
||
company's remote access system.
|
||
|
||
Petrie says that to date his company has been hit with about 6,000
|
||
fraudulent calls, which cost about $10 an hour. "Even with all this," he
|
||
says, "I don't feel we look too bad compared to companies I know who have
|
||
been hit for in excess of $2,500 a month on international calls alone. He
|
||
seems to take great delight in calling Hertz Rent-A-Car in Guam."
|
||
|
||
John Petrie's problem is not unique. An informal survey by BCR reveals
|
||
that a number of large companies, although by no means all have had some
|
||
type of a problem with unauthorized use of remote access facilities.
|
||
Indeed, at least one large consulting firm has been investigating this
|
||
problem for several clients.
|
||
|
||
The difficulty in getting access to a companie's long distance
|
||
facilities via remote access varies considerably. The system used by
|
||
Petrie's company is one of the more difficult ro crack in that it
|
||
trquires knowing the proper inward WATS number plus a valid authorization
|
||
code. The system used in AT&T's Dimension PBX may be less secure in that
|
||
there is one common access code for eveyone. In some systems, no access
|
||
of authorization code at all is required. Simply dialing the special
|
||
local or inward WATS number gives the caller immediate access to the long
|
||
distance facilities. The communications manager of one large company
|
||
says that his organization once used inward WATS to access long distance
|
||
facilities thriugh a Centrex system without any restriction. A caller
|
||
simply dialed "9" and got access to the world. In one month there was
|
||
$5,000 to $6,000 in unauthorized calls to destinations such as Israel,
|
||
Hong Kong and Portugal. Belatedly, the company charged the system to
|
||
restrict remote access calls to the company's tie line network.
|
||
|
||
A consultant who has studied the problem believes that most abuse of
|
||
remote access to long distance facilities involves insiders or other
|
||
persons closely associated with the company. Often, it is a consumer or
|
||
a supplier who finds out how to use the remote access. Sometimes it is
|
||
just the difficulty in keeping authorization codes from becoming common
|
||
knowledge within an organization. One company the consultant recalls was
|
||
using MCI Execunet service, and the authorization code was supposed to be
|
||
known by only a small group of persons. Eventually, it came to be known
|
||
by a very large group. "I don't know how much security you can really
|
||
put into it," the consultant says, "because once you tell the secretaries
|
||
and they have to write memos to someone else, it is very hard to clamp
|
||
down on it."
|
||
|
||
One of the country's largest manafacturing firms uses an
|
||
operator-controlled system in which someone calling from outside wanting
|
||
to use the long distance facilities must give the operator a four
|
||
character code. The communications manager told BCR that while abuse is
|
||
"not a significant problem for us, we know that there are people using
|
||
the network who are not authorized to do it. Some of them are retiries
|
||
from the company who have been around for a while and know the score.
|
||
With 10,000 authorization codes, it's not too difficult to find a good
|
||
one."
|
||
|
||
It appears that most cases of abuse are the result of people wanting to
|
||
make free telephone calls. But there also seems to be an element of
|
||
pranksterism involved. One company in the East, located near a large
|
||
university, found they had a lot of outsiders accessing their telephone
|
||
system. Suspecting university students, they got persmission to install
|
||
a call data recorder on the main university Centrex system. The data
|
||
they collected confirmed that the students were, indeed, living up to
|
||
their reputation for technical wizardry. they had not only found out how
|
||
to access the company's long distance facilities, but its computer system
|
||
as well. Fortunately, they had not yet found out how to obtain or
|
||
manipulate data in the computer.
|
||
|
||
John Petrie says one of the prankster's tricks "is to place a call to
|
||
Company A's remote access. From Company A's system, they then call
|
||
Company B's remote access; then call from Company B to Company C; then
|
||
call from Company C back again to Company A and finally to a
|
||
non-releasing Time and Temperature number that, of course, will never
|
||
hang up. By doing this on a Friday evening (none of the companies being
|
||
aware of it until Monday morning), they can tie up entire systems for
|
||
many hours of overtime charges."
|
||
|
||
How easy is it to find a remote access number? If you have some
|
||
association with a company that has one or with the telephone company,
|
||
the answer is probably: not too hard. But, if you have no inside
|
||
information, the difficulty is much greater.
|
||
|
||
To find out how hard it might be for an outsider, we decided to beomce
|
||
a phone freak, and to try to find an inward WATS line connected to a
|
||
remote access. AT&T says that there are about 40,000 interstate inward
|
||
WATS lines, of which about one-half have unlisted numbers. Presumably, a
|
||
small percentage of these unlisted nunbers are for remote access. Our
|
||
experience suggests that they are not easy to find.
|
||
|
||
Knowing nothing about how the telephone company assigns inward WATS
|
||
numbers, we began by consulting a readily available directory of listed
|
||
800 numbers to see if there was any pattern to how numbers are assigned.
|
||
Our assumption was that unlisted numbers would follow the same pattern as
|
||
listed numbers, an assumption that seems to be true.
|
||
|
||
It appears from the directory that 800 numbers do have some pattern;
|
||
that the digits in the exchange code vary with the geographical area.
|
||
WATS lines in New York, for example, have exchange codes that begin with
|
||
a different digit than WATS lines in California. (We deducted the
|
||
location from the fact that the listing said that the number was good
|
||
anywhere except New York or except California.)
|
||
|
||
Knowintg that a lot of company headquarters are located in New York, we
|
||
selected some exchange codes that appear to be used very frequently in
|
||
New York. We dialed these codes with varying combinations of the last
|
||
four digits. After gerring three answers and six recorded announcements
|
||
saying the number was no good on the first ten tries (one answer did not
|
||
answer), we further analyzed the numbers and dialed 30 good numbers out
|
||
of the next 40. None of these numbers, however, was connected to remote
|
||
access. After these 50 unsuccessful attempts, we got bored and gave up,
|
||
deciding we were not cut out to be a phone freak. But had we more
|
||
perserverance or an automatic dialer, perhaps eventually we would have
|
||
found a remote access system. Of course, even if we had, we would be only
|
||
half-way home if the system required an authorization code.
|
||
|
||
It is this difficulty in getting through the security precautions that
|
||
makes most observers believe abuse of remote access results generally
|
||
from inside information. For the user being hit, this distinction might
|
||
seem academic but it does suggest that a company can cut its losses
|
||
substantially by concentrating on more internal security. The following
|
||
are some effective measures:
|
||
|
||
1. Require a proper authorization code in addition to the access
|
||
number.
|
||
|
||
2. Assign remote access authorization codes to a minimum number of
|
||
people.
|
||
|
||
3. Provide enough digits in the authorization code so that you need
|
||
assign only a small percentage of the maximum number of
|
||
combinations.
|
||
|
||
4. Change authorization codes frequently.
|
||
|
||
5. When someone with a code leaves the company, retire the code.
|
||
|
||
6. If possible, install asystem which tells you if a series of invalid
|
||
codes had been dialed in.
|
||
|
||
7. Never give information on remote access to someone you do not know.
|
||
A while back, an individual posing as an Action Communications
|
||
Systems employee was calling WATSBOX users and asking for remote
|
||
access numbers and codes, ostensibly to update Actions's records.
|
||
The caller was not from action.
|
||
|
||
These precautions should minimalize abuse of romote access, but they
|
||
will not eliminate it. Ask John Petrie. He knows.
|
||
|
||
|
||
|
||
==================================
|
||
HOW TO CHEAT YOUR ASS OFF IN SKOOL
|
||
==================================
|
||
|
||
"I have only learned by copying"
|
||
|
||
- Pablo Picasso
|
||
|
||
|
||
MAKING IT: Nice people just don't cheat. This is a fact of life. If you
|
||
do cheat, you are most likely a rotten no good stinker with
|
||
commie friends, dirty underwear and a host of social
|
||
diseases. The REVOLUTIONARY 3 STOOGES try to discourage
|
||
this type of behaviour. It is both tacky and
|
||
unsophisticated. We suggest that instead, you foloow the
|
||
advice of our firends from TAKE OVER, in Madison Wis. by
|
||
just forgetting the entire mess. Fuck Skool! Forget
|
||
cheating. Print up your own degree instead and get on with
|
||
living.
|
||
|
||
(1) Borrow a friend's diploma, put your name in it and make a
|
||
copy suitable for framing. You can take the signature from
|
||
the old diploma, and get a fascimile when the new President
|
||
is named - he will probably have his signature in the papers
|
||
or on all kinds of documents.
|
||
|
||
(2) If you have a Gemini friend, get the friend's transcript and
|
||
put your name at the top - if the friend has a degree.
|
||
Again, make a copy.
|
||
|
||
Or, if you have been here one semester - and don't rush, you
|
||
have 4 years to graduate the TakeOver way - you can get your
|
||
own transcript and simply fill it in with courses it might
|
||
have been nice to take. Reduce-xerox your work to fit the
|
||
form.
|
||
|
||
Consolidated Company in Chicago, a Saturn (discreet) firm
|
||
will sell you a seal that works like a notary's seal for the
|
||
transcript - you must emboss your list of courses and grades
|
||
to give it that offical look. You design the embossing seal
|
||
yourself; put your birth sign in the center if you like,
|
||
some Latin on the outside, with the words "University of
|
||
Wisconsin." For Latin phrases we suggest a little joking,
|
||
such as "PECUNIA LOQUIT" (Money talks) or "OSCULA ASCULA"
|
||
(Kiss my Ass)
|
||
|
||
(3) Two-thirds graduated already, thank your lucky stars and
|
||
proceed to the next part of your education: references.
|
||
Choose or aquire three friends who are careful about getting
|
||
their mail. Appoint them Deans or Faculty members,
|
||
depending on what stationery you can get or contacts you can
|
||
aquire, have them write glowing reccomendations for you, and
|
||
when your file is built, put it in an employment office.
|
||
Some employment offices, such as the University Placement
|
||
Bureau, will furnish forms for reccomendations, so you won't
|
||
have to get the stationery yourself.
|
||
|
||
After your file is put in an employment office, job offers
|
||
will be sent to you, and, as you apply for them, the
|
||
companies may contact your references - let them do it by
|
||
mail and you can write replies yourself.
|
||
|
||
Freed of the ignorance and cruelty of the Capricorns, you
|
||
will have time to learn instead of just becoming passive.
|
||
You can make life easier for yourself, too, by following
|
||
your star on food stamps and welfare, or get a new name by
|
||
writing for the copy of a birth certificate of someone your
|
||
own age who died young. With this certificate you're on
|
||
your way to a social security card, driver's license, phones
|
||
in other names, bills falling forgotten into abandoned
|
||
mailboxes, etc.
|
||
|
||
You can have four years of life, not the living death of
|
||
crawling from class to class.
|
||
|
||
But, some object, "What about knowledge?" The person who has
|
||
spent time at the university may just turn their eyes up at
|
||
such a question, hardly able to believe that someone who
|
||
could think he/she would learn anything of the slightest use
|
||
while sitting in a lecture hall is not an extraterrestrial
|
||
alien. The knowledgable believe that Education, under the
|
||
influence of venus, is not at all lovely, but a sort of
|
||
venereal disease, a cerebellic gangrene, for which this
|
||
paper may be used as a condom (more mundane disease
|
||
prevention may be obtained at the WSA pharmacy or the Blue
|
||
Bus on Spring St).
|
||
|
||
|
||
FAKING IT: It was the morning after. After, that is, dragging myself
|
||
from the gutter in front of the Moonlight Bar to the back
|
||
seat of my car. A bristly black hairy tarantula ran
|
||
screaming from my mouth. Unknown substances mingled with
|
||
cigarette butts in my hair. I had a mid-term exam in
|
||
ancient Chinese history in 2 hours. You could say that I
|
||
was unprepared. I asked myself, "What would a Mao Tse-fly do
|
||
in a case like this?" But the Red Guards were nowhere in
|
||
sight. I was on my own. I entered the class, paused and
|
||
slowly labeled my blue book #2. I took the time writing a
|
||
single grandiloquent concluding paragraph and handed it in.
|
||
The professor later apologized for losing my first blue book
|
||
and gave me a B. A cheat must always be resourceful.
|
||
|
||
1) Change the answers on graded tests. Bring them back to
|
||
the prof and say, "Hey, I had this answer right."
|
||
|
||
2) Carry in completed blue books to the exam.
|
||
|
||
3) At the end of the quarter professors leave graded tests
|
||
and term papers in the halls for their students. Take the
|
||
best ones and save them for future use.
|
||
|
||
4) Keep all tests and papers to use again and again, use
|
||
your friends' and visit fraternity files.
|
||
|
||
5) Remember to never put down what you plagerized from as a
|
||
source. Use master theses from other colleges, the
|
||
papers kept by departments at other colleges for the
|
||
"serious researcher" and obscure books from other
|
||
libraries.
|
||
|
||
6) Despite propaganda, term paper companies are OK.
|
||
|
||
|
||
|
||
TAKING IT: I know of one student who walked into the school print shop
|
||
as exams were being run off, sat down on an inked gally and
|
||
walked off with a set of tests on his pants.
|
||
|
||
1) Bribe or get friends who can get tests, such as janitors
|
||
and print shop workers.
|
||
|
||
2) Go through wastepaper cans for copies.
|
||
|
||
CRIBING IT: What I have come to call the "Ethiopian Shuffle" was given
|
||
to me by a foriegn exchange student and has proven to be one
|
||
of the best crib notes in the buisness. Taking a long
|
||
narrow strip of paper that is folded like an accordion into
|
||
a tiny book, you are able to write 10 times the amount of
|
||
info that a normal crib sheet holds. It is then manipulated
|
||
with thumb and forefinger.
|
||
|
||
1) Magic shops have special pensils which write invisible
|
||
notes that can only been seen with special glasses.
|
||
|
||
2) Intelligence is transmitted to several cheaters through
|
||
an elaborate signal system. Pen point is up, down is
|
||
false. In multiple choice, fingers at chin level mean
|
||
number of question - at waist level, number of answer.
|
||
|
||
3) Put cribs on the seat near your crotch. Open your legs to
|
||
see it, close them to hide it.
|
||
|
||
4) Transistorized tape recorders can be camoflauged as
|
||
hearing aids.
|
||
|
||
5) Be imagnitive. Hide notes everywhere. On skin and
|
||
fingernails. As scrolls in objects such as watches and
|
||
pens. On kleenex, gum and cigarettes. Write on the sole
|
||
of your shoe for easy reading when crossing legs. On
|
||
tape in the folds of clothes and behind sheer nylon.
|
||
|
||
|
||
Viva Larry, Curly & Moe,
|
||
Pancho White Villa
|
||
|
||
|
||
|
||
|
||
=====================================
|
||
TRANSIT EMPLOYEE SOLVES TOKEN PROBLEM
|
||
=====================================
|
||
|
||
A Transit Worker who took it upon himself to tackle the TA's
|
||
$1-million-a-year problem with slug token has come up with an ingenious
|
||
$1 solution.
|
||
|
||
Thomas Costa, a 46-year-old turnstile foreman from Astoris, invented
|
||
what he calls a "roll-pin" device at home.
|
||
|
||
"We were having a problem at the Greenpoint Ave. Station" where thin
|
||
steel slugs were showing up reguarly in token clerk buckets, he
|
||
explained.
|
||
|
||
"I came up with it for this one particular slug, but when I brought it
|
||
in we found out it worked on all kinds."
|
||
|
||
The device works by measuring the width of the phony coins and dropping
|
||
through those coins that don't fit the dimensions of legitimate tokens.
|
||
|
||
Forty copies of Costa's home invention were tested in several
|
||
high-volume stations in Manhattan with "excellent success," a Transit
|
||
Authority spokesman said yesterday.
|
||
|
||
This week, the TA ordered devices for the installation in every
|
||
turnstile in the system.
|
||
|
||
Slugs and foreign coins, which have plagued the subway system since it
|
||
was opened nearly 80 years ago, have been used at epidemic proportions
|
||
since the fare was hiked to 75 cents last month.
|
||
|
||
Nearly 30,000 fare beaters have dropped phony tokens into turnstiles
|
||
every week according to transit police.
|
||
|
||
A peak in slug use was reached in 1976 when 100,000 phony tokens a week
|
||
were being used.
|
||
|
||
Costa submitted his invention to the TA through its employee suggestion
|
||
program, which means he gives up all patent rights to the device.
|
||
|
||
"The TA couldn't pay [employees] for all the stuff they've come up
|
||
with," Costa laughed.
|
||
|
||
"What did he get for developing this thing?" Costa's boss, Joe Spencer,
|
||
was asked.
|
||
|
||
"I kissed him twice," Spencer said.
|
||
|
||
|
||
|
||
|
||
|
||
=======================================
|
||
COMPUTERS MONITOR PHONE LINES FOR FRAUD
|
||
=======================================
|
||
|
||
New electronic "watchdogs" are making it increasingly difficult to fool
|
||
Ma Bell.
|
||
|
||
The watchdogs are computer monitoring systems that have been set up to
|
||
fight telephone toll fraud, which cost New Jersey Bell Telephone Co.
|
||
millions of dollars last year through phony credit card numbers,
|
||
fraudulent third-party billing and the use of eletronic devices to
|
||
bypass automatic billing equipment.
|
||
|
||
The loss due to electronic fraud only can be guessed at, since the
|
||
devices work by circumventing company billing, but Bell spokesman Ted
|
||
Spencer said the company had lost $2.3 million through more conventional
|
||
fraud-schemes in 1980. The costs eventually are passed on to customers.
|
||
|
||
Company officals say telephone bill cheaters come from all segments of
|
||
society, including college students, immigrants, middle-class
|
||
suburbanites, buisnessmen and the poor.
|
||
|
||
* * *
|
||
|
||
For example, a 70-year-old Patterson woman recently was caught charging
|
||
more than $7,000 in overseas telephone calls to Greece using s "blue
|
||
box," a device that emits tones reproducing the signals that guide
|
||
telephone switching equipment.
|
||
|
||
Last week an Israeli couple was charged with making calls to Israel
|
||
with a blue box from pay telephones throughout Union and Middlesex
|
||
counties.
|
||
|
||
After in investigation by the telephone company, a computer analyst
|
||
making $45,000 a year was charged with making fraudulent credit card
|
||
calls on his lunch hour to Iran.
|
||
|
||
John T. Cox, Bell's district staff manager, said the detection systems
|
||
for illegal electronic devices were getting better all the time.
|
||
|
||
"If you're using a blue box on a regular basis in New Jersey, you're
|
||
going to be caught," he said flatly. "I can almost guarantee it."
|
||
|
||
Escorting a visitor through s seldom-seen computer room at Bell, Cox
|
||
pointed out teletype monitors that can pick up the use of the device and
|
||
immediately tell investigators where a call is being made from, so that
|
||
cheaters frequently are arrested by local police while still on the
|
||
phone.
|
||
|
||
Those found guilty of using a Blue Box can be fined, jailed and forced
|
||
to make restitution.
|
||
|
||
* * *
|
||
|
||
A blue box is nothing more than a tone generator that gives its user
|
||
access to the telephone company's long-distance lines by fooling
|
||
automatic equipment. Users generally dial an 800-toll-free number and
|
||
send a pulse that allows them to dial anywhere in the world without the
|
||
calls registering as a toll call.
|
||
|
||
The device was named for the color of the first boxes sold through
|
||
underground publications, but they have grown in sophistication. Cox
|
||
displayed several confiscated boxes built into small handheld calculators
|
||
and boxes the size of a cigarette pack. A young electronis ebgineer from
|
||
Verona was arrested two years ago with a blue box he built directly into
|
||
his telphone.
|
||
|
||
"The devices sell for up to $500, but it's not worth it." Cox
|
||
commented.
|
||
|
||
Bell prosecutes every blue box case it uncovers and works with police
|
||
departments to move quickly in catching users. Because the Blue Boxes
|
||
show no record of calls, Bell has run across cases of criminals involved
|
||
in drugs and prostitution using the devices.
|
||
|
||
Cox said the use of blue boxes was falling off, explaining "People are
|
||
realizing they're going to get caught."
|
||
|
||
* * *
|
||
|
||
Since January, Bell investigators have come across 32 cases that have
|
||
resulted in 12 arrests and 11 convictions.
|
||
|
||
Computer monitoring equipment can also pick out the use of other
|
||
devices, such as black boxes, which avoid charges for incoming calls to a
|
||
phone, and red boxes, which generate the sound of coins dropping in a pay
|
||
phone. Cox said new billing control systems would seeon eliminate the
|
||
electronic boxes.
|
||
|
||
Of more concern is nonelectronic fraud, which Cox said was growing
|
||
nationwide. It can range from charging a long-distance phone call to a
|
||
stranger, to using a stolen credit card, but computers are being put to
|
||
use here.
|
||
|
||
Bell plans to introduce a special billing system that will need
|
||
personal codes to operate, similat to automatic tellers being used by
|
||
banks. Customers also will be able to stop anyone from billing a call to
|
||
their number with an automatic computer block that signals an operator
|
||
not to accept such calls.
|
||
|
||
However, it is impossible to stop all-fraud. Cox pointed out, "The
|
||
people who are perpetrating the frauds know our systems."
|
||
|
||
|
||
===========================================================================
|
||
OFFICAL NPA RELEASE DOCUMENT
|
||
TRANSCRIPT: TAP ISSUE #70
|
||
DATE: 10/24/87
|
||
LINES:987
|
||
TYPED BY: THE AESTHETIC INDIVIDUAL
|
||
===========================================================================
|
||
|