textfiles/phreak/tap70.phk
2021-04-15 13:31:59 -05:00

988 lines
44 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

===========================================================================
OFFICAL NPA RELEASE DOCUMENT
TRANSCRIPT: TAP ISSUE #70
DATE: 10/24/87
TYPED BY: THE AESTHETIC INDIVIDUAL
===========================================================================
TAP
No. 70
November-December 1981
====================
NAKED CAME THE CROOK
====================
A nude man who came in from the cold to rob a gas station early
yesterday had a decided advantage, police said. The attendant was female.
She fled, leaving the unarmed man free to empty the cash register, then
scroll casually from the scene of the crime.
==================
FREEBASING COCAINE
==================
By Dr. Atomic
Frebasing cocaine is basically a California phenomenon, but it's a
practice that is popular with entertainers and with others who can afford
to indulge in the pleasures of cocaine. Freebase cocaine is smoked in a
special, glass water pipe called a freebase pipe, and after taking a toke
the onset of the high is quick; it comes on faster than snorting and
almost as quick as an I.V. injection -- it's like injecting cocaine
without using a needle. After inhaling the freebase cocaine vapors, your
hearing drops, and you get an incredible rush even before enough time
passes to exhale the smoke. Unfortunately, the rush and the high don't
last long, and the desire to smoke some more coke is compulsive. In
fact, it is so impulsive that people who hang around the freebase pip,
impatiently waiting to get another toke, are known in the vernacular as
"freebase vultures". But, before the cocaine can be smoked, it must
first be prepared.
The cocaine purchased on the street is usually coaine hydrochloride
(HCl), a water soluble salt of cocaine that is suitable for snorting
or injecting, but not for smoking. Cocaine HCl burns at a high
temperature, about 200oC, an if it's smoked, much of the cocaine gets
carbonized, burned up, instead of reaching your lungs as vapors. But, by
changing the cocaine HCl to cocaine freebase, you get more of the desired
cocaine vapors and less carbon because the freebase vaporizes at a much
lower temperature than the cocaine HCl does.
All it takes to change the cocaine HCl into cocaine freebase is a
little home chemistry. It's easy: if you can bake brownies by following a
cook book, you can freebase coke. The only supplies needed are some
inexpensive chemicals and equipment that are easily obtainable at your
local paraphernalia shop.
Equipment and Supplies
----------------------
1 Freebase water pipe, glass
2 Screens, fine mesh, for pipe
1 Glass freebase vial, 1 oz with top (1)
1 Mirror
1 Single edge razor blade
1 Box baking soda
1 bottle of petroleum ether or ethyl ether (2)
1 book matches or butane lighter
NOTE 1: Ethyl ether and petroleum ether will dissolve many plastics, so
the tops of freebase vials are specially made of ether
resistant plastic.
NOTE 2: Use caution when handling ether. The vapors of both ethyl ether
and petroleum ether will ignite explosively near an open flame.
Make sure that the room is well ventilated when extracting with
ether. When freebasing in the kitchen, make sure the pilot
lights are out on the stove and the hot water heater if they
are nearby. Also, don't smoke or light matches while there are
still fumes in the air.
The Freebase Process
--------------------
1) To a 1 oz glass freebase vial, add 4ml to 6ml of warm water. Less
than 1/4 of the vial is more than sufficient water.
2) Dissolve 1/4 to 1/2 gram of cocaine HCl in the water to make a
cocaine solution. Shake or stir if necessary to dissolve the
cocaine.
3) Add about 1/4 gram, more or less, of baking soda to the coaine HCl
solution. It is better to have an excess of baking soda than not
enough. Next shake well. This changes the cocaine HCl to the
freebase.
4) Using a glass eyedropper, add 2ml to 3ml of ether. Shake well. The
ether extracts the freebase cocaine from the water layer. As a rule
of thumb, use half as much ether as water. Since ether and water do
not form a solution, the ether will rise to the top and form a
distinct layer.
___________
|\ /|
| \_______/ | __________ Ether Resistant Cap
|___________|
| |
| |
| |
| |
| |
|___________|
| | --------- Ether Layer
|___________|
| |
| | --------- Water Layer
|___________|
Because the cocaine freebase is more soluble in ether than in water,
the ether layer will contain most of the freebase; in effect, the
ether has extracted the freebase cocaine from the water layer. This
first ether extraction is known as the "first wash". The water
layer can be washed one or two more times with ether to extract the
small amount of freebase remaining after the first wash.
5) Siphon off the ether layer with the eyedropper, making sure not to
take any of the water layer. Drop the freebase saturated ether
carefully onto a clean mirror or glass surface. When the ether
evaporates, a white powder should remain; this is the cocaine
freebase, and it's ready to smoke. So what are you waiting for?
The freebasing process removes some of the water soluble contaminants
(cuts) like mannitol and lactose, so the yield, i.e. the weight of the
cocaine freebase obtained will weigh less than the cut-coke that was
started with; however, no significant amount of cocaine is lost, only the
cut is removed. Thus, a gram of cocaine HCl that is only 25% pure is not
a gram of cocaine but a 1/4 gram of cocaine, and the yield of freebase
cocaine, for this particular sample, will be slightly less than 1.4 gram.
The cocaine freebase, however, is nearly pure, compared to the starting
material, and a smaller dose of the freebase will be just as potent as a
larger amount of the cut cocaine. So, start with a small hit, a match
size line or less (20mg to 50mg). Remember, just like snorting ot
injecting, you can consume too much by smoking. Be careful how much you
smoke, and be careful, too, for police and informers: cocaine is still
illegal. Have fun with your chemistry projects, stay high, and stay
free.
=========================
MAN NABBED IN PHONE FRAUD
=========================
EAST BRUNSWICK - A man who described himself as an electronics engineer
has been arrested on charges stemming from the use of a "blue box", a
gadget the size of a calculator that emits electronic signals that
bypasses regular telephone billing equipment.
Tarkeshwar Singh, 50, of 16 Manor Place, was freed on his own
recognizance after he was arrested yesterday in a public phone booth at a
Route 18 department store, Detective Donald Henschel reported.
Singh was charged with possesion of a burglary tool, the "blue box",
and theft of $300 of services from New Jersey Bell Telephone Co. police
said.
Investigator James Witanek of the phone company's security division in
Newark said the investigation had been inprogress for several months.
During that time, he said, Signh used the device for $300 worth of phone
calls to Japan and Hong Kong.
In addition to the "Blue Box", investigators confiscated a schematic
design of the insturment which they said had been sent to Signh by an
aquaintance in West Germany.
"These electronic devices are a continuing problem to the telephone
company," Witanek said.
=======================
THE POSTAL (DIS)SERVICE
=======================
The Department of Agriculture recently completed a major survey, packed
up its findings in some 1,300 boxes and mailed them off to its Des
Moines, Iowa, processing center. While in the fumbling hands of the
Postal Service, more than 600 of the parcels were damaged, lost or
delivered to the wrong address.
We trust that when the Agriculture Department lodged its complaint, it
had the good sense to call rather than drop a letter in the mail.
=====================================
DO-IT-YOURSELF CALL FORWARDING DEVICE
=====================================
Dear TAP:
In Response to several pleas from your pub, enclosed is some technical
data on the Pacific Telephones in Pasadena.
On Hook: 45 VDC
Off Hook: 7.5 VDC @ 6ma Phone Input res: 200 ohms
Ring: Approx 50 VAC (My cheap multi-meter doesn't read AC mils)
T1 (Mic Button) res: 600 ohms
U3 (Ear Piece) res: 20 ohms (leads feeding earpiece show 80 ohms
across them.)
Ringer Coil Res: approx 3K ohms. Only one Coil.
Ring Back #6105-6: (Prefix)-1-(Prefix) gets a wierd "ticky-tock" sound;
(Prefix)-0002 gets a nice 1000 cps tone;
(Prefix)-1118 gets a real LOUD tone;
(Prefix)-0000 gets a central office recording which
includes the unlisted phone number for
the office (in this case, 576-6119);
What was supposed to be the verifying number (Prefix)-1111, gets the
"Not in service" recording;
(Prefix)-0003 gets the referral operator;
(Prefix)-0119 is a private party's home fone;
I'm trying to come up with a design for a "Dial Through Cheese Box"
sort of a gimmick, but it's not what I want. I could do it if we had T-T
phone hereabouts, but we're stuck with impulse dials. Drat. Any ideas?
MATERIALS:
C1- 1.0mfd @ 400 VDC
RL1- 4P.DT Relay, 115 vac coil
T1- Audio Isolation xformer, approx 600 ohms imped, 100 to 200 ohms DC
res.
M1- Timer Motor. 115 VAC 60 CPS
SW1a- First section of timer switch, set for approx 3min closed, 10 sec
open (due to circuit configuration, timer will self index to "open"
position of this switch).
SW1b- Second section of timer switch. Set for minimum possible duration
"on". Indexed to close AFTER SW1A has come OUT of detent. This is the
critical factor in choosing the type of timer. "On" duration must be LESS
than time required for "name caller" to finish dialing.
ADDITIONAL ITEM REQUIRED, BUT NOT SHOWN:
1 ea battery powered "Name Caller" dialing machine or equivalent.
NOTE: Over-ride disconnect switch (Tone Send. Relay?) may be connected
at point x-x.
================
CALLING HIS BUFF
================
LAS VEGAS (AP) - What do you say to a naked burglar?
That's what police were wondering at 5am Sunday when they arrested
Karl Hunsaker, 30 of Las Vegas, as he was climbing down a ladder in the
buff carrying household goods from an apartment.
Hunsaker was booked for investigation of burglary.
Officers gave no reason as to why Hunsaker had no clothes on.
====================
JAIL PHONE LINE BUSY
====================
DELAND, Fla. - A defendant usually gets to make one free phone call,
but for a few inmates at the Volusia County jail that apparently wasn't
enough. Using coin-operated telephones in the jail, at least six inamtes
made at least $32,000 worth of illegal telephone calls, according to
Assistant State Attorney Horace Smith. The inmated charged the calls to
fake credit cards or to telephone numbers of unsuspecting citizens in
this central Florida city, he said. Three inmates have been found guilty
of charges in connection with the telephone case, and three others are
awaiting trial, Smith said.
====================
PHONE CENTER PARADOX
====================
Michigan Bell Telephone Co., the giant corporate institution that
touches all of our lives and wallets, gets absolutely giddy whenever we
reach for the telephone. Bell spends millions of dollars around the clock
and calendar for advertising and public relation to persuade us to reach
more often.
We are taught, however, obliquely, that we are disadvantaged unless we
have telephones handy in every room of the house and office, or if we do
not use them to facilitate every communication. Shop by phone; sell
aluminum siding by phone; solicit and collect money by phone. Telephone
your mother, lover, great uncle and your entire graduating clas at least
once a week, just for the kick of it. Get a separate line for the kids!
Get a car phone! Give a phone to a poor person! And, do invest in one
of those recording devices so you will never, never miss a call, even a
wrong number. That way Michigan Bell will never miss collecting for the
call. We will all live happily ever after.
ONE RINGY-DINGY......
All this, and more, is the implied message of Bell's advertising. I
have no argument with it. I would rather write than phone, or recieve a
letter than a call. Written words are special to me. Spoke words
transmitted by electronic devices may be special to other people. The
absurdity that intriges me is not in the advertising or even the concept
of the telephone as an extension of the human mouth and ear.
Here's the absurdity: In it's ever-dilligent determination to expand
service, the telephone company has opened 35 new Phone Centers around the
state during the past 18 months or so. These are retail stores, more or
less, in which you can purchase telephones (Bell calls them
"instruments") and also arrange for installation when necessary,
strighten out billing problems and generally do your telephone buisness.
These places are designed as walk-in centers, however. Therefore - and
here it comes - they are not included in telephone book listings. This
is not an oversight. The Phone Centers have unlisted telephone numbers.
This is what I call absurd, remembering everything Bell has said about
how essential telephone communication is to life itself.
I know about this because a fellow named Jerry Moons (I think)
telephoned me to tell me about it. He had seen one of these Phone Centers
near Telegraph and 13 mile and wanted to dial it up to ask telephonic
questions.
TWO RINGY-DINGIES....
"I couldn't find a listing," he said, "so I dialed the information
operator. It rang 20 times and I hung up. Then, I dialed Bell
headquarters, and someone there told me the number is unlisted. The
person said Bell doesn't want its people bothered by phone calls. I swear
to you that's what I was told."
I believe him. I confirmed it with a telephone company spokeman. He
said, "The Phone Centers do have telephones, but we discourage telephone
contacts. It's supposed to be a face-to-face operation. You know, a
retail outlet to shop for phones."
He told me a lot of other things. He said Bell workers at the Phone
Centers do not have access to central records and are not really set up
to help with billing problems or repair problems. He said they have to
refer all those things to other departments, that that's a nuisance for
them and a hold-up for customers. He said the main job of the phone
centers is to sell phones and to arrange for service, and that having an
unlisted number helps. All that translates to me as the same thing as
"Bell doesn't want it's people bothered by phone calls."
I love it. Finding a giant absurdity is as exciting as finding the
great pumpkin. Now, it's your turn.
========================
COMPUTER 'ERASES' PHONES
========================
A malfunctioning computer bulletin board almost caused a total
communications blackout yesterday at the Union County administrative
complex in Elizabeth.
All 945 telephones at the County complex went dead shortly before
11:30am. when a memory board in the telephone operations room burned
out, according to James Delaney, director of central services.
Delaney said critical county operations, such as police and emergency
communications, had been carried out over the county's radio system
during the nearly four hours it took for the telephone company to restore
service.
In the meantime, the county's work force either waited until the
telephones were operative, or opted to "hoot it" between various floors
or buildings in an effort to maintain communications until the system was
repaired just after 3pm.
==================
WRONG LINE, INDEED
==================
TEMPLE, Texas (AP) - If you're one of those people who always seem to
be caught in the slowest-moving line at the bank, you might understand
the predicament a would-be robber found himself in recently.
The fellow stepped up to a teller at the First National Bank of Temple
and demanded that she fill his sack with money.
"Give me the money, this is a stickup," the unarmed man told Claudine
Holder.
Holder barely glanced at the canvas bag on her counter. Instead, the
teller, whom bank vice-president Sam Farrow described as "feisty and very
quick-witted," informed the man that he was in the wrong line.
She directed him to stand in a line across the lobby, and while he
waited meekly for service, she called police.
The suspect was arrested and charged with attempted bank robbery.
=======================================
ARMY WANTS TO FIND LONG-DISTANCE CHEATS
=======================================
TACOMA - The Army wants to reach out and touch a few individuals who
like to make illegal long-distance calls at Fort Lewis.
One soldier phoned a number in the Dominican Republic and charged the
$1,296 call to the base.
Another has been calling from a pay telephone on Fort Lewis to a pay
phone outside the Howard Johnson Restaurant in Trenton, NJ and been
charging those calls to a number on the post. Worse yet, says Bill Wood,
a base spokesman, return calls from Trenton are billed to the same
number.
Ordinarily, long-distance bills going through the Fort Lewis
Communications Center average $2,000 a month. In May, the bills came to
$4,500. "Probably half or more of them are fraudulent," Wood says, "but
we are checking and we will find those people."
Those making such calls could be imprisioned for five years for the
offense.
==============================
ABUSE OF REMOTE ACCESS SYSTEMS
==============================
John Petrie has a problem. Petrie (not his real name) is the
communcations manager for a medium size company in the Midwest. His
company has installed a long-distance control system to monitor usage and
get better utilization of long distance facilities. Because the company
has a large number of people traveling, remote access to the company's
long distance facilities was installed to reduce the number of credit
card calls. A series of inward WATS lines are connected to the long
distance control system at headquarters. When traveling, company
representatives can simply dial an "800" number and then their personal
authorization code to get access to the company's long distance
facilities including toll and outward WATS.
The remote access system seemed to be working great. Credit card calls
had been all but eliminated and the overall cost had been reduced. Then
about six months ago, Petrie was in the midst of doing the detailed
monthly billing of calls to station users when he noticed that one person
had been making a large number of 800 number calls via the remote access.
Petrie thought to himself, "This guy's got to be a stupid fool to dial
our 800 number to place a free 800 number call!" When questioned about
the calls, the man denied making any remote access calls at all that
month.
Totally confused at this point, Petrie called several of the 800
numbers listed in the billing report. In every case, when the call was
answered, the familiar toned indicated entrance to a remote access system
were heard. A phone freak was clearly at work!
Petrie immediately changed all codes, pauses and methods of gaining
access to the company's system. That night, the mysterious caller tried
60 times before he finally figured out the new procedures and codes.
Petrie made another major change, but the caller cracked that in about 20
tries, and then placed a call to germany. Petrie removed international
dialing from the system and called the telephone company security
department.
Meanwhile, he decided to have some fun by calling the 800 numbers on
the billing report, contacting each company's switchboard operator and
asking to be connected to the communications manager. According to
Petrie, "The moments of silence were deafening when I told these managers
how I had reached them."
After about a week, the telephone company security people showed up and
after reviewing the documentation were amazed. They traced all of the
called numbers, and came up with nothing but remote access numbers,
"meet-me" conference numbers and services such as Time and Temperature in
upstate Michigan. They did their best to trace calls back to the
originating number, and came up with calls from California out of another
company's remote access system.
Petrie says that to date his company has been hit with about 6,000
fraudulent calls, which cost about $10 an hour. "Even with all this," he
says, "I don't feel we look too bad compared to companies I know who have
been hit for in excess of $2,500 a month on international calls alone. He
seems to take great delight in calling Hertz Rent-A-Car in Guam."
John Petrie's problem is not unique. An informal survey by BCR reveals
that a number of large companies, although by no means all have had some
type of a problem with unauthorized use of remote access facilities.
Indeed, at least one large consulting firm has been investigating this
problem for several clients.
The difficulty in getting access to a companie's long distance
facilities via remote access varies considerably. The system used by
Petrie's company is one of the more difficult ro crack in that it
trquires knowing the proper inward WATS number plus a valid authorization
code. The system used in AT&T's Dimension PBX may be less secure in that
there is one common access code for eveyone. In some systems, no access
of authorization code at all is required. Simply dialing the special
local or inward WATS number gives the caller immediate access to the long
distance facilities. The communications manager of one large company
says that his organization once used inward WATS to access long distance
facilities thriugh a Centrex system without any restriction. A caller
simply dialed "9" and got access to the world. In one month there was
$5,000 to $6,000 in unauthorized calls to destinations such as Israel,
Hong Kong and Portugal. Belatedly, the company charged the system to
restrict remote access calls to the company's tie line network.
A consultant who has studied the problem believes that most abuse of
remote access to long distance facilities involves insiders or other
persons closely associated with the company. Often, it is a consumer or
a supplier who finds out how to use the remote access. Sometimes it is
just the difficulty in keeping authorization codes from becoming common
knowledge within an organization. One company the consultant recalls was
using MCI Execunet service, and the authorization code was supposed to be
known by only a small group of persons. Eventually, it came to be known
by a very large group. "I don't know how much security you can really
put into it," the consultant says, "because once you tell the secretaries
and they have to write memos to someone else, it is very hard to clamp
down on it."
One of the country's largest manafacturing firms uses an
operator-controlled system in which someone calling from outside wanting
to use the long distance facilities must give the operator a four
character code. The communications manager told BCR that while abuse is
"not a significant problem for us, we know that there are people using
the network who are not authorized to do it. Some of them are retiries
from the company who have been around for a while and know the score.
With 10,000 authorization codes, it's not too difficult to find a good
one."
It appears that most cases of abuse are the result of people wanting to
make free telephone calls. But there also seems to be an element of
pranksterism involved. One company in the East, located near a large
university, found they had a lot of outsiders accessing their telephone
system. Suspecting university students, they got persmission to install
a call data recorder on the main university Centrex system. The data
they collected confirmed that the students were, indeed, living up to
their reputation for technical wizardry. they had not only found out how
to access the company's long distance facilities, but its computer system
as well. Fortunately, they had not yet found out how to obtain or
manipulate data in the computer.
John Petrie says one of the prankster's tricks "is to place a call to
Company A's remote access. From Company A's system, they then call
Company B's remote access; then call from Company B to Company C; then
call from Company C back again to Company A and finally to a
non-releasing Time and Temperature number that, of course, will never
hang up. By doing this on a Friday evening (none of the companies being
aware of it until Monday morning), they can tie up entire systems for
many hours of overtime charges."
How easy is it to find a remote access number? If you have some
association with a company that has one or with the telephone company,
the answer is probably: not too hard. But, if you have no inside
information, the difficulty is much greater.
To find out how hard it might be for an outsider, we decided to beomce
a phone freak, and to try to find an inward WATS line connected to a
remote access. AT&T says that there are about 40,000 interstate inward
WATS lines, of which about one-half have unlisted numbers. Presumably, a
small percentage of these unlisted nunbers are for remote access. Our
experience suggests that they are not easy to find.
Knowing nothing about how the telephone company assigns inward WATS
numbers, we began by consulting a readily available directory of listed
800 numbers to see if there was any pattern to how numbers are assigned.
Our assumption was that unlisted numbers would follow the same pattern as
listed numbers, an assumption that seems to be true.
It appears from the directory that 800 numbers do have some pattern;
that the digits in the exchange code vary with the geographical area.
WATS lines in New York, for example, have exchange codes that begin with
a different digit than WATS lines in California. (We deducted the
location from the fact that the listing said that the number was good
anywhere except New York or except California.)
Knowintg that a lot of company headquarters are located in New York, we
selected some exchange codes that appear to be used very frequently in
New York. We dialed these codes with varying combinations of the last
four digits. After gerring three answers and six recorded announcements
saying the number was no good on the first ten tries (one answer did not
answer), we further analyzed the numbers and dialed 30 good numbers out
of the next 40. None of these numbers, however, was connected to remote
access. After these 50 unsuccessful attempts, we got bored and gave up,
deciding we were not cut out to be a phone freak. But had we more
perserverance or an automatic dialer, perhaps eventually we would have
found a remote access system. Of course, even if we had, we would be only
half-way home if the system required an authorization code.
It is this difficulty in getting through the security precautions that
makes most observers believe abuse of remote access results generally
from inside information. For the user being hit, this distinction might
seem academic but it does suggest that a company can cut its losses
substantially by concentrating on more internal security. The following
are some effective measures:
1. Require a proper authorization code in addition to the access
number.
2. Assign remote access authorization codes to a minimum number of
people.
3. Provide enough digits in the authorization code so that you need
assign only a small percentage of the maximum number of
combinations.
4. Change authorization codes frequently.
5. When someone with a code leaves the company, retire the code.
6. If possible, install asystem which tells you if a series of invalid
codes had been dialed in.
7. Never give information on remote access to someone you do not know.
A while back, an individual posing as an Action Communications
Systems employee was calling WATSBOX users and asking for remote
access numbers and codes, ostensibly to update Actions's records.
The caller was not from action.
These precautions should minimalize abuse of romote access, but they
will not eliminate it. Ask John Petrie. He knows.
==================================
HOW TO CHEAT YOUR ASS OFF IN SKOOL
==================================
"I have only learned by copying"
- Pablo Picasso
MAKING IT: Nice people just don't cheat. This is a fact of life. If you
do cheat, you are most likely a rotten no good stinker with
commie friends, dirty underwear and a host of social
diseases. The REVOLUTIONARY 3 STOOGES try to discourage
this type of behaviour. It is both tacky and
unsophisticated. We suggest that instead, you foloow the
advice of our firends from TAKE OVER, in Madison Wis. by
just forgetting the entire mess. Fuck Skool! Forget
cheating. Print up your own degree instead and get on with
living.
(1) Borrow a friend's diploma, put your name in it and make a
copy suitable for framing. You can take the signature from
the old diploma, and get a fascimile when the new President
is named - he will probably have his signature in the papers
or on all kinds of documents.
(2) If you have a Gemini friend, get the friend's transcript and
put your name at the top - if the friend has a degree.
Again, make a copy.
Or, if you have been here one semester - and don't rush, you
have 4 years to graduate the TakeOver way - you can get your
own transcript and simply fill it in with courses it might
have been nice to take. Reduce-xerox your work to fit the
form.
Consolidated Company in Chicago, a Saturn (discreet) firm
will sell you a seal that works like a notary's seal for the
transcript - you must emboss your list of courses and grades
to give it that offical look. You design the embossing seal
yourself; put your birth sign in the center if you like,
some Latin on the outside, with the words "University of
Wisconsin." For Latin phrases we suggest a little joking,
such as "PECUNIA LOQUIT" (Money talks) or "OSCULA ASCULA"
(Kiss my Ass)
(3) Two-thirds graduated already, thank your lucky stars and
proceed to the next part of your education: references.
Choose or aquire three friends who are careful about getting
their mail. Appoint them Deans or Faculty members,
depending on what stationery you can get or contacts you can
aquire, have them write glowing reccomendations for you, and
when your file is built, put it in an employment office.
Some employment offices, such as the University Placement
Bureau, will furnish forms for reccomendations, so you won't
have to get the stationery yourself.
After your file is put in an employment office, job offers
will be sent to you, and, as you apply for them, the
companies may contact your references - let them do it by
mail and you can write replies yourself.
Freed of the ignorance and cruelty of the Capricorns, you
will have time to learn instead of just becoming passive.
You can make life easier for yourself, too, by following
your star on food stamps and welfare, or get a new name by
writing for the copy of a birth certificate of someone your
own age who died young. With this certificate you're on
your way to a social security card, driver's license, phones
in other names, bills falling forgotten into abandoned
mailboxes, etc.
You can have four years of life, not the living death of
crawling from class to class.
But, some object, "What about knowledge?" The person who has
spent time at the university may just turn their eyes up at
such a question, hardly able to believe that someone who
could think he/she would learn anything of the slightest use
while sitting in a lecture hall is not an extraterrestrial
alien. The knowledgable believe that Education, under the
influence of venus, is not at all lovely, but a sort of
venereal disease, a cerebellic gangrene, for which this
paper may be used as a condom (more mundane disease
prevention may be obtained at the WSA pharmacy or the Blue
Bus on Spring St).
FAKING IT: It was the morning after. After, that is, dragging myself
from the gutter in front of the Moonlight Bar to the back
seat of my car. A bristly black hairy tarantula ran
screaming from my mouth. Unknown substances mingled with
cigarette butts in my hair. I had a mid-term exam in
ancient Chinese history in 2 hours. You could say that I
was unprepared. I asked myself, "What would a Mao Tse-fly do
in a case like this?" But the Red Guards were nowhere in
sight. I was on my own. I entered the class, paused and
slowly labeled my blue book #2. I took the time writing a
single grandiloquent concluding paragraph and handed it in.
The professor later apologized for losing my first blue book
and gave me a B. A cheat must always be resourceful.
1) Change the answers on graded tests. Bring them back to
the prof and say, "Hey, I had this answer right."
2) Carry in completed blue books to the exam.
3) At the end of the quarter professors leave graded tests
and term papers in the halls for their students. Take the
best ones and save them for future use.
4) Keep all tests and papers to use again and again, use
your friends' and visit fraternity files.
5) Remember to never put down what you plagerized from as a
source. Use master theses from other colleges, the
papers kept by departments at other colleges for the
"serious researcher" and obscure books from other
libraries.
6) Despite propaganda, term paper companies are OK.
TAKING IT: I know of one student who walked into the school print shop
as exams were being run off, sat down on an inked gally and
walked off with a set of tests on his pants.
1) Bribe or get friends who can get tests, such as janitors
and print shop workers.
2) Go through wastepaper cans for copies.
CRIBING IT: What I have come to call the "Ethiopian Shuffle" was given
to me by a foriegn exchange student and has proven to be one
of the best crib notes in the buisness. Taking a long
narrow strip of paper that is folded like an accordion into
a tiny book, you are able to write 10 times the amount of
info that a normal crib sheet holds. It is then manipulated
with thumb and forefinger.
1) Magic shops have special pensils which write invisible
notes that can only been seen with special glasses.
2) Intelligence is transmitted to several cheaters through
an elaborate signal system. Pen point is up, down is
false. In multiple choice, fingers at chin level mean
number of question - at waist level, number of answer.
3) Put cribs on the seat near your crotch. Open your legs to
see it, close them to hide it.
4) Transistorized tape recorders can be camoflauged as
hearing aids.
5) Be imagnitive. Hide notes everywhere. On skin and
fingernails. As scrolls in objects such as watches and
pens. On kleenex, gum and cigarettes. Write on the sole
of your shoe for easy reading when crossing legs. On
tape in the folds of clothes and behind sheer nylon.
Viva Larry, Curly & Moe,
Pancho White Villa
=====================================
TRANSIT EMPLOYEE SOLVES TOKEN PROBLEM
=====================================
A Transit Worker who took it upon himself to tackle the TA's
$1-million-a-year problem with slug token has come up with an ingenious
$1 solution.
Thomas Costa, a 46-year-old turnstile foreman from Astoris, invented
what he calls a "roll-pin" device at home.
"We were having a problem at the Greenpoint Ave. Station" where thin
steel slugs were showing up reguarly in token clerk buckets, he
explained.
"I came up with it for this one particular slug, but when I brought it
in we found out it worked on all kinds."
The device works by measuring the width of the phony coins and dropping
through those coins that don't fit the dimensions of legitimate tokens.
Forty copies of Costa's home invention were tested in several
high-volume stations in Manhattan with "excellent success," a Transit
Authority spokesman said yesterday.
This week, the TA ordered devices for the installation in every
turnstile in the system.
Slugs and foreign coins, which have plagued the subway system since it
was opened nearly 80 years ago, have been used at epidemic proportions
since the fare was hiked to 75 cents last month.
Nearly 30,000 fare beaters have dropped phony tokens into turnstiles
every week according to transit police.
A peak in slug use was reached in 1976 when 100,000 phony tokens a week
were being used.
Costa submitted his invention to the TA through its employee suggestion
program, which means he gives up all patent rights to the device.
"The TA couldn't pay [employees] for all the stuff they've come up
with," Costa laughed.
"What did he get for developing this thing?" Costa's boss, Joe Spencer,
was asked.
"I kissed him twice," Spencer said.
=======================================
COMPUTERS MONITOR PHONE LINES FOR FRAUD
=======================================
New electronic "watchdogs" are making it increasingly difficult to fool
Ma Bell.
The watchdogs are computer monitoring systems that have been set up to
fight telephone toll fraud, which cost New Jersey Bell Telephone Co.
millions of dollars last year through phony credit card numbers,
fraudulent third-party billing and the use of eletronic devices to
bypass automatic billing equipment.
The loss due to electronic fraud only can be guessed at, since the
devices work by circumventing company billing, but Bell spokesman Ted
Spencer said the company had lost $2.3 million through more conventional
fraud-schemes in 1980. The costs eventually are passed on to customers.
Company officals say telephone bill cheaters come from all segments of
society, including college students, immigrants, middle-class
suburbanites, buisnessmen and the poor.
* * *
For example, a 70-year-old Patterson woman recently was caught charging
more than $7,000 in overseas telephone calls to Greece using s "blue
box," a device that emits tones reproducing the signals that guide
telephone switching equipment.
Last week an Israeli couple was charged with making calls to Israel
with a blue box from pay telephones throughout Union and Middlesex
counties.
After in investigation by the telephone company, a computer analyst
making $45,000 a year was charged with making fraudulent credit card
calls on his lunch hour to Iran.
John T. Cox, Bell's district staff manager, said the detection systems
for illegal electronic devices were getting better all the time.
"If you're using a blue box on a regular basis in New Jersey, you're
going to be caught," he said flatly. "I can almost guarantee it."
Escorting a visitor through s seldom-seen computer room at Bell, Cox
pointed out teletype monitors that can pick up the use of the device and
immediately tell investigators where a call is being made from, so that
cheaters frequently are arrested by local police while still on the
phone.
Those found guilty of using a Blue Box can be fined, jailed and forced
to make restitution.
* * *
A blue box is nothing more than a tone generator that gives its user
access to the telephone company's long-distance lines by fooling
automatic equipment. Users generally dial an 800-toll-free number and
send a pulse that allows them to dial anywhere in the world without the
calls registering as a toll call.
The device was named for the color of the first boxes sold through
underground publications, but they have grown in sophistication. Cox
displayed several confiscated boxes built into small handheld calculators
and boxes the size of a cigarette pack. A young electronis ebgineer from
Verona was arrested two years ago with a blue box he built directly into
his telphone.
"The devices sell for up to $500, but it's not worth it." Cox
commented.
Bell prosecutes every blue box case it uncovers and works with police
departments to move quickly in catching users. Because the Blue Boxes
show no record of calls, Bell has run across cases of criminals involved
in drugs and prostitution using the devices.
Cox said the use of blue boxes was falling off, explaining "People are
realizing they're going to get caught."
* * *
Since January, Bell investigators have come across 32 cases that have
resulted in 12 arrests and 11 convictions.
Computer monitoring equipment can also pick out the use of other
devices, such as black boxes, which avoid charges for incoming calls to a
phone, and red boxes, which generate the sound of coins dropping in a pay
phone. Cox said new billing control systems would seeon eliminate the
electronic boxes.
Of more concern is nonelectronic fraud, which Cox said was growing
nationwide. It can range from charging a long-distance phone call to a
stranger, to using a stolen credit card, but computers are being put to
use here.
Bell plans to introduce a special billing system that will need
personal codes to operate, similat to automatic tellers being used by
banks. Customers also will be able to stop anyone from billing a call to
their number with an automatic computer block that signals an operator
not to accept such calls.
However, it is impossible to stop all-fraud. Cox pointed out, "The
people who are perpetrating the frauds know our systems."
===========================================================================
OFFICAL NPA RELEASE DOCUMENT
TRANSCRIPT: TAP ISSUE #70
DATE: 10/24/87
LINES:987
TYPED BY: THE AESTHETIC INDIVIDUAL
===========================================================================