Notes for Version III!
********************* *****************************************************************
Ah..version III. Well, I never thought
for a minute that version II would turn out to be so popular! Well, I am
proud to announce version III, and can assure you that a version IV is
in the works! As a student, however, I cannot say when it will be ready...but
what the hell...it will be a long time, I am sure, before you run out of
"toys" to play with. Lots of interesting new reading for you in this version!
A Special thanks to CREDITMAN, who lives in the UK and contributed an excellent
article on carding in the UK. It is great reading. Now, I would like to
say a few words to those who insist on yanking my chain (or is it dick?)
in the message bases here in the U.S.: "Whatever, dudes!" Now that was
a few words, eh? Ok, I am debating on a new format for Cookbook IV...something
with easier access. Hell, this index idea worked just fine when the cookbook
was small, but now it is getting quite large and the articles are getting
quite numerous...and--who knows? My laziness tells me to stick with it.
I just might do that! Well, the files spilled over onto two disks, so I
figured I would include some ST-specific "goodies". They are in a file
on disk B called "Goodie.Bag" and contain a few rarities and a few essentials.
Some will find most interesting, most will find some interesting, a few
may find none interesting. Oh, well. If anybody has any comments (there
always is a few slags--take your best shot!) then drop me a line in the
usual places that one can find me. If you do not know where those places
are, then I am sorry. It just wasn't meant to be. Ha Ha! All who oppose
me and my ideas and/or the group that I participate in can bugger off.
Sure, yeah, I steal a lot of things--I am a pirate after all. but so do
you, and don't forget it. It is ridiculous to call a thief a thief when
it is a thief doing the accusing. Grow up.
This Cookbook is done for no other
reason but to share with EVERYONE ELITE some of the underground and often
illegal as hell information that I have gathered, researched, and labored
to locate, type, and write/compose. At least give me credit for that. Anyone
whom I call asshole deserves it in my eyes for only one reason: there is
not ONE DAMN THING redeeming that I can find to compliment them on!! For
example, Automation slagged me for the R.C.A Slag Show II, I turned around
and told them to piss off on that, and then said that their cd's are getting
better. What kind of "kid" (a 24 year old one) would do that anyway? Certainly
not the TOI, that's for sure! Oh, well, fuck it anyways. We are all going
to die in Iraq soon enough anyway....- Enjoy and spread! Contribute if
you can! Information should be free (that's why I turned down an offer
to publish portions of this thing!)!!
Making Plastic
Explosives from Bleach by The Jolly Roger
Potassium chlorate is an extremely
volatile explosive compound, and has been used in the past as the main
explosive filler in grenades, land mines, and mortar rounds by such countries
as France and Germany. Common household bleach contains a small amount
of potassium chlorate, which can be extracted by the procedure that follows.
First off, you must obtain: [1] A heat source (hot plate, stove, etc.)
[2] A hydrometer, or battery hydrometer [3] A large Pyrex, or enameled
steel container (to weigh chemicals) [4] Potassium chloride (sold as a
salt substitute at health and nutrition stores) Take one gallon of bleach,
place it in the container, and begin heating it. While this solution heats,
weigh out 63 grams of potassium chloride and add this to the bleach being
heated. Constantly check the solution being heated with the hydrometer,
and boil until you get a reading of 1.3. If using a battery hydrometer,
boil until you read a FULL charge. Take the solution and allow it to cool
in a refrigerator until it is between room temperature and 0 degrees Celcius.
Filter out the crystals that have formed and save them. Boil this solution
again and cool as before. Filter and save the crystals. Take the crystals
that have been saved, and mix them with distilled water in the following
proportions: 56 grams per 100 milliliters distilled water. Heat this solution
until it boils and allow to cool. Filter the solution and save the crystals
that form upon cooling. This process of purification is called "fractional
crystalization". These crystals should be relatively pure potassium chlorate.
Powder these to the consistency of face powder, and heat gently to drive
off all moisture. Now, melt five parts Vaseline with five parts wax. Dissolve
this in white gasoline (camp stove gasoline), and pour this liquid on 90
parts potassium chlorate (the powdered crystals from above) into a plastic
bowl. Knead this liquid into the potassium chlorate until intimately mixed.
Allow all gasoline to evaporate. Finally, place this explosive into a cool,
dry place. Avoid friction, sulfur, sulfides, and phosphorous compounds.
This explosive is best molded to the desired shape and density of 1.3 grams
in a cube and dipped in wax until water proof. These block type charges
guarantee the highest detonation velocity. Also, a blasting cap of at least
a 3 grade must be used. The presence of the afore mentioned compounds (sulfur,
sulfides, etc.) results in mixtures that are or can become highly sensitive
and will possibly decompose explosively while in storage. You should never
store homemade explosives, and you must use EXTREME caution at all times
while performing the processes in this article. You may obtain a catalog
of other subject of this nature by writing: Information Publishing Co.
Box 10042 Odessa, Texas 79762
Picking Master
Locks by The Jolly Roger
Have you ever tried to impress someone
by picking one of those Master combination locks and failed? The Master
lock company made their older combination locks with a protection scheme.
If you pull the handle too hard, the knob will not turn. That was their
biggest mistake. The first number: Get out any of the Master locks so you
know what is going on. While pulling on the clasp (part that springs open
when you get the combination right), turn the knob to the left until it
will not move any more, and add five to the number you reach. You now have
the first number of the combination. The second number: Spin the dial around
a couple of times, then go to the first number you got. Turn the dial to
the right, bypassing the first number once. When you have bypassed the
first number, start pulling on the clasp and turning the knob. The knob
will eventually fall into the groove and lock. While in the groove, pull
the clasp and turn the knob. If the knob is loose, go to the next groove,
if the knob is stiff, you have the second number of the combination. The
third number: After getting the second number, spin the dial, then enter
the two numbers. Slowly spin the dial to the right, and at each number,
pull on the clasp. The lock will eventually open if you did the process
right. This method of opening Master locks only works on older models.
Someone informed Master of their mistake, and they employed a new mechanism
that is foolproof (for now).
The Arts of Lockpicking
I courtesy of The Jolly Roger
Lockpicking I:
Cars and assorted other locks
While the basic themes of lockpicking
and uninvited entry have not changed much in the last few years, some modern
devices and techniques have appeared on the scene. Automobiles: Many older
automobiles can still be opened with a Slim Jim type of opener (these and
other auto locksmithing techniques are covered fully in the book "In the
Still of the Night", by John Russell III); however, many car manufacturers
have built cases over the lock mechanism, or have moved the lock mechanism
so the Slim Jim will not work. So: American Locksmith Service P.O. Box
26 Culver City, CA 90230 ALS offers a new and improved Slim Jim that is
30 inches long and 3/4 inches wide, so it will both reach and slip through
the new car lock covers (inside the door). Price is $5.75 plus $2.00 postage
and handling. Cars manufactured by General Motors have always been a bane
to people who needed to open them, because the sidebar locking unit they
employ is very difficult to pick. To further complicate matters, the new
GM cars employ metal shields to make the use of a Slim Jim type instrument
very difficult. So: Lock Technology Corporation 685 Main St. New Rochelle,
NY 10801 LTC offers a cute little tool which will easily remove the lock
cylinder without harm to the vehicle, and will allow you to enter and/or
start the vehicle. The GMC-40 sells for $56.00 plus $2.00 for postage and
handling. The best general automobile opening kit is probably a set of
lockout tools offered by: Steck MFG Corporation 1319 W. Stewart St. Dayton,
OH 45408 For $29.95 one can purchase a complete set of six carbon lockout
tools that will open more than 95% of all the cars around.
Kwickset locks have become quite popular
as one step security locks for many types of buildings. They are a bit
harder to pick and offer a higher degree of security than a normal builder
installed door lock. So: A MFG 1151 Wallace St. Massilon, OH 44646 Price
is $11.95. Kwickset locks can handily be disassembled and the door opened
without harm to either the lock or the door by using the above mentioned
Kwick Out tool. If you are too lazy to pick auto locks: Veehof Supply Box
361 Storm Lake, IO 50588 VS sells tryout keys for most cars (tryout keys
are used since there is no one master key for any one make of car, but
there are group type masters (a.k.a. tryout keys). Prices average about
$20.00 a set.
Updated Lockpicking:
For years, there have been a number of pick attack procedures for most
pin and tumbler lock systems. In reverse order of ease they are as follows:
Normal Picking: Using a pick set to align the pins, one by one, until the
shear line is set and the lock opens. Racking: This method uses picks that
are constructed with a series of bumps, or diamond shape notches. These
picks are "raked" (i.e. run over all the pins at one time). With luck,
the pins will raise in the open position and stay there. Raking, if successful,
can be much less of an effort than standard picking. Lock Aid Gun: This
gun shaped device was invented a number of years ago and has found application
with many locksmiths and security personnel. Basically, a needle shaped
pick is inserted in the snout of the "gun", and the "trigger" is pulled.
This action snaps the pick up and down strongly. If the tip is slipped
under the pins, they will also be snapped up and down strongly. With a
bit of luck they will strike each other and separate at the shear line
for a split second. When this happens the lock will open. The lock aid
gun is not 100% successful, but when it does work, the results are very
dramatic. You can sometimes open the lock with one snap of the trigger.
Vibrator: Some crafty people have mounted a needle pick into an electric
toothbrush power unit. This vibrating effect will sometimes open pin tumbler
locks -- instantly. There is now another method to open pin and wafer locks
in a very short time. Although it resembles a toothbrush pick in appearance,
it is actually an electronic device. I am speaking of the Cobra pick that
is designed and sold by: Fed Corporation P.O. Box 569 Scottsdale, AR 85252
The Cobra uses two nine volt batteries, teflon bearings (for less noise),
and a cam roller. It comes with three picks (for different types of locks)
and works both in America and overseas, on pin or wafer locks. The Cobra
will open group one locks (common door locks) in three to seven seconds
with no damage, in the hands of an experienced locksmith. It can take a
few seconds more or up to a half a minute for someone with no experience
at all. It will also open group two locks (including government, high security,
and medecos), although this can take a short time longer. It will not open
GM sidear locks, although a device is about to be introduced to fill that
gap. How much for this toy that will open most locks in seven seconds?
$235.00 plus $4.00 shipping and handling.
For you hard core safe crackers, FC
also sells the MI-6 that will open most safes at a cost of $10,000 for
the three wheel attack model, and $10,500 for the four wheel model. It
comes in a sturdy aluminum carrying case with monitor, disk drive and software.
If none of these safe and sane ideas appeal to you, you can always fall
back on the magic thermal lance... The thermal lance is a rather crude
instrument constructed from 3/8 inch hollow magnesium rods. Each tube comes
in a 10 foot length, but can be cut down if desired. Each one is threaded
on one end. To use the lance, you screw the tube together with a matted
regulator (like a welding outfit uses) and hook up an oxygen tank. Then
oxygen is turned on and the rod is lit with a standard welding ignitor.
The device produces an incredible amount of heat. It is used for cutting
up concrete blocks or even rocks. An active lance will go through a foot
of steel in a few seconds. The lance is also known as a burning bar, and
is available from: C.O.L. MFG 7748 W. Addison Chicago, IL 60634
The Arts of Lockpicking
II courtesy of The Jolly Roger
So you want to be a criminal. Well,
if you want to be like James Bond and open a lock in fifteen seconds, then
go to Hollywood, because that is the only place you are ever going to do
it. Even experienced locksmiths can spend five to ten minutes on a lock
if they are unlucky. If you are wanting extremely quick access, look elsewhere.
The following instructions will pertain mostly to the "lock in knob" type
lock, since it is the easiest to pick. First of all, you need a pick set.
If you know a locksmith, get him to make you a set. This will be the best
possible set for you to use. If you find a locksmith unwilling to supply
a set, don't give up hope. It is possible to make your own, if you have
access to a grinder (you can use a file, but it takes forever). The thing
you need is an allen wrench set (very small). These should be small enough
to fit into the keyhole slot. Now, bend the long end of the allen wrench
at a slight angle (not 90 degrees). Now, take your pick to a grinder or
a file, and smooth the end until it is rounded so it won't hang inside
the lock. Test your tool out on doorknobs at your house to see if it will
slide in and out smoothly. Now, this is where the screwdriver comes in.
It must be small enough for it and your pick to be used in the same lock
at the same time, one above the other. In the coming instructions, please
refer to this chart of the interior of a lock: ______________________________
\ K | | | | | | / E | | | | \ Y [|]
Upper tumbler pin
^ ^ / H [^] Lower tumbler pin
^ ^ ^ ^ ^ ^ \ O [-] Cylinder wall /
L
(This is a greatly simplified \ E drawing)
______________________________/
The object is to press the pin up so
that the space between the upper pin and the lower pin is level with the
cylinder wall. Now, if you push a pin up, it's tendency is to fall back
down, right? That is where the screwdriver comes in. Insert the screwdriver
into the slot and turn. This tension will keep the "solved" pins from falling
back down. Now, work from the back of the lock to the front, and when you
are through, there will be a click, the screwdriver will turn freely, and
the door will open. Do not get discouraged on your first try! It will probably
take you about twenty to thirty minutes your first time. After that, you
will quickly improve with practice.
Solidox Bombs
by The Jolly Roger
Most people are not aware that a volatile,
extremely explosive chemical can be bought over the counter: Solidox. Solidox
comes in an aluminum can containing 6 grey sticks, and can be bought at
Kmart, and various hardware supply shops for around $7.00. Solidox is used
in welding applications as an oxidizing agent for the hot flame needed
to melt metal. The most active ingredient in Solidox is potassium chlorate,
a filler used in many military applications in the WWII era. Since Solidox
is literally what the name says: SOLID OXygen, you must have an energy
source for an explosion. The most common and readily available energy source
is common household sugar, or sucrose. In theory, glucose would be the
purest energy source, but it is hard to find a solid supply of glucose.
Making the mixture: [1] Open the can of Solidox, and remove all 6 sticks.
One by one, grind up each of the sticks (preferably with a mortar and pestle)
into the finest powder possible. [2] The ratio for mixing the sugar with
the Solidox is 1:1, so weigh the Solidox powder, and grind up the equivalent
amount of sugar. [3] Mix equivalent amounts of Solidox powder, and sugar
in a 1:1 ratio. It is just that simple! You now have an extremely powerful
substance that can be used in a variety of applications. A word of caution:
be EXTREMELY careful in the entire process. Avoid friction, heat, and flame.
A few years back, a teenager I knew blew 4 fingers off while trying to
make a pipe bomb with Solidox. You have been warned!
High Tech Revenge:
The Beigebox rev.2 by The Jolly Roger -------------Introduction-------------
Have you ever wanted a lineman's handset?
Surely every phreak has at least once considered the phun that he could
have with one. After searching unlocked phone company trucks for months,
we had an idea. We could build one. We did, and named it the "Beige Box"
simply because that is the color of ours. The beigebox is simply a consumer
lineman's handset, which is a phone that can be attached to the outside
of a person's house. To fabricate a beigebox, follow along. ---------Construction
and Use--------- The construction is very simple. First you must understand
the concept of the device. In a modular jack, there are four wires. These
are red, green, yellow, and black. For a single line telephone, however,
only two matter: the red (ring) and green (tip). The yellow and the black
are not neccessary for this project. A lineman's handset has two clips
on it: the ring and the tip. Take a modular jack and look at the bottom
of it's casing. There should be a grey jack with four wires (red, green,
yellow & black) leading out of it. To the end of the red wire attach
a red aligator clip. To the end of the green wire attatch a green aligator
clip. The yellow and black wires can be removed, although I would only
set them aside so that you can use the modular jack in future projects.
Now insert your telephone's modular plug into the modular jack. That's
it. This particular model is nice because it is can be easily made, is
inexpensive, uses common parts that are readily available, is small, is
lightweight, and does not require the destruction of a phone. ------------Beige
Box Uses------------ There are many uses for a Beige Box. However, before
you can use it, you must know how to attach it to the output device. This
device can be of any of Bell switching apparatus that include germinal
sets (i.e. remote switching centers, bridgin heads, cans, etc.). To open
most Bell Telephone switching apparatus, you must have a 7/16 inch hex
driver (or a good pair of needle nose pliers work also). This piece of
equipment can be picked up at your local hardware store. With your hex
driver (or pliers), turn the security bolt(s) approximately 1/8 of an inch
counter-clockwise and open. If your output device is locked, then you must
have some knowledge of destroying and/or picking locks. However, we have
never encountered a locked output device. Once you have opened your output
device, you should see a mass of wires connected to terminals. On most
output devices, the terminals should be labeled "T" (Tip -- if not labeled,
it is usually on the left) and "R" (Ring -- if not labeled, usually on
the right). Remember: Ring - red - right. The "Three R's" -- a simple way
to remember which is which. Now you must attach all the red alligator clip
(Ring) to the "R" (Ring) terminal. Attach the green alligator clip (Tip)
to the "T" (Tip) terminal. Note: If instead of a dial tone you hear nothing,
adjust the alligator clips so that they are not touching each other terminals.
Also make sure they are firmly attached. By this time you should hear a
dial tone. Dial ANI to find out the number you are using (you wouldn't
want to use your own). Here are some practicle aplications: > Eavesdropping
> Long distance, static free free fone calls to phriends > Dialing direct
to Alliance Teleconferencing (also no static) > Phucking people over >
Bothering the operator at little risk to yourself > Blue Boxing with greatly
reduced chance of getting caught > Anything at all you want, since you
are on an extension of that line. Eavesdropping ------------- To be most
effective, first attach the Beige Box then your phone. This eliminates
the static caused by connecting the box, therefore reducing the potential
suspicion of your victim. When eavesdropping, it is allways best to be
neither seen nor heard. If you hear someone dialing out, do not panic;
but rather hang up, wait, and pick up the receiver again. The person will
either have hung up or tried to complete their call again. If the latter
is true, then listen in, and perhaps you will find information worthy of
blackmail! If you would like to know who you are listening to, after dialing
ANI, pull a CN/A on the number.
Dialing Long
Distance --------------------- This section is self explanitory,
but don't forget to dial a "1" before the NPA. Dialing Direct to Aliance
Teleconferencing ------------------------------------------ Simply dial
0-700-456-1000 and you will get instructions from there. I prefer this
method over PBX's, since PBX's often have poor reception and are more dificult
to come by.
Phucking People
Over -------------------- This is a very large topic of discussion.
Just by using the other topics described, you can create a large phone
bill for the person (they will not have to pay for it, but it will be a
big hassle for them). In addition, since you are an extension of the person's
line, you can leave your phone off the hook, and they will not be able
to make or receive calls. This can be extremely nasty because no one would
expect the cause of the problem.
Bothering the
Operator ---------------------- This is also self explanitary and
can provide hours of entertainment. Simply ask her things that are offensive
or you would not like traced to your line. This also corresponds to the
previously described section, Phucking People Over. After all, guess who's
line it gets traced to? He he he...
Blue Boxing
----------- See a file on Blue Boxing for more details. This is an especially
nice feature if you live in an ESS-equiped prefix, since the calls are,
once again, not traced to your line... ---
POTENTIAL RISKS
OF BEIGE BOXING---- Overuse of the Beige Box may cause suspicians
within the Gestapo, and result in legal problems. Therefor, I would recomend
you: > Choose a secluded spot to do your Beige Boxing, > Use more than
one output device > Keep a low profile (i.e., do not post under your real
name on a public BBS concering your occomplishments) > In order to make
sure the enemy has not been inside your output device, I recomend you place
a piece of transparent tape over the opening of your output device. Therefor,
if it is opened in your abscence, the tapqe will be displaced and you will
be aware of the fact that someone has intruded on your teritory. Now, imagine
the possibilities: a $2000 dollar phone bill for that special person, 976
numbers galore, even harassing the operator at no risk to you! Think of
it as walking into an enemies house, and using their phone to your heart's
content. ---------
Jolly Roger How
to make a CO2 bomb by the Jolly Roger
You will have to use up the cartridge
first by either shooting it or whatever. With a nail, force a hole bigger
so as to allow the powder and wick to fit in easily. Fill the cartridge
with black powder and pack it in there real good by tapping the bottom
of the cartridge on a hard surface (I said TAP not SLAM!). Insert a fuse.
I recommend a good water-proof cannon fuse, or an m-80 type fuse, but firecracker
fuses work, if you can run like a black man runs from the cops after raping
a white girl.) Now, light it and run like hell! It does wonders for a row
of mailboxes (like the ones in apartment complexes), a car (place under
the gas tank), a picture window (place on window sill), a phone booth (place
right under the phone), or any other devious place. This thing throws shrapnel,
and can make quit a mess!! -
Jolly Roger-
Thermite II... or A better way to make Thermite by Jolly Roger
Thermite is nasty shit. Here is a good
and easy way to make it. The first step is to get some iron-oxide (which
is RUST!). Here is a good way to make large quantities in a short time:
- Get a DC convertor like the one used on a train set. Cut the connector
off, seperate the wires, and strip them both. - Now you need a jar of water
with a tablespoon or so of sodium chloride (which is SALT!) added to it.
This makes the water conductive. - Now insert both wires into the mixture
(I am assuming you plugged the convertor in...) and let them sit for five
minutes. One of them will start bubbling more than the other. This is the
POSITIVE(+) wire. If you do not do this test right, the final product will
be the opposite (chemically) of rust, which is RUST ACID. You have no use
for this here (although it IS useful!). - Anyway, put the nail tied to
the positive wire into the jar. Now put the negative wire in the other
end. Now let it sit overnight and in the morning scrape the rust off of
the nail & repeat until you got a bunch of rust on the bottom of the
glass. Be generous with your rust collection. If you are going through
the trouble of making thermite, you might as well make a lot, right? -
Now remove the excess water and pour the crusty solution onto a cookie
sheet. Dry it in the sun for a few hours, or inside overnight. It should
be an orange-brown color (although I have seen it in many different colors!
Sometimes the color gets fucked up, what can I say... but it is still iron
oxide!) - Crush the rust into a fine powder and heat it in a cast-iron
pot until it is red. Now mix the pure iron oxide with pure alluminum filinos
which can be bought or filed down by hand from an aluminum tube or bar.
The ratio or iron oxide to aluminum is 8 grams to 3 grams. - Congrats!
You have just made THERMITE! Now, to light it... - Thermite requires a
LOT of heat (more than a blow torch!) to ignite. However, a magnesium ribbon
(which is sorta hard to find.. call around) will do the trick. It takes
the heat from the burning magnesium to light the thermite. - Now when you
see your victim's car, pour a fifty-cent sized pile onto his hood, stick
the ribbon in it, and light the ribbon with the blow torch. Now chuckle
as you watch it burn through the hood, the block, the axle, and the pavement.
BE CAREFUL! The ideal mixtures can vaporize CARBON STEEL! Another idea
is to use thermite to get into pay phone cash boxes. HAVE FUN!! -Jolly
Roger-
Touch Explosives
by the Jolly Roger
This is sort of a mild explosive, but
it can be quite dangerous in large quantities. To make touch explosive
(such as that found in a snap-n-pop, but more powerful), use this recipe:
- Mix iodine crystals into ammonia until the iodine crystals will not dissolve
into the ammonia anymore. Pour off the excess ammonia and dry out the crystals
on a baking sheet the same way as you dried the thermite (in other words,
just let it sit overnight!). - Be careful now because these crystals are
now your touch explosive. Carefully wrap a bunch in paper (I mean carefully!
Friction sets 'em off!) and throw them around.. pretty loud, huh? They
are fun to put on someone's chair. Add a small fish sinker to them and
they can be thrown a long distance (good for crowds, football games, concerts,
etc.) Have fun! -Jolly Roger-
Letter Bombs
by The Jolly Roger
You will first have to make a mild
version of thermite. Use my recipe, but substitute iron fillings for rust.
- Mix the iron with aluminum fillings in a ratio of 75% aluminum to 25%
iron. This mixture will burn violently in a closed space (such as an envelope).
This bring us to our next ingredient... - Go to the post office and buy
an insulated (padded) envelope. You know, the type that is double layered...
Seperate the layers and place the mild thermite in the main section, where
the letter would go. Then place magnesium powder in the outer layer. There
is your bomb!! - Now to light it... this is the tricky part and hard to
explain. Just keep experimenting until you get something that works. The
fuse is just that touch explosive I have told you about in another one
of my anarchy files. You might want to wrap it like a long cigarette and
then place it at the top of the envelope in the outer layer (on top of
the powdered magnesium). When the touch explosive is torn or even squeezed
hard it will ignite the powdered magnesium (sort of a flash light) and
then it will burn the mild thermite. If the thermite didn't blow up, it
would at least burn the fuck out of your enemy (it does wonders on human
flesh!). NOW that is REVENGE! -Jolly Roger- Paint Bombs by The Jolly Roger
To make a pain bomb you simply need a metal pain can with a refastenable
lid, a nice bright color paint (green, pink, purple, or some gross color
is perfect!), and a quantity of dry ice. Place the paint in the can and
then drop the dry ice in. Quicky place the top on and then run like hell!
With some testing you can time this to a science. It depends on the ratio
of dry ice to paint to the size of the can to how full it is. If you are
really pissed off at someone, you could place it on their doorstep, knock
on the door, and then run!! Paint will fly all over the place HAHAHA!!
-Jolly Roger-
Ways to send
a car to Hell by The Jolly Roger
There are 1001 ways to destroy a car
but I am going to cover only the ones that are the most fun (for you),
the most destructive (for them), and the hardest to trace (for the cops).
- Place thermite on the hood, light it, and watch it burn all the way through
the pavement! - Tape a CO2 bomb to the hood, axel, gas tank, wheel, muffler,
etc.) - Put a tampon, dirt, sugar (this on is good!), a ping pong ball,
or just about anything that will dissolve in the gas tank. - Put potatoes,
rocks, banannas, or anything that will fit, into the tailpipe. Use a broom
handle to stuff 'em up into the tailpipe. - Put a long rag into the gas
tank and light it... - Steal a key, copy it, replace it, and then steal
the stereo. - Break into the car. Cut a thin metal ruler into a shape like
this: ---- | | | | | | | < ---- Slide it into the outside window and
keep pulling it back up until you catch the lock cable which should unlock
the door. This device is also called a SLIM JIM. Now get the stereo, equalizer,
radar detector, etc. Now destroy the inside. (A sharp knife does wonders
on the seats!) Have Fun! -Jolly Roger-
Do ya hate school?
by The Jolly Roger
One of my favorites for getting out
of a class or two is to call in a bomb threat. Tell 'em that it is in a
locker. Then they have to check them all, whilst you can slip away for
an hour or two. You can even place a fake bomb (in any locker but YOURS!).
They might cancel school for a week while they investigate (of course,
you will probably have to make it up in the summer...). - Get some pure
potassium or pure sodium, put it in a capsule, and flush it down the toilet
(smells awful! Stinks up the whole school!). - Use a smoke grenade in the
hallway. - Steal the computer passwords & keys. Or steal the 80 column
cards inside if they are (gag) IBM. - Make friends with student assistants
and have them change your grades when the teachers hand in their bubble
sheets for the report cards. - Spit your gum out on the carpet in the library
or whatever and grind it into the carpet. Watch the janitors cry! - Draw
on lockers or spraypaint on the building that the principal is a fascist.
- Stick a potato in the tailpipe of the principal's car. - USE YOUR IMAGINATION!
-Jolly Roger-
Phone related
vandalism by the Jolly Roger
If you live where there are underground
lines then you will be able to ruin someone's phone life very easily. All
you must do is go to their house and find the green junction box that interfaces
their line (and possibly some others in the neighborhood) with the major
lines. These can be found just about anywhere but they are usually underneath
the nearest phone pole. Take a socket wrench and loosen the nut on the
right. Then just take clippers or a sledge hammer or a bomb and destroy
the insides and pull up their phone cable. Now cut it into segments so
it can't be fixed but must be replaced (There is a week's worth of work
for 'em!!) -Jolly Roger-
Highway radar
jamming by The Jolly Roger
Most drivers wanting to make better
time on the open road will invest in one of those expensive radar detectors.
However, this device will not work against a gun type radar unit in which
the radar signal is not present until the cop has your car in his sights
and pulls the trigger. Then it is TOO LATE for you to slow down. A better
method is to continuously jam any signal with a radar signal of your own.
I have tested this idea with the cooperation of a local cop and found that
his unit reads random numbers when my car approached him. It is suprisingly
easy to make a low power radar transmitter. A nifty little semiconductor
called a Gunn Diode will generate microwaves when supplied with the 5 to
10 volt DC and enclosed in the correct size cavity (resonater). An 8 to
3 terminal regulator can be used to get this voltage from a car's 12v system.
However, the correct construction and tuning of the cavity is difficult
without good microwave measurement equipment. Police radars commonly operate
on the K band at 22 ghz. Or more often on the X band at 10.525 ghz. most
microwave intruder alarms and motion detectors (mounted over automatic
doors in supermarkets & banks, etc.) contain a Gunn type transmitter/receiver
combination that transmits about 10 kilowatts at 10.525 ghz. These units
work perfectly as jammers. If you cannot get one locally, write to Microwave
Associates in Burlington, Massachusettes and ask them for info on 'Gunnplexers'
for ham radio use. When you get the unit it may be mounted in a plastic
box on the dash or in a weather-proff enclosure behind the PLASTIC grille.
Switch on the power when on an open highway. The unit will not jam radar
to the side or behind the car so don't go speeding past the radar trap.
An interesting phenomena you will notice is that the drivers who are in
front of you who are using detectors will hit their brakes as you approach
large metal signs and bridges. Your signal is bouncing off of these objects
and triggering their radar detectors! HAVE FUN! -Jolly Roger- P.S. If you
are interested in this sort of thing, get a copy of POPULAR COMMUNICATIONS.
The ads in there tell you where you can get all kinds of info on all kinds
of neat equipment for all kinds of neat things!
Smoke Bombs by
the Jolly Roger
Here is the recipe for one helluva
smoke bomb! 4 parts sugar 6 parts potassium nitrate (Salt Peter) Heat this
mixture over a LOW flame until it melts, stirring well. Pour it into a
future container and, before it solidifies, imbed a few matches into the
mixture to use as fuses. One pound of this stuff will fill up a whole block
with thick, white smoke! Mail Box Bombs by the Jolly Roger (1) Two litre
bottle of chlorine (must contain sodium hypochlorate) Small amount of sugar
Small amount of water Mix all three of these in equal amounts to fill about
1/10 of the bottle. Screw on the lid and place in a mailbox. It's hard
to believe that such a small explosion will literally rip the mailbox in
half and send it 20 feet into the air! Be careful doing this, though, because
if you are caught, it is not up to the person whose mailbox you blew up
to press charges. It is up to the city. -Jolly Roger-
Mail Box Bombs
by the Jolly Roger
(1) Two litre bottle of chlorine (must
contain sodium hypochlorate) Small amount of sugar Small amount of water
Mix all three of these in equal amounts to fill about 1/10 of the bottle.
Screw on the lid and place in a mailbox. It's hard to believe that such
a small explosion will literally rip the mailbox in half and send it 20
feet into the air! Be careful doing this, though, because if you are caught,
it is not up to the person whose mailbox you blew up to press charges.
It is up to the city. -Jolly Roger-
The easiest way
to hotwire cars by the Jolly Roger
Get in the car. Look under the dash.
If it enclosed, forget it unless you want to cut through it. If you do,
do it near the ignition. Once you get behind or near the ignition look
for two red wires. In older cars red was the standard color, if not, look
for two matched pairs. When you find them, cross them and take off! -Jolly
Roger-
How to make Napalm
by the Jolly Roger
Pour some gas into an old bowl, or
some kind of container. - Get some styrofoam and put it in the gas, until
the gas won't eat anymore. You should have a sticky syrup. - Put it on
the end of something (don't touch it!!). The unused stuff lasts a long
time! -Jolly Roger-
How to make a
fertilizer bomb by Jolly Roger
Ingredients: - Newspaper - Fertilizer
(the chemical kind, GREEN THUMB or ORCHO) - Cotton - Diesel fuel Make a
pouch out of the newspaper and put some fertilizer in it. Then put cotton
on top. Soak the cotton with fuel. Then light and run like you have never
ran before! This blows up 500 square feet so don't do it in an alley!!
-Jolly Roger-
Tennis Ball Bombs
by The Jolly Roger
Ingredients: - Strike anywhere matches
- A tennis ball - A nice sharp knife - Duct tape Break a ton of matchheads
off. Then cut a SMALL hole in the tennis ball. Stuff all of the matchheads
into the ball, until you can't fit any more in. Then tape over it with
duct tape. Make sure it is real nice and tight! Then, when you see a geek
walking down the street, give it a good throw. He will have a blast!! -Jolly
Roger- Diskette Bombs by the Jolly Roger You need: - A disk - Scissors
- White or blue kitchen matches (they MUST be these colors!) - Clear nail
polish - Carefully open up the diskette (3.5" disks are best for this!)
- Remove the cotton covering from the inside. - Scrape a lot of match powder
into a bowl (use a wooden scraper, metal might spark the matchpowder!)
- After you have a lot, spread it evenly on the disk. - Using the nail
polish, spread it over the match mixture - Let it dry - Carefully put the
diskette back together and use the nail polish to seal it shut on the inside
(where it came apart). - When that disk is in a drive, the drive head attempts
to read the disk, which causes a small fire (ENOUGH HEAT TO MELT THE DISK
DRIVE AND FUCK THE HEAD UP!!). ahahahahaha! Let the fuckhead try and fix
THAT!!! -Jolly Roger-
Unlisted Phone
Numbers by The Jolly Roger
There are a couple of different ways
of doing this. Let's see if this one will help: Every city has one or more
offices dedicated to assigning numbers to the telephone wire pairs. These
offices are called DPAC offices and are available to service reps who are
installing or repairing phones. To get the DPAC number, a service rep would
call the customer service number for billing information in the town that
the number is located in that he is trying to get the unlisted number of.
(Got that?) The conversation would go something like this: "Hi, Amarillo,
this is Joe from Anytown business office, I need the DPAC number for the
south side of town." This info is usually passed out with no problems,
so... if the first person you call doesn't have it, try another. REMEMBER,
no one has ANY IDEA who the hell you are when you are talking on the phone,
so you can be anyone you damn well please! (heheheheh!) When you call the
DPAC number, just tell them that you need a listing for either the address
that you have, or the name. DPAC DOES NOT SHOW WHETHER THE NUMBER IS LISTED
OR UNLISTED!! Also, if you're going to make a habit of chasing numbers
down, you might want to check into geting a criss-cross directory, which
lists phone numbers by their addresses. It costs a couple-a-hundred bux,
but it is well worth it if you have to chase more than one or two numbers
down! -Jolly Roger-
Fuses brought
to you by The Jolly Roger
You would be surprised how many files
are out there that use what falls under the category of a "fuse." They
assume that you just have a few lying around, or know where to get them.
Well, in some parts of the country, fuses are extremely hard to come by...
so this file tells you how to make your own. Both fuses presented here
are fairly simple to make, and are fairly reliable. SLOW BURNING FUSE ~~~~~~~~~~~~~~~~~
(approx. 2 inches per minute) Materials needed: - Cotton string or 3 shoelaces
- Potassium Nitrate or Potassium Chlorate - Granulated sugar Procedure:
- Wash the cotton string or showlaces in HOT soapy water, then rinse with
fresh water - Mix the following together in a glass bowl: 1 part potassium
nitrate or potassium chlorate 1 part granulated sugar 2 parts hot water
- Soak strings or shoelaces in this solution - Twist/braid 3 strands together
and allow them to dry - Check the burn rate to see how long it actually
takes!! FAST BURNING FUSE ~~~~~~~~~~~~~~~~~ (40 inches per minute) Materials
needed: -Soft cotton string -fine black powder (empty a few shotgun shells!)
-shallow dish or pan Procedure: - moisten powder to form a paste - twist/braid
3 strands of cotton together - rub paste into string and allow to dry -
Check the burn rate!!! How to make Potassium Nitrate by The Jolly Roger
Potassium Nitrate is an ingredient in making fuses, among other things.
Here is how you make it: Materials needed: -3.5 gallons of nitrate bearing
earth or other material -1/2 cup of wood ashes -Bucket or other similar
container about 4-5 gallons in volume -2 pieces of finely woven cloth,
each a bit bigger than the bottom of the bucket -Shallow dish or pan at
least as large in diameter as the bucket -Shallow, heat resistant container
-2 gallons of water -Something to punch holes in the bottom of the bucket
-1 gallon of any type of alcohol -A heat source -Paper & tape Procedure:
- Punch holes on the inside bottom of the bucket, so that the metal is"puckered"
outward from the bottom - Spread cloth over the holes from the bottom -
Place wood ashes on the cloth. Spread it out so that it covers the entire
cloth and has about the same thickness. - Place 2nd cloth on top of the
wood ashes - Place the dirt or other material in the bucket - Place the
bucket over the shallow container. NOTE: It may need support on the bottom
so that the holes on the bottom are not blocked. - Boil water and pour
it over the earth very slowly. Do NOT pour it all at once, as this will
clog the filter on the bottom. - Allow water to run through holes into
the shallow dish on the bottom. - Be sure that the water goes through ALL
of the earth! - Allow water in dish to cool for an hour or so - Carefully
drain the liquid in the dish away, and discard the sludge in the bottom
- Boil this liquid over a fire for at least two hours. Small grains of
salt will form - scoop these out with the paper as they form - When the
liquid has boiled down to 1/2 its original volume let it sit - After 1/2
hour, add equal volume of the alcohol; when this mixture is poured through
paper, small white crystals appear. This is the posassium nitrate. Purification:
- Redissolve crystals in small amount of boiling water - Remove any crystals
that appear - Pour through improvised filter then heat concentrated solution
to dryness. - Spread out crystals and allow to dry
Exploding lightbulbs
by The Jolly Roger
Materials needed: -lightbulb (100w)
-socket (duh...) -1/4 cup soap chips -blackpowder! (open some shotgun shells!)
-1/4 cup kerosene orgasoline -adhesive tape -lighter or small blowtorch
-glue Procedure for a simple exploding lightbulb: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Drill a small hole in the top of the bulb near the threads! - Carefully
pour the blackpowder into the hole. Use enough so that it touches the filament!
- Insert into socket as normal (make sure the light is off or else YOU
will be the victim!!) - Get the hell out!! Procedure for a Napam Bulb:
~~~~~~~~~~~~~~~~~~~~~~~~~~~ - Heat kerosene/gasoline in a double boiler
- Melt soap chips, stirring slowly. - Put somewhere and allow to cool -
Heat the threads of the bulb VERY carefully to melt the glue. Remove threads,
slowly drawing out the filament. Do NOT break the cheap electrical igniters
and/or the filament or this won't work!! - Pour the liquid into the bulb,
and slowly lower the filament back down into the bulb. Make sure the filament
is dipped into the fluid. - Re-glue the threads back on. Insert it into
a socket frequently used by the victim and get the hell out!! When the
victim flips the switch, he will be in for a BIG surprise! Have fun! -Jolly
Roger-
Under water igniters
by The Jolly Roger
Materials needed: -Pack of 10 silicon
diodes (available at Radio Shack. you will know you got the right ones
if they are very, very small glass objects!) -Pack of matches -1 candle
Procedure: - Light the candle and allow a pool of molten wax to form in
the top. - Take a single match and hold the glass part of a single diode
against the head. Bend the diode pins around the matchhead so that one
wraps in an upward direction and thensticks out to the side. Do the same
with the other wire, but in a downward direction. The diodes should now
be hugging the matchhead, but its wires MUST NOT TOUCH EACH OTHER! - Dip
the matchhead in wax to give it a water-proof coat. These work underwater
- repeat to make as many as you want How to use them: When these little
dudes are hooked across a 6v battery, the diode reaches what is called
breakdown voltage. When most electrical components reach this voltage,
they usually produce great amounts of heat and light, while quickly melting
into a little blob. This heat is enough to ignite a matchhead. These are
recommended for use underwater, where most other igniters refuse to work.
ENJOY! -Jolly Roger-
Home-brew blast
cannon by The Jolly Roger
Materials needed: -1 plastic drain
pipe, 3 feet long, at least 3 1/2 inches in diameter -1 smaller plastic
pipe, about 6 inches long, 2 inches in diameter -1 large lighter, with
fluid refills (this gobbles it up!) -1 pipe cap to fit the large pipe,
1 pipe cap to fit the small pipe -5 feet of bellwire -1 SPST rocker switch
-16v polaroid pot-a-pulse battery -15v relay (get this at Radio Shack)
-Electrical Tape -One free afternoon Procedure: - Cut the bell wire into
three equal pieces, and strip the ends - Cut a hole in the side of the
large pipe, the same diameter as the small pipe. Thread the hole and one
end of the small pipe. they should screw together easily. - Take a piece
of scrap metal, and bend it into an "L" shape, then attach it to the level
on the lighter: /------------------------gas switch is here V /------ !lighter!!<---metal
lever !!! !! Now, every time you pull the 'trigger' gas should flow freely
from the lighter. You may need to enlarge the 'gas port' on your lighter,
if you wish to be able to fire more rapidly. - Connect two wires to the
two posts on the switch - Cut two holes in the side of the smaller tube,
one for the switch on the bottom, and one for the metal piece on the top.
Then, mount the switch in the bottom, running the wires up and out of the
top. - Mount the lighter/trigger in the top. Now the switch should rock
easily, and the trigger should cause the lighter to pour out gas. Re-screw
the smaller tube into the larger one, hold down the trigger a bit, let
it go, and throw a match in there. If all goes well, you should hear a
nice big 'THUD!' - Get a hold of the relay, and take off the top. 1---------------
v/ 2--------------/<--- the center object is the metal finger inside
3 the relay cc-------------/ oo----------------4 ii ll----------------5
Connect (1) to one of the wires coming from the switch. Connect (2) to
(4), and connect (5) to one side of the battery. Connect the remaining
wire from the switch to the other side of the battery. Now you should be
able to get the relay to make a little 'buzzing' sound when you flip the
switch and you should see some tiny little sparks. - Now, carefully mount
the relay on the inside of the large pipe, towards the back. Screw on the
smaller pipe, tape the battery to the side of the cannon barrel (yes, but
looks aren't everything!) - You should now be able to let a little gas
into the barrel and set it off by flipping the switch. - Put the cap on
the back end of the large pipe VERY SECURELY. You are now ready for the
first trial-run! To Test: Put something very, very large into the barrel,
just so that it fits 'just right'. Now, find a strong guy (the recoil will
probably knock you on your ass if you aren't careful!). Put on a shoulderpad,
earmuffs, and possibly some other protective clothing (trust the Jolly
Roger! You are going to need it!). Hold the trigger down for 30 seconds,
hold on tight, and hit the switch. With luck and the proper adjustments,
you should be able to put a frozed orange through 1/4 or plywood at 25
feet. Have fun! -Jolly Roger-
Chemical Equivalency
list by the Jolly Roger
Acacia..................................................Gum
Arabic
Acetic Acid................................................Vinegar
Aluminum Oxide..............................................Alumia
Aluminum Potassium Sulphate...................................Alum
Aluminum Sulfate..............................................Alum
Ammonium Carbonate.......................................Hartshorn
Ammonium Hydroxide.........................................Ammonia
Ammonium Nitrate........................................Salt
Peter
Ammonium Oleate.......................................Ammonia
Soap
Amylacetate............................................Bananna
Oil
Barium Sulfide...........................................Black
Ash Carbon
Carbinate.............................................Chalk
Carbontetrachloride.................................Cleaning
Fluid
Calcium Hypochloride..............................Bleaching
Powder
Calcium Oxide.................................................Lime
Calcium Sulfate...................................Plaster
of Paris
Carbonic Acid..............................................Seltzer
Cetyltrimethylammoniumbromide........................Ammonium
Salt
Ethylinedichloride.....................................Dutch
Fluid
Ferric Oxide.............................................Iron
Rust
Furfuraldehyde............................................Bran
Oil
Glucose.................................................Corn
Syrup
Graphite...............................................Pencil
Lead
Hydrochloric Acid....................................Muriatic
Acid
Hydrogen Peroxide.........................................Peroxide
Lead Acetate.........................................Sugar
of Lead
Lead Tero-oxide...........................................Red
Lead
Magnesium Silicate............................................Talc
Magnesium Sulfate.......................................Epsom
Salt
Methylsalicylate..................................Winter
Green Oil
Naphthalene..............................................Mothballs
Phenol...............................................Carbolic
Acid
Potassium Bicarbonate..............................Cream
of Tarter
Potassium Chromium Sulfate..............................Chromealum
Potassium Nitrate.......................................Salt
Peter
Sodium Oxide..................................................Sand
Sodium Bicarbonate.....................................Baking
Soda
Sodium Borate................................................Borax
Sodium Carbonate......................................Washing
Soda
Sodium Chloride...............................................Salt
Sodium Hydroxide...............................................Lye
Sodium Silicate..............................................Glass
Sodium Sulfate......................................Glauber's
Salt
Sodium Thiosulfate.............................Photographer's
Hypo
Sulfuric Acid.........................................Battery
Acid
Sucrose.................................................Cane
Sugar
Zinc Chloride.......................................Tinner's
Fluid
Zinc Sulfate.........................................White
Vitriol
Phone Taps by
The Jolly Roger
Here is some info on phone taps. In
this file is a schematic for a simple wiretap & instructions for hooking
up a small tape recorder control relay to the phone line. First, I will
discuss taps a little. There are many different types of taps. there are
transmitters, wired taps, and induction taps to name a few. Wired and wireless
transmitters must be physically connected to the line before they will
do any good. Once a wireless tap is connected to the line,it can transmit
all conversations over a limited reception range. The phones in the house
can even be modifies to pick up conversations in the room and transmit
them too! These taps are usually powered off of the phone line, but can
have an external power source. You can get more information on these taps
by getting an issue of Popular Communications and reading through the ads.
Wired taps, on the other hand, need no power source, but a wire must be
run from the line to the listener or to a transmitter. There are obvious
advantages of wireless taps over wired ones. There is one type of wireless
tap that looks like a normal telephone mike. All you have to do is replace
the original mike with thisand itwill transmit all conversations! There
is also an exotic type of wired tap known as the 'Infinity Transmitter'
or 'Harmonica Bug'. In order to hook one of these, it must be installed
inside the phone. When someone calls the tapped phone & *before* it
rings,blows a whistle over the line, the transmitter picks up the phone
via a relay. The mike on the phone is activated so that the caller can
hear all of the conversations in the room. There is a sweep tone test at
415/BUG-1111 which can be used to detect one of these taps. If one of these
is on your line & the test # sends the correct tone, you will hear
a click. Induction taps have one big advantage over taps that must be physically
wired to the phone. They do not have to be touching the phone in order
to pick up the conversation. They work on the same principle as the little
suction-cup tape recorder mikes that you can get at Radio Shack. Induction
mikes can be hooked up to a transmitter or be wired. Here is an example
of industrial espionage using the phone: A salesman walks into an office
& makes a phone call. He fakes the conversation, but when he hangs
up he slips some foam rubber cubes into the cradle. The called party can
still hear all conversations in the room. When someone picks up the phone,
the cubes fall away unnoticed. A tap can also be used on a phone to overhear
what your modem is doing when you are wardialing, hacking, or just plain
calling a bbs (like the White Ruins! Denver, Colorado! 55 megs online!
Atari! Macintosh! Amiga! Ibm! CALL IT! 303-972-8566! By the way, i did
this ad without the sysops consent or knowledge!).
Nelson GueretteNelson Guerette
* = the digit 0 or 1 X = a digit from 0 to 9 Area Codes ~~~~~~~~~~ Check
your telephone book or the seperate listing of area codes found on many
bbs's. Here are the special area codes (SAC's): 510 - TWX (USA) 610 - TWX
(Canada) 700 - New Service 710 - TWX (USA) 800 - WATS 810 - TWX (USA) 900
- DIAL-IT Services 910 - TWX (USA) The other area codes never cross state
lines, therefore each state must have at least one exclusive NPA code.
When a community is split by a state line, the CO #'s are often interchangeable
(ie, you can dial the same number from two different area codes). TWX (Telex
II) consists of 5 teletype-writer area codes. They are owned by Western
Union. These SAC's may only be reached via other TWX machines. These run
at 110 baud (last I checked! They are most likely faster now!). Besides
the TWX #'s, these machines are routed to normal telephone #'s. TWX machines
always respond with an answerback. For example, WU's FYI TWX # is (910)
279-5956. The answerback for this service is "WU FYI MAWA". If you don't
want to but a TWX machine, you can still send TWX messages using Easylink
[800/325-4112]. However you are gonna have to hack your way onto this one!
700: 700 is currently used by AT&T as a call forwarding service. It
is targeted towards salesmen on the run. To understand how this works,
I'll explain it with an example. Let's say Joe Q. Salespig works for AT&T
security and he is on the run chasing a phreak around the country who royally
screwed up an important COSMOS system. Let's say that Joe's 700 # is (700)
382-5968. Everytime Joe goes to a new hotel (or most likely SLEAZY MOTEL),
he dials a special 700 #, enters a code, and the number where he is staying.
Now, if his boss received some important info, all he would do is dial
(700) 382-5968 and it would ring wherever Joe last progammed it to. Neat,
huh? 800: This SAC is one of my favourites since it allows for toll free
calls. INWARD WATS (INWATS), or Inward Wide Area Telecommunications Service
is the 800 #'s that we are all familiar with. 800 #'s are set up in service
areas or bands. There are 6 of these. Band 6 is the largest and you can
call a band 6 # from anywhere in the US except the state where the call
is terminated (that is why most companies have one 800 number for the countery
and then another one for their state.) Band 5 includes the 48 contiguous
states. All the way down to band 1 which includes only the states contiguous
to that one. Therefore, less people can reach a band 1 INWATS # than a
band 6 #. Intrastate INWATS #'s (ie, you can call it from only 1 state)
always have a 2 as the last digit in the exchange (ie, 800-NX2- XXXX).
The NXX on 800 #'s represent the area where the business is located. For
example, a # beginning with 800-431 would terminate at a NY CO. 800 #'s
always end up in a hunt series in a CO. This means that it tries the first
# allocated to the company for their 800 lines; if this is busy, it will
try the next #, etc. You must have a minimum of 2 lines for each 800 #.
For example, Travelnet uses a hunt series. If you dial (800) 521-8400,
it will first try the # associated with 8400; if it is busy it will go
to the next available port, etc. INWATS customers are billed by the number
of hours of calls made to their #. OUTWATS (OUTWARD WATS): OUTWATS are
for making outgoing calls only. Largecompanies use OUTWATS since they receive
bulk-rate discounts. Since OUTWATS numbers cannot have incoming calls,
they are in the format of: (800) *XXX-XXXX Where * is the digit 0 or 1
(or it may even be designated by a letter) which cannot be dialed unless
you box the call. The *XX identifies the type of service and the areas
that the company can call. Remember: INWATS + OUTWATS = WATS EXTENDER 900:
This DIAL-IT SAC is a nationwide dial-it service. It is use for taking
television polls and other stuff. The first minute currently costs an outrageous
50-85 cents and each additional minute costs 35-85 cents. Hell takes in
a lot of revenue this way! Dial (900) 555-1212 to find out what is currently
on this service. CO CODES ~~~~~~~~ These identify the switching office
where the call is to be routed. The following CO codes are reserved nationwide:
555 - directory assistance 844 - time. These are now in! 936 - weather
the 976 exchange 950 - future services 958 - plant test 959 - plant test
970 - plant test (temporary) 976 - DIAL-IT services Also, the 3 digit ANI
& ringback #'s are regarded as plant test and are thus reserved. These
numbers vary from area to area. You cannot dial a 0 or 1 as the first digit
of the exchange code (unless using a blue box!). This is due to the fact
that these exchanges (000-199) contains all sorts of interesting shit such
as conference #'s, operators, test #'s, etc. 950: Here are the services
that are currently used by the 950 exchange: 1000 - SPC 1022 - MCI Execunet
1033 - US Telephone 1044 - Allnet 1066 - Lexitel 1088 - SBS Skyline These
SCC's (Specialized Common Carriers) are free from fortress phones! Also,
the 950 exchange will probably be phased out with the introduction of Equal
Access Plant Tests: These include ANI, Ringback, and other various tests.
976: Dial 976-1000 to see what is currently on the service. Also, many
bbs's have listings of these numbers. N11 codes: ---------- Bell is trying
to phase out some of these, but they still exist in most areas. 011 - international
dialing prefix 211 - coin refund operator 411 - directory assistance 611
- repair service 811 - business office 911 - EMERGENCY International Dialing
~~~~~~~~~~~~~~~~~~~~~ With International Dialing, the world has been divided
into 9 numbering zones. To make an international call, you must first dial:
International Prefix + Country code + National # In North America, the
international dialing prefix is 011 for station-to-station calls. If you
can dial International #'s directly in your area then you have International
Direct Distance Dialing (IDDD). The country code, which varies from 1 to
3 digits, always has the world numbering zone as the first digit. For example,
the country code for the United Kingdom is 44, thus it is in world numbering
zone 4. Some boards may contain a complete listing of other country codes,
but here I give you a few: 1 - North America (US, Canada, etc.) 20 - Egypt
258 - Mozambique 34 - Spain 49 - Germany 52 - Mexico (southern portion)
7 - USSR 81 - Japan 98 - Iran (call & hassle those bastards!) If you
call from an area other than North America, the format is generally the
same. For example, let's say that you wanted to call the White House from
Switzerland to tell the prez that his numbered bank account is overdrawn
(it happens, you know! ha ha). First you would dial 00 (the SWISS international
dialing refix), then 1 (the US country code), followed by 202-456-1414
(the national # for the White House. Just ask for Georgy and give him the
bad news!) Also, country code 87 is reserved for Maritime mobile service,
ie, calling ships: 871 - Marisat (Atlantic) 871 - Marisat (Pacific) 872
- Marisat (Indian) International Switching: ------------------------ In
North America there are currently 7 no. 4 ESS's that perform the duty of
ISC (Inter-nation Switching Centers). All international calls dialed from
numbering zone 1 will be routed through one of these "gateway cities".
They are: 182 - White Plains, NY 183 - New York, NY 184 - Pittsburgh, PA
185 - Orlando, Fl 186 - Oakland, CA 187 - Denver, CO 188 - New York, NY
The 18X series are operator routing codes for overseas access (to be furthur
discussed with blue boxes). All international calls use a signaling service
called CCITT.It is an international standard for signaling. Ok.. there
you go for now! If you wanna read more about this, read part two which
is the next file #36 in the Jolly Roger's cookbook! -Jolly Roger- Phone
Systems Tutorial part II by The Jolly Roger Part II will deal with the
various types of operators, office heirarchy, & switching equipment.
Operators ~~~~~~~~~ There are many types of operators in the network and
the more common ones will be discussed. TSPS Operator: The TSPS [(Traffic
Service Position System) ass opposed to This Shitty Phone Service] Operator
is probably the bitch (or bastard, for the female libertationists out there)
that most of us are used to having to deal with. Here are his/her responsibilities:
1) Obtaning billing information for calling card or third number calls
2) Identifying called customer on person-to-person calls. 3) Obtaining
acceptance of charges on collect calls. 4) Identifying calling numbers.
This only happens when the calling # is not automatically recorded by CAMA
(Centralized Automatic Message Accounting) & forwarded from the local
office. This could be caused by equipment failures (ANIF- Automatic Number
Identification Failure) or if the office is not equipped for CAMA (ONI-
Operator Number Identification). Ask to speak to their supervisor... or
better yet the Group Chief (who is the highest ranking official in any
office) who is the equivalent of the Madame ina whorehouse. By the way,
some CO's that willallow you to dial a 0 or 1 as the 4th digit, will also
allow you to call special operators & other fun Tel. Co. #'s without
a blue box. This is ver rare, though! For example,212-121-1111 will get
you a NY Inward Operator. Office Hierarchy ~~~~~~~~~~~~~~~~ Every switching
office in North America (the NPA system), is assigned an office name and
class. There are five classes of offices numbered 1 through 5. Your CO
is most likely a class 5 or end office. All long-distance (Toll) calls
are switched by a toll office which can be a class 4, 3, 2, or 1 office.
There is also a class 4X office callen an intermediate point. The 4X office
is a digital one that can have an unattended exchange attached to it (known
as a Remote Switching Unit (RSU)). The following chart will list the Office
#, name, & how many of those office exist (to the best of my knowledge)
in North America: Class Name Abb # Existing ----- -----------------------
--- ----------------- > 1 Regional Center RC 12 > 2 Sectional Center SC
67 > 3 Primary Center PC 230 > 4 Toll Center TC 1,300 > 4P Toll Point TP
n/a > 4X Intermediate Point IP n/a > 5 End Office EO 19,000 > 6 RSU RSU
n/a When connecting a call from one party to another, the switching equipment
usually tries to find the shortest route between the class 5 end office
of the caller & the class 5 end officeof the called party. If no inter-office
trunks exist between the two parties, it will then move upward to the next
highest office for servicing calls (Class 4). If the Class 4 office cannot
handle the call by sending it to another Class 4 or 5 office, it will then
be sent to the next highest office in the hierarchy (3). The switching
equipment first uses the high-usage interoffice trunk groups, if they are
busy then it goes to the fina; trunk groups on the next highest level.
If the call cannot be connected, you will probably get a re-order [120
IPM (interruptions per minute) busy signal] signal. At this time, the guys
at Network Operations are probably shitting in their pants and trying to
avoid the dreaded Network Dreadlock (as seen on TV!). It is also interesting
to note that 9 connections in tandem is called ring-around-the-rosy and
it has never occured in telephone history. This would cause an endless
loop connection [a neat way to really screw up the network]. The 10 regional
centers in the US & the 2 in Canada are all interconnected. they form
the foundation of the entire telephone network. Since there are only 12
of them, they are listed below: Class 1 Regional Office Location NPA --------------------------------
--- Dallas 4 ESS 214 Wayne, PA 215 Denver 4T 303 Regina No. 2SP1-4W (Canada)
306 St. Louis 4T 314 Rockdale, GA 404 Pittsburgh 4E 412 Montreal No. 1
4AETS (Canada) 504 That's it for now! More info to come Future update to
the Cookbook! Have fun! -Jolly Roger- Basic Alliance Teleconferencing Courtesy
of the Jolly Roger Introduction: ------------ This phile will deal with
accessing, understanding and using the Alliance Teleconferencing Systems....
it has many sections and for best use should be printed out...enjoy...
Alliance: -------- Alliance Teleconferencing is an independant company
which allows the general public to access and use it's conferencing equipment.
Many rumors have been floating apound that Alliance is a subsidary of AT&T.
Well, they are wrong. As stated above, Alliance is an entirely independant
company. They use sophisticated equipment to allow users to talk to many
people at once. The Number: --------- Alliance is in the 700 exchange,
thus it is not localized, well, not in a way. Alliance is only in certain
states, and only residents of these certain states can access by dialing
direct. This, however, will be discussed in a later chapter. The numbers
for alliance are as follows: 0-700-456-1000 (chicago) -1001 (los angeles)
-1002 (chicago) -1003 (houston) -2000 (?) -2001 (?) -2002 (?) -2003 (?)
-3000 (?) -3001 (?) -3002 (?) -3003 (?) The locations of the first 4 numbers
are known and i have stated them. However, the numbers in the 200x and
300x are not definately known. Rumor has it that the pattern repeats itself
but this has not been proven. Dialing: ------- As stated before, Alliance
is only in certain stated and only these states can access them via dialing
direct. However, dialing direct causes your residence to be charged for
the conference and conference bills are not low!!! Therefore, many ways
have been discovered to start a conference without having it billed to
ones house. They are as follows: 1) Dialing through a PBX 2) Incorporating
a Blue Box 3) Billing to a loop 4) Billing to a forwarded call I am sure
there are many more but these are the four i will deal with.
Dialing through a PBX: ------- -------
- --- Probably the easiest method of creating a free conference is through
a PBX. Simply call one in a state that has Alliance, input the PBX's code,
dial 9 for an outside line and then dial alliance. An example of this would
be: PBX: 800-241-4911 When it answers it will give you a tone. At this
tone input your code. Code: 1234 After this you will receive another tone,
now dial 9 for an outside line. You will now hear a dial tone. Simply dial
Alliance from this point and the conference will be billed to the PBX.
Using a Blue Box: ----- - ---- ---
Another rather simple way of starting a conference is with a Blue Box.
The following procedure is how to box a conference: Dial a number to box
off of. In this example we will use 609-609-6099 When the party answers
hit 2600hz. This will cause the fone company's equipment to think that
you have hung up. You will hear a
Billing to a loop: ------- -- - ----
A third method of receiving a free conference is by billing out to a loop.
A loop is 2 numbers that when two people call, they can talk to each other.
You're saying woop-tee-do right? Wrong! Loops can be usefull to phreaks.
First, dial alliance direct. After going through the beginning procedure,
which will be discussed later in this tutorial, dial 0 and wait for an
Alliance operator. When she answers tell her you would like to bill the
conference to such and such a number. (A loop where your phriend is on
the other side) She will then call that number to receive voice verification.
Of course your phriend will be waiting and will accept the charges. Thus,
the conference is billed to the loop.
Billing to call forwarding: -------
-- ---- ---------- When you dial a number that is call forwarded, it is
first answered by the original location, then forwarded. The original location
will hang up if 2600hz is received from only ond end of the line. Therefore,
if you were to wait after the forwarded residence answered, you would receive
the original location's dial tone. Example: Dial 800-325-4067 The original
residence would answer, then forward the call, a second type of ringing
would be heard. When this second residence answers simply wait until they
hang up. After about twenty seconds you will then receive the original
residence's dial tone since it heard 2600hz from one end of the line. Simply
dial Alliance from this point and the conference will be billed to the
original residence. These are the four main ways to receive a free conference.
I am sure many more exist, but these four are quite handy themselves.
Logon Procedure: ----- --------- Once
Alliance answers you will hear a two-tone combination. This is their way
of saying 'How many people do you want on the conference dude?' Simply
type in a 2-digit combination, depending on what bridge of Alliance you
are on, between 10 and 59. After this either hit '*' to cancel the conference
size and inout another or hit '#' to continue. You are now in Alliance
Teleconferencing and are only seconds away from having your own roaring
conference going strong!!!
Dialing in Conferees: ------- -- ---------
To dial your first conferee, dial 1+npa+pre+suff and await his/her answer.
npa=area code pre=prefix suff=suffix If the number is busy, or if no one
answers simply hit '*' and your call will be aborted. But, if they do answer,
hit the '#' key. This will add them to the conference. Now commence dialing
other conferees.
Joining Your Conference: ------- ----
---------- To join your conference from control mode simply hit the '#'
key. Within a second or two you will be chatting with all your buddies.
To go back into control mode, simply hit the '#' key again.
Transferring Control: ------------
------- To transfer control to another conferee, go into control mode,
hit the # 6+1+npa+pre+suff of the conferee you wish to give control to.
If after, you wish to abort this transfer hit the '*' key. :Transfer of
control is often not available. When you receive a message stating this,
you simply cannot transfer control.
Muted Conferences: ----- -----------
To request a muted conference simply hit the 9 key. I am not exactly sure
what a muted conference is but it is probably a way to keep unwanted eavesdroppers
from listening in. Dialing Alliance Operators: ------- -------- ---------
Simply dial 0 as you would from any fone and wait for the operator to answer.
Ending Your Conference: ------ ----
---------- To end your conference all together, that is kick everyone including
yourself off, go into control mode and hit '*'...after a few seconds simply
hang up. Your conference is over.
Are Alliance Operators Dangerous? ---
-------- --------- --------- No. Not in the least. The worst they can do
to you while you are having a conference is drop all conferees including
yourself. This is in no way harmful, just a little aggravating.
Alliance and Tracing: -------- ---
------- Alliance can trace, as all citizens of the United States can. But
this has to all be pre-meditated and AT&T has to be called and it's
really a large hastle, therefore, it is almost never done. Alliance simply
does not want it known that teenagers are phucking them over. The only
sort of safety equipment Alliance has on-line is a simple pen register.
This little device simply records all the numbers of the conferees dialed.
No big deal. All Alliance can do is call up that persons number, threaten
and question. However, legally, they can do nothing because all you did
was answer your fone. :Almost all instructions are told to the person in
command by Alliance recordings. A lot of this tutorial is just a listing
of those commands plus information gathered by either myself or the phellow
phreaks of the world!!! (written by the Trooper) Aqua Box Plans by Jolly
Roger Every true phreaker lives in fear of the dreadded F.B.I. 'Lock In
Trace.' For a long time, it was impossible to escape from the Lock In Trace.
This box does offer an escape route with simple directions to it. This
box is quite a simple concept, and almost any phreaker with basic electronics
knowledge can construct and use it.
The Lock In Trace ------------------
A lock in trace is a device used by the F.B.I. to lock into the phone users
location so that he can not hang up while a trace is in progress. For those
of you who are not familiar with the conecpt of 'locking in', then here's
a brief desciption. The F.B.I. can tap into a conversation, sort of like
a three-way call connection. Then, when they get there, they can plug electricity
into the phone line. All phone connections are held open by a certain voltage
of electricity. That is why you sometimes get static and faint connections
when you are calling far away, because the electricity has trouble keeping
the line up. What the lock in trace does is cut into the line and generate
that same voltage straight into the lines. That way, when you try and hang
up, voltage is retained. Your phone will ring just like someone was calling
you even after you hang up. (If you have call waiting, you should understand
better about that, for call waiting intersepts the electricity and makes
a tone that means someone is going through your line. Then, it is a matter
of which voltage is higher. When you push down the receiver,then it see-saws
the electricity to the other side. When you have a person on each line
it is impossible to hang up unless one or both of them will hang up. If
you try to hang up, voltage is retained, and your phone will ring. That
should give you an understanding of how calling works. Also, when electricity
passes through a certain point on your phone, the electricity causes a
bell to ring, or on some newer phones an electronic ring to sound.) So,
in order to eliminate the trace, you somehow must lower the voltage level
on your phone line. You should know that every time someone else picks
up the phone line, then the voltage does decrease a little. In the first
steps of planning this out, Xerox suggested getting about a hundred phones
all hooked into the same line that could all be taken off the hook at the
same time. That would greatly decrease the voltage level. That is also
why most three-way connections that are using the bell service three way
calling (which is only $3 a month) become quite faint after a while. By
now, you should understand the basic idea. You have to drain all of the
power out of the line so the voltage can not be kept up. Rather sudden
draining of power could quickly short out the F.B.I. voltage machine, because
it was only built to sustain the exact voltage nessecary to keep the voltage
out. For now, imagine this. One of the normal Radio Shack generators that
you can go pick up that one end of the cord that hooks into the central
box has a phone jack on it and the other has an electrical plug. This way,
you can "flash" voltage through the line, but cannot drain it. So, some
modifications have to be done. Materials ---------- A BEOC (Basic Electrical
Output Socket), like a small lamp-type connection, where you just have
a simple plug and wire that would plug into a light bulb. One of cords
mentioned above, if you can't find one then construct your own... Same
voltage connection, but the restrainor must be built in (I.E. The central
box) Two phone jacks (one for the modem, one for if you are being traced
to plug the aqua box into) Some creativity and easy work. *Notice: No phones
have to be destroyed/modified to make this box, so don't go out and buy
a new phone for it! Procedure --------- All right, this is a very simple
procedure. If you have the BEOC, it could drain into anything: a radio,
or whatever. The purpose of having that is you are going to suck the voltage
out from the phone line into the electrical appliance so there would be
no voltage left to lock you in with. 1)Take the connection cord. Examine
the plug at the end. It should have only two prongs. If it has three, still,
do not fear. Make sure the electrical appliance is turned off unless you
wanna become a crispy critter while making this thing. Most plugs will
have a hard plastic design on the top of them to prevent you from getting
in at the electrical wires inside. Well, remove it. If you want to keep
the plug (I don't see why...) then just cut the top off. When you look
inside, Lo and Behold, you will see that at the base of the prongs there
are a few wires connecting in. Those wires conduct the power into the appliance.
So, you carefully unwrap those from the sides and pull them out until they
are about an inch ahead of the prongs. If you don't wanna keep the jack,
then just rip the prongs out. If you are, cover the prongs with insultation
tape so they will not connect with the wires when the power is being drained
from the line. 2)Do the same thing with the prongs on the other plug, so
you have the wires evenly connected. Now, wrap the end of the wires around
each other. If you happen to have the other end of the voltage cord hooked
into the phone, stop reading now, you're too fucking stupid to continue.
After you've wrapped the wires around each other, then cover the whole
thing with the plugs with insulating tape. Then, if you built your own
control box or if you bought one, then cram all the wires into it and reclose
it. That box is your ticket out of this. 3)Re-check everything to make
sure it's all in place. This is a pretty flimsy connection, but on later
models when you get more experienced at it then you can solder away at
it and form the whole device into one big box, with some kind of cheap
mattel hand-held game inside to be the power connector. In order to use
it, just keep this box handy. Plug it into the jack if you want, but it
will slightly lower the voltage so it isn't connected. When you plug it
in, if you see sparks, unplug it and restart the whole thing. But if it
just seems fine then leave it. Use ---- Now, so you have the whole thing
plugged in and all... Do not use this unless the situation is desperate!
When the trace has gone on, don't panic, unplug your phone, and turn on
the appliance that it was hooked to. It will need energy to turn itself
on, and here's a great source... The voltage to keep a phone line open
is pretty small and a simple light bulb should drain it all in and probably
short the F.B.I. computer at the same time. Happy boxing and stay free!
------------
Jolly Roger Hindenberg
Bomb by the Jolly Roger
Needed:1 Balloon 1 Bottle 1 Liquid
Plumr 1 Piece Aluminum FoilL 1 Length Fuse Fill the bottle 3/4 full with
Liquid Plumr and add a little piece of aluminum foil to it. Put the balloon
over the neck of the bottle until the balloon is full of the resulting
gas. This is highly flammable hydrogen. Now tie the baloon. Now light the
fuse, and let it rise. When the fuse contacts the balloon, watch out!!!
-------
[=How to Kill
Someone==]------------[=WITH YOUR BARE HANDS=]----- AN EXCERPT FROM THE
ANARCHISTS COOKBOOK..... Courtesy of the Jolly Roger
This file will explain the basics of
hand-to-hand combat, and will tell of the best places to strike and kill
an enemy... When engaged in hand-to-hand combat, your life is always at
stake. There is only one purpose in combat, and that is to kill your enemy.
Never face an enemy with the idea of knocking him out. The chances are
extremely good that he will kill YOU instead. When a weapon is not available,
one must resort to the full use of his natural weapons. The natural weapons
are: 1. The knife edge of your hands. 2. Fingers folded at the second joint
or knuckle. 3. The protruding knuckle of your second finger. 4. The heel
of your hand. 5. Your boot 6. Elbows 7. Knees 8. and Teeth. Attacking is
a primary factor. A fight was never won by defensive action. Attack with
all of your strength. At any point or any situation, some vulnerable point
on your enemies body will be open for attack. Do this while screaming as
screaming has two purposes. 1. To frighten and confuse your enemy. 2. To
allow you to take a deep breath which, in turn, will put more oxygen in
your blood stream. Your balance and balance of your enemy are two inportant
factors; since, if you succeed in making your enemy lose his balance, the
chances are nine to one that you can kill him in your next move. The best
over-all stance is where your feet are spread about shoulders width apart,
with your right foot about a foot ahead of the left. Both arms should be
bent at the elbows parallel to each other. Stand on the balls of your feet
and bend your waist slightly. Kinda of like a boxer's crouch. Employing
a sudden movement or a scream or yell can throw your enemy off-balance.
There are many vulnerable points of the body. We will cover them now: Eyes:Use
your fingers in a V-shape and attack in gouging motion. Nose:(Extremely
vulnerable) Strike with the knife edge of the hand along the bridge, which
will cause breakage, sharp pain, temporary blindness, and if the blow is
hard enough, death. Also, deliver a blow with the heel of your hand in
an upward motion, this›will shove the bone up into the brain causing death.
Adam's Apple: This spot is usually pretty well protected, but if you get
the chance, strike hard with the knife edge of your hand. This should sever
the wind-pipe, and then it's all over in a matter of minutes. Temple: There
is a large artery up here, and if you hit it hard enough, it will cause
death. If you manage to knock your enemy down, kick him in the temple,
and he'll never get up again. Back of the Neck: A rabbit punch, or blow
delivered to the base of the neck can easily break it, but to be safe,
it is better to use the butt of a gun or some other heavy blunt object.
Upper lip: A large network of nerves are located. These nerves are extrememly
close to the skin. A sharp upward blow will cause extreme pain, and unconciosness.
Ears: Coming up from behind an enemy and cupping the hands in a clapping
motion over the victims ears can kill him immediately. The vibrations caused
from the clapping motion will burst his eardrums, and cause internal bleeding
in the brain. Groin: A VERY vulnerable spot. If left open, get it with
knee hard, and he'll buckle over very fast. Kidneys: A large nerve that
branches off to the spinal cord comes very close to the skin at the kidneys.
A direct blow with the knife edge of your hand can cause death. There are
many more ways to kill and injure an enemy, but these should work best
for the average person. This is meant only as information and I would not
recommend that you use this for a simple High School Brawl. Use these methods
only, in your opinion, if your life is in danger. Any one of these methods
could very easily kill or cause permanent damage to someone. One more word
of caution, you should practice these moves before using them on a dummy,
or a mock battle with a friend. (You don't have to actually hit him to
practice, just work on accuracy.)
Phone Systems
Tutorial III by The Jolly Roger
PREFACE: THIS ARTICLE WILL FOCUS PRIMARILY
ON THE STANDARD WESTERN ELECTRIC SINGLE- SLOT COIN TELEPHONE (AKA FORTRESS
FONE) WHICH CAN BE DIVIDED INTO 3 TYPES: - DIAL-TONE FIRST (DTF) - COIN-FIRST
(CF): (IE, IT WANTS YOUR $ BEFORE YOU RECEIVE A DIAL TONE) - DIAL POST-PAY
SERVICE (PP): YOU PAYAFTER THE PARTY ANSWERS DEPOSITING COINS (SLUGS):
------------------------- ONCE YOU HAVE DEPOSITED YOUR SLUG INTO A FORTRESS,
IT IS SUBJECTED TO A GAMUT OF TESTS. THE FIRST OBSTACAL FOR A SLUG IS THE
MAGNETIC TRAP. THIS WILL STOP ANY LIGHT-WEIGHT MAGNETIC SLUGS AND COINS.
IF IT PASSES THIS, THE SLUG IS THEN CLASSIFIED AS A NICKEL, DIME, OR QUARTER.
EACH SLUG IS THEN CHECKED FOR APPROPRIATE SIZE AND WEIGHT. IF THESE TESTS
ARE PASSED, IT WILL THEN TRAVEL THROUGH A NICKEL, DIME, OR QUARTER MAGNET
AS APPROPRIATE. THESE MAGNETS SET UP AN EDDY CURRENT EFFECT WHICH CAUSES
COINS OF THE APPROPRIATE CHARACTERISTICS TO SLOW DOWN SO THEY WILL FOLLOW
THE CORRECT TRAJECTORY. IF ALL GOES WELL, THE COIN WILL FOLLOW THE CORRECT
PATH (SUCH AS BOUNCING OFF OF THE NICKEL ANVIL) WHERE IT WILL HOPEFULLY
FALL INTO THE NARROW ACCEPTED COIN CHANNEL. THE RATHER ELABORATE TESTS
THAT ARE PERFORMED AS THE COIN TRAVELS DOWN THE COIN CHUTE WILL STOP MOST
SLUGS AND OTHER UNDESIRABLE COINS, SUCH AS PENNIES, WHICH MUST THEN BE
RETRIEVED USING THE COIN RELEASE LEVER. IF THE SLUG MIRACULOUSLY SURVIVES
THE GAMUT, IT WILL THEN STRIKE THE APPROPRIATE TOTALIZER ARM CAUSING A
RATCHET WHEEL TO ROTATE ONCE FOR EVERY 5-CENT INCREMENT (EG, A QUARTER
WILL CAUSE IT TO ROTATE 5 TIMES). THE TOTALIZER THEN CAUSES THE COIN SIGNAL
OSCILLATOR TO READOUT A DUAL- FREQUENCY SIGNAL INDICATING THE VALUE DEPOSITED
TO ACTS (A COMPUTER) OR THE TSPS OPERATOR. THESE ARE THE SAME TONES USED
BY PHREAKS IN THE INFAMOUS RED BOXES. FOR A QUARTER, 5 BEEP TONES ARE OUTPULSED
AT 12-17 PULSES PER SECOND (PPS). A DIME CAUSES 2 BEEP TONES AT 5 - 8.5
PPS WHILE A NICKEL CAUSES ONE BEEP TONE AT 5 - 8.5 PPS. A BEEP CONSISTS
OF 2 TONES: 2200 + 1700 HZ. A RELAY IN THE FORTRESS CALLED THE "B RELAY"
(YES, THERE IS ALSO AN 'A RELAY') PLACES A CAPACITOR ACROSS THE SPEECH
CIRCUIT DURING TOTALIZER READOUT TO PREVENT THE "CUSTOMER" FROM HEARING
THE RED BOX TONES. IN OLDER 3 SLOT PHONES: ONE BELL (1050-1100 HZ) FOR
A NICKEL, TWO BELLS FOR A DIME, AND ONE GONG (800 HZ) FOR A QUARTER ARE
USED INSTEAD OF THE MODERN DUAL-FREQUENCY TONES. ============= =TSPS &
ACTS= ============= WHILE FORTRESSES ARE CONNECTED TO THE CO OF THE AREA,
ALL TRANSACTIONS ARE HANDLED VIA THE TRAFFIC SERVICE POSITION SYSTEM (TSPS).
IN AREAS THAT DO NOT HAVE ACTS, ALL CALLS THAT REQUIRE OPERATOR ASSISTANCE,
SUCH AS CALLING CARD AND COLLECT, ARE AUTOMATICALLY ROUTED TO A TSPS OPERATOR
POSITION. IN AN EFFORT TO AUTOMATE FORTRESS SERVICE, A COMPUTER SYSTEM
KNOWN AS AUTOMATED COIN TOLL SERVICE (ACTS) HAS BEEN IMPLEMENTED IN MANY
AREAS. ACTS LISTENS TO THE RED BOX SIGNALS FROM THE FONES AND TAKES APPROPRIATE
ACTION. IT IS ACTS WHICH SAYS, "TWO DOLLARS PLEASE (PAUSE) PLEASE DEPOSIT
TWO DOLLARS FOR THE NEXT TEN SECONDS" (AND OTHER VARIATIONS). ALSO, IF
YOU TALK FOR MORE THAN THREE MINUTES AND THEN HANG-UP, ACTS WILL CALL BACK
AND DEMAND YOUR MONEY. ACTS IS ALSO RESPONSIBLE FOR AUTOMATED CALLING CARD
SERVICE. ACTS ALSO PROVIDE TROUBLE DIAGNOSIS FOR CRAFTSPEOPLE (REPAIRMEN
SPECIALIZING IN FORTRESSES). FOR EXAMPLE, THERE IS A COIN TEST WHICH IS
GREAT FOR TUNING UP RED BOXES. IN MANY AREAS THIS TEST CAN BE ACTIVATED
BY DIALING 09591230 AT A FORTRESS (THANKS TO KARL MARX FOR THIS INFORMATION).
ONCE ACTIVATED IT WILL REQUEST THAT YOU DEPOSIT VARIOUS COINS. IT WILL
THEN IDENTIFY THE COIN AND OUTPULSE THE APPROPRIATE RED BOX SIGNAL. THE
COINS ARE USUALLY RETURNED WHEN YOU HANG UP. TO MAKE SURE THAT THERE IS
ACTUALLY MONEY IN THE FONE, THE CO INITIATES A "GROUND TEST" AT VARIOUS
TIMES TO DETERMINE IF A COIN IS ACTUALLY IN THE FONE. THIS IS WHY YOU MUST
DEPOSIT AT LEAST A NICKEL IN ORDER TO USE A RED BOX! GREEN BOXES: ------------
PAYING THE INITIAL RATE IN ORDER TO USE A RED BOX (ON CERTAIN FORTRESSES)
LEFT A SOUR TASTE IN MANY RED BOXER'S MOUTHS THUS THE GREEN BOX WAS INVENTED.
THE GREEN BOX GENERATES USEFUL TONES SUCH AS COIN COLLECT, COIN RETURN,
AND RINGBACK. THESE ARE THE TONES THAT ACTS OR THE TSPS OPERATOR WOULD
SEND TO THE CO WHEN APPROPRIATE. UNFORTUNATELY, THE GREEN BOX CANNOT BE
USED AT A FORTRESS STATION BUT IT MUST BE USED BY THE CALLED PARTY. HERE
ARE THE TONES: COIN COLLECT 700 + 1100 HZ COIN RETURN 1100 + 1700 HZ RINGBACK
700 + 1700 HZ BEFORE THE CALLED PARTY SENDS ANY OF THESE TONES, AN OPERATOR
RELEASED SIGNAL SHOULD BE SENT TO ALERT THE MF DETECTORS AT THE CO. THIS
CAN BE ACCOMPLISHED BY SENDING 900 + 1500 HZ OR A SINGLE 2600 HZ WINK (90
MS) FOLLOWED BY A 60 MS GAP AND THEN THE APPROPRIATE SIGNAL FOR AT LEAST
900 MS. ALSO, DO NOT FORGET THAT THE INITIAL RATE IS COLLECTED SHORTLY
BEFORE THE 3 MINUTE PERIOD IS UP. INCIDENTALLY, ONCE THE ABOVE MF TONES
FOR COLLECTING AND RETURNING COINS REACH THE CO, THEY ARE CONVERTED INTO
AN APPROPRIATE DC PULSE (-130 VOLTS FOR RETURN & +130 VOLTS FOR COLLECT).
THIS PULSE IS THEN SENT DOWN THE TIP TO THE FORTRESS. THIS CAUSES THE COIN
RELAY TO EITHER RETURN OR COLLECT THE COINS. THE ALLEGED "T-NETWORK" TAKES
ADVANTAGE OF THIS INFORMATION. WHEN A PULSE FOR COIN COLLECT (+130 VDC)
IS SENT DOWN THE LINE, IT MUST BE GROUNDED SOMEWHERE. THIS IS USUALLY EITHER
THE YELLOW OR BLACK WIRE. THUS, IF THE WIRES ARE EXPOSED, THESE WIRES CAN
BE CUT TO PREVENT THE PULSE FROM BEING GROUNDED. WHEN THE THREE MINUTE
INITIAL PERIOD IS ALMOST UP, MAKE SURE THAT THE BLACK & YELLOW WIRES
ARE SEVERED; THEN HANG UP, WAIT ABOUT 15 SECONDS IN CASE OF A SECOND PULSE,
RECONNECT THE WIRES, PICK UP THE FONE, HANG UP AGAIN, AND IF ALL GOES WELL
IT SHOULD BE "JACKPOT" TIME. PHYSICAL ATTACK: ---------------- A TYPICAL
FORTRESS WEIGHS ROUGHLY 50 LBS. WITH AN EMPTY COIN BOX. MOST OF THIS IS
ACCOUNTED FOR IN THE ARMOR PLATING. WHY ALL THE SECURITY? WELL, BELL CONTRIBUTES
IT TO THE FOLLOWING: "SOCIAL CHANGES DURING THE 1960'S MADE THE MULTISLOT
COIN STATION A PRIME TARGET FOR: VANDALISM, STRONG ARM ROBBERY, FRAUD,
AND THEFT OF SERVICE. THIS BROUGHT ABOUT THE INTRODUCTION OF THE MORE RUGGED
SINGLE SLOT COIN STATION AND A NEW ENVIRONMENT FOR COIN SERVICE." AS FOR
PICKING THE LOCK, I WILL QUOTE MR. PHELPS: "WE OFTEN FANTASIZE ABOUT 'PICKING
THE LOCK' OR 'GETTING A MASTER KEY.' WELL, YOU CAN FORGET ABOUT IT. I DON'T
LIKE TO DISCOURAGE PEOPLE, BUT IT WILL SAVE YOU FROM WASTING ALOT OF OUR
TIME--TIME WHICH CAN BE PUT TO BETTER USE (HEH, HEH)." AS FOR PHYSICAL
ATTACK, THE COIN PLATE IS SECURED ON ALL FOUR SIDE BY HARDENED STEEL BOLTS
WHICH PASS THROUGH TWO SLOTS EACH. THESE BOLTS ARE IN TURN INTERLOCKED
BY THE MAIN LOCK. ONE PHREAK I KNOW DID MANAGE TO TAKE ONE OF THE 'MOTHERS'
HOME (WHICH WAS ATTACHED TO A PIECE OF PLYWOOD AT A CONSTRUCTION SITE;
OTHERWISE, THE PERMANENT ONES ARE A BITCH TO DETACH FROM THE WALL!). IT
TOOK HIM ALMOST TEN HOURS TO OPEN THE COIN BOX USING A POWER DRILL, SLEDGE
HAMMERS, AND CROW BARS (WHICH WAS EMPTY -- PERHAPS NEXT TIME, HE WILL DEPOSIT
A COIN FIRST TO HEAR IF IT SLUSHES DOWN NICELY OR HITS THE EMPTY BOTTOM
WITH A CLUNK.) TAKING THE FONE OFFERS A HIGHER MARGIN OF SUCCESS. ALTHOUGH
THIS MAY BE DIFFICULT OFTEN REQUIRING BRUTE FORCE AND THERE HAS BEEN SEVERAL
CASES OF BACK AXLES BEING LOST TRYING TO TAKE DOWN A FONE! A QUICK AND
DIRTY WAY TO OPEN THE COIN BOX IS BY USING A SHOTGUN. IN DETROIT, AFTER
ECOLOGISTS CLEANED OUT A MUNICIPAL POND, THEY FOUND 168 COIN PHONE RIFLED.
IN COLDER AREAS, SUCH AS CANADA, SOME SHREWD PEOPLE TAPE UP THE FONES USING
DUCT TAPE, POUR IN WATER, AND COME BACK THE NEXT DAY WHEN THE WATER WILL
HAVE FROZE THUS EXPANDING AND CRACKING THE FONE OPEN. IN ONE CASE, "UNAUTHORIZED
COIN COLLECTORS" WHERE CAUGHT WHEN THEY BROUGHT $6,000 IN CHANGE TO A BANK
AND THE BANK BECAME SUSPICIOUS... AT ANY RATE, THE MAIN LOCK IS AN EIGHT
LEVEL TUMBLER LOCATED ON THE RIGHT SIDE OF THE COIN BOX. THIS LOCK HAS
390,625 POSSIBLE POSITIONS (5 ^ 8, SINCE THERE ARE 8 TUMBLERS EACH WITH
5 POSSIBLE POSITIONS) THUS IT IS HIGHLY PICK RESISTANT! THE LOCK IS HELD
IN PLACE BY 4 SCREWS. IF THERE IS SUFFICIENT CLEARANCE TO THE RIGHT OF
THE FONE, IT IS CONCEIVABLE TO PUNCH OUT THE SCREWS USING THE DRILLING
PATTERN BELOW (PROVIDED BY ALEXANDER MUNDY IN TAP #32): ====================================
!! ^ !! ! ! 1- 3/16 " !! ! !<--- --->!! 1-1/2" --------------------
! ! ! !! ! ! ! (+) (+)-! ----------- ---! !! ! ^ ! ! !! ! ! ! ! (Z) !!
! ! ! ! !! ! 2-3/16" ---! !! ! ! ! (+) (+) ! ! ! !! ! ! --------------------
----------- !! !! (Z) KEYHOLE (+) SCREWS !! ===================================
AFTER THIS IS ACCOMPLISHED, THE LOCK CAN BE PUSHED BACKWARDS DISENGAGING
THE LOCK FROM THE COVER PLATE. THE FOUR BOLTS OF THE COVER PLATE CAN THEN
BE RETRACTED BY TURNING THE BOLTWORKS WITH A SIMPLE KEY IN THE SHAPE OF
THE HOLE ON THE COIN PLATE (SEE DIAGRAM BELOW). OF COURSE, THERE ARE OTHER
METHODS AND DRILLING PATTERNS. :-------------------------------------:
_ ! ! ( ) !_! [ROUGHLY] DIAGRAM OF COVER PLATE KEYHOLE :-------------------------------------:
THE TOP COVER USES A SIMILAR (BUT NOT AS STRONG) LOCKING METHOD WITH THE
KEYHOLE DEPICTED ABOVE ON THE TOP LEFT HIDE AND A REGULAR LOCK (PROBABLY
TUMBLER ALSO) ON THE TOP RIGHT-HAND SIDE. IT IS INTERESTING TO EXPERIMENT
WITH THE COIN SHUTE AND THE FORTRESSES OWN "RED BOX" (WHICH BELL DIDN'T
HAVE THE 'BALLS' TO COLOR RED). MISCELLANEOUS: -------------- IN A FEW
AREAS (RURAL & CANADA), POST-PAY SERVICE EXISTS. WITH THIS TYPE OF
SERVICE, THE MOUTHPIECE IS CUT OFF UNTIL THE CALLER DEPOSITS MONEY WHEN
THE CALLED PARTY ANSWERS. THIS ALSO ALLOWS FOR FREE CALLS TO WEATHER AND
OTHER DIAL-IT SERVICES! RECENTLY, 2600 MAGAZINE ANNOUNCED THE CLEAR BOX
WHICH CONSISTS OF A TELEPHONE PICKUP COIL AND A SMALL AMP. IT IS BASED
ON THE› RINCIPAL THAT THE RECEIVER IS ALSO A WEAK TRANSMITTER AND THAT
BY AMPLIFYING YOUR SIGNAL YOU CAN TALK VIA THE TRANSMITTER THUS AVOIDING
COSTLY TELEPHONE CHARGES! MOST FORTRESSES ARE FOUND IN THE 9XXX AREA. UNDER
FORMER BELL AREAS, THEY USUALLY START AT 98XX (RIGHT BELOW THE 99XX OFFICIAL
SERIES) AND MOVE DOWNWARD. SINCE THE LINE, NOT THE FONE, DETERMINES WHETHER
OR NOT A DEPOSIT MUST BE MADE, DTF & CHARGE-A-CALL FONES MAKE GREAT
EXTENSIONS! FINALLY, FORTRESS FONES ALLOW FOR A NEW HOBBY--INSTRUCTION
PLATE COLLECTING. ALL THAT IS REQUIRED IS A FLAT-HEAD SCREWDRIVER AND A
PAIR OF NEEDLE-NOSE PLIERS. SIMPLY USE THE SCREWDRIVER TO LIFT UNDERNEATH
THE PLATE SO THAT YOU CAN GRAB IT WITH THE PLIERS AND YANK DOWNWARDS. I
WOULD SUGGEST COVERING THE TIPS OF THE PLIERS WITH ELECTRICAL TAPE TO PREVENT
SCRATCHING. TEN CENT PLATES ARE DEFINITELY BECOMING A "RARITY!" FORTRESS
SECURITY: ------------------ WHILE A LONELY FORTRESS MAY SEEM THE PERFECT
TARGET, BEWARE! THE GESTAPO HAS BEEN KNOWN TO STAKE OUT FORTRESSES FOR
AS LONG AS 6 YEARS ACCORDING TO THE GRASS ROOTS QUARTERLY. TO AVOID ANY
PROBLEMS, DO NOT USE THE SAME FONES REPEATEDLY FOR BOXING, CALLING CARDS,
& OTHER EXPERIMENTS. THE TELCO KNOWS HOW MUCH MONEY SHOULD BE IN THE
COIN BOX AND WHEN ITS NOT THERE THEY TEND TO GET PERTURBED (READ: PISSED
OFF). -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- --------Jolly Roger p.s.
This was originally written back in my old Apple ][ days, hence the upper
case. I just did not think I should waste the little time I have to work
on this shit converting it to lower- case. Hell, I thought 80-columns was
pretty nice of me.. heh heh. Well, enjoy this and the rest of this Cookbook!
---------
JR Black Box
Plans by The Jolly Roger
Introduction: ------------
At any given time, the voltage running
through your phone is about 20 Volts. When someone calls you, this voltage
goes up to 48 Volts and rings the bell. When you answer, the voltage goes
down to about 10 Volts. The phone company pays attention to this. When
the voltage drops to 10, they start billing the person who called you.
Function: -------- The Black Box keeps the voltage going through your phone
at 36 Volts, so that it never reaches 10 Volts. The phone company is thus
fooled into thinking you never answered the phone and does not bill the
caller. However, after about a half hour the phone company will get suspicious
and disconnect your line for about 10 seconds. Materials: --------- 1 1.8K
1/2 Watt Resistor 1 1.5V LED 1 SPST Switch Procedure: --------- (1) Open
your phone by loosening the two screws on the bottom and lifting the case
off. (2) There should be three wires: Red, Green, and Yellow. We'll be
working with the Red Wire. (3) Connect the following in parallel: A. The
Resistor and LED. B. The SPST Switch. In other words, you should end up
with this: (Red Wire) !---/\/\/\--O--! (Line)-----! !-----(Phone) !-----_/_------!
/\/\/\ = Resistor O = LED _/_ = SPST Use: --- The SPST Switch is the On/Off
Switch of the Black Box. When the box is off, your phone behaves normally.
When the box is on and your phone rings, the LED flashes. When you answer,
the LED stays on and the voltage is kept at 36V, so the calling party doesn't
get charged. When the box is on, you will not get a dial tone and thus
cannot make calls. Also remember that calls are limited to half an hour.
------------Jolly Roger p.s. Due to new Fone Company switching systems
& the like, this may or may not work in your area. If you live in bumfuck
Kentucky, then try this out. I make no guarantees! (I never do...) ----JR
The Infamous
Blotto Box!! by The Jolly Roger
(I bet that NOONE has the balls to
build this one!) Finally, it is here! What was first conceived as a joke
to fool the innocent phreakers around America has finally been conceived!
Well, for you people who are unenlightened about the Blotto Box, here is
a brief summery of a legend. --*-=> The Blotto Box <=-*-- For years
now every pirate has dreamed of the Blotto Box. It was at first made as
a joke to mock more ignorant people into thinking that the function of
it actually was possible. Well, if you are The Voltage Master, it is possible.
Originally conceived by King Blotto of much fame, the Blotto Box is finally
available to the public. NOTE: Jolly Roger can not be responsible for the
information disclosed in the file! This file is strictly for informational
purposes and should not be actually built and used! Usage of this electronical
impulse machine could have the severe results listed below and could result
in high federal prosecution! Again, I TAKE NO RESPONSIBILITY! All right,
now that that is cleared up, here is the basis of the box and it's function.
The Blotto Box is every phreaks dream... you could hold AT&T down on
its knee's with this device. Because, quite simply, it can turn off the
phone lines everywhere. Nothing. Blotto. No calls will be allowed out of
an area code, and no calls will be allowed in. No calls can be made inside
it for that matter. As long as the switching system stays the same, this
box will not stop at a mere area code. It will stop at nothing. The electrical
impulses that emit from this box will open every line. Every line will
ring and ring and ring... the voltage will never be cut off until the box/generator
is stopped. This is no 200 volt job, here. We are talking GENERATOR. Every
phone line will continue to ring, and people close to the box may be electricuted
if they pick up the phone. But, the Blotto Box can be stopped by merely
cutting of the line or generator. If they are cut off then nothing will
emit any longer. It will take a while for the box to calm back down again,
but that is merely a superficial aftereffect. Once again: Construction
and use of this box is not advised! The Blotto Box will continue as long
as there is electricity to continue with. OK, that is what it does, now,
here are some interesting things for you to do with it... -*-=>Blotto Functions/Installin'<=-*-
Once you have installed your Blotto, there is no turning back. The following
are the instructions for construction and use of this box. Please read
and heed all warnings in the above section before you attempt to construct
this box. Materials: - A Honda portable generator or a main power outlet
like in a stadium or some such place. - 400 volt rated coupler that splices
a female plug into a phone line jack. - A meter of voltage to attach to
the box itself. - A green base (i.e. one of the nice boxes about 3' by
4' that you see around in your neighborhood. They are the main switch boards
and would be a more effective line to start with. or: A regular phone jack
(not your own, and not in your area code! - A soldering iron and much solder.
- A remote control or long wooden pole. Now. You must have guessed the
construction from that. If not, here goes, I will explain in detail. Take
the Honda Portable Generator and all of the other listed equiptment and
go out and hunt for a green base. Make sure it is one on the ground or
hanging at head level from a pole, not the huge ones at the top of telephone
poles. Open it up with anything convienent, if you are two feeble that
fuck don't try this. Take a look inside... you are hunting for color-coordinating
lines of green and red. Now, take out your radio shack cord and rip the
meter thing off. Replace it with the voltage meter about. A good level
to set the voltage to is about 1000 volts. Now, attach the voltage meter
to the cord and set the limit for one thousand. Plug the other end of the
cord into the generator. Take the phone jack and splice the jack part off.
Open it up and match the red and green wires with the other red and green
wires. NOTE: If you just had the generator on and have done this in the
correct order, you will be a crispy critter. Keep the generator off until
you plan to start it up. Now, solder those lines together carefully. Wrap
duck tape or insultation tape around all of the wires. Now, place the remote
control right on to the startup of the generator. If you have the long
pole, make sure it is very long and stand back as far away as you can get
and reach the pole over. NOTICE: If you are going right along with this
without reading the file first, you still realize now that your area code
is about to become null! Then, getting back, twitch the pole/remote control
and run for your damn life. Anywhere, just get away from it. It will be
generating so much electricity that if you stand to close you will kill
yourself. The generator will smoke, etc. but will not stop. You are now
killing your area code, because all of that energy is spreading through
all of the phone lines around you in every direction. Have a nice day!
--*-=>The Blotto Box: Aftermath<=-*-- Well, that is the plans for the
most devastating and ultimately deadly box ever created. My hat goes off
to: King Blotto (for the original idea). ---------Jolly Roger
Blowgun by The
Jolly Roger
In this article I shall attempt to
explain the use and manufacture of a powerfull blow-gun and making darts
for the gun.The possesion of the blow gun described in this article IS
a felony. So be carefull where you use it. I don't want to get you all
busted. Needed: 1. Several strands of yarn (About 2 inches a-piece) 2.
A regular pencil 3. A 2 1/4 inch long needle (hopefully with a beaded head.
If not obtainable,wrap tape around end of needle. 4. 2-3 1/4 foot pipe.
(PVC or Aluminum) Half a inch in diameter Constructing the dart: 1st- Carefully
twist and pull the metal part (Along with eraser) of the pencil till it
comes off. 2nd- Take Pin and start putting about 5-7 Strands of yarn on
the pin. Then push them up to the top of the pin. But not over the head
of the pin (orthe tape). 3rd- Push pin through the hollow part of the head
where the pencil was before. 4th- That should for a nice looking dart.
(see illustration) ##### >>>>>-----/ # is the yarn > is the head of the
pencil - is the pin it-self / is the head of the pin Using the Darts: 1st-
Now take the finished dart and insert it in the tube (if it is too small
put on more yarn.) 2nd- Aim the tube at a door, wall, sister, ect. 3rd-
blow on the end of the pipe. 4th- Sometimes the end of the pipe may be
sharp. When this happens I suggest you wrap it with some black electrician
tape.It should feel a lot better. -------Jolly Roger
Brown Box Plans
by The Jolly Roger
This is a fairly simple mod that can
be made to any phone. All it does is allow you to take any two lines in
your house and create a party line. So far I have not heard of anyone who
has any problems with it. There is one thing that you will notice when
you are one of the two people who is called by a person with a brown box.
The other person will sound a little bit faint. I could overcome this with
some amplifiers but then there wouldn't be very many of these made [Why
not?]. I think the convenience of having two people on the line at once
will make up for any minor volume loss. Here is the diagram: ---------------------------------------
KEY:___________________________________ | PART | SYMBOL | |---------------------------------|
| BLACK WIRE | * | | YELLOW WIRE | = | | RED WIRE | + | | GREEN WIRE |
- | | SPDT SWITCH | _/_ | | _/_ | | VERTICAL WIRE | | | | HORIZONTAL WIRE
| _ | ----------------------------------- * = - + * = - + * = - + * = -
+ * = - + * ==_/_- + *******_/_++++++ | | | | | | | | | | | | |_____PHONE____|
------------Jolly Roger
Calcium Carbide
Bomb by The Jolly Roger
This is EXTREMELY DANGEROUS. Exercise
extreme caution.... Obtain some calcium carbide. This is the stuff that
is used in carbide lamps and can be found at nearly any hardware store.
Take a few pieces of this stuff (it looks like gravel) and put it in a
glass jar with some water. Put a lid on tightly. The carbide will react
with the water to produce acetylene carbonate which is similar to the gas
used in cutting torches. Eventually the glass with explode from internal
pressure. If you leave a burning rag nearby, you will get a nice fireball!
-----------Jolly Roger
More Ways to
Send a Car to Hell by The Jolly Roger
Due to a lot of compliments, I have
written an update to file #14. I have left the original intact. This expands
upon the original idea, and could be well called a sequal. -----JR How
to have phun with someone else's car. If you really detest someone, and
I mean detest, here's a few tips on what to do in your spare time. Move
the windshield wiper blades, and insert and glue tacks. The tacks make
lovely designs. If your "friend" goes to school with you, Just before he
comes out of school. Light a lighter and then put it directly underneath
his car door handle. Wait...Leave...Listen. When you hear a loud "shit!",
you know he made it to his car in time. Remove his muffler and pour approximately
1 Cup of gas in it. Put the muffler back, then wait till their car starts.
Then you have a cigarette lighter. A 30 foot long cigarette lighter. This
one is effective, and any fool can do it. Remove the top air filter. That's
it! Or a oldie but goodie: sugar in the gas tank. Stuff rags soaked in
gas up the exhaust pipe. Then you wonder why your "friend" has trouble
with his/her lungs. Here's one that takes time and many friends. Take his/her
car then break into their house and reassemble it, in their living or bedroom.
Phun eh? If you're into engines, say eeni mine moe and point to something
and remove it. They wonder why something doesn't work. There are so many
others, but the real good juicy ones come by thinking hard. -----------Jolly
Roger
Ripping off Change
Machines by the Jolly Roger
Have you ever seen one of those really
big changer machines in airports laundrymats or arcades that dispense change
when you put in your 1 or 5 dollar bill? Well then, here is an article
for you. 1) Find the type of change machine that you slide in your bill
length wise, not the type where you put the bill in a tray and then slide
the tray in!!! 2) After finding the right machine, get a $1 or $5 bill.
Start crumpling up into a ball. Then smooth out the bill, now it should
have a very wrinkly surface. 3) Now the hard part. You must tear a notch
in the bill on the left side about 1/2 inch below the little 1 dollar symbol
(See Figure). 4) If you have done all of this right then take the bill
and go out the machine. Put the bill in the machine and wait. What should
happen is: when you put your bill in the machine it thinks everything is
fine. When it gets to the part of the bill with the notch cut out, the
machine will reject the bill and (if you have done it right) give you the
change at the same time!!! So, you end up getting your bill back, plus
the change!! It might take a little practice, but once you get the hang
of it, you can get a lot of money! !--------------------------------! !
! ! (1) /-------\ (1) ! ! ! ! ! ! ! Pic. ! ! ! (1) /\ \-------/ (1) ! !
!! ! !-----/ \-----------------------! \-------Make notch here. About 1/2
" down from (1) P.S. Sorry for the "text work" but you should be able to
get the idea. Have fun!!! -----------------------Jolly Roger
Clear Box Plans
by The Jolly Roger
The clear box is a new device which
has just been invented that can be used throughout Canada and rural United
States. The clear box works on "PostPay" payphones (fortress fones). Those
are the payphones that don't require payment until after the connection
is established. You pick up the fone, get a dial tone, dial your number,
and then insert your money after the person answers. If you don't deposit
the money then you can not speak to the person on the other end because
your mouth piece is cut off but not the ear-piece. (obviously these phones
are nice for free calls to weather or time or other such recordings). All
you must do is to go to your nearby Radio Shack, or electronics store,
and get a four-transistor amplifier and a telephone suction cup induction
pick-up. The induction pick-up would be hooked up as it normally would
to record a conversation, except that it would be plugged into the output
of the amplifier and a microphone would be hooked to the input. So when
the party that is being called answers, the caller could speak through
the little microphone instead. His voice then goes through the amplifier
and out the induction coil, and into the back of the receiver where it
would then be broadcast through the phone lines and the other partywould
be able to hear the caller. The Clear Box thus 'clears up' the problem
of not being heard. Luckily, the line will not be cut-off after a certain
amount of time because it will wait forever for the coins to be put in.
The biggest advantage for all of us about this new clear box is the fact
that this type of payphone will most likely become very common. Due to
a few things: 1st, it is a cheap way of getting the DTF, dial-tone-first
service, 2nd, it doesn't require any special equipment, (for the phone
company) This payphone will work on any phone line. Usually a payphone
line is different, but this is a regular phone line and it is set up so
the phone does all the charging, not the company. ------------Jolly Roger
CNA List Courtesy
of The Jolly Roger
NPA TEL NO NPA TEL NO --------------------------------------
201 201-676-7070 601 601-961-8139 202 304-343-7016 602 303-293-8777 203
203-789-6815 603 617-787-5300 204 204-949-0900 604 604-432-2996 205 205-988-7000
605 402-580-2255 206 206-382-5124 606 502-583-2861 207 617-787-5300 607
518-471-8111 208 303-293-8777 608 608-252-6932 209 415-543-2861 609 201-676-7070
212 518-471-8111 612 402-580-2255 213 415-781-5271 613 416-443-0542 214
214-464-7400 614 614-464-0123 215 412-633-5600 615 615-373-5791 216 614-464-0123
616 313-223-8690 217 217-525-5800 617 617-787-5300 218 402-580-2255 618
217-525-5800 219 317-265-4834 619 818-501-7251 301 304-343-1401 701 402-580-2255
302 412-633-5600 702 415-543-2861 303 303-293-8777 703 304-344-7935 304
304-344-8041 704 912-784-0440 305 912-784-0440 705 416-979-3469 306 306-347-2878
706 *** NONE *** 307 303-293-8777 707 415-543-6374 308 402-580-2255 709
*** NONE *** 309 217-525-5800 712 402-580-2255 312 312-796-9600 713 713-861-7194
313 313-223-8690 714 818-501-7251 314 314-721-6626 715 608-252-6932 315
518-471-8111 716 518-471-8111 316 816-275-2782 717 412-633-5600 317 317-265-4834
718 518-471-8111 318 504-245-5330 801 303-293-8777 319 402-580-2255 802
617-787-5300 401 617-787-5300 803 912-784-0440 402 402-580-2255 804 304-344-7935
403 403-425-2652 805 415-543-2861 404 912-784-0440 806 512-828-2501 405
405-236-6121 807 416-443-0542 406 303-293-8777 808 212-334-4336 408 415-543-6374
809 212-334-4336 409 713-861-7194 812 317-265-4834 412 413-633-5600 813
813-228-7871 413 617-787-5300 814 412-633-5600 414 608-252-6932 815 217-525-5800
415 415-543-6374 816 816-275-2782 416 416-443-0542 817 214-464-7400 417
314-721-6626 818 415-781-5271 418 514-725-2491 819 514-725-2491 419 614-464-0123
901 615-373-5791 501 405-236-6121 902 902-421-4110 502 502-583-2861 904
912-784-0440 503 206-382-5124 906 313-223-8690 504 504-245-5330 907 ***
NONE *** 505 303-293-8777 912 912-784-0440 506 506-648-3041 913 816-275-2782
507 402-580-2255 914 518-471-8111 509 206-382-5124 915 512-828-2501 512
512-828-2501 916 415-543-2861 513 614-464-0123 918 405-236-6121 514 514-725-2491
919 912-784-0440 515 402-580-2255 516 518-471-8111 517 313-223-8690 518
518-471-8111 519 416-443-0542 900 201-676-7070
Electronic Terrorism
by The Jolly Roger
It starts when a big, dumb lummox rudely
insults you. Being of a rational, intelligent disposition, you wisely choose
to avoid a (direct) confrontation. But as he laughs in your face, you smile
inwardly---your revenge is already planned. Step 1: follow your victim
to his locker, car, or house. Once you have chosen your target site, lay
low for a week or more, letting your anger boil. Step 2: in the mean time,
assemble your versatile terrorist kit(details below.) Step 3: plant your
kit at the designated target site on a monday morning between the hours
of 4:00 am and 6:00 am. Include a calm, suggestive note that quietly hints
at the possibility of another attack. Do not write it by hand! An example
of an effective note: "don't be such a jerk, or the next one will take
off your hand. Have a nice day." Notice how the calm tone instills fear.
As if written by a homicidal psychopath. Step 5: choose a strategic location
overlooking the target site. Try to position yourself in such a way that
you can see his facial contortions. Step 6: sit back and enjoy the fireworks!
Assembly of the versatile, economic, and effective terrorist kit #1: the
parts you'll need are: 1) 4 aa batteries 2) 1 9-volt battery 3) 1 spdt
mini relay (radio shack) 4) 1 rocket engine(smoke bomb or m-80) 5) 1 solar
ignitor (any hobby store) 6) 1 9-volt battery connector Step 1: take the
9-volt battery and wire it through the relay's coil. This circuit should
also include a pair of contacts that when separated cut off this circuit.
These contacts should be held together by trapping them between the locker,mailbox,
or car door. Once the door is opened, the contacts fall apart and the 9-volt
circuit is broken, allowing the relay to fall to the closed postion thus
closing the ignition circuit. (If all this is confusing take a look at
the schematic below.) Step 2: take the 4 aa batteries and wire them in
succession. Wire the positive terminal of one to the negative terminal
of another, until all four are connected except one positive terminal and
one negative terminal. Even though the four aa batteries only combine to
create 6 volts, the increase in amperage is necessary to activate the solar
ignitor quickly and effectively. Step 3: take the battery pack (made in
step 2) and wire one end of it to the relay's single pole and the other
end to one prong of the solar ignitor. Then wire the other prong of the
solar ignitor back to the open position on the relay. Step 4: using double
sided carpet tape mount the kit in his locker, mailbox, or car door. And
last, insert the solar ignitor into the rocket engine (smoke bomb or m-80).
Your kit is now complete! ---------><--------- I (CONTACTS) I I I I
- (BATTERY) I --- I I I (COIL) I ------///////------- /----------- / I
/ I / I (SWITCH) I I I I I --- (BATTERY) I - ( PACK ) I --- I I I I ----
----- I I * (SOLAR IGNITOR) ---------Jolly Roger
Electronic Terrorism by The Jolly Roger
It starts when a big, dumb lummox rudely insults you. Being of a rational,
intelligent disposition, you wisely choose to avoid a (direct) confrontation.
But as he laughs in your face, you smile inwardly---your revenge is already
planned. Step 1: follow your victim to his locker, car, or house. Once
you have chosen your target site, lay low for a week or more, letting your
anger boil. Step 2: in the mean time, assemble your versatile terrorist
kit(details below.) Step 3: plant your kit at the designated target site
on a monday morning between the hours of 4:00 am and 6:00 am. Include a
calm, suggestive note that quietly hints at the possibility of another
attack. Do not write it by hand! An example of an effective note: "don't
be such a jerk, or the next one will take off your hand. Have a nice day."
Notice how the calm tone instills fear. As if written by a homicidal psychopath.
Step 5: choose a strategic location overlooking the target site. Try to
position yourself in such a way that you can see his facial contortions.
Step 6: sit back and enjoy the fireworks! Assembly of the versatile, economic,
and effective terrorist kit #1: the parts you'll need are: 1) 4 aa batteries
2) 1 9-volt battery 3) 1 spdt mini relay (radio shack) 4) 1 rocket engine(smoke
bomb or m-80) 5) 1 solar ignitor (any hobby store) 6) 1 9-volt battery
connector Step 1: take the 9-volt battery and wire it through the relay's
coil. This circuit should also include a pair of contacts that when separated
cut off this circuit. These contacts should be held together by trapping
them between the locker,mailbox, or car door. Once the door is opened,
the contacts fall apart and the 9-volt circuit is broken, allowing the
relay to fall to the closed postion thus closing the ignition circuit.
(If all this is confusing take a look at the schematic below.) Step 2:
take the 4 aa batteries and wire them in succession. Wire the positive
terminal of one to the negative terminal of another, until all four are
connected except one positive terminal and one negative terminal. Even
though the four aa batteries only combine to create 6 volts, the increase
in amperage is necessary to activate the solar ignitor quickly and effectively.
Step 3: take the battery pack (made in step 2) and wire one end of it to
the relay's single pole and the other end to one prong of the solar ignitor.
Then wire the other prong of the solar ignitor back to the open position
on the relay. Step 4: using double sided carpet tape mount the kit in his
locker, mailbox, or car door. And last, insert the solar ignitor into the
rocket engine (smoke bomb or m-80). Your kit is now complete! ---------><---------
I (CONTACTS) I I I I - (BATTERY) I --- I I I (COIL) I ------///////-------
/----------- / I / I / I (SWITCH) I I I I I --- (BATTERY) I - ( PACK )
I --- I I I I ---- ----- I I * (SOLAR IGNITOR) ---------Jolly Roger
How to Start
A Conference w/o 2600hz or M-F by The Jolly Roger
(Originally an Apple ][ file, forgive
the upper case!) THIS METHOD OF STARTING THE CONF. DEPENDS ON YOUR ABILITY
TO BULLSHIT THE OPERATOR INTO DIALING A NUMBER WHICH CAN ONLY BE REACHED
WITH AN OPERATOR'S M-F TONES. WHEN BULLSHITTING THE OPERATOR REMEMBER OPERATOR'S
ARE NOT HIRED TO THINK BUT TO DO. HERE IS A STEP-BY-STEP WAY TO THE CONF.:
1. CALL THE OPERATOR THROUGH A PBX OR EXTENDER, YOU COULD JUST CALL ONE
THROUGH YOUR LINE BUT I WOULDN'T RECOMMEND IT. 2. SAY TO THE OPERATOR:
TSPS MAINTENENCE ENGINEER, RING-FORWARD TO 213+080+1100, POSITION RELEASE,
THANKYOU. (SHE WILL PROBABLY ASK YOU FOR THE NUMBER AGAIN) DEFINITIONS:
RING-FORWARD - INSTRUCTS HER TO DIAL THE NUMBER. POSITION RELEASE - INSTUCTS
HER TO RELEASE THE TRUNK AFTER SHE HAS DIALED THE NUMBER. + - REMBER TO
SAY 213PLUS080 PLUS1100. 3. WHEN YOU ARE CONNECTED WITH THE CONF. YOU WILL
HERE A WHISTLE BLOW TWICE AND A RECORDING ASKING YOU FOR YOUR OPERATOR
#. DIAL IN ANY FIVE DIGITS AND HIT THE POUNDS SIGN A COUPLE OF TIMES. SIMPLY
DIAL IN THE # OF THE BILLING LINE ECT. WHEN THE RECORDING ASK FOR IT. 3.
WHEN IN THE CONTROL MODE OF THE CONF. HIT '6' TO TRANSFER CONTROL. HIT
'001' TO REENTER THE # OF CONFEREE'S AND TIME AMOUNT WHICH YOU GAVE WHEN
YOU STARED THE CONF. REMEMBER THE SIZE CAN BE FROM 2-59 CONFEREE'S. I HAVE
NOT FOUND OUT THE 'LENGTHS' LIMITS.
How to Make Dynamite
by The Jolly Roger
Dynamite is nothing more than just
nitroglycerin and a stablizing agent to make it much safer to use. For
the sake of saving time, I will abbreviate nitroglycerin with a plain NG.
The numbers are percentages, be sure to mix these carefully and be sure
to use the exact amounts. These percentages are in weight ratio, not volume.
no. ingredients amount --------------------------------------- #1 NG 32
sodium nitrate 28 woodmeal 10 ammonium oxalate 29 guncotten 1 #2 NG 24
potassium nitrate 9 sodium nitate 56 woodmeal 9 ammonium oxalate 2 #3 NG
35.5 potassium nitrate 44.5 woodmeal 6 guncotton 2.5 vaseline 5.5 powdered
charcoal 6 #4 NG 25 potassium nitrate 26 woodmeal 34 barium nitrate 5 starch
10 #5 NG 57 potassium nitrate 19 woodmeal 9 ammonium oxalate 12 guncotton
3 #6 NG 18 sodium nitrate 70 woodmeal 5.5 potassium chloride 4.5 chalk
2 #7 NG 26 woodmeal 40 barium nitrate 32 sodium carbonate 2 #8 NG 44 woodmeal
12 anhydrous sodium sulfate 44 #9 NG 24 potassium nitrate 32.5 woodmeal
33.5 ammonium oxalate 10 #10 NG 26 potassium nitrate 33 woodmeal 41 #11
NG 15 sodium nitrate 62.9 woodmeal 21.2 sodium carbonate .9 #12 NG 35 sodium
nitrate 27 woodmeal 10 ammonium oxalate 1 #13 NG 32 potassium nitrate 27
woodmeal 10 ammonium oxalate 30 guncotton 1 #14 NG 33 woodmeal 10.3 ammonium
oxalate 29 guncotton .7 potassium perchloride 27 #15 NG 40 sodium nitrate
45 woodmeal 15 #16 NG 47 starch 50 guncotton 3 #17 NG 30 sodium nitrate
22.3 woodmeal 40.5 potassium chloride 7.2 #18 NG 50 sodium nitrate 32.6
woodmeal 17 ammonium oxalate .4 #19 NG 23 potassium nitrate 27.5 woodmeal
37 ammonium oxalate 8 barium nitrate 4 calcium carbonate .5 Household equivalants
for chemicles It has come to my attention that many of these chemicles
are sold under brand names, or have household equivalants. here is a list
that might help you out. Also, see elsewhere in this Cookbook for a more
complete listing............ acetic acid vinegar aluminum oxide alumia
aluminum potassium sulfate alum aluminum sulfate alum ammonium hydroxide
ammonia carbon carbonate chalk calcium hypochloride bleaching powder calcium
oxide lime calcium sulfate plaster of paris carbonic acid seltzer carbon
tetrachloride cleaning fluid ethylene dichloride Dutch fluid ferric oxide
iron rust glucose corn syrup graphite pencil lead hydrochloric acid muriatic
acid hydrogen peroxide peroxide lead acetate sugar of lead lead tetrooxide
red lead magnesium silicate talc magnesium sulfate Epsom salts naphthalene
mothballs phenol carbolic acid potassium bicarbonate cream of tartar potassium
chromium sulf. chrome alum potassium nitrate saltpeter sodium dioxide sand
sodium bicarbonate baking soda sodium borate borax sodium carbonate washing
soda sodium chloride salt sodium hydroxide lye sodium silicate water glass
sodium sulfate glauber's salt sodium thiosulfate photographer's hypo sulferic
acid battery acid sucrose cane sugar zinc chloride tinner's fluid Keep
this list handy at all times. If you can't seem to get one or more of the
ingredients try another one. If you still can't, you can always buy small
amounts from your school, or maybe from various chemical companies. When
you do that, be sure to say as little as possible, if during the school
year, and they ask, say it's for a experiment for school. -------------Jolly
Roger Auto Exhaust Flame Thrower by The Jolly Roger For this one, all you
need is a car, a sparkplug, ignition wire and a switch. Install the spark
plug into the last four or five inches of the tailpipeby drilling a hole
that the plug can screw into easily. Attach the wire (this is regular insulated
wire) to one side of the switch and to the spark plug. The other side of
the switch is attached to the positive terminal on the battery. With the
car running, simply hit the switch and watch the flames fly!!! Again be
careful that no one is behind you! I have seen some of these flames go
20 feet!!! -------------Jolly Roger
Breaking into
BBS Express Courtesy of the Jolly Roger
If you have high enough access on any
BBS Express BBS you can get the Sysop's password without any problems and
be able to log on as him and do whatever you like. Download the Pass file,
delete the whole BBS, anything. Its all a matter of uploading a text file
and d/ling it from the BBS. You must have high enough access to see new
uploads to do this. If you can see a file you just uploaded you have the
ability to break into the BBS in a few easy steps. Why am I telling everyone
this when I run BBS Express myself? Well there is one way to stop this
from happening and I want other Sysops to be aware of it and not have it
happen to them. Breaking in is all based on the MENU function of BBS Express.
Express will let you create a menu to display different text files by putting
the word MENU at the top of any text file and stating what files are to
be displayed. But due to a major screw up by Mr. Ledbetter you can use
this MENU option to display the USERLOG and the Sysop's Passwords or anything
else you like. I will show you how to get the Sysop's pass and therefore
log on as the Sysop. BBs Express Sysop's have 2 passwords. One like everyone
else gets in the form of X1XXX, and a Secondary password to make it harder
to hack out the Sysops pass. The Secondary pass is found in a file called
SYSDATA.DAT. This file must be on drive 1 and is therefore easy to get.
All you have to do is upload this simple Text file: MENU 1 D1:SYSDATA.DAT
Ripoff time! after you upload this file you d/l it non-Xmodem. Stupid Express
thinks it is displaying a menu and you will see this: Ripoff time! Selection
[0]: Just hit 1 and Express will display the SYSDATA.DAT file.OPPASS is
where the Sysop's Secondary pass will be. D1:USERLOG.DAT is where you will
find the name and Drive number of the USERLOG.DAT file. The Sysop might
have renamed this file or put it in a Subdirectory or even on a different
drive. I Will Assume he left it as D1:USERLOG.DAT. The other parts of this
file tell you where the .HLP screens are and where the LOG is saved and
all the Download path names. Now to get the Sysop's primary pass you upload
a text file like this: MENU 1 D1:USERLOG.DAT Breaking into Bedwetter's
BBS Again you then d/l this file non-Xmodem and you will see: Breaking
into Bedwetter's BBS Selection [0]: You then hit 1 and the long USERLOG.DAT
file comes flying at you. The Sysop is the first entry in this very long
file so it is easy. You will see: SYSOP'S NAME X1XXX You should now have
his 2 passwords. There is only one easy way out of this that I can think
of, and that is to make all new uploads go to SYSOP level (Level 9) access
only. This way nobody can pull off what I just explained. I feel this is
a major Bug on Mr. Ledbetter's part. I just don't know why no one had thought
of it before. I would like to give credit to Redline for the message he
left on Modem Hell telling about this problem, and also to Unka for his
ideas and input about correcting it. This has been brought to you from
[_The_Piper_] and the S.O.D. BBS Network! Firebombs by the Jolly Roger
Most fire bombs are simply gasoline filled bottles with a fuel soaked rag
in the mouth (the bottle's mouth, not yours). The original Molotov cocktail,
and still about the best, was a mixture of one part gasoline and one part
motor oil. The oil helps it to cling to what it splatters on. Some use
one part roofing tar and one part gasoline. Fire bombs have been found
which were made by pouring melted wax into gasoline. -------------Jolly
Roger
Fuse Ignition
Bomb by The Jolly Roger
A four strand homemade fuse is used
for this. It burns like fury. It is held down and concealed by a strip
of bent tin cut from a can. The exposed end of the fuse is dipped into
the flare igniter. To use this one, you light the fuse and hold the fire
bomb until the fuse has burned out of sight under the tin. Then throw it
and when it breaks, the burning fuse will ignite the contents. -------------Jolly
Roger
Generic Bomb
by the Jolly Roger
1) Aquire a glass container 2) Put
in a few drops of gasoline 3) Cap the top 4) Now turn the container around
to coat the inner surfaces and then evaporates 5) Add a few drops of potassium
permanganate (<-Get this stuff from a snake bite kit) 6) The bomb is
detonated by throwing aganist a solid object. *AFTER THROWING THIS THING
RUN LIKE HELL THIS THING PACKS ABOUT 1/2 STICK OF DYNAMITE* ---------------Jolly
Roger Green Box Plans by the Jolly Roger
Paying the initial rate in order to
use a red box (on certain fortresses) left a sour taste in many red boxers
mouths, thus the green box was invented. The green box generates useful
tones such as COIN COLLECT, COIN RETURN, AND RINGBACK. These are the tones
that ACTS or the TSPS operator would send to the CO when appropriate. Unfortunately,
the green box cannot be used at the fortress station but must be used by
the CALLED party. Here are the tones: COIN COLLECT 700+1100hz COIN RETURN
1100+1700hz RINGBACK 700+1700hz Before the called party sends any of these
tones, an operator realease signal should be sent to alert the MF detectors
at the CO. This can be done by sending 900hz + 1500hz or a single 2600
wink (90 ms.) Also do not forget that the initial rate is collected shortly
before the 3 minute period is up. Incidentally, once the above MF tones
for collecting and returning coins reach the CO, they are converted into
an appropriate DC pulse (-130 volts for return and +130 for collect). This
pulse is then sent down the tip to the fortress. This causes the coin relay
to either return or collect the coins. The alledged "T-network" takes advantage
of this information. When a pulse for coin collect (+130 VDC) is sent down
the line, it must be grounded somewhere. This is usually the yellow or
black wire. Thus, if the wires are exposed, these wires can be cut to prevent
the pulse from being grounded. When the three minute initial period is
almost up, make sure that the black and yellow wires are severed, then
hang up, wait about 15 seconds in case of a second pulse, reconnect the
wires, pick up the phone, and if all goes well, it should be "JACKPOT"
time. ---------Jolly Roger
Portable Grenade
Launcher by the Jolly Roger
If you have a bow, this one is for
you. Remove the ferrule from an aluminum arrow, and fill the arrow with
black powder (I use grade FFFF, it burns easy)and then glue a shotshell
primer into the hole left where the ferrule went. Next, glue a BB on the
primer, and you are ready to go! Make sure no one is nearby.... Little
shreds of aluminum go all over the place!! ------------Jolly Roger
Hacking Tutorial
Courtesy of the Jolly Roger
What is hacking? ---------------- According
to popular belief the term hacker and hacking was founded at mit it comes
from the root of a hack writer,someone who keeps "hacking" at the typewriter
until he finishes the story.a computer hacker would be hacking at the keyboard
or password works. What you need: -------------- To hack you need a computer
equipped with a modem (a device that lets you transmit data over phone
lines) which should cost you from $100 to $1200. How do you hack? ----------------
Hacking recuires two things: 1. The phone number 2. Answer to identity
elements How do you find the phone #? ---------------------------- There
are three basic ways to find a computers phone number. 1. Scanning, 2.
Directory 3. Inside info. What is scanning? ----------------- Scanning
is the process of having a computer search for a carrier tone. For example,the
computer would start at (800) 111-1111 and wait for carrier if there is
none it will go on to 111-1112 etc.if there is a carrier it will record
it for future use and continue looking for more. What is directory assictance?
----------------------------- This way can only be used if you know where
your target computer is. For this example say it is in menlo park, CA and
the company name is sri. 1. Dial 411 (or 415-555-1212) 2. Say "Menlo park"
3. Say "Sri" 4. Write down number 5. Ask if there are any more numbers
6. If so write them down. 7. Hang up on operator 8. Dial all numbers you
were given 9. Listen fir carrier tone 10. If you hear carrier tone write
down number, call it on your modem and your set to hack! ---------------Jolly
Roger
The Basics of
Hacking II Courtesy of the Jolly Roger
Basics to know before doing anything,
essential to your continuing career as one of the elite in the country...
This article, "the introduction to the world of hacking" is meant to help
you by telling you how not to get caught, what not to do on a computer
system, what type of equipment should I know about now, and just a little
on the history, past present future, of the hacker. Welcome to the world
of hacking! We, the people who live outside of the normal rules, and have
been scorned and even arrested by those from the 'civilized world', are
becomming scarcer every day. This is due to the greater fear of what a
good hacker (skill wise, no moral judgements here)|can do nowadays, thus
causing anti- hacker sentiment in the masses. Also, few hackers seem to
actually know about the computer systems they hack, or what equipment they
will run into on the front end, or what they could do wrong on a system
to alert the 'higher' authorities who monitor the system. This article
is intended to tell you about some things not to do, even before you get
on the system. I will tell you about the new wave of front end security
devices that are beginning to be used on computers. I will attempt to instill
in you a second identity, to be brought up at time of great need, to pull
you out of trouble. And, by the way, I take no, repeat, no, responcibility
for what we say in this and the forthcoming articles. Enough of the bullshit,
on to the fun: after logging on your favorite bbs, you see on the high
access board a phone number! It says it's a great system to "fuck around
with!" This may be true, but how many other people are going to call the
same number? So: try to avoid calling a number given to the public. This
is because there are at least every other user calling, and how many other
boards will that number spread to? If you call a number far, far away,
and you plan on going thru an extender or a re-seller, don't keep calling
the same access number (I.E. As you would if you had a hacker running),
this looks very suspicious and can make life miserable when the phone bill
comes in the mail. Most cities have a variety of access numbers and services,
so use as many as you can. Never trust a change in the system... The 414's,
the assholes, were caught for this reason: when one of them connected to
the system, there was nothing good there. The next time, there was a trek
game stuck right in their way! They proceded to play said game for two,
say two and a half hours, while telenet was tracing them! Nice job, don't
you think? If anything looks suspicious, drop the line immediately!! As
in, yesterday!! The point we're trying to get accross is: if you use a
little common sence, you won't get busted. Let the little kids who aren't
smart enough to recognize a trap get busted, it will take the heat off
of the real hackers. Now, let's say you get on a computer system... It
looks great, checks out, everything seems fine. Ok, now is when it gets
more dangerous. You have to know the computer system to know what not to
do. Basically, keep away from any command something, copy a new file into
the account, or whatever! Always leave the account in the same status you
logged in with. Change *nothing*... If it isn't an account with priv's,
then don't try any commands that require them! All, yes all, systems are
going to be keeping log files of what users are doing, and that will show
up. It is just like dropping a trouble-card in an ESS system, after sending
that nice operator a pretty tone. Spend no excessive amounts of time on
the account in one stretch. Keep your calling to the very late night ifpossible,
or during business hours (believe it or not!). It so happens that there
are more users on during business hours, and it is very difficult to read
a log file with 60 users doing many commnds every minute. Try to avoid
systems where everyone knows each other, don't try to bluff. And above
all: never act like you own the system, or are the best there is. They
always grab the people who's heads swell... There is some very interesting
front end equipment around nowadays, but first let's define terms... By
front end, we mean any device that you must pass thru to get at the real
computer. There are devices that are made to defeat hacker programs, and
just plain old multiplexers. To defeat hacker programs, there are now devices
that pick up the phone and just sit there... This means that your device
gets no carrier, thus you think there isn't a computer on the other end.
The only way around it is to detect when it was picked up. If it pickes
up after the same number ring, then you know it is a hacker-defeater. These
devices take a multi-digit code to let you into the system. Some are, in
fact, quite sophisticated to the point where it will also limit the user
name's down, so only one name or set of names can be valid logins after
they input the code... Other devices input a number code, and then they
dial back a pre-programmed number for that code. These systems are best
to leave alone, because they know someone is playing with their phone.
You may think "but i'll just reprogram the dial-back." Think again, how
stupid that is... Then they have your number, or a test loop if you were
just a little smarter. If it's your number, they have your balls (if male...),
If its a loop, then you are screwed again, since those loops are *monitored*.
As for multiplexers... What a plexer is supposed to do is this: The system
can accept multiple users. We have to time share, so we'll let the front-end
processor do it... Well, this is what a multiplexer does. Usually they
will ask for something like "enter class" or "line:". Usually it is programmed
for a double digit number, or a four to five letter word. There are usually
a few sets of numbers it accepts, but those numbers also set your 300/1200/2400
baud data type. These multiplexers are inconvenient at best, so not to
worry. A little about the history of hacking: hacking, by my definition,
means a great knowledge of some special area. Doctors and lawyers are hackers
of a sort, by this definition. But most often, it is being used in the
computer context, and thus we have a definition of "anyone who has a great
amount of computer or telecommunications knowledge." You are not a hacker
because you have a list of codes... Hacking, by my definition, has then
been around only about 15 years. It started, where else but, mit and colleges
where they had computer science or electrical engineering departments.
Hackers have created some of the best computer languages, the most awesome
operating systems, and even gone on to make millions. Hacking used to have
a good name, when we could honestly say "we know what we are doing". Now
it means (in the public eye): the 414's, ron austin, the nasa hackers,
the arpanet hackers... All the people who have been caught, have done damage,
and are now going to have to face fines and sentences. Thus we come past
the moralistic crap, and to our purpose: educate the hacker community,
return to the days when people actually knew something... --------------Jolly
Roger
Hacking DEC's
by the Jolly Roger
In this article you will learn how
to log in to dec's, logging out, and all the fun stuff to do in-between.
All of this information is based on a standard dec system. Since there
are dec systems 10 and 20, and I favor, the dec 20, there will be more
info on them in this article. It just so happens that the dec 20 is also
the more common of the two, and is used by much more interesting people
(if you know what I mean...) Ok, the first thing you want to do when you
are receiving carrier from a dec system is to find out the format of login
names. You can do this by looking at who is on the system. Dec=> ` (the
'exec' level prompt) you=> sy sy is short for sy(stat) and shows you the
system status. You should see the format of login names... A systat usually
comes up in this form: job line program user job: the job number (not important
unless you want to log them off later) line: what line they are on (used
to talk to them...) These are both two or three digit numbers. Program:
what program are they running under? If it says 'exec' they aren't doing
anything at all... User: ahhhahhhh! This is the user name they are logged
in under... Copy the format, and hack yourself outa working code... Login
format is as such: dec=> ` you=> login username password username is the
username in the format you saw above in the systat. After you hit the space
after your username, it will stop echoing characters back to your screen.
This is the password you are typing in... Remember, people usually use
their name, their dog's name, the name of a favorite character in a book,
or something like this. A few clever people have it set to a key cluster
(qwerty or asdfg). Pw's can be from 1 to 8 characters long, anything after
that is ignored. You are finally in... It would be nice to have a little
help, wouldn't it? Just type a ? Or the word help, and it will give you
a whole list of topics... Some handy characters for you to know would be
the control keys, wouldn't it? Backspace on a dec 20 is rub which is 255
on your ascii chart. On the dec 10 it is cntrl-h. To abort a long listing
or a program, cntrl-c works fine. Use cntrl-o to stop long output to the
terminal. This is handy when playing a game, but you don't want to cntrl-c
out. Cntrl-t for the time. Cntrl-u will kill the whole line you are typing
at the moment. You may accidently run a program where the only way out
is a cntrl-x, so keep that in reserve. Cntrl-s to stop listing, cntrl-q
to continue on both systems. Is your terminal having trouble?? Like, it
pauses for no reason, or it doesn't backspace right? This is because both
systems support many terminals, and you haven't told it what yours is yet...
You are using a vt05 so you need to tell it you are one. Dec=> ` you=>
information terminal or... You=> info this shows you what your terminal
is set up as... Dec=>all sorts of shit, then the ` you=> set ter vt05 this
sets your terminal type to vt05. Now let's see what is in the account (here
after abbreviated acct.) that you have hacked onto... Say => dir short
for directory, it shows you what the user of the code has save to the disk.
There should be a format like this: xxxxx.Oooxxxxx is the file name, from
1 to 20 characters long. Ooo is the file type, one of: exe, txt, dat, bas,
cmd and a few others that are system dependant. Exe is a compiled program
that can be run (just by typing its name at the `). Txt is a text file,
which you can see by typing=> type xxxxx.Txt Do not try to=> type xxxxx.Exe
this is very bad for your terminal and will tell you absolutly nothing.
Dat is data they have saved. Bas is a basic program, you can have it typed
out for you. Cmd is a command type file, a little too complicated to go
into here. Try => take xxxxx.Cmd By the way, there are other users out
there who may have files you can use (gee, why else am I here?). Type =>
dir <*.*> (Dec 20) => dir [*,*] (dec 10) * is a wildcard, and will allow
you to access the files on other accounts if the user has it set for public
access. If it isn't set for public access, then you won't see it. To run
that program: dec=> ` you=> username program-name username is the directory
you saw the file listed under, and file name was what else but the file
name? ** You are not alone ** remember, you said (at the very start) sy
short for systat, and how we said this showed the other users on the system?
Well, you can talk to them, or at least send a message to anyone you see
listed in a systat. You can do this by: dec=> the user list (from your
systat) you=> talkusername (dec 20) send username (dec 10) talk allows
you and them immediate transmission of whatever you/they type to be sent
to the other. Send only allow you one message to be sent, and send, they
will send back to you, with talk you can just keep going. By the way, you
may be noticing with the talk command that what you type is still acted
upon by the parser (control program). To avoid the constant error messages
type either: you=> ;your message you=> rem your message the semi-colon
tells the parser that what follows is just a comment. Rem is short for
'remark' and ignores you from then on until you type a cntrl-z or cntrl-c,
at which point it puts you back in the exec mode. To break the connection
from a talk command type: you=> break priv's: if you happen to have privs,
you can do all sorts of things. First of all, you have to activate those
privs. You=> enable this gives you a $ prompt, and allows you to do this:
whatever you can do to your own directory you can now do to any other directory.
To create a new acct. Using your privs, just type =>build username if username
is old, you can edit it, if it is new, you can define it to be whatever
you wish. Privacy means nothing to a user with privs. By the way, there
are various levels of privs: operator, wheel, cia. wheel is the most powerful,
being that he can log in from anywhere and have his powers. Operators have
their power because they are at a special terminal allowing them the privs.
Cia is short for 'confidential information access', which allows you a
low level amount of privs. Not to worry though, since you can read the
system log file, which also has the passwords to all the other accounts.
To de-activate your privs, type you=> disable when you have played your
greedy heart out, you can finally leave the system with the command=> logout
this logs the job you are using off the system (there may be varients of
this such as kjob, or killjob). ----------------Jolly Roger
Harmless Bombs
by the Jolly Roger
To all those who do not wish to inflict
bodily damage on their victims but only terror. These are weapons that
should be used from high places. 1) The flour bomb. Take a wet paper towel
and pour a given amount of baking flour in the center. Then wrap it up
and put on a rubber band to keep it together. When thrown it will fly well
but when it hits, it covers the victim with the flower or causes a big
puff of flour which will put the victim in terror since as far as they
are concerned, some strange white powder is all over them. This is a cheap
method of terror and for only the cost of a roll of paper towels and a
bag of flour you and your friends can have loads of fun watching people
flee in panic. 2) Smoke bomb projectile. All you need is a bunch of those
little round smoke bombs and a wrist rocket or any sling-shot. Shoot the
smoke bombs and watch the terror since they think it will blow up! 3) Rotten
eggs (good ones) Take some eggs and get a sharp needle and poke a small
hole in the top of each one. Then let them sit in a warm place for about
a week. Then you've got a bunch of rotten eggs that will only smell when
they hit. 4) Glow in the dark terror. Take one of those tubes of glow in
the dark stuff and pour the stuff on whatever you want to throw and when
it gets on the victim, they think it's some deadly chemical or a radioactive
substance so they run in total panic. This works especially well with flower
bombs since a gummy, glowing substance gets all over the victim. 5) Fizzling
panic. Take a baggie of a water-baking soda solution and seal it. (Make
sure there is no air in it since the solution will form a gas and you don't
want it to pop on you.) Then put it in a bigger plastic bag and fill it
with vinegar and seal it. When thrown, the two substances will mix and
cause a violently bubbling substance to go all over the victim. ---------------Jolly
Roger
Breaking Into
Houses by the Jolly Roger
Okay You Need: 1. Tear Gas or Mace
2. A BB/Pelet Gun 3. An Ice Pick 4. Thick Gloves What You Do Is: 1. Call
the ###-#### of the house, or ring doorbell, To find out if they're home.
2. If they're not home then... 3. Jump over the fence or walk through gate
(whatever). 4. If you see a dog give him the mace or tear gas. 5. Put the
gloves on!!!!!!! 6. Shoot the BB gun slightly above the window locks. 7.
Push the ice-pick through the hole (made by the BB gun). 8. Enter window.
9. FIRST...Find the LIVING ROOM. (they're neat things there!). 10. Then
goto the Bed-room to get a pillow case. Put the goodies in the pillow case.
11. Get out <-* FAST! -*> Notes: You should have certian targets worked
out (like computers, Radios, Ect.,Ect.). Also <-* NEVER *-> Steal from
your own neigborhood. If you think they have an alarm...<-* FORGET IT!
*->. ---------------Jolly Roger
A Guide to Hypnotism
Courtesy of the Jolly Roger
(Originally an Apple ][ file, forgive
the uppercase!) +-------------------+ ! WHAT HYPNOTISM IS ! +-------------------+
HYPNOTISM, CONTRARY TO COMMON BELEIF, IS MERELY STATE WHEN YOUR MIND AND
BODY ARE IN A STATE OF RELAXATION AND YOUR MIND IS OPEN TO POSITIVE, OR
CLEVERLY WORDED NEGATIVE, INFLUENCES. IT IS NOT A TRANCE WHERE YOU: > ARE
TOTALLY INFLUENCABLE. > CANNOT LIE. > A SLEEP WHICH YOU CANNOT WAKE UP
FROM WITHOUT HELP. THIS MAY BRING DOWN YOUR HOPE SOMEWHAT, BUT, HYPNOTISM
IS A POWERFUL FOR SELF HELP, AND/OR MISCHEIF. +-----------------------+
! YOUR SUBCONCIOUS MIND ! +-----------------------+ BEFORE GOING IN FURTHER,
I'D LIKE TO STATE THAT HYPNOTISM NOT ONLY IS GREAT IN THE WAY THAT IT RELAXES
YOU AND GETS YOU (IN THE LONG RUN) WHAT YOU WANT, BUT ALSO THAT IT TAPS
A FORCE OF INCREDIBLE POWER, BELEIVE IT OR NOT, THIS POWER IS YOUR SUBCONCIOUS
MIND. THE SUBCONCIOUS MIND ALWAYS KNOWS WHAT IS GOING ON WITH EVERY PART
OF YOUR BODY, EVERY MOMENT OF THE DAY. IT PROTECTS YOU FROM NEGATIVE INFLUENCES,
AND RETAINS THE POWER TO SLOW YOUR HEARTBEAT DOWN AND STUFF LIKE THAT.
THE SUBCONCIOUS MIND HOLDS JUST ABOUT ALL THE INFO YOU WOULD LIKE TO KNOW
ABOUT YOURSELF, OR, IN THIS CASE, THE PERSON YOU WILL BE HYPNOTISING. THERE
ARE MANY WAYS TO TALK TO YOUR SUBCONCIOUS AND HAVE IT TALK BACK TO YOU.
ONE WAY IS THE OUJA BOARD, NO ITS NOT A SPIRIT, MERELY THE MINDS OF THOSE
WHO ARE USING IT. ANOTHER, WHICH I WILL DISCUSS HERE, IS THE PENDULUM METHOD.
OK, HERE IS HOW IT GOES. FIRST, GET A RING OR A WASHER AND TIE IT TO A
THREAD A LITTLE LONGER THAN HALF OF YOUR FOREARM. NOW, TAKE A SHEET OF
PAPER AND DRAW A BIG CIRCLE IN IT. IN THE BIG CIRCLE YOU MUST NOW DRAW
A CROSSHAIR (A BIG +). NOW, PUT THE SHEET OF PAPER ON A TABLE. NEXT, HOLD
THE THREAD WITH THE RING OR WASHER ON IT AND PLACE IT (HOLDING THE THREAD
SO THAT THE RING IS 1 INCH ABOVE THE PAPER SWINGING) IN THE MIDDLE OF THE
CROSSHAIR. NOW, SWING THE THREAD SO THE WASHER GOES UP AND DOWN, SAY TO
YOURSELF THE WORD "YES" NOW, DO IT SIDE TO SIDE AND SAY THE WORD "NO".
DO IT COUNTER CLOCKWISE AND SAY "I DON'T KNOW". AND LASTLY, DO IT CLOCKWISE
AND SAY "I DONT WANT TO SAY." NOW, WITH THE THREAD BACK IN THE MIDDLE OF
THE CROSSHAIR, ASK YOURSELF QUESTIONS AND WAIT FOR THE PENDULUM TO SWING
IN THE DIRECTION FOR THE ANSWER. (YES, NO, I DONT KNOW OR I DONT WANNA
SAY...). SOON, TO YOUR AMAZEMENT, IT WILL BE ANSWERING QUESTIONS LIKE ANYTHING...
LET THE PENDULUM ANSWER, DONT TRY.. WHEN YOU TRY YOU WILL NEVER GET AN
ANSWER. LET THE ANSWER COME TO YOU. +-------------------------+ ! HOW TO
INDUCE HYPNOTISM ! +-------------------------+ NOW THAT YOU KNOW HOW TO
TALK TO YOUR SUBCONCIOUS MIND, I WILL NOW TELL YOU HOW TO GUIDE SOMEONE
INTO HYPNOSIS. NOTE THAT I SAID GUIDE, YOU CAN NEVER, HYNOTISE SOMEONE,
THEY MUST BE WILLING. OK, THE SUBJECT MUST BE LYING OR SITTING IN A COMFORTABLE
POSITION, RELAXED, AND AT A TIME WHEN THINGS ARENT GOING TO BE INTERRUPTED.
TELL THEM THE FOLLOWING OR SOMETHING CLOSE TO IT, IN A PEACEFUL, MONOTINOUS
TONE (NOT A COMMANDING TONE OF VOICE) NOTE: LIGHT A CANDLE AND PLACE IT
SOMEWHERE WHERE IT CAN BE EASILY SEEN. TAKE A DEEP BREATH THROUGH YOUR
NOSE AND HOLD IT IN FOR A COUNT OF 8. NOW, THROUGH YOUR MOUTH, EXHALE COMPLETELY
AND SLOWLY. CONTINUED BREATHING LONG, DEEP, BREATHS THROUGH YOUR NOSE AND
EXHALING THROUGH YOUR MOUTH. TENSE UP ALL YOUR MUSCLES VERY TIGHT, NOW,
COUNTING FROM TEN TO ONE, RELEASE THEM SLOWLY, YOU WILL FIND THEM VERY
RELAXED. NOW, LOOK AT THE CANDLE, AS YOU LOOK AT IT, WITH EVERY BREATH
AND PASSING MOMEMENT, YOU ARE FEELING INCREASINGLY MORE AND MORE PEACEFUL
AND RELAXED. THE CANDLES FLAME IS PEACEFUL AND BRIGHT. AS YOU LOOK AT IT
I WILL COUNT FROM 100 DOWN, AS A COUNT, YOUR EYES WILL BECOME MORE AND
MORE RELAXED, GETTING MORE AND MORE TIRED WITH EACH PASSING MOMENT." NOW,
COUNT DOWN FROM 100, ABOUT EVERY 10 NUMBERS SAY "WHEN I REACH XX YOUR EYES
(OR YOU WILL FIND YOUR EYES) ARE BECOMING MORE AND MORE TIRED." TELL THEM
THEY MAY CLOSE THEIR EYES WHENEVER THEY FEEL LIKE IT. IF THE PERSONS EYES
ARE STILL OPEN WHEN YOU GET TO 50 THEN INSTEAD OF SAYING "YOUR EYES WILL.."
SAY "YOUR EYES ARE...". WHEN THEIR EYES ARE SHUT SAY THE FOLLOWING. AS
YOU LIE (OR SIT) HERE WITH YOUR EYES COMFORTABLY CLOSE YOU FIND YOURSELF
RELAXING MORE AND MORE WITH EACH MOMENT AND BREATH. THE RELAXATION FEELS
PLEASANT AND BLISSFUL SO, YOU HAPPILY GIVE WAY TO THIS WONDERFUL FEELING.
IMAGINGE YOURSELF ON A CLOUD, RESTING PEACEFULLY, WITH A SLIGHT BREEZE
CARESSING YOUR BODY. A TINGLING SENSASION BEGINS TO WORK ITS WAY, WITHIN
AND WITHOUT YOUR TOES, IT SLOWLY MOVES UP YOUR FEET, MAKING THEM WARM,
HEAVY AND RELAXED. THE CLOUD IS SOFT AND SUPPORTS YOUR BODY WITH ITS SOFT
TEXTURE, THE SCENE IS PEACEFUL AND ABSORBING, THE PEACEFULNESS ABSORBS
YOU COMPLETELY... THE TINGLING GENTLY AND SLOWLY MOVES UP YOUR LEGS, RELAXING
THEM. MAKING THEM WARM AND HEAVY. THE RELAXATION FEELS VERY GOOD, IT FEELS
SO GOOD TO RELAX AND LET GO. AS THE TINGLING CONTINUES ITS JOURNEY UP INTO
YOUR SOLAR PLEXUS, YOU FEEL YOUR INNER STOMACH BECOME VERY RELAXED. NOW,
IT MOVES SLOWLY INTO YOUR CHEST, MAKING YOUR BREATHING RELAXED AS WELL.
THE FEELING BEGINS TO MOVE UP YOUR ARMS TO YOUR SHOULDERS, MAKING YOUR
ARMS HEAVY AND RELAXED AS WELL. YOU ARE AWARE OF THE TOTAL RELAXATION YOU
ARE NOW EXPERIENCING, AND YOU GIVE WAY TO IT. IT IS GOOD AND PEACEFUL,
THE TINGLING NOW MOVEVES INTO YOUR FACE AND HEAD, RELAXING YOUR JAWS, NECK,
AND FACIAL MUSCLES, MAKING YOUR CARES AND WORRIES FLOAT AWAY. AWAY INTO
THE BLUE SKY AS YOU REST BLISFUlLY ON THE CLOUD.... IF THEY ARE NOT RESPONSIVE
OR YOU THINK THEY (HE OR SHE..) IS GOING TO SLEEP, THEN ADD IN A "...ALWAYS
CONCENTRATING UPON MY VOICE, INGORING ALL OTHER SOUNDS. EVEN THOUGH OTHER
SOUNDS EXSIST, THEY AID YOU IN YOUR RELAXATION..." THEY SHOULD SOON LET
OUT A SIGH AS IF THEY WERE LETTING GO, AND THEIR FACE SHOULD HAVE A "WOODENESS"
TO IT, BECOMING FEATURLESS... NOW, SAY THE FOLLOWING ".... YOU NOW FIND
YOURSELF IN A HALLWAY, THE HALLWAY IS PEACEFUL AND NICE. AS I COUNT FROM
10 TO 1 YOU WILL IMAGINE YOURSELF WALKING FURTHER AND FURTHER DOWN THE
HALL. WHEN I REACH ONE YOU WILL FIND YOURSELF WHERE YOU WANT TO BE, IN
ANOTHER, HIGHER STATE OF CONCIOUS AND MIND. (COUNT FROM TEN TO ONE)....."
DO THIS ABOUT THREE OR FOUR TIMES. THEN, TO TEST IF THE SUBJECT IS UNDER
HYPNOSIS OR NOT, SAY.... "...YOU FEEL A STRANGE SENSATION IN YOUR (ARM
THEY WRITE WITH) ARM, THE FEELING BEGINS AT YOUR FINGERS AND SLOWLY MOVES
UP YOUR ARM, AS IT MOVES THROUGH YOUR ARM YOUR ARM BECOMES LIGHTER AND
LIGHTER, IT WILL SOON BE SO LIGHT IT WILL ..... BECOMING LIGHTER AND LIGHTER
WHICH EACH BREATH AND MOMENT..." THEIR FINGERS SHOULD BEGIN TO TWITCH AND
THEN MOVE UP, THE ARM FOLLOWING, NOW MY FRIEND, YOU HAVE HIM/HEP IN HYPNOSIS.
THE FIRST TIME YOU DO THIS, WHILE HE/SHE IS UNDER SAY GOOD THINGS, LIKE:
"YOUR GOING TO FEEL GREAT TOMORROW" OR "EVERY DAY IN EVERY WAY YOU WILL
FIND YOURSELF BECOMING BETTER AND BETTER".. OR SOME CRAP LIKE THAT... THE
MORE THEY GO UNDER, THE DEEPER IN HYPNOSIS THEY WILL GET EACH TIME YOU
DO IT. +----------------------------+ ! WHAT TO DO WHEN HYPNOTISED ! +----------------------------+
WHEN YOU HAVE THEM UNDER YOU MUST WORD THINGS VERY CAREFULLY TO GET YOUR
WAY. YOU CANNOT SIMPLY SAY... TAKE OFF YOUR CLOTHES AND FUCK THE PILLOW.
NO, THAT WOULD NOT REALLY DO THE TRICK. YOU MUST SAY SOMETHING LIKE....
"YOU FIND YOUR SELF AT HOME, IN YOUR ROOM AND YOU HAVE TO TAKE A SHOWER
(VIVIDLY DESCRIBE THEIR ROOM AND WHATS HAPPENING), YOU BEGIN TO TAKE OFF
YOUR CLOTHES..." NOW, IT CANT BE THAT SIMPLE, YOU MUST KNOW THE PERSONS
HOUSE, ROOM, AND SHOWER ROOM. THEN DESCRIBE THINGS VIVIDLY AND TELL THEM
TO ACT IT OUT (THEY HAVE TO BE DEEPLY UNDER TO DO THIS...). I WOULD JUST
SUGGEST THAT YOU EXPERIMENT A WHILE, AND GET TO KNOW HO; TO DO THINGS.
+-----------+ ! WAKING UP ! +-----------+ WAKING UP IS VERY EASY, JUST
SAY.. "...AS I COUNT FROM 1 TO 5 YOU WILL FIND YOURSELF BECOMMING MORE
AND MORE AWAKE, MORE AND MORE LIVELY. WHEN YOU WAKE UP YOU WILL FIND YOURSELF
COMPLETELY ALIVE, AWAKE, AND REFRESHED. MENTALLY AND PHYSICALLY, REMEMBERING
THE PLEASANT SENSATION THAT HYPNOSIS BRINGS... WAKING UP FEELING LIKE A
NEW BORN BABY, REBORN WITH LIFE AND VIGOR, FEELING EXCELLENT. REMEMBERING
THAT NEXT TIME YOU ENTER HYPNOSIS IT WILL BECOME AN EVER INCREASING DEEPER
AND DEEPER STATE THAN BEFORE. 1- YOU FEEL ENERGY COURSE THROUGHOUT YOUR
LIMBS. 2- YOU BEGIN TO BREATHE DEEPLY, STIRRING. 3- BEGINING TO MOVE MORE
AND MORE YOUR EYES OPEN, BRINGING YOU UP TO FULL CONCIOUS. 4- YOU ARE UP,UP,
UP AND AWAKENING MORE AND MORE. 5- YOU ARE AWAKE AND FEELING GREAT." AND
THATS IT! YOU NOW KNOW HOW TO HYPNOTISE YOURSELF AND SOMEONE ELSE. YOU
WILL LEARN MORE AND MORE AS YOU EXPERIMENT. ------------------Jolly Roger
##########################################################################
# # # The Remote Informer # # # #------------------------------------------------------------------------#
# Reader supported newsletter for the underworld # #------------------------------------------------------------------------#
# # # Editors: Tracker and Norman Bates # # # #========================================================================#
# September 1987 Issue: 01 # #========================================================================#
# The Headlines # #------------------------------------------------------------------------#
# 1) Introduction # # 2) Hacking Sprint: The Easy Way # # 3) Rumors: Why
spread them? # # 4) The New Sprint FON Calling Cards # # 5) Automatic Number
Identifier (ANI) # ##########################################################################
Introduction --------------------------------------------------------------------------
Welcome to the first issue of 'The Remote Informer'! This newsletter is
reader supported. If the readers of this newsletter do not help support
it, then it will end. We are putting this out to help out the ones that
would like to read it. If you are one of those who thinks they know everything,
then don't bother reading it. This newsletter is not anything like the
future issues. The future issues will contain several sections, as long
as reader input is obtained. Below is an outline overview of the sections
in the future issues. I/O Board (Input/Output Board) The I/O Board is for
questions you have, that we might be able to answer or atleast refer you
to someone or something. We will be honest if we cannot help you. We will
not make up something, or to the effect, just to make it look like we answered
you. There will be a section in the I/O Board for questions we cannot answer,
and then the readers will have the opportunity to answer it. We will print
anything that is reasonable in the newsletter, even complaints if you feel
like you are better than everyone. NewsCenter This section will be for
news around the underworld. It will talk of busts of people in the underworld
and anything else that would be considered news. If you find articles in
the paper, or something happens in your local area, type it up, and upload
it to one of the boards listed at the end of the newsletter. Your handle
will be placed in the article. If you do enter a news article, please state
the date and from where you got it. Feature Section The Feature Section
will be the largest of the sections as it will be on the topic that is
featured in that issue. This will be largely reader input which will be
sent in between issues. At the end of the issue at hand, it will tell the
topic of the next issue, therefore, if you have something to contribute,
then you will have ample time to prepare your article. Hardware/Software
Review In this section, we will review the good and bad points of hardware
and software related to the underworld. It will be an extensive review,
rather than just a small paragraph. The Tops This section will be the area
where the top underworld BBS's, hacking programs, modem scanners, etc.
will be shown. This will be reader selected and will not be altered in
anyway. The topics are listed below. Underworld BBS's (Hack, Phreak, Card,
Anarchy, etc.) Hacking programs for Hayes compatables Hacking programs
for 1030/Xm301 modems Modem scanners for Hayes compatables Modem scanners
for 1030/Xm301 modems Other type illegal programs You may add topics to
the list if enough will support it. Tid Bits This will contain tips and
helpful information sent in by the users. If you have any information you
wish to contribute, then put it in a text file and upload it to one of
the BBS's listed at the end of the newsletter. Please, no long distance
codes, mainframe passwords, etc. We may add other sections as time goes
by. This newsletter will not be put out on a regular basis. It will be
put out when we have enough articles and information to put in it. There
may be up to 5 a month, but there will always be at least one a month.
We would like you, the readers, to send us anything you feel would be of
interest to others, like hacking hints, methods of hacking long distance
companies, companies to card from, etc. We will maintain the newsletter
as long as the readers support it. That is the end of the introduction,
but take a look at this newsletter, as it does contain information that
may be of value to you. ==========================================================================
Hacking Sprint: The Easy Way -------------------------------------------------------------------------
By: Tracker If you hack US Sprint,
950-0777 (by the way it is no longer GTE Sprint), and you are fustrated
at hacking several hours only to find one or two codes, then follow these
tips, and it will increase your results tremendously. First, one thing
that Mr. Mojo proved is that Sprint will not store more than one code in
every hundred numbers. (ex: 98765400 to 98765499 may contain only one code).
There may NOT be a code in that hundred, but there will never be more than
one. Sprint's 9 digit codes are stored from 500000000 through 999999999.
In the beginning of Sprint's 950 port, they only had 8 digit codes. Then
they started converting to 9 digit codes, storing all 8 digit codes between
10000000 and 49999999 and all 9 digit codes between 500000000 and 999999999.
Sprint has since cancelled most 8 digit codes, although there are a few
left that have been denoted as test codes. Occaisionally, I hear of phreaks
saying they have 8 digit codes, but when verifying them, the codes were
invalid. Now, where do you start? You have already narrowed the low and
high numbers in half, therefore already increasing your chances of good
results by 50 percent. The next step is to find a good prefix to hack.
By the way, a prefix, in hacking terms, is the first digits in a code that
can be any length except the same number of digits the code is. (ex: 123456789
is a code. That means 1, 12, 123, 1234, 12345, 123456, 1234567, and 12345678
are prefixes) The way you find a good prefix to hack is to manually enter
a code prefix. If when you enter the code prefix and a valid destination
number and you do not hear the ringing of the recording telling you that
the code is invalid until near the end of the number, then you know the
prefix is valid. Here is a chart to follow when doing this: Code - Destination
Range good codes exist -------------------------------------------------
123456789 - 6192R 123400000 - 123499999 123456789 - 619267R 123450000 -
123459999 123456789 - 61926702R 123456000 - 123456999 123456789 - 6192670293R
123456700 - 123456799 -------------------------------------------------
( R - Denotes when ring for recording starts) To prove this true, I ran
a test using OmniHack 1.3p, written by Jolly Joe. In this test I found
a prefix where the last 3 digits were all I had to hack. I tested each
hundred of the 6 digit prefix finding that all but 4 had the ring start
after the fourth digit was dialed in the destination number. The other
four did not ring until I had finished the entire code. I set OmniHack
to hack the prefix + 00 until prefix + 99. (ex: xxxxxxy00 to xxxxxxy99:
where y is one of the four numbers that the ring did not start until the
dialing was completed.) Using this method, I found four codes in a total
of 241 attempts using ascending hacking (AKA: Sequential). Below you will
see a record of my hack: Range of hack Codes found Tries ----------------------------------------------
xxxxxx300 - xxxxxx399 xxxxxx350 50 xxxxxx500 - xxxxxx599 xxxxxx568 68 xxxxxx600
- xxxxxx699 xxxxxx646 46 xxxxxx800 - xxxxxx899 xxxxxx877 77 ----------------------------------------------
Totals 4 codes 241 As you see, these methods work. Follow these guidlines
and tips and you should have an increase in production of codes in the
future hacking Sprint. Also, if you have any hints/tips you think others
could benefit from, then type them up and upload them to one of the boards
at the end of the newsletter. ==========================================================================
Rumors: Why Spread Them? --------------------------------------------------------------------------
By: Tracker Do you ever get tired of hearing rumors? You know, someone
gets an urge to impress others, so they create a rumor that some long distance
company is now using tracing equipment. Why start rumors? It only scares
others out of phreaking, and then makes you, the person who started the
rumor, look like Mr. Big. This article is short, but it should make you
aware of the rumors that people spread for personal gain. The best thing
to do is to denote them as a rumor starter and then leave it at that. You
should not rag on them constantly, since if the other users cannot determine
if it is fact or rumor, then they should suffer the consequences. ==========================================================================
The New Sprint FON Calling Cards --------------------------------------------------------------------------
By: Tracker US Sprint has opened up a new long distance network called
the Fiber Optic Network (FON), in which subscribers are given calling cards.
These calling cards are 14 digits, and though, seem randomly generated,
they are actually encrypted. The rumors floating around about people getting
caught using the Sprint FON calling cards are fact, not rumors. The reason
people are getting caught is that they confuse the FON calling cards with
the local 950 port authorization codes. If you will remember, you never
use AT&T calling cards from you home phone. It has ANI capability,
which is not tracing, but rather the originating phone number is placed
on the bill as soon as the call is completed. They know your phone number
when you call the 800 access port, but they do not record it until your
call is completed. Also, through several of my hacks, I came up with some
interesting information surrounding the new Sprint network. They are listed
below. 800-877-0000 This number is for information on US Sprint's 800 calling
card service. I have not played around with it, but I believe it is for
trouble or help with the FON calling cards. I am not sure if it is for
subscribing to the FON network. 800-877-0002 - You hear a short tone, then
nothing. 800-877-0003 - US Sprint Alpha Test Channel #1 800-877-(0004-0999)
When you call these numbers, you get a recording saying: "Welcome to US
Sprint's 1 plus service." When the recording stops, if you hit the pound
key (#) you will get the calling card dial tone. Other related Sprint numbers
800-521-4949 This is the number that you subscribe to US Sprint with. You
may also subscribe to the FON network on this number. It will take 4 to
5 weeks for your calling card to arrive. 10777 This is US Sprint's equal
access number. When you dial this number, you then dial the number you
are calling, and it will be billed through US Sprint, and you will receive
their long distance line for that call. Note that you will be billed for
calls made through equal access. Do not mistake it to be a method of phreaking,
unless used from a remote location. If you are in US Sprint's 1+ service
then call 1+700-555-1414, which will tell you which long distance company
you are using. When you hear: "Thank you for choosing US Sprint's 1 plus
service," hit the pound key (#), and then you will get the US Sprint dial
tone. This however is just the same as if you are calling from your home
phone if you dial direct, so you would be billed for calls made through
that, but there are ways to use this to your advantage as in using equal
access through a PBX. ==========================================================================
Automatic Number
Identification (ANI) --------------------------------------------------------------------------
By: Tracker The true definition for Automatic Number Identification has
not been widely known to many. Automatic Number Identification, (AKA: ANI),
is the process of the destination number knowing the originating number,
which is where you are calling from. The method of achieving this is to
send the phone number that you are calling from in coded form ahead of
the destination number. Below is an example of this. ANI Method Dial: 267-0293
Sent: ********2670293 * - Denotes the originating number which is coded
and sent before the number As you noticed there are 8 digits in the coded
number. This is because, at least I believe, it is stored in a binary-like
form. Automatic Number Identification means a limited future in phreaking.
ANI does not threaten phreaking very much yet, but it will in the near
future. A new switching system will soon be installed in most cities that
are covered by ESS, Electronic Switching System, now. The system will have
ANI capabilities which will be supplied to the owners of phone lines as
an›added extra. The owner's phone will have an LED read-out that will show
the phone number of the people that call you. You will be able to block
some numbers, so that people cannot call you. This system is in the testing
stages currently, but will soon be installed across most of the country.
As you see, this will end a large part of phreaking, until we, the phreakers,
can come up with an alternative. As I have been told by several, usually
reliable, people, this system is called ISS, which I am not sure of the
meaning of this, and is being tested currently in Rhode Island. 800 in-watts
lines set up by AT&T support ANI. The equipment to decode an ANI coded
origination number does not costs as much as you would expect. 950 ports
do not offer ANI capability, no matter what you have been told. The 950
ports will only give the city in which they are based, this usually being
the largest in the state, sometimes the capitol. One last thing that I
should tell you is that ANI is not related to tracing. Tracing can be done
on any number whether local, 950, etc. One way around this, especially
when dialing Alliance TeleConferencing, is to dial through several extenders
or ports. ANI will only cover the number that is calling it, and if you
call through a number that does not support ANI, then your number will
never be known. ==========================================================================
The Disclaimer! --------------------------------------------------------------------------
We, the editors, take no responsibility for your actions and use of the
information in this newsletter. This newsletter is for informational purposes
only. There will never be any long distance codes, passwords, etc. in this
newsletter. If you are easily offended by telecommunication discussions,
then we suggest that you not read this newsletter. But for those who are
truely interested in the information in this newsletter, enjoy it. Brought
to you in Cookbook, courtesy of the Jolly Roger!!!!!!!!!! Jackpotting ATM
Machines courtesy of the Jolly Roger JACKPOTTING was done rather successfully
a while back in (you guessed it) New York. What the culprits did was: Sever
(actually cross over) the line between the ATM and the host. insert a microcomputer
between the ATM and the host. insert a fradulent card into the ATM. (card=cash
card, not hardware) What the ATM did was: send a signal to the host, saying
"Hey! Can I give this guy money, or is he broke, or is his card invalid?"
What the microcomputer did was: intercept the signal from the host, discard
it, send "there's no one using the ATM" signal. What the host did was:
get the "no one using" signal, send back "okay, then for God's sake don't
spit out any money!" signal to ATM. What the microcomputer did was: intercept
signal (again), throw it away (again), send "Wow! That guy is like TOO
rich! Give him as much money as he wants. In fact, he's so loaded, give
him ALL the cash we have! He is really a valued customer." signal. What
the ATM did: what else? Obediently dispense cash till the cows came home
(or very nearly so). What the crooks got: well in excess of $120,000 (for
one weekend's work), and several years when they were caught. This story
was used at a CRYPTOGRAPHY conference I attended a while ago to demonstrate
the need for better information security. The lines between ATM's &
their hosts are usually 'weak' in the sense that the information transmitted
on them is generally not encrypted in any way. One of the ways that JACKPOTTING
can be defeated is to encrypt the information passing between the ATM and
the host. As long as the key cannot be determined from the ciphertext,
the transmission (and hence the transaction) is secure. A more believable,
technically accurate story might concern a person who uses a computer between
the ATM and the host to determine the key before actually fooling the host.
As everyone knows, people find cryptanalysis a very exciting and engrossing
subject...don't they? (Hee-Hee) _____ ______ | |-<<-| |-<<-|
| |ATM| micro |Host| |___|->>-| |->>-|____| The B of A ATM's are connected
through dedicated lines to a host computer as the Bishop said. However,
for maintenance purposes, there is at least one separate dial-up line also
going to that same host computer. This guy basically bs'ed his way over
the phone till he found someone stupid enough to give him th number. After
finding that, he had has Apple hack at the code. Simple. Step 2: He had
a friend go to an ATM with any B of A ATM card. He stayed at home with
the Apple connected to the host. When his friend inserted the card, the
host displayed it. The guy with the Apple modified the status & number
of the card directly in the host's memory. He turned the card into a security
card, used for testing purposes. At that point, the ATM did whatever it's
operator told it to do. The next day, he went into the bank with the $2000
he received, talked to the manager and told him every detail of what he'd
done. The manager gave him his business card and told him that he had a
job waiting for him when he got out of school. Now, B of A has been warned,
they might have changed the system. On the other hand, it'd be awful expensive
to do that over the whole country when only a handful of people have the
resources and even less have the intelligence to duplicate the feat. Who
knows? Jug Bomb by the Jolly Roger Take a glass jug, and put 3 to 4 drops
of gasoline into it. Then put the cap on, and swish the gas around so the
inner surface of the jug is coated. Then add a few drops of potassium permanganate
solution into it and cap it. To blow it up, either throw it at something,
or roll it at something. ------------Jolly Roger Fun at K-Mart by the Jolly
Roger Well, first off, one must realise the importance of K-Marts in society
today. First off, K-Marts provide things cheaper to those who can't afford
to shop at higher quality stores. Although, all I ever see in there is
minorities and Senior Citizens, and the poor people in our city. Personally,
I wouldn't be caught dead in there. But, once, I did. You see, once, after
The Moon Roach and Havoc Chaos(Dear friends of mine) and I were exploring
such fun things as rooftops, we came along a K-Mart. Amused, and cold for
that matter, we wandered in. The Tension mounts. As we walked up to the
entrance, we were nearly attacked by Youth Groups selling cheap cookies,
and wheelchair sticken people selling American Flags. After laughing at
these people, we entered. This is where the real fun begins... First, we
wandered around the store, and turned on all the blue lights we could find.
That really distracts and confuses the attendents...Fun to do... The first
neat thing, is to go to the section of the store where they sell computers.
Darkness engulf the earth the day they find Apple Computers being sold
there. Instead, lesser computers like the laughable C-64 can be found there...Turn
it on, and make sure nobody's looking...Then, once in Basic, type... ]10
PRINT "Fuck the world! Anarchy Rules!" (or something to that effect.) ]20
GOTO 10 and walk away. Also, set the sample radios in the store to a santanic
rock station, and turn the radio off. Then, set the alarm for two minutes
ahead of the time displayed there. Turn the volume up all the way, and
walk away. After about two minutes, you will see the clerk feebly attempt
to turn the radio down or off. It's really neat to set ten or more radios
to different stations, and walk away. One of my favorite things to do,
is to get onto the intercom system of the store. Easier typed then done.
First, check out the garden department. You say there's no attendent there?
Good. Sneak carefully over to the phone behind the cheap counter there,
and pick it up. Dial the number corrisponding to the item that says 'PAGE'...
And talk. You will note that your voice will echo all over the bowels of
K-Mart. I would suggest announcing something on the lines of: "Anarchy
rules!!" ---------------Jolly Roger Mace Substitute by the Jolly Roger
3 PARTS: Alcohol 1/2 PARTS: Iodine 1/2 PARTS: Salt Or: 3 PARTS: Alcohol
1 PARTS: Iodized Salt (Mortons) It's not actual mace, but it does a damn
good job on the eyes... --------------Jolly Roger How to grow Marijuana
courtesy of the Jolly Roger MARIJUANA Marijuana is a deciduous plant which
grows from seeds. The fibrous section of the plant was (has been replaced
by synthetics) used to make rope. The flowering tops, leaves, seeds, and
resin of the plant is used by just about everyone to get HIGH. Normally,
the vegetable parts of the plant are smoked to produce this "high," but
thay can also be eaten. The axtive ingredient in marijuana resin is THC
(tetahydrocannabinol). Marijuana contains from 1 - 4 per cent THC (4 per
cent must be considered GOOD dope). Marijuana grows wild in many parts
of the world, and is cultivated in Mexice, Vietnam, Africa, Nepal, India,
South America, etc.,etc. The marijuana sold in the United States comes
primarily from, yes, the Uniited States. It is estimated that at least
50 per cent of the grass on the streets in America is homegrown. The next
largest bunch comes actoss the borders from Mexico, with smaller amounts
filtering in from Panama, occasionally South America, and occasinally,
Africa. Hashish is the pure resin of the marijuana plant, which is scraped
from the flowering tops of the plant and lumped together. Ganja is the
ground-up tops of the finest plants. (It is also the name given to any
sort of marijuana in Jamaica.) Marijuana will deteriorate in about two
years if exposed to light, air or heat. It should always be stored in cool
places. Grass prices in the United States are a direct reflection of the
laws of supply and demand (and you thought that high school economics would
never be useful). A series of large border busts, a short growing season,
a bad crop, any number of things can drive the price of marijuana up. Demand
still seems to be on the increase in the U.S., so prices seldom fall below
last year's level. Each year a small seasonal drought occurs, as last year's
supply runs low, and next year's crop is not up yet. Prices usually rase
about 20 - 75 per cent during this time and then fall back to "normal."
Unquestionably, a large shortage of grass causes a percentage of smokers
to turn to harder drugs instead. For this reason, no grass control program
can ever be beneficial or "successful." GROW IT! There is one surefire
way of avoiding high prices and the grass DT's: Grow your own. This is
not as difficult as some "authorities" on the subject would make you believe.
Marijuana is a weed, and a fairly vivacious one at that, and it will grow
almost in spite of you. OUTDOORS Contrary to propular belief, grass grows
well in many place on the North American continent. It will flourish even
if the temperature does not raise above 75 degrees. The plants do need
a minimum of eight hours of sunlight per day and should be planted in late
April/early May, BUT DEFINITELY, after the last frost of the year. Growing
an outdoor, or "au naturel", crop has been the favored method over the
years, because grass seems to grow better without as much attention when
in its natural habitat. Of course, an outdoors setting requires special
precautions not encoun- tered with an indoors crop; you must be able to
avoid detection, both from law enforcement freaks and common freaks, both
of whom will take your weed and probably use it. Of course, one will also
arrest you. You must also have access to the area to prepare the soil and
harvest the crop. There are two schools of thought about starting the seeds.
One says you should start the seedlings for about ten days in an indoor
starter box (see the indoor section) and then transplant. The other theory
is that you should just start them in the correct location. Fewer plants
will come up with this method, but there is no shock of transplant to kill
some of the seedlings halfway through. The soil should be preprepared for
the little devils by turning it over a couple of times and adding about
one cup of hydrated lime per square yard of soil and a little bit (not
too much, now) of good water soluble nitrogen fertilizer. The soil should
now be watered several times and left to sit about one week. The plants
should be planted at least three feet apart, getting too greedy and stacking
them too close will result in stunted plants. The plants like some water
during their growing season, BUT not too much. This is especially true
around the roots, as too much water will rot the root system. Grass grows
well in corn or hops, and these plants will help provide some camouflage.
It does not grow well with rye, spinach, or pepperweed. It is probally
a good idea to plant in many small, broken patches, as people tend to notice
patterns. GENERAL GROWING INFO Both the male and he female plant produce
THC resin, although the male is not as strong as the female. In a good
crop, the male will still be plenty smokable and should not be thrown away
under any circumstances. Marijuana can reach a hight of twenty feet (or
would you rather wish on a star) and obtain a diameter of 4 1/2 inches.
If normal, it has a sex ratio of about 1:1, but this can be altered in
several ways. The male plant dies in the 12th week of growing, the female
will live another 3 - 5 weeks to produce her younguns. Females can weigh
twice as much as males when they are mature. Marijuana soil should compact
when you squeeze it, but should also break apart with a small pressure
and absorb water well. A nice test for either indoor or outdoor growing
is to add a bunch of worms to the soil, if they live and hang aroung, it
is good soil, but if they don't, well, change it. Worms also help keep
the soil loose enough for the plants to grow well. SEEDS To get good grass,
you should start with the right seeds. A nice starting point is to save
the seeds form the best batch you have consumed. The seeds should be virile,
that is, they should not be grey and shiriveled up, but green, meaty, and
healthy appearing. A nice test is to drop the seeds on a hot frying pan.
If they "CRACK," they are probably good for planting purposes. The seeds
should be soaked in distilled water overnight before planting. BE SURE
to plant in the ground with the pointy end UP. Plant about 1/2" deep. Healthy
seeds will sprout in about five days. SPROUTING The best all around sprouting
method is probably to make a sprouting box (as sold in nurseries) with
a slated bottom or use paper cups with holes punched in the bottoms. The
sprouting soil should be a mixture of humus, soil, and five sand with a
bit of organic fertilizer and water mixed in about one week before planting.
When ready to transplant, you must be sure and leave a ball of soil around
the roots of each plant. This whole ball is dropped into a baseball-sized
hold in the permanent soil. If you are growing/transplanting indoors, you
should use a green safe light (purchased at nurseries) during the transplanting
operation. If you are transplanting outdoors, you should time it about
two hours befor sunset to avoid damage to the plant. Always wear cotton
gloves when handling the young plants. After the plants are set in the
hole, you should water them. It is also a good idea to use a commercial
transplant chemical (also purchased at nurseries) to help then overcome
the shock. INDOOR GROWING Indoor growing has many advantages, besides the
apparent fact that it is much harder to have your crop "found," you can
control the ambient conditions just exactly as you want them and get a
guaranteed "good" plant. Plants grown indoors will not appear the same
as their outdoor cousins. They will be scrawnier appearing with a weak
stems and may even require you to tie them to a growing post to remain
upright, BUT THEY WILL HAVE AS MUCH OR MORE RESIN! If growing in a room,
you should put tar paper on the floors and then buy sterilized bags of
soil form a nursery. You will need about one cubic foot of soil for eavh
plant. The plants will need about 150 ml. of water per plant/per week.
They will also need fresh air, so the room must be ventilated. (however,
the fresh air should contain NO TOBACCO smoke.) At least eight hours of
light a day must be provided. As you increase the light, the plants grow
faster and show more females/less males. Sixteen hours of light per day
seems to be the best combination, beyond this makes little or no appreciable
difference in the plant quality. Another idea is to interrupt the night
cycle with about one hour of light. This gives you more females. The walls
of your growing room should be painted white or covered with aluminum foil
to reflect the light. The lights themselves can be either bulbs of fluorescent.
Figure about 75 watts per plant or one plant per two feet of flouresent
tube. The fluorescents are the best, but do not use "cool white" types.
The light sources should be an average of twenty inches from the plant
and NEVER closer than 14 inches. They may be mounted on a rack and moved
every few days as the plants grow. The very best light sources are those
made by Sylvania and others especially for growing plants (such as the
"gro lux" types). HARVESTING AND DRYING The male plants will be taller
and have about five green or yellow sepals, which will split open to fertilize
the female plant with pollen. The female plant is shorter and has a small
pistillate flower, which really doesn't look like a flower at all but rather
a small bunch of leaves in a cluster. If you don't want any seeds, just
good dope, you should pick the males before they shed their pollen as the
female will use some of her resin to make the seeds. After another three
to five weeks, after the males are gone, the females will begin to wither
and die (from loneliness?), this is the time to pick. In some nefarious
Middle Eastren countries, farmers reportedly put their beehives next to
fiels of marijuana. The little devils collect the grass pollen for their
honey, which is supposed to contain a fair dosage of THC. The honey is
then enjoyed by conventional methods or made into ambrosia. If you want
seeds - let the males shed his pollen then pick him. Let the female go
another month and pick her. To cure the plants, they must be dried. On
large crops, this is accomplished by constructing a drying box or drying
room. You must have a heat source (such as an electric heater) which will
make the box/room each 130 degrees. The box/room must be ventilated to
carry off the water-vapor-laden air and replace it with fresh. A good box
can be constructed from an orange crate with fiberglass insulated walls,
vents in the tops, and screen shelves to hold the leaves. There must be
a baffle between the leaves and the heat source. A quick cure for smaller
amounts is to: cut the plant at the soil level and wrap it in a cloth so
as not to loose any leavs. Take out any seeds by hand and store. Place
all the leaves on a cookie sheet or aluminum foil and put them in the middle
sheld of the oven, which is set on "broil." In a few seconds, the leaves
will smoke and curl up, stir them around and give another ten seconds before
you take them out. TO INCREASE THE GOOD STUFF There are several tricks
to increase the number of females, or the THC content of plants: You can
make the plants mature in 36 days if you are in a hurry, by cutting back
on the light to about 14 hours, but the plants will not be as big. You
should gradually shorten the light cycle until you reach fourteen hours.
You can stop any watering as the plants begin to bake the resin rise to
the flowers. This will increse the resin a bit. You can use a sunlamp on
the plants as they begin to develop flower stalks. You can snip off the
flower, right at the spot where it joins the plant, and a new flower will
form in a couple of weeks. This can be repeated two or three times to get
several times more flowers than usual. If the plants are sprayed with Ethrel
early in their growing stage, they will produce almost all female plants.
This usually speeds up the flowering also, it may happen in as little as
two weeks. You can employ a growth changer called colchicine. This is a
bit hard to get and expensive. (Should be ordered through a lab of some
sort and costs about $35 a gram.) To use the colchicine, you should prepare
your presoaking solution of distilled water with about 0.10 per cent colchicine.
This will cause many of the seeds to die and not germinate, but the ones
that do come up will be polyploid plants. This is the accepted difference
between such strains as "gold" and normal grass, and yours will DEFINITELY
be superweed. The problem here is that colchicine is a posion in larger
quanities and may be poisonous in the first generation of plants. Bill
Frake, author of CONNOISSEUR'S HANDBOOK OF MARIJUANA runs a very complete
colchicine treatment down and warns against smoking the first generation
plants (all succeeding generations will also be polyploid) bacause of this
poisonous quality. However, the Medical Index shows colchicine being given
in very small quantities to people for treatment if various ailments. Although
these quantities are small, they would appear to be larger than any you
could recive form smoaking a seed-treated plant. It would be a good idea
to buy a copy of CONNOISSEUR'S, if you are planning to attempt this, and
read Mr. Drake's complete instructions. Another still-experimental process
to increase the resin it to pinch off the leaf tips as soon as they appear
from the time the plant is in the seedling stage on through its entire
life-span. This produces a distorted, wrecked-looking plant which would
be very difficuly to recognize as marijuana. Of course, there is less substance
to this plant, but such wrecked creatures have been known to produve so
much resin that it crystallizes a strong hash all over the surface of the
plant - might be wise to try it on a plant or two and see what happens.
PLANT PROBLEM CHART Always check the overall enviromental conditions prior
to passing judgment - soil aroung 7 pH or slightly less - plenty of water,
light, fresh air, loose soil, no water standing in pools. SYMPTOM PROBABLY
PROBLEM/CURE Larger leaves turning yellow - Nitrogen dificiency - add smaller
leaves still green. nitrate of soda or organic fertilizer. Older leaves
will curl at edges, Phosphorsus dificiency - turn dark, possibaly with
a purple add commercial phosphate. cast. Mature leaves develop a yellowish
Magnesium dificiency - cast to least veinal areas. add commercial fertilizer
with a magnesium content. Mature leaves turn yellow and then Potassium
dificiency - become spotted with edge areas add muriate of potash. turning
dark grey. Cracked stems, no healthy support Boron dificiency - add tissue.
any plant food containing boron. Small wrinkled leaves with Zinc dificiency
- add yelloish vein systems. commercial plant food containing zinc. Young
leaves become deformed, Molybedum dificiency - possibaly yellowing. use
any plant food with a bit of molydbenum in it. EXTRA SECTION: BAD WEED/GOOD
WEED Can you turn bad weed into good weed? Surprisingly enough, the answer
to this oft-asked inquiry is, yes! Like most other things in life, the
amount of good you are going to do relates directly to how much effort
you are going to put into it. There are no instant, supermarket products
which you can spray on Kansas catnip and have wonderweed, but there are
a number of simplified, inexpensive processes (Gee, Mr. Wizard!) thich
will enhance mediocre grass somewhat, ant there are a couple of fairly
involved processes which will do up even almost-parsley weed into something
worth writing home about. EASES 1. Place the dope in a container which
allows air to enter in a restricted fashion (such as a can with nail holes
punched in its lid) and add a bunch of dry ice, and the place the whold
shebang in the freezer for a few days. This process will add a certain
amount of potency to the product, however, this only works with dry ice,
if you use normal, everyday freezer ice, you will end up with a soggy mess...
2. Take a quantity of grass and dampen it, place in a baggie or another
socially acceptable container, and store it in a dark, dampish place for
a couple of weeks (burying it also seems to work). The grass will develop
a mold which tastes a bit harsh, a and burns a tiny bit funny, but does
increase the potency. 3. Expose the grass to the high intensity light of
a sunlamp for a full day or so. Personally, I don't feel that this is worth
the effort, but if you just spent $400 of your friend's money for this
brick of super-Colombian, right-from-the-President's-personal-stash, and
it turns out to be Missouri weed, and you're packing your bags to leave
town before the people arrive for their shares, well, you might at least
try it. Can't hurt. 4. Take the undisirable portions of our stash (stems,
seeds, weak weed, worms, etc.) and place them in a covered pot, with enough
rubbing alchol to cover everything. Now CAREFULLY boil the mixture on an
ELECTRIC stove or lab burner. DO NOT USE GAS - the alchol is too flammable.
After 45 minutes of heat, remove the pot and strain the solids out, SAVING
THE ALCOHOL. Now, repeat the process with the same residuals, but fresh
alchol. When the second boil is over, remove the solids again, combine
the two quantities of alcohol and reboil until you have a syrupy mixture.
Now, this syrupy mixture will contain much of the THC formerly hidden in
the stems and such. One simply takes this syrup the throughly combines
it with the grass that one wishes to improve upon. SPECIAL SECTION ON RELATED
SUBJECT MARYGIN: Marygin is an anagram of the words marijuana and gin,
as in Eli Whitney. It is a plastic tumbler which acts much like a commercial
cottin gin. One takes about one ounce of an harb and breaks it up. This
is then placed in the Marygin and the protuding knod is roatated. This
action turns the internal wheel, which separates the grass from the debris
(seeds, stems). It does not pulberize the grass as screens have a habit
of doing and is easily washable. Marygin is available from: P.O. Box 5827
Tuscon, Arizona 85703 $5.00 GRASS Edmund Scientific Company 555 Edscorp
Building Barrington, New Jersy 08007 Free Catalog is a wonder of good things
for the potential grass grower. They have an electric thermostat greenhouse
for starting plants for a mere $14.95. Soil test kits for PH - $2.40 Al
test - $9.95 Soil thermometer - $2.75 Lights which approzimate the true
color balance of the sun and are probably the most beneficial types available:
40 watt, 48 inch - 4 for $15.75. Indoor sun bulb, 75 or 150 watt - $5.75.
And, they have a natural growth regualtor for plants (Gibberellin) which
can change height, speed growth, and maturity, promote blossoming, etc.
Each plant reacts differently to treatment with Gibberellin...there's no
fun like experimenting - $2.00 SUGGESTED READING THE CONNOISSEUR'S HANDBOOK
OF MARIJUANA, Bill Drake Straight Arrow Publishing - $3.50 625 Third Street
San Francisco, California FLASH P.O.Box 16098 San Fransicso, California
94116 Stocks a series of pamphlets on grass, dope manufacture, cooking.
Includes the Mary Jane Superweed series. Match Head Bomb by the Jolly Roger
Simple safety match heads in a pipe, capped at both ends, make a devestating
bomb. It is set off with a regular fuse. A plastic Baggie is put into the
pipe before the heads go in to prevent detonation by contact with the metal.
Cutting enough match heads to fill the pipe can be tedious work for one
but an evening's fun for the family if you can drag them away from the
TV. ----------------Jolly Roger
How To Terrorize
McDonalds by the Jolly Roger
(Originally an Apple ][ file so excuse
the upper case!!!) NOW, ALTHOUGH Mc DONALDS IS FAMOUS FOR IT'S ADVERTISING
AND MAKING THE WHOLE WORLD THINK THAT THE BIG MAC IS THE BEST THING TO
COME ALONG SINCE SLICED BREAD (BUNS?), EACH LITTLE RESTAURANT IS AS AMATEUR
AND SIMPLE AS A NEW-FOUND BUSNESS. NOT ONLY ARE ALL THE EMPLOYEES RATHER
INEXPERIENCED AT WHAT THEY'RE =SUPPOSED= TO DO, BUT THEY WILL JUST LOOSE
ALL CONTROL WHEN AN EMERGENCY OCCURS....HERE WE GO!!! FIRST, GET A FEW
FRIENDS (4 IS GOOD...I'LL GET TO THIS LATER) AND ENTER THE MCDONALDS RESTAURANT,
TALKING LOUDLY AND REAKING OF SOME STRANGE SMELL THAT AUTOMATICALLY MAKES
THE OLD COUPLE SITTING BY THE DOOR LEAVE. IF ONE OF THOSE PIMPLY-FACED
GOONS IS WIPING THE FLOOR, THEN TRACK SOME CRAP ALL OVER IT (YOU COULD
PRETEND TO SLIP AND BREAK YOUR HEAD, BUT YOU MIGHT ACTUALLY DO SO). NEXT,
BEFORE YOU GET THE FOOD, FIND A TABLE. START YELLING AND RELEASING SOME
STRANGE BODY ODOR SO =ANYBODY= WOULD LEAVE THEIR TABLE AND WALK OUT THE
DOOR. SIT 2 FRIENDS THERE, AND GO UP TO THE COUNTER WITH ANOTHER. FIND
A PLACE WHERE THE LINE IS SHORT, OR IF THE LINE IS LONG SAY "I ONLY WANNA
BUY A COKE" AND YOU GET MOVED UP. NOW, YOU GET TO DO THE =ORDERING= ...HEH
HEH HEH. SOMEBODY =ALWAYS= MUST WANT A PLAIN HAMBURGER WITH ABSOLUTELY
NOTHING ON IT (THIS TAKES EXTRA TIME TO MAKE, AND DRIVES THE LITTLE HAMBURGER-MAKERS
INSANE)..ORDER A 9-PACK OF CHICKEN MCNUGGETS...NO, A 20 PACK...NO, THREE
6 PACKS...WAIT...GO BACK TO THE TABLE AND ASK WHO WANTS WHAT. YOUR OTHER
FRIEND WAITS BY THE COUNTER AND MAKES A PASS AT THE FEMALE CLERK. GET BACK
TO THE THING AND ORDER THREE 6-PACKS OF CHICKEN ETC....NOW SHE SAYS "WHAT
KIND OF SAUCE WOULD YOU LIKE?".OF COURSE, SAY THAT YOU ALL WANT BARBECUE
SAUCE ONE OF YOUR FRIENDS WANTS 2 (ONLY IF THERE ARE ONLY 2 CONTAINERS
OF BARBECUE SAUCE LEFT).THEN THEY HAFTA GO INTO THE STOREROOM AND OPEN
UP ANOTHER BOX. FINALLY, THE DRINKS...SOMEBODY WANTS COKE, SOMEBODY ROOT
BEER, AND SOMEBODY DIET COKE. AFTER THESE ARE DELIVERED, BRING THEM BACK
AND SAY "I DIDN'T ORDER A DIET COKE! I ORDERED A SPRITE!" THIS GETS THEM
MAD; BETTER YET, TURN DOWN SOMETHING TERRIBLE THAT NOBODY WANTS TO DRINK,
SO THEY HAFTA THROW THE DRINK AWAY; THEY CAN'T SELL IT. AFTER ALL THE FOOD(?)
IS HANDED TO YOU, YOU MUST =NEVER= HAVE ENOUGH MONEY TO PAY. THE CLERK
WILL BE SO ANGRY AND CONFUSED THAT SHE'LL LET YA GET AWAY WITH IT (ANOTHER
INFLUENCE ON HER IS YOUR FRIEND ASKING HER "IF YOU LET US GO I'LL GO OUT
WITH YOU" AND GIVING HER A FAKE FONE NUMBER). NOW, BACK TO YOUR TABLE.
BUT FIRST, SOMEBODY LIKES KETCHUP AND MUSTARD. AND PLENTY (TOO MUCH) OF
NAPKINS. OH, AND SOMEBODY LIKES FORKS AND KNIVES, SO ALWAYS END UP BREAKING
THE ONES YOU PICK OUTTA THE BOX. HAVE YOUR FRIENDS YELL OUT,"YAY!!!!! WE
HAVE MUNCHIES!!" AS LOUD AS THEY CAN. THAT'LL WORRY THE ENTIRE RESTAURANT.
PROCEED TO SIT DOWN. SO, YOU ARE SITTING IN THE SMOKING SECTION (BY ACCIDENT)
EH? WELL, WHILE ONE OF THE TOBACCO-BREATHERS ISN'T LOOKING, PUT A SIGN
FROM THE OTHER SIDE OF THE ROOM SAYING "DO NOT SMOKE HERE" AND HE'LL HAFTA
MOVE...THEN HE GOES INTO THE REAL NON-SMOKING SECTION, AND GETS YELLED
AT. HE THEN THINKS THAT NO SMOKING IS ALLOWED IN THE RESTAURANT, SO HE
EATS OUTSIDE (IN THE POUR- ING RAIN) AFTER YOUR MEAL IS FINISHED (AND QUITE
A FEW SPLATTERED-OPENED KETCHUP PACKETS ARE ALL OVER YER TABLE), TRY TO
LEAVE. BUT OOPS! SOMEBODY HAS TO DO HIS DUTY IN THE MEN'S ROOM. AS HE GOES
THERE, HE STICKS AN UNEATED HAMBURGGR (WOULD YOU DARE TO EAT ONE OF THEIR
HAMBURGERS?) INSIDE THE TOILET, FLUSHES IT A WHILE,UNTIL IT RUNS ALL OVER
THE BATHROOM. OOPS! SEND A PIMPLY-FACED TEENAGER TO CLEAN IT UP. (HE WON'T
KNOW THAT BROWN THING IS A HAMBURGER, AND HE'LL GET SICK. WHEEE!) AS YOU
LEAVE THE RESTCURANT, LOOKING BACK AT YOUR UNCLEANED TABLE, SOMEBODY MUST
REMEMBER THAT THEY LEFT THEIR CHOCOLATE SHAKE THERE! THE ONE THAT'S ALMOST
FULL!!!! HE TAKES IT THEN SAYS "THIS TASTES LIKE CRAP!", THEN HE TAKES
OFF THE LID AND THROWS IT INTO THE GARBAGE CAN...OOPS! HE MISSED, AND NOW
THE SAME POOR SOUL WHO'S CLEANING UP THE BATHROOM NOW HASTA CLEAN UP CHOCOLATE
SHAKE. THEN LEAVE THE JOINT, REVERSING THE "YES, WE'RE OPEN" SIGN (AS A
REMINDER OF YER VISIT THERE YOU HAVE IT! YOU HAVE JUST PUT ALL OF MCDONALDS
INTO COMPLETE MAYHEM. AND SINCE THERE IS NO PENALTY FOR LITTERING IN A
RESTAURANT, BUGGING PEOPLE IN A PUBLIC EATERY (OR THROW-UPERY, IN THIS
CASE) YOU GET OFF SCOT-FREE. WASN'T THAT FUN? --------------Jolly Roger
"Mentor's Last
Words" courtesy of the Jolly Roger
The following file is being reprinted
in honor and sympathy for the many phreaks and hackers that have been busted
recently by the Secret Service. - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - \/\The Conscience of a Hacker/\ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Another one got caught today, it's all over the papers. "Teenager Arrested
in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn
kids. They're all alike. But did you, in your three- piece psychology and
1950's technobrain, ever take a look behind the eyes of the hacker? Did
you ever wonder what made him tick, what forces shaped him, what may have
molded him? I am a hacker, enter my world... Mine is a world that begins
with school... I'm smarter than most of the other kids, this crap they
teach us bores me... Damn underachiever. They're all alike. I'm in junior
high or high school. I've listened to teachers explain for the fifteenth
time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't
show my work. I did it in my head..." Damn kid. Probably copied it. They're
all alike. I made a discovery today. I found a computer. Wait a second,
this is cool. It does what I want it to. If it makes a mistake, it's because
I screwed it up. Not because it doesn't like me... Or feels threatened
by me.. Or thinks I'm a smart ass.. Or doesn't like teaching and shouldn't
be here... Damn kid. All he does is play games. They're all alike. And
then it happened... a door opened to a world... rushing through the phone
line like heroin through an addict's veins, an electronic pulse is sent
out, a refuge from the day-to-day incompetencies is sought... a board is
found. "This is it... this is where I belong..." I know everyone here...
even if I've never met them, never talked to them, may never hear from
them again... I know you all... Damn kid. Tying up the phone line again.
They're all alike... You bet your ass we're all alike... we've been spoon-fed
baby food at school when we hungered for steak... the bits of meat that
you did let slip through were pre-chewed and tasteless. We've been dominated
by sadists, or ignored by the apathetic. The few that had something to
teach found us willing pupils, but those few are like drops of water in
the desert. This is our world now... the world of the electron and the
switch, the beauty of the baud. We make use of a service already existing
without paying for what could be dirt-cheap if it wasn't run by profiteering
gluttons, and you call us criminals. We explore... and you call us criminals.
We seek after knowledge... and you call us criminals. We exist without
skin color, without nationality, without religious bias... and you call
us criminals. You build atomic bombs, you wage wars, you murder, cheat,
and lie to us and try to make us believe it's for our own good, yet we're
the criminals. Yes, I am a criminal. My crime is that of curiosity. My
crime is that of judging people by what they say and think, not what they
look like. My crime is that of outsmarting you, something that you will
never forgive me for. I am a hacker, and this is my manifesto. You may
stop this individual,but you can't stop us all... after all, we're all
alike. +++The Mentor+++ [May the members of the phreak community never
forget his words -JR]
The Myth of the
2600hz Detector courtesy of the Jolly Roger
(Imported from the Apple ][ so forgive
the upper case!!) JUST ABOUT EVERYONE I TALK TO THESE DAYS ABOUT ESS SEEMS
TO BE SCARED WITLESS ABOUT THE 2600HZ DETECTOR. I DON'T KNOW WHO THOUGHT
THIS ONE UP, BUT IT SIMPLY DOES NOT EXIST. SO MANY OF YOU PEOPLE WHINE
ABOUT THIS SO -CALLED PHREAK CATCHING DEVICE FOR NO REASON. SOMEONE WITH
AT&T SAID THEY HAD IT TO CATCH PHREAKERS. THIS WAS JUST TO SCARE THE
BLUE-BOXERS ENOUGH TO MAKE THEM QUIT BOXING FREE CALLS. I'M NOT SAYING
ESS IS WITHOUT ITS HANG-UPS, EITHER. ONE THING THAT ESS CAN DETECT READILY
IS THE KICK-BACK THAT THE TRUNK CIRCUITRY SENDS BACK TO THE ESS MACHINE
WHEN YOUR LITTLE 2600HZ TONE RESETS THE TOLL TRUNK. AFTER AN ESS DETECTS
A KICKBACK IT TURNS AN M-F DETECTOR ON AND RECORDES ANY M-F TONES X-MITTED.
--------------------------------------- DEFEATING THE KICK-BACK DETECTOR
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ AS MENTIONED IN MY PREVIOUS NOTE, KICK-BACK
DETECTION CAN BE A SERIOUS NUISANCE TO ANYONE INTERESTED IN GAINING CONTROL
OF A TRUNK LINE. THE EASIEST WAY TO BY-PASS THIS DETECTION CIRCUITRY IS
NOT REALLY BY-PASSING IT AT ALL, IT IS JUST LETTING THE KICK-BACK GET DETECTED
ON SOME OTHER LINE. THIS OTHER LINE IS YOUR LOCAL MCI, SPRINT, OR OTHER
LONG DISTANCE CARRIER (EXCEPT AT&T). THE ONLY CATCH IS THAT THE SERVICE
YOU USE MUST NOT DISCONNECT THE LINE WHEN YOU HIT THE 2600HZ TONE. THIS
IS HOW YOU DO IT: CALL UP YOUR LOCAL EXTENDER, PUT IN THE CODE, AND DIAL
A NUMBER IN THE 601 AREA CODE AND THE 644 EXCHANGE. LOTS OF OTHER EXCHANGES
WORK ACROSS THE COUNTRY, I'M SURE, BUT THIS IS THE ONLY ONE THAT I HAVE
FOUND SO FAR. ANYWAY, WHEN IT STARTS RINGING, SIMPLY HIT 2600HZ AND YOU'LL
HEAR THE KICK-BACK, (KA-CHIRP, OR WHATEVER). THEN YOU ARE READY TO DIAL
WHOEVER YOU WANT (CONFERENCES, INWARD, ROUTE AND RATE, OVERSEAS, ETC.)
FROM THE TRUNK LINE IN OPERATOR TONES! SINCE BLOWING 2600HZ DOESN'T MAKE
YOU YOU A PHREAKER UNTIL THE TOLL EQUIPMENT RESETS THE LINE, KICKBACK DETECTION
IS THE METHOD AT&T CHOOSES (FOR NOW) THIS INFORMATION COMES AS A RESULT
OF MY EXPERIMENTS & EXPERIENCE AND HAS BEEN VERIFIED BY LOCAL AT&T
EMPLOYEES I HAVE AS ACQUAINTANCES. THEY COULD ONLY SAY THAT THIS IS TRUE
FOR MY AREA, BUT WERE PRETTY SURE THAT THE SAME IDEA IS IMPLEMENTED ACROSS
THE COUNTRY. ======================================= NOW THAT YOU KNOW
HOW TO ACCESS A TRUNK LINE OR AS OPERATORS SAY A LOOP, I WILL TELL YOU
THE MANY THINGS YOU CAN DO WITH IT. HERE IS A LIST OF AT&T SERVICES
ACCESSIBLE TO YOU BY USING A BLUE BOX. A/C+101 TOLL SWITCHING A/C+121 INWARD
OPERATOR A/C+131 INFORMATION A/C+141 ROUTE & RATE OP. A/C+11501 MOBILE
OPERATOR A/C+11521 MOBILE OPERATOR STARTING CONFERANCES:---------------------
THIS IS ONE THE MOST USEFUL ATTRIBUTES OF BLUE BOXING. NOW THE CONFS. ARE
UP 24 HOURS/DAY AND 7 DAYS/WEEK AND THE BILLING LINES ARE BEING BILLED.
SINCE I BELEIVE THE ABOVE IS TRUE (ABOUT THE BILLING LINES BEING BILLED)
I WOULD RECOMMEND THAT YOU NEVER LET YOUR # SHOW UP ON THE CONF. IF YOU
STARTED IT, PUT IT ON A LOOP AND THEN CALL THE LOOP. ENOUGH BULLSHIT!!!!!
TO START THE CONF. DIAL ONE OF THESE THREE NUMBERS IN M-F WHILE YOU ARE
ON THE TRUNK. 213+080+XXXX XXXX=1050,3050 SPECIAL XXXX=1000,1100,1200,1500,2200,2500.
THESE #S ARE IN L.A. AND ARE THE MOST WATCHED, I DO NOT ADVISE USING THIS
NPA. 312+001+1050 OR 3050 914+042+1050 OR 1100,1200 ECT.. ***************************************
UPDATE, I BELEIVE ONLY 914 WORKS AT THE MOMENT ***************************************
ONCE CONNECTED WITH ONE OF THESE YOU WILL EITHER HEAR A RE-ORDER, BUSY,
OR CHERP. WHEN YOU HEAR THE CHERP ENTER THE BILLING LINE IN M-F. I USE
THE CONF. DIAL- UP. A BILLING LINE EXAMPLE: KP312+001+1050ST YOU WILL THEN
HEAR TWO TUTES AND A RECORDING ASKING YOU FOR THE # OF CONFERREES INCLUDING
YOURSELF. ENTER A # BETWEEN 20 AND 30. IF YOU EVER GET OVER 30 PEOPLE ON
A CONFERANCE ALL YOU WILL HEAR IS JUMBLED VOICES. AFTER THE IT SAYS "YOUR
CONFERANCE SIZE IS XX" THEN HIT # SIGN. ADD YOUR FAVORITE LOOP ON AND HIT
6 TO TRANSFER CONTROL TO IT. AFTER IT SAYS CONTROL WILL BE TRANSFERED HANG
UP AND CALL THE OTHER SIDE OF THE LOOP, HIT # SIGN AND FOLLOW THE INSTRUCTIONS.
A BONUS FOR CONF. IS TO ADD AN INTERNATIONAL # DIAL 1+011+CC+NUMBER PRETTY
COOL EHHH. A FEW EXTRA NOTES. DO NOT ADD #S THAT YOU WILL WANT TO HANG
UP, ADD THESE THROUGH MCI OR SPRINT. YOU CANNOT BLOW ANYONE OFF W/2600HZ
UNLESS THEY ARE IN AN OLD X-BAR OR OLDER SYSTEM. MANY D.A. OPERATORS WILL
STAY ON AFTER YOU ABUSE THEM; YOU MAY HAVE TO START ANOTHER OR AT LEAST
DON'T SAY ANY NUMBERS. NEVER ADD THE TONE SIDE OF A LOOP ONTO A CONF. NEVER
ADD MORE THAN ONE MCI NODE ON YOUR CONF. ROUTE & RATE: -------------
NOTE ROUTE & RATE AND RQS PERFORM THE SAME SERVICE. R&R SIMPLY
TELLS YOU ROUTE AND RATE INFO WHICH IS VERY VALUBLE, EX. SUCH AS THE INWARD
ROUTING FOR AN EXCHANGE IN AN AREA CODE. AN INWARD ROUTING WILL LET YOU
CALL HER AND SHE CAN DO AN EMERGENCY INTERUPT FOR YOU. SHE CAN TELL YOU
HOW TO GET INTERNATIONAL OPERATORS,ECT. HERE ARE THE TERMS YOU ARE REQUIRED
TO USE: INTERNATIONAL, -OPERATOR ROUTE FOR [COUNTRY, CITY]. *GIVES YOU
INWARD OP. -DIRECTORY ROUTE FOR [COUNTRY, CITY]. *GIVES YOU DIRECTORY ASS.
-CITY ROUTE FOR [COUNTRY, CITY]. *GIVES YOU COUNTRY AND CITY CODE. OPERATOR
ROUTE FOR [A/C]+ [EXCHANGE] *GIVES YOU INWARD OP. ROUTE EX. [A/C]+ OR [A/C]+0XX+
WHEN SHE SAYS PLUS SHE MEANS PLUS 121. NUMBERS ROUTE FOR [STATE, CITY]
*GIVES YOU A/C. PLACE NAME [A/C]+[EXCHANGE] *GIVES YOU CITY/STATE FOR THAT
A/C AND EXCHANGE. INTERNATIONAL CALLS: -------------------- TO CALL INTERNATIONAL
OVER CABLE SIMPLY ACCESS A TRUNK AND DIAL KP011XXXST WAIT FOR SENDER TONE,
KPXXXCC-NUMBERST XXX - A 3 DIGIT COUNTRY CODE, IT MAY NOT BE 3 DIGITS SO
JUST PUT 1 OR 2 0'S IN FRONT OF IT. CC - IS THE CITY CODE TO GO BY SATELLITE:
DIAL KP18XST X - NUMBERS 2-8 WAIT FOR SENDER TONE THEN KPXXXCCNUMBERST
Blue Box courtesy of the Jolly Roger
To quote Karl Marx, blue boxing has
always been the most noble form of phreaking. As opposed to such things
as using an MCI code to make a free fone call, which is merely mindless
pseudo-phreaking, blue boxing is actual interaction with the Bell System
toll network. It is likewise advisable to be more cautious when blue boxing,
but the careful phreak will not be caught, regardless of what type of switching
system he is under. In this part, I will explain how and why blue boxing
works, as well as where. In later parts, I will give more practical information
for blue boxing and routing information. To begin with, blue boxing is
simply communicating with trunks. Trunks must not be confused with subscriber
lines (or "customer loops") which are standard telefone lines. Trunks are
those lines that connect central offices. Now, when trunks are not in use
(i.e., idle or "on-hook" state) they have 2600Hz applied to them. If they
are two-way trunks, there is 2600Hz in both directions. When a trunk IS
in use (busy or "off-hook" state), the 2600Hz is removed from the side
that is off-hook. The 2600Hz is therefore known as a supervisory signal,
because it indicates the status of a trunk; on hook (tone) or off-hook
(no tone). Note also that 2600Hz denoted SF (single frequency) signalling
and is "in-band." This is very important. "In-band" means that is within
the band of frequencies that may be transmitted over normal telefone lines.
Other SF signals, such as 3700Hz are used also. However, they cannot be
carried over the telefone network normally (they are "out-of-band" and
are therefore not able to be taken advantage of as 2600Hz is. Back to trunks.
Let's take a hypothetical phone call. You pick up your fone and dial 1+806-258-1234
(your good friend in Amarillo, Texas). For ease, we'll assume that you
are on #5 Crossbar switching and not in the 806 area. Your central office
(CO) would recognize that 806 is a foreign NPA, so it would route the call
to the toll centre that serves you. [For the sake of accuracy here, and
for the more experienced readers, note that the CO in question is a class
5 with LAMA that uses out-of-band SF supervisory signalling]. Depending
on where you are in the country, the call would leave your toll centre
(on more trunks) to another toll centre, or office of higher "rank". Then
it would be routed to central office 806-258 eventually and the call would
be completed. Illustration A---CO1-------TC1------TC2----CO2----B A....
you CO1=your central office TC1.. your toll office. TC2.. toll office in
Amarillo. CO2.. 806-258 central office. B.... your friend (806-258-1234)
In this situation it would be realistic to say that CO2 uses SF in-band
(2600Hz) signalling, while all the others use out-of-band signal- ling
(3700Hz). If you don't understand this, don't worry. I am pointing this
out merely for the sake of accuracy. The point is that while you are connected
to 806-258-1234, all those trunks from YOUR central office (CO1) to the
806-258 central office (CO2) do *NOT* have 2600Hz on them, indicating to
the Bell equipment that a call is in progress and the trunks are in use.
Now let's say you're tired of talking to your friend in Amarillo, so you
send a 2600Hz down the line. This tone travels down the line to your friend's
central office (CO2) where it is detected. However, that CO thinks that
the 2600Hz is originating from Bell equipment, indicating to it that you've
hung up, and thus the trunks are once again idle (with 2600Hz present on
them). But actually, you have not hung up, you have fooled the equipment
atyour friend's CO into thinking you have. Thus,it disconnects him and
resets the equipment to prepare for the next call. All this happens very
quickly (300-800ms for step-by-step equipment and 150-400ms for other equipment).
When you stop sending 2600Hz (after about a second), the equipment thinks
that another call is coming towards --> on hook, no tone -->off hook. Now
that you've stopped sending 2600Hz, several things happen: 1) A trunk is
seized. 2) A "wink" is sent to the CALLING end from the CALLED end indicating
that the CALLED end (trunk) is not ready to receive digits yet. 3) A register
is found and attached to the CALLED end of the trunk within about two seconds
(max). 4) A start-dial signal is sent to the CALLING end from the CALLED
end indicating that the CALLED end is ready to receive digits. Now, all
of this is pretty much transparent to the blue boxer. All he really hears
when these four things happen is a
Napalm (Another
way to make it...) by the Jolly Roger
(See file #021 of the Cookbook for
an easy way to make it!!) About the best fire bomb is napalm. It has a
thick consistancy, like jam and is best for use on vehilces or buildings.
Napalms is simply one part gasoline and one part soap. The soap is either
soap flakes or shredded bar soap. Detergents won't do. The gasoline must
be heated in order for the soap to melt. The usual way is with a double
boiler where the top part has at least a two-quart capicity. The water
in the bottom part is brought to a boil and the double boiler is taken
from the stove and carried to where there is no flame. Then one part, by
volume, of gasoline is put in the top part and allowed to heat as much
as it will and the soap is added and the mess is stirred until it thickens.
A better way to heat gasoline is to fill a bathtub with water as hot as
you can get it. It will hold its heat longer and permit a much larger container
than will the double boiler. ---------------Jolly Roger
Nitroglycerin
Recipe by the Jolly Roger
Like all chemists I must advise you
all to take the greatest care and caution when you are doing this. Even
if you have made this stuff before. This first article will give you information
on making nitroglyerin, the basic ingredient in a lot of explosives such
as straight dynamites, and geletin dynamites. Making nitroglycerin 1. Fill
a 75-milliliter beaker to the 13 ml. Level with fuming red nitric acid,
of 98% pure concentration. 2. Place the beaker in an ice bath and allow
to cool below room temp. 3. After it has cooled, add to it three times
the amount of fuming sulferic acid (99% h2so4). In other words, add to
the now-cool fuming nitric acid 39 ml. Of fuming sulferic acid. When mixing
any acids, always do it slowly and carefully to avoid splattering. 4. When
the two are mixed, lower thier temp. By adding more ice to the bath, about
10-15 degrees centigrade. (Use a mercury-operated thermometer) 5. When
the acid solution has cooled to the desired temperature, it is ready for
the glycerin. The glycerin must be added in small amounts using a medicine
dropper. (Read this step about 10 times!) Glycerin is added slowly and
carefully (i mean careful!) Until the entire surface of the acid it covered
with it. 6. This is a dangerous point since the nitration will take place
as soon as the glycerin is added. The nitration will produce heat, so the
solution must be kept below 30 degrees centigrade! If the solution should
go above 30 degrees, immediately dump the solution into the ice bath! This
will insure that it does not go off in your face! 7. For the first ten
minutes of nitration, the mixture should be gently stirred. In a normal
reaction the nitroglycerin will form as a layer on top of the acid solution,
while the sulferic acid will absorb the excess water. 8. After the nitration
has taken place, and the nitroglycerin has formed on the top of the solution,
the entire beaker should be transferred slowly and carefully to another
beaker of water. When this is done the nitroglycerin will settle at the
bottem so the other acids can be drained away. 9. After removing as much
acid as posible without disturbing the nitroglycerin, remove the nitroglycerin
with an eyedropper and place it in a bicarbonate of soda (sodium bicarbonate
in case you didn't know) solution. The sodium is an alkalai and will nuetralize
much of the acid remaining. This process should be repeated as much as
necesarry using blue litmus paper to check for the presence of acid. The
remaining acid only makes the nitroglycerin more unstable than it already
is. 10. Finally! The final step is to remove the nitroglycerin from the
bicarbonate. His is done with and eye- dropper, slowly and carefully. The
usual test to see if nitration has been successful is to place one drop
of the nitroglycerin on metal and ignite it. If it is true nitroglycerin
it will burn with a clear blue flame. ** Caution ** Nitro is very sensative
to decomposition, heating dropping, or jarring, and may explode if left
undisturbed and cool. -------------Jolly Roger Operation:
Fuckup by the Jolly Roger
This is a guide for Anarchists and
can be funny for non-believers and 12 and 13 year old runts, and can be
a lexicon of deadly knowledge for True Anarchists... Serious damage is
intended to be dealt here. Do not try this stuff unless you want to do
a lot of serious Anarchy. [Simulation] Asshole - 'Listen, you little teenager
punk shit, shut the fuck up, or I'll knock you down!' Anarchist - 'O.K.....You
can't say I didn't warn you. You don't know my rue power...' (soooo casually)
Asshole - 'Well, er, what do you mean? Anarchist - '
How to "steal"
local calls from most Payphones by the Jolly Roger
Now to make free local calls, you need
a finishing nail. I highly recommend "6D E.G. FINISH C/H, 2 INCH" nails.
These are about 3/32 of an inch in diameter and 2 inches long (of course).
You also need a large size paper clip. By large I mean they are about 2
inches long (FOLDED). Then you unfold the paper clip. Unfold it by taking
each piece and moving it out 90 degrees. When it is done it should look
somewhat like this: /----------\ : : : : : : : : \----- Now, on to the
neat stuff. What you do, instead of unscrewing the glued-on mouthpiece,
is insert the nail into the center hole of the mouthpiece (where you talk)
and push it in with pressure or just hammer it in by hitting the nail on
something. Just DON'T KILL THE MOUTHPIECE! You could damage it if you insert
the nail too far or at some weird angle. If this happens then the other
party won't be able to hear what you say. You now have a hole in the mouthpiece
in which you can easily insert the paper clip. So, take out the nail and
put in the paper clip. Then take the other end of the paper clip and shove
it under the rubber cord protector at the bottom of the handset (you know,
the blue guy...). This should end up looking remotely like...like this:
/----------\ Mouthpiece : : Paper clip --> : : / : /---:---\ : : : :------------>
====================\---))): : To earpiece -> ^ ^ \-------------------->
: : : : Cord Blue guy (The paper clip is shoved under the blue guy to make
a good connection between the inside of the mouthpiece and the metal cord.)
Now, dial the number of a local number you wish to call, sayyyy, MCI. If
everything goes okay, it should ring and not answer with the "The Call
You Have Made Requires a 20 Cent Deposit" recording. After the other end
answers the phone, remove the paper clip. It's all that simple, see? There
are a couple problems, however. One is, as I mentioned earlier, the mouthpiece
not working after you punch it. If this happens to you, simply move on
to the next payphone. The one you are now on is lost. Another problem is
that the touch tones won't work when the paper clip is in the mouthpiece.
There are two ways around this.. A> Dial the first 6 numbers. This should
be done without the paper clip making the connection, i.e., one side should
not be connected. Then connect the paper clip, hold down the last digit,
and slowly pull the paper clip out at the mouthpiece's end. B> Don't use
the paper clip at all. Keep the nail in after you punch it. Dial the first
6 digits. Before dialing the last digit, touch the nail head to the plate
on the main body of the phone, the money safe thingy..then press the last
number. The reason that this method is sometimes called clear boxing is
because there is another type of phone which lets you actually make the
call and listen to them say "Hello, hello?" but it cuts off the mouthpiece
so they can't hear you. The Clear Box is used on that to amplify your voice
signals and send it through the earpiece. If you see how this is even slightly
similar to the method I have just described up there, kindly explain it
to ME!! Cause I don't GET IT! Anyways, this DOES work on almost all single
slot, Dial Tone First payphones (Pacific Bell for sure). I do it all the
time. This is the least, I STRESS *LEAST*, risky form of Phreaking. ---------------Jolly
Roger
Pool Fun by the
Jolly Roger
First of all, you need know nothing
about pools. The only thing you need know is what a pool filter looks like.
If you don't know that. Second, dress casual. Preferably, in black. Visit
your "friends" house, the one whose pool looks like fun!!) Then you reverse
the polarity of his/her pool, by switching the wires around. They are located
in the back of the pump. This will have quite an effect when the pump goes
on. In other words. Boooooooooooommm! Thats right, when you mix + wires
with - plugs, and vice- versa, the 4th of july happens again. Not into
total destruction??? When the pump is off, switch the pump to "backwash".
Turn the pump on and get the phuck out! When you look the next day, phunny.
The pool is dry. If you want permanant damage, yet no great display like
my first one mentioned, shut the valves of the pool off. (There are usually
2) One that goes to the main drain and one that goes to the filter in the
pool. That should be enough to have one dead pump. The pump must take in
water, so when there isn't any... Practical jokes: these next ones deal
with true friends and there is *no* permanent damage done. If you have
a pool, you must check the pool with chemicals. There is one labeled orthotolidine.
The other is labeled alkaline (ph). You want orthotolidine. (It checks
the chlorine). Go to your local pool store and tell them you're going into
the pool business, and to sell you orthotolidine (a CL detector) Buy this
in great quantities if possible. The solution is clear. You fill 2 baggies
with this chemical. And sew the bags to the inside of your suit. Next,
go swimming with your friend! Then open the bags and look like you're enjoying
a piss. And anyone there will turn a deep red! They will be embarrased
so much, Especially if they have guests there! Explain what it is, then
add vinegar to the pool. Only a little. The "piss" disappears. HAHA!! --------------------Jolly
Roger
Free Postage
by the Jolly Roger
The increasing cost of postage to mail
letters and packages is bringing down our standard of living. To remedy
this deplorable situation, some counter control measures can be applied.
For example, if the stamps on a letter are coated with Elmer's Glue by
the sender, the cancellation mark will not destroy the stamp: the Elmer/s
drives to form an almost invisible coating that protects the stamps from
the cancellation ink. Later, the receiver of the letter can remove the
cancellation mark with water and reuse the stamps. Furthermore, ecological
saving will also result from recycling the stamps. Help save a tree. The
glue is most efficently applied with a brush with stiff, short bristles.
Just dip the brush directly into the glue and spread it on evenly, covering
the entire surface of the stamp. It will dry in about 15 minutes. For mailing
packages, just follow the same procedure as outlined above; however, the
package should be weighed and checked to make sure that it has the correct
amount of postage on it before it is taken to the Post Office. Removing
the cancellation and the glue from the stamps can be easily accomplished
by soaking the stamps in warm water until they float free from the paper.
The stamps can then be put onto a paper towel to dry. Processing stamps
in large batches saves time too. Also, it may be helpful to write the word
'Elmer' at the top of the letter (not on the envelope) to cue the receiving
party in that the stamps have been protected with the glue. We all know
that mailing packages can be expensive. And we also know that the handicapped
are sometimes discriminated against in jobs. The Government, being the
generous people they are, have given the blind free postal service. Simply
address you envelope as usual, and make one modification. In the corner
where the stamp would go, write in (or stamp) the words 'FREE MATTER FOR
THE BLIND". Then drop you package or letter in one of the blue fedral mailboxes.
DO NOT TAKE THE LETTER TO THE POST OFFICE, OR LEAVE IT IN YOUR MAILBOX.
Sounds very nice of the government to do this, right? Well, they aren't
that nice. The parcel is sent library rate, that is below third class.
It may take four to five days to send a letter to just the next town. This
too is quite simple, but less effective. Put the address that you are sending
the letter to as the return address. If you were sending a $20 donation
to the pirate's Chest, you would put our address (po box 644, lincoln ma.
01773) as the return address. Then you would have to be carless and forget
to put the stamp on the envelope. A nice touch is to put a bullshit address
in the center of the envelope. Again, you MUST drop the letter in a FEDRAL
mailbox. If the post office doesn't send the letter to the return address
for having no stamp, they will send it back for the reason of "No such
address". Example-- Pirates Chest Dept. 40DD P.O. Box 644865 Lincol, Ma.
41773 Tom Bullshit 20 Fake Road What Ever, XX 99851 One last thing you
might try doing is soaking a cancelled stamp off of an envelope, and gluing
it onto one you are sending. Then burn the stamp, leaveing a little bit
to show that there was one there. --------------Jolly Roger Unstable
Explosives by the Jolly Roger
Mix solid Nitric Iodine with househould
ammonia. Wait overnight and then pour off the liquid. You will be left
with a muddy substance. Let this dry till it hardens. Now throw it at something!!!!
----------------Jolly Roger
Weird Drugs by
the Jolly Roger
Bananas: 1. Obtain 15 pounds of ripe
yellow bananas 2. Peel all and eat the fruit. Save the peelings 3. Scrape
all the insides of the peels with a sharp knife. 4. Put all the scraped
material in a large pot and add water. 5. Boil 3 or 4 hours until it has
attained a solid paste considtency. 6. Spread paste onto cookie sheets
and dry in ofen for about 20 minutes. This will result in fine black powder.
Usually one will feel the effects after smoking three to four cigarettes.
Cough syrup: mix robitussion a-c with an equal amount of ginger ale and
drink. The effect are sedation and euphoria. Never underestimate the effects
of any drug! You can od on cough syrup! Toads: 1. Collect five to ten toads,
frogs will not work. The best kind are tree toads. 2. Kill them as painlessly
as possible, and skin immediately. 3. Allow the skins to dry in a refrigerator
four four to five days, or until the skins are brittle. 4. Now crush the
skins into powder and smoke. Due to its bad taste you can mix it with a
more fragrent smoking medium. Nutmeg: 1. Take several whole nutmegs and
grind them up in an old grinder. 2. After the nutmegs are ground. Place
in a mortar and pulverize with a pestle. 3. The usual dosage is about 10
or 15 grams. A larger dose may produce excessive thirst,anxiety,and rapid
hart beat, but hallucinations are rare. Peanuts: 1. Take 1 pound of raw
peanuts (not roasted) 2. Shell them, saving the skins and discarding the
shells. 3. Eat the nuts. 4. Grind up the skins and smoke them. ------------------Jolly
Roger
The Art of Carding
by the Jolly Roger
Obtaining a credit card number: There
are many ways to obtain the information needed to card something. The most
important things needed are the card number and the expiration date. Having
the card-holders name doesn't hurt, but it is not essential. The absolute
best way to obtain all the information needed is by trashing. The way this
is done is simple. You walk around your area or any other area and find
a store, mall, supermarket, etc., that throws their garbage outside on
the sidewalk or dumpster. Rip the bag open and see if you can find any
carbons at all. If you find little shreds of credit card carbons, then
it is most likely not worth your time to tape together. Find a store that
does not rip their carbons at all or only in half. Another way is to bullshit
the number out of someone. That is call them up and say "Hello, this is
Visa security and we have a report that your card was stolen." They will
deny it and you will try to get it out of them from that point on. You
could say, "It wasn't stolen? Well what is the expiration date and maybe
we can fix the problem.... Ok and what is the number on your card?......Thank
you very much and have a nice day." Or think of something to that degree.
Another way to get card numbers is through systems such as TRW and CBI,
this is the hard way, and probably not worth the trouble, unless you are
an expert on the system. Using credit card numbers posted on BBS's is risky.
The only advantage is that there is a good chance that other people will
use it, thus decreasing the chances of being the sole-offender. The last
method of getting numbers is very good also. In most video rental stores,
they take down your credit card number when you join to back-up your rentals.
So if you could manage to steal the list or make a copy of it, then you
are set for a LONG time. Choosing a victim: Once you have the card number,
it is time to make the order. The type of places that are easiest to victimize
are small businesses that do mail order or even local stores that deliver.
If you have an ad for a place with something you want and the order number
is NOT a 1-800 number then chances are better that you will succeed. Ordering:
When you call the place up to make the order, you must have several things
readily at hand. These are the things you will need: A name, telephone
number, business phone, card number (4 digit bank code if the card is MasterCard),
expiration date, and a complete shipping and billing address. I will talk
about all of these in detail. A personal tip: When I call to make an order,
it usually goes much smoother if the person you are talking to is a woman.
In many cases they are more gullible than men. The name: You could use
the name on the card or the name of the person who you are going to send
the merchandise to. Or you could use the name on the card and have it shipped
to the person who lives at the drop (Say it is a gift or something). The
name is really not that important because when the company verifies the
card, the persons name is never mentioned, EXCEPT when you have a Preffered
Visa card. Then the name is mentioned. You can tell if you have a Preffered
Visa card by the PV to the right of the expiration date on the carbon.
Nophone all day long waiting for the company to call (Which they will),
then the phone number to give them as your home-phone could be one of the
following: A number that is ALWAYS busy, a number that ALWAYS rings, a
payphone number, low end of a loop (and you will wait on the other end),
or a popular BBS. NEVER give them your home phone because they will find
out as soon as the investigation starts who the phone belongs to. The best
thing would be to have a payphone call forward your house (via Cosm The
business number: When asked for, repeat the number you used for your home
phone. Card number: The cards you will use will be Visa, Mastercard, and
American Express. The best is by far Visa. It is the most straight-forward.
Mastercard is pretty cool except for the bank code. When they ask for the
bank code, they sometimes also ask for the bank that issued it. When they
ask that just say the biggest bank you know of in your area. Try to avoid
American Express. They tend to lead full scale investigations. Unfortunately,
American Express is the most popular card out. When telling the person
who is taking your call the card number, say it slow, clear, and with confidence.
e.g. CC# is 5217-1234-5678-9012. Pause after each set of four so you don't
have to repeat it. Expiration date: The date must be at LEAST in that month.
It is best to with more than three months to go. The address: More commonly
referred to as the 'drop'. Well the drop can range from an abandoned building
to your next door neighbors apartment. If you plan to send it to an apartment
building then be sure NOT to include an apartment number. This will confuse
UPS or postage men a little and they will leave the package in the lobby.
Here is a list of various drops: The house next door whose family is on
vacation, the apartment that was just moved out of, the old church that
will be knocked down in six months, your friends house who has absolutely
nothing to do with the type of merchandise you will buy and who will also
not crack under heat from feds, etc.. There are also services that hold
merchandise for you, but personally I would not trust them. And forget
about P.O. Boxes because you need ID to get one and most places don't ship
to them anyway. Other aspects of carding:Verifying cards, seeing if they
were reported stolen. Verifying cards: Stores need to verify credit cards
when someone purchases something with one. They call up a service that
checks to see if the customer has the money in the bank. The merchant identifies
himself with a merchant number. The service then holds the money that the
merchant verified on reserve. When the merchant sends in the credit card
form, the service sends the merchant the money. The service holds the money
for three days and if no form appears then it is put back into the bank.
The point is that if you want to verify something then you should verify
it for a little amount and odds are that there will be more in the bank.
The good thing about verification is that if the card doesn't exist or
if it is stolen then the service will tell you. To verify MasterCard and
Visa try this number. It is voice:1-800-327-1111 merchant code is 596719.
Stolen cards: Mastercard and Visa come out with a small catalog every week
where they publish EVERY stolen or fraudulantly used card. I get this every
week by trashing the same place on the same day. If you ever find it trashing
then try to get it every week. Identifying cards: Visa card numbers begin
with a 4 and have either 13 or 16 digits. MasterCard card numbers begin
with a 5 and have 16 digits. American Express begins with a 3 and has 15
digits. They all have the formats of the following: 3xxx-xxxxxx-xxxxx American
Express 4xxx-xxx-xxx-xxx Visa 4xxx-xxxx-xxxx-xxxx Visa 5xxx-xxxx-xxxx-xxxx
MasterCard Gold cards: A gold card simply means that credit is good for
$5000. Without a gold card, credit would be normally $2000. To recognize
a gold card on a carbon there are several techniques: American Express-none.
Visa-PV instead of CV. Note-When verifying a PV Visa, you have to have
the real name of the cardholder. Mastercard-An asterix can signify a gold
card, but this changes depending when the card was issued. I am going to
type out a dialog between a carder and the phone operator to help you get
the idea. Operator: "Over-priced Computer Goods, may I help you?" Carder:
"Hi, I would like to place an order please." Operator: "Sure, what would
you like to order?" Carder: "400 generic disks and a double density drive."
Operator: "Ok, is there anything else?" Carder: "No thank you, that's all
for today." Operator: "Ok, how would you like to pay for this? MasterCard
or Visa?" Carder: "Visa." Operator: "And your name is?" Carder: "Lenny
Lipshitz." (Name on card) Operator: "And your Visa card number is?" Carder:
"4240-419-001-340" (Invalid card) Operator: "Expiration date?" Carder:
"06-92." Operator: "And where would you like the package shipped to?" Carder:
"6732 Goatsgate Port. Paris,texas,010166." Operator: "And what is your
home telephone number?" Carder: "212-724-9970" (This number is actually
always busy) Operator: "I will also need your business phone number in
case we have to reach you." Carder: "You can reach me at the same number.
212-724-9970" Operator: "O.K. Thank you very much and have nice day." Carder:
"Excuse me, when will the package arrive?" Operator: "In six to seven days
UPS." Carder: "Thanks alot, and have a pleasant day." Now you wait 6-7
days when the package will arrive to the address which is really a house
up for sale. There will be a note on the door saying, "Hello UPS, please
leave all packages for Lenny Lipshitz in the lobby or porch. Thanks alot,
Lenny Lipshitz" (Make the signature half-way convincing) ------------------Jolly
Roger
Recognizing credit
cards by the Jolly Roger
[Sample: American Express] XXXX XXXXXX
XXXXX MM/Y1 THRU MM/Y2 Y1 John Doe AX Explanation: The first date is the
date the person got the card, the second date is the expriation date, after
the expiration date is the same digits in the first year.The American Express
Gold has many more numbers (I think 6 8 then 8). If you do find a Gold
card keep it for it has a $5000.00 backup even when the guy has no money!
[Sample: Master Card] 5XXX XXXX XXXX XXXX XXXX AAA DD-MM-YY MM/YY John
Doe. Explanation: The format varies, I have never seen a card that did
not start with a 5XXX there is another 4 digits on the next line that is
sometimes asked for when ordering stuff, (and rarely a 3 digit letter combo
(e. ANB). The first date is the date the person got the card and the second
date is the expiration date. Master Card is almost always accepted at stores.
[Sample: VISA] XXXX XXX(X) XXX(X) XXX(X) MM/YY MM/YY*VISA John Doe Explanation:
Visa is the most straight forward of the cards,for it has the name right
on the card itself, again the first date is the date he got the card and
the second is the expiration date. (Sometimes the first date is left out).
The numbers can eather be 4 3 3 3 or 4 4 4 4. Visa is also almost always
accepted at stores, therefore, the best of cards to use. Recognizing credit
cards by the Jolly Roger [Sample: American Express] XXXX XXXXXX XXXXX MM/Y1
THRU MM/Y2 Y1 John Doe AX Explanation: The first date is the date the person
got the card, the second date is the expriation date, after the expiration
date is the same digits in the first year.The American Express Gold has
many more numbers (I think 6 8 then 8). If you do find a Gold card keep
it for it has a $5000.00 backup even when the guy has no money! [Sample:
Master Card] 5XXX XXXX XXXX XXXX XXXX AAA DD-MM-YY MM/YY John Doe. Explanation:
The format varies, I have never seen a card that did not start with a 5XXX
there is another 4 digits on the next line that is sometimes asked for
when ordering stuff, (and rarely a 3 digit letter combo (e. ANB). The first
date is the date the person got the card and the second date is the expiration
date. Master Card is almost always accepted at stores. [Sample: VISA] XXXX
XXX(X) XXX(X) XXX(X) MM/YY MM/YY*VISA John Doe Explanation: Visa is the
most straight forward of the cards,for it has the name right on the card
itself, again the first date is the date he got the card and the second
is the expiration date. (Sometimes the first date is left out). The numbers
can eather be 4 3 3 3 or 4 4 4 4. Visa is also almost always accepted at
stores, therefore, the best of cards to use.
How To Create
A New Indentity By The Walking Glitch Courtesy of the Jolly Roger!
You might be saying, "Hey Glitch, what
do I need a new identity for?" The answer is simple. You might want to
go buy liquor somewhere, right? You might want to go give the cops the
false name when you get busted so you keep your good name, eh? You might
even want to use the new identity for getting a P.O. Box for carding. Sure!
You might even want the stuff for renting yourself a VCR at some dickless
loser of a convenience store. Here we go: Getting a new ID isn't always
easy, no one said it would be. By following these steps, any bozo can become
a new bozo in a coupla weeks. STEP 1 The first step is to find out who
exactly you'll become. The most secure way is to use someone's ID who doesn't
use it themselves. The people who fit that bill the best are dead. As an
added bonus they don't go complaining one bit. Go to the library and look
through old death notices. You have to find someone who was born about
the same time as you were, or better yet, a year or two older so you can
buy booze, etc. You should go back as far as you can for the death because
most states now cross index deaths to births so people can't do this in
the future. The cutoff date in Wisconsin is 1979, folks in this grand state
gotta look in 1978 or earlier. Anything earier there is cool. Now, this
is the hardest part if you're younger. Brats that young happen to be quite
resilient, takin' falls out of three story windows and eating rat poison
like its Easter candy, and not a scratch or dent. There ain't many that
die, so ya gotta look your ass off. Go down to the library and look up
all the death notices you can, if it's on microfilm so much the better.
You might have to go through months of death notices though, but the results
are well worth it. You gotta get someone who died locally in most instances:
the death certificate is filed only in the county of death. Now you go
down to the county courthouse in the county where he died and get the death
certificate, this will cost you around $3-$5 depending on the state you're
in. Look at this hunk of paper, it could be your way to vanish in a clould
of smoke when the right time comes, like right after that big scam. If
You're lucky, the slobs parents signed him up with social security when
he was a snot nosed brat. That'll be another piece of ID you can get. If
not, thats ok too. It'll be listed on the death certificate if he has one.
If you're lucky, the stiff was born locally and you can get his birth certificate
right away. STEP 2 Now check the place of birth on the death certificate,
if it's in the same place you standing now you're all set. If not, you
can mail away for one from that county but its a minor pain and it might
take a while to get, the librarian at the desk has listings of where to
write for this stuff and exactly how much it costs. Get the Birth cirtificate,
its worth the extra money to get it certified because thats the only way
some people will accept it for ID. When yur gettin this stuff the little
forms ask for the reason you want it, instead of writing in "Fuck you",
try putting in the word "Geneology". They get this all the time. If the
Death certificate looks good for you, wait a day or so before getting the
certified birth certificate in case they recognize someone wanting it for
a dead guy. STEP 3 Now your cookin! You got your start and the next part's
easy. Crank out your old Dot matrix printer and run off some mailing labels
addressed to you at some phony address. Take the time to check your phony
address that there is such a place. Hotels that rent by the month or large
apartment buildings are good, be sure to get the right zip code for the
area. These are things that the cops might notice that will trip you up.
Grab some old junk mail and paste your new lables on them. Now take them
along with the birth certificate down to the library. Get a new library
card. If they ask you if you had one before say that you really aren't
sure because your family moved around alot when you were a kid. Most libraries
will allow you to use letters as a form of ID when you get your card. If
they want more give them a sob story about how you were mugged and got
your wallet stolen with all your identification. Your card should be waiting
for you in about two weeks. Most libraries ask for two forms of ID, one
can be your trusty Birth Certificate, and they do allow letters addressed
to you as a second form. STEP 4 Now you got a start, it isn't perfect yet,
so let's continue. You should have two forms of ID now. Throw away the
old letters, or better yet stuff them inside the wallet you intend to use
with this stuff. Go to the county courthouse and show them what nice ID
you got and get a state ID card. Now you got a picture ID. This will take
about two weeks and cost about $5, its well worth it. STEP 5 If the death
certificate had a social security number on it you can go out and buy one
of those metal SS# cards that they sell. If it didn't, then you got all
kinds of pretty ID that shows exactly who you are. If you don't yet have
an SS#, Go down and apply for one, these are free but they could take five
or six weeks to get, Bureaucrats you know... You can invent a SS# too if
ya like, but the motto of 'THE WALKING GLITCH' has always been "Why not
excellence?". STEP 6 If you want to go whole hog you can now get a bank
account in your new name. If you plan to do alot of traveling then you
can put alot of money in the account and then say you lost the account
book. After you get the new book you take out all the cash. They'll hit
you with a slight charge and maybe tie-up your money some, but if you're
ever broke in some small town that bank book will keep you from being thrown
in jail as a vagrant. ALL DONE? So kiddies, you got ID for buying booze,
but what else? In some towns (the larger the more likely) the cops if they
catch you for something petty like shoplifting stuff under a certain dollar
amount, will just give you a ticket, same thing for pissing in the street.
Thats it! No fingerprints or nothing, just pay the fine (almost always
over $100) or appear in court. Of course they run a radio check on your
ID, you'll be clean and your alter-ego gets a blot on his record. Your
free and clear. Thats worth the price of the trouble you've gone through
right there. If your smart, you'll toss that ID away if this happens, or
better yet, tear off your picture and give the ID to someone you don't
like, maybe they'll get busted with it. If you're a working stiff, here's
a way to stretch your dollar. Go to work for as long as it takes to get
unemployment and then get yourself fired. Go to work under the other name
while your getting the unemployment. With a couple of sets of ID, you can
live like a king. These concepts for survival in the new age come to you
compliments of THE WALKING GLITCH. First release of this phile 7/7/88.
brought to you in the Cookbook courtesy of... ---------------The Jolly
Roger ##########################################################################
# # # The Remote Informer # # # #------------------------------------------------------------------------#
# # # Editors: Tracker, Norman Bates, and Ye Cap'n # # # #========================================================================#
# September 26, 1987 Issue: 02 # #========================================================================#
##########################################################################
# # # Brought to you by the 'new' TUFF: The Underground Fone Federation
# # # ##########################################################################
==========================================================================
The News ==========================================================================
Sprint Strikes Back | Celestial Elite/TUFF Come to an End ==============================|===========================================
Sprint caught a guy dealing| Celestial Elite and TUFF, the famous codes
on the street in LA|hack/phreak groups came to an end a couple this past
week. Information|weeks ago. TUFF, however, is being reborn on this bust
is limited at|and you can expect it to be back to full this time. |force
within a month. Sources have it that A seventeen year old was|Magnus Adept,
head of the now terminated busted in Arizona last week.|group, Celestial
Elite, has started a new The name of the teenager will|group called Avalon
Kingdom. We are unsure not be printed to protect him|what plans are in
store for it. from harassment calls. | TUFF has several ideas and plans
that |will be out to the public soon. Look for >This information was supplied|future
issues of The Remote Informer (tm) by Phreaky Phone II |for new updates.
==========================================================================
Beige Box Bust | TeleNet Hacker | Bate's Motel Moves ==============================|====================|======================
One of our editors and a| Crusader released| Bate's Motel BBS, member of
TUFF, Norman Bates|his TeleNet hacking|run by Norman Bates, was caught
for Beige boxing|program on September|was forced to move. It that he had
done over 3 months|20, 1987. Look for|is temporarily set up ago. The calls
he had made|it on a good board|at (619)267-8619. It were inside his state
and cost|you call. A review|will remain 1200 baud, a total of $12. He paid
the|will be in the next|and a member of the bill and no charges were filed|issue
of The Remote |TUFF Network. It is against him. |Informer. |open to the
public. ==========================================================================
Phreaky Phones Return: Amazing? | LDDS Buys Out TMC: Companies Merge =====================================|====================================
The original Phreaky Phone numbers| LDDS bought out TMC last month. now
support the new Phreaky Phones.|They merged into LDDS, since it was The
guys running them had protested|bigger and more widespread. Any that the
lines were being monitored.|companies that were subscribing to There is
no way that could have been,|the TMC long distance service were and they
contradicted themselves by|automatically coverted to LDDS. All restarting
Phreaky Phones on the same|local TMC ports still work, but will numbers.
They gave alot of credit|soon be disconnected. Refer to the to the people
calling to suggest they|article on LDDS in this issue for believe a story
like that. |more information on LDDS dial-ups. ==========================================================================
US Sprint Calls Destinations | Pirate's Hollow Is Back With 10 Megs ==========================================================================
US Sprint now calls all the| Pirate's Hollow is back on-line. It numbers
called with unauthorized|now is run a 10 meg hard drive. Unlike codes.
Their dis-advantage is|most boards that have #'s of megs, this that they
are delayed by about|one will stress more attention on it's two months
in calling because|database. The database is scheduled to they have to
wait till people|be online by October 1st. This database report they did
not make calls to|will contain 800+ text files on various the numbers they
were billed for.|topics, with about 60% - 70% pertaining Best advice is
to not call voice|to illegal activities. Unfortunately, with Sprint except
to those who|Trax Xe is being redesigned, so until it have private lines
other than|is finished, it will run on Carina. The their regular phone
line. |number is (415)593-6784 (300/1200 baud). ==========================================================================
Raggers and Braggers ==========================================================================
This section is to make you aware of well-known raggers and braggers. Since
this is the first time this section is being printed, we will tell you
what classifies people as raggers and braggers. In the future issues the
top raggers and braggers will be listed in this newsletter to let the SysOps
know who not to let on their board, or to atleast keep an eye on. A ragger
is someone who will put someone else down for something. The person might
post a message asking a novice question about hacking and phreaking, or
may say something that is completely wrong, and a ragger will put the other
person down for he said, posted, etc. The ones that usually classify in
this category are the ones that think they know it all and consider themselves
right no matter what anyone says. Most of the users that use codes and
consider themselves a master phreaker usually become raggers. A bragger
is someone who either does or thinks he does know everything, and puts
it upon himself to tell the whole world that he knows it all. This person
is also one who thinks he is better than everyone else and he believes
he is Elite, and no one else is. People who tend to do this are those who
have, for some reason, become well-known in the underworld, and as a result
become a bragger. Those usually not too well-known will not tend to brag
as much as those who think everyone would love to be their friend and be
like them. As a well-known ragger and bragger, The Toad, learned that it
does not help to be one or both of those. He has since changed and is now
easily accepted by most. Most people disliked him because others they knew
had said something bad about him. This is called peer pressure and is a
bad influence to those who are new to the underworld. I would suggest in
the future, to not judge someone by what others say, but rather by how
they act around/to you. The current most popular Atarian that classifies
as a ragger and a bragger is Ace of Aces, and is well-hated by many users
and SysOps, since he tends to put down anything anyone says and considers
himself the best at writing hacking programs. He is commonly referred to
as Ass of Asses and Ass of Assholes. Even holding an open mind about this
guy, you would soon come to find that what others said coincides with what
you see from him. ==========================================================================
A New 950 has arrived! ==========================================================================
LDDS, who as mentioned above bought out TMC, is installing a new 950 port
to most major cities. By the time you read this, it should be in almost
every area that supports 950 ports. The number is 950-1450. This port will
dial 976 numbers, but not 700, 800, or 900 numbers. The dialing method
for LDDS is: 7 digit code, then even if the code is bad it will give you
a dial tone. Then dial the area code plus the number. If you have a bad
code it will simply say your call cannot be completed as it was dialed.
There is a default code used on the system that currently works. The code
is simply, 1234567. I have seen codes from 5 different companies and they
all are in the format of 00xxxxx. I do not know what type of software they
use, but I will know by the next issue exactly what they place on the bills.
This could be the answer to alot of people's problems with fear of Sprint
and ITT, especially AllNets. Just remember, Tracker is the one who found
this, and all information about it. If someone is seen saying they found
this, then they will be listed in the next issue which will contain an
article on leeches. ==========================================================================
Mailbox Systems ==========================================================================
Mailbox systems are the link between information and the underworld. If
you have ever called one, then you will know the advantages of having one,
especially the ones that are open to whole underworld, rather than just
a select few. There are two types of mailbox systems that are widely used.
The first type we will talk about is the multiple mailbox systems, or commonly
referred to as message systems. These systems have several mailboxes set
up on one number. Usually, you can access other mailboxes from that number
by pressing '*' or '#'. Sometimes you just enter the mailbox number and
you are connected. These are the safest systems to use to protect information
from US Sprint and other long distance companies. Since US Sprint and other
companies call the destination numbers, it is safer to have 800 mailbox
systems, and most of the time, the multiple mailbox systems are on 800
numbers. The passcode on these systems can vary in length and can be accessed
by several different methods, so it is impossible to explain exactly how
to hack these systems. The other type is the single mailbox system. These
are usually set up in a reserved prefix in an area code. (Ex: 713-684-6xxx)
These systems are usually controlled by the same type of hardware/software.
To access the area where you enter the passcode, just hit '0' for a second
or so. The passcodes are four (4) digits long. The only way to hack these
is manually. The best thing you could do is to find one that does not have
a recording from a person, but just the digitized voice. If you hack one
that someone already owns, they will report it and it will not last as
long. Here is a list mailboxes or prefixes to help you get started --------------------------------------------------------------------------
Single Multiple Digits ------------ ------------ -------- 213-281-8xxx
212-714-2770 3 213-285-8xxx 216-586-5000 4 213-515-2xxx 415-338-7000 Aspen
Message System 3 214-733-5xxx 714-474-2033 Western Digital 214-855-6xxx
800-222-0651 Vincent and Elkins 4 214-978-2xxx 800-233-8488 3 215-949-2xxx
800-447-8477 Fairylink 7 312-450-8xxx 800-521-5344 3 313-768-1xxx 800-524-2133
RCA 4 405-557-8xxx 800-527-0027 TTE TeleMessager 6 602-230-4xxx 800-632-7777
Asynk 6 619-492-8xxx 800-645-7778 SoftCell Computers 4 713-684-6xxx 800-648-9675
Zoykon 4 800-847-0003 Communications World 3 ==========================================================================
The Disclaimer! ==========================================================================
We, the editors, take no responsibility for your actions and use of the
information in this newsletter. This newsletter is for informational purposes
only. If you are easily offended by telecommunication discussions, then
we suggest that you not read this newsletter. But for those who are truely
interested in the information in this newsletter, enjoy it. ==========================================================================
Coming in the next issue! ==========================================================================
In the next issue, we will be open for suggestions from the readers of
this issue. We will have some featured articles though, which include:
1) Study of bridges 2) Review of Crusader's new TeleNet Hacker 3) More
information on the new LDDS 950 port 4) Review of Code Hackers for all
modems 5) List of TeleNet addresses 6) Credit Card checkers 7) Ideas from
the readers ==========================================================================
Brought to you in the Cookbook by the Jolly Roger!!!!!!!!!!!!!!! ##############################################################################
# _________________________________ # # /he Remote Informer Newsletter!
# # # #----------------------------------------------------------------------------#
# November TRI Issue: 03 # #----------------------------------------------------------------------------#
# # # The Editors: Tracker, Ye Cap'n, Norman Bates, and The Reporter #
# # ##############################################################################
==============================================================================
= Introduction = ==============================================================================
It's been a month now, and ALOT has happened. So much, in fact, that the
information will be split into several issues. This should be no shock
since I mentioned in the first issue that we may put several issues out
sometimes. I want to congratulate the readers for finally contributing
to the newsletter. This first two issues were all on information that I,
myself, obtained. Several people gave me information for these issues,
and their handle and information is included in the articles. ==============================================================================
= In The News! = ==============================================================================
ITT has 9 digits! | Phreaky Phones Go Down! |Information! ==============================================================================
For those of you who did| The famed Phreaky Phones are down| We have not
know this, ITT has nine|again. Modem Man, the original person|so much info
digit codes. They are said|that started them, has said that they|to put
out, to give better connections|will be down until further notice. In|that
we are to some extent. This info.|the meantime, other independent boxes|putting
out was originally given to us|are being started. A listing can be|many
issues by Party Beast. |made of current ones on request. |at one time.
=================================================================|If you
want Magnus Adept Gets Busted | Sprint Codes Are Dying Fast! |all issues
=================================================================|that
are out Fellow Atarian and well-| Sprint codes are hard to get and|now,
then known phreak Magnus Adept|when they are obtained, they tend to|call
one of got caught by MCI. Details|die rather quickly. Phreakers have|the
boards of the how, when, and where|been saying that the 950-0777 port|at
the end are not known at this time.|is dead, but on the contrary, it is|of
the issue He got caught with 150 codes|still available in states that are|or
look for and may have to pay up to|not highly abused by phreaks. Here|an
editor on 50 dollars for each code.|again, rumors are being spread. |a
hack BBS. ==============================================================================
= The Best BBS of the Month = ==============================================================================
Starting from now on, we will have a BBS of the month. We will choose a
BBS, ragardless of computer type, and look at the user participation in
phreak related matters, as well as quality discussions on the various illegal
topics. A BBS can remain the BBS of the month as long as they reside above
the rest of the BBS systems. Even though we will sometimes bring out more
than one issue in a month, the board will remain BBS of the month until
the first issue inthe next month comes out. This month's BBS of the month
is FBI PirateNet. We chose this board because of the large numbers of posts
in the bases, and not only information, but discussions as well, with a
minimum number of posts from raggers and braggers. The number for it is
516-661-7360. The SysOp of FBI PirateNet is The Phantom, not to be confused
with an earlier narc. ==============================================================================
= US Sprint Expected to Trim Staff, Consolidate Divisions = ==============================================================================
New York -- US Sprint Communications Corp., the troubled long distance
carrier, is expected to announce soon that it will cut its work force by
several hundred people and reduce its seven regional divisions to 3 operating
groups, sources familiar with the company said. The company's Pacific division
is based in Burlingame, CA. The layoffs and reorganization are part of
a plan by US Sprint's new president, Robert H. Snedaker, to reduce heavy
operating losses, which analysts expect to reach more than $800 million
this year. Snedaker replaced Charles M. Slibo, who was forced to resign
in July because losses were running much higher than the parent companies
had expected. Problems with the company's computerized billing system also
contributed to Skibo's ouster. US Sprint is owned and operated by the GTE
Corp. and United TeleCom. According to sources close to Snedaker, who was
vice chairman and chief operating officer of United TeleCom, he is planning
to consolidate the company's 7 divisions, which operate in the same geographical
regions as the seven regional Bell operating companies, into 3 divisions.
The rationale for the move, according to idustry analysts, is that the
company will need a much smaller work force once it begins handling all
it's phone traffic on it's new fiber optic network, which can carry a greater
number of telephone calls at less cost. Company officials have said that
they expect to have most of the traffic on the network by early next year.
One source said that there would be more than one round of layoffs in the
coming months and that the company ultimately plans to reduce its 14,000
member work force by 15 percent. Several top managers are expected to resign
as soon as US Sprint centralizes its marketing and support operations as
its headquarters in Kansas City, MO., according to a report in the latest
issue of Business Week magazine. A spokesman for US Sprint said on Friday
that the company would not comment on the rumors. The company is the nation's
third largest long distance company, after the American Telephone and Telegraph
Co. (AT&T) and MCI Communications Co. Last year, Washington based MCI
undertook a similar reorganization in which it posted a $502.5 million
loss to write down old inventory and restructure operations. Analysts said
that is US Sprint is to turn a profit, the company must increase its market
share. "To do this, US Sprint must gain more large business customers,
which account for about 80 percent of industry revenues," said Robert B.
Morris III, Securities in San Francisco. Morris said that by using a slick
marketing campaign to differentiate its all-fiber telephone network from
those of competitors, US Sprint more than doubled its customer base last
year. But "most of these customers were residential and small business
users that added little to Sprint's bottom line," he added. "If the company
expects to be profitable, it will have to concentrate on providing the
best service to volume users." ] This information was supplied by Ye Cap'n
==============================================================================
= Secret Service Cracks Down on Teen Hackers = ==============================================================================
Mount Lebanon, PA -- The US Secret Service and local police departments
have put a scare into the hacker community with a nationwide crackdown
on computer crime that has resulted in the arrests of teenage hackers in
at least three cities. "People who monitor the bulletin boards say there
are a lot of nervous hackers out there, wondering who will be arrested
next," says Ronald E. Freedman, vice-president of Advanced Information
Management, a Woodbridge, VA base computer security firm. Nine teenagers
from Mount Lebanon Junior-Senior High School near Pittsburg, PA, were arrested
recently and charged with computer fraud. The juveniles allegedly used
home computers to gain illegal access to a credit card authorization center.
They obtained valid credit card numbers and used them to purchase thousands
of dollars worth of mail order merchandise, the police said. Freedman says
it appears the hackers used some relatively sophisticated techniques in
the scheme, including specially written software that enabled them to bypass
security controls and navigate through credit records to obtain key information.
Police officials say that the hackers also obtained access codes from pirate
bulletin board systems to make free long distance calls and gain access
to various business and government computers. The arrests were the result
of a 6 week investigation by the Secret Service and the Mount Lebanon police.
The police were tipped off by parents who were suspicious about how their
son managed to obtain a skateboard valued at $140. The Secret Service was
also involved in investigations that led to the arrests of several hackers
in San Francisco and New York last July. Secret Service spokesman William
Corbett says that although some reports have portrayed the hackers as part
of a national crime ring, the cases are unrelated. "It's just that a few
of these computers hacking cases came to a head at about the same time,"
he says. Federal Legislation enacted in 1984 gives the Secret Service,
part of the Department of the Treasury, a major role in investigating computer
crimes. Under the federal Computer Fraud and Abuse Act of 1986, computer
fraud is a felony that carries a maximum penalty of 5 years for the first
offense, and 10 years for the second. Displaying unauthorized passwords
on hacking bulletin boards carries a maximum penalty of 1 year in prison
for the first offense, and 10 years for the second. ] This information
was supplied by Ye Cap'n ==============================================================================
= German Teens Crack NASA = ==============================================================================
Washington, D.C. -- A group of West German teenagers from the Chaos Computer
Club penetrated a NASA network recently, saying they were doing it to "test
the security." What they got into was SPAN Net, a computer network with
about 700 notes, which is actually based at the Goddard Space Center in
Maryland. All that's in there is unclassified data, space science information,
and post-flight data anaysis. "Anyone with NASA related research can apply
for access to SPAN" says a spokesman, who adds that the network runs on
DEC VAX hardware. "We picked up three attempts to gain access and put in
security precautions so it would't happen." His personal opinion is, "We're
happy that they couldn't get back in, and decided to go public." He also
added that NASA has many other networks, many of the classified and "probably
inpenetrable. But I do not want to challenge anybody." How'd they get in?
Probably they got a West German NASA licensee, which gave them a visitor's
pass, then they created new passwords with unlimited security for themselves,
after which getting around the network was easy. ] Supplied by Ye Cap'n
==============================================================================
We look for information in anyway related to the newsletter. If you have
something of interests, or something that you saw on television, or in
the newspaper, then upload it to one of the boards listed below. You will
receive full credit. Pirate's Hollow..................................................(415)593-6784
Bate's Motel.....................................................(619)267-0293
==============================================================================
##############################################################################
# _________________________________ # # /he Remote Informer Newsletter!
# # # #----------------------------------------------------------------------------#
# November TRI Issue: 04 # #----------------------------------------------------------------------------#
# # # The Editors: Tracker, Ye Cap'n, Norman Bates and The Reporter # #
# ##############################################################################
==============================================================================
= FCC Charges Much Ado About Not Much = ==============================================================================
New Cannan, CT -- International Resource Develope of New Cannan, CT says
that the market bubble for packet switch networks like TeleNet is going
to burst by 1991, regardless of what the Federal Communications Commission
does about access charges. Cheap fiber, which greatly increases the capacity,
and ISDN services, which let you share a phone line with your computer,
will do the business in, the report says. Over the next four years, however,
the demand for packet switch services to will grow from $650 million to
$1,612 million (If the Baby Bells are allowed to add competition to the
market, the $5/hour access charge cannot be passed though to the customers
anyway). ] Supplied by Ye Cap'n ==============================================================================
= Pirate's Hollow Update = ==============================================================================
San Carlos, CA -- The Pirate's Hollow, one of the more popular BBS's in
the Bay Area, is installing several new features that will even add to
it's popularity. For one, users will be able to gamble against each other
by betting on NFL games and participating in the Pirate's Hollow Lottery.
Also, in order to support one of the best newsletters around, the Pirate's
Hollow will soon be adding a seperate module that will act as an outpost
for The Remote Informer. This module will feature the older issues of the
newsletter, a section that will keep you abreast of updates of recently
released information, and a section that will show what is upcoming in
the next issues of The Remote Informer. The long-awaited database will
soon be put online. Over 800 textfiles on a variety of subjects will be
available to the users that pay the access fee that will be determined
at a later date. Many more are on the way, and will be included at no charge.
The charge will be a one time charge though, rather than a yearly payment.
Another new option will be available by early December. PC Pursuit callback
will be installed. This will allow people to call and then get called back
if your area code is supported by PC Pursuit. This will also require a
charge, to be set at a later date. The Pirate's Hollow has been doing well
in its comeback to the telecommunications world, but we need more callers
in order to formulate a more diverse user base. Please spread the BBS #
around while also trying to make others aware of the newsletter. ==============================================================================
= Switching Systems = ==============================================================================
There are currently three different forms of switching systems that are
present in the United States today. Step by Step (SxS), Crossbar, and the
Electronic Switching System (ESS) make up the group. Phreaks have always
been a little tenative when it comes to "doing their work" once they have
heard about effects of switching systems on their hobby. After researching
this topic, I have found that there really is not that much to be worried
about. Read on, while I share with you information which I have compiled
about all of these switching systems and their distinct features. The first
switching system that was used in the country was called Step by Step.
This was adopted in 1918 by Bell, and until 1978, they had over 53% of
all their exchanges using Step by Step (SxS). This system is known for
it's long, confusing train of switches that are used for its step by step
switching. Step by Step has many disadvantages to phone users. The switch
train becomes jammed fairly often, and it causes calls to be blocked. Also,
SxS does not allow the use of DTMF dialing. This accounts for some of the
areas in the United States that cannot have touch tone dialing abilities.
A tremendous amount of electricity and maintenance needs to accompany the
SxS switching system, which makes it even more impratical. All in all,
this is probably the most archaic switching system around. There are a
number of ways to see if you are on SxS. You will notice that there are
no pulsing digits after dialing. Most sources say that the phone company
will sound like many typewriters. SxS does not offer features such as speed
calling, call forwarding, three-way calling, call waiting, and other such
services. Pay phones on SxS also will want your money before you receive
a dial tone. This adds to the list of disadvantages labelled to that of
the Step by Step switching systems. Another type of switching system that
is prevalent in the United States is Crossbar. Crossbar has been Bell's
primary switcher after 1960, and three types of it exists. Number 1 Crossbar
(1xB), Number 4 Crossbar (4xB), and the Number 5 Crossbar (5xB). In Crossbar,
a switching matrix is used for all the phones in an area, and when someone
calls, the route is determined and is met up with the other phone. This
matrix is set-up in horizontal and vertical paths. Unlike other swichting
systems, in my research, I could not come up with any true and definate
distinguishing features of the Crossbar switching systems. The Electronic
Switching System (ESS) is yet another switching system used in the United
States and the most used of all three swicthing systems. ESS is an extremely
advanced and multi-faced type of switching system, and is feared by marauders
of the phone company everywhere. With ESS, your phone company is able to
know every digit dialed (including mistakes), who you call, when you called,
and how long you were connected. ESS is also programmed to print out the
numbers of people who make excessive calls to WATS numbers (800 services)
or directory assistance. This feature of ESS is called 800 Exceptional
Calling Report, and has spelled the end of some forms of continuous code
hacks to certain extenders. ESS can also be programmed to print logs of
who called and abused certain numbers as well. Everything is kept track
of in its records. The aforementioned facts show that ESS has made the
jobs of organizations such as the FBI, NSA, and other phone company security
forces easier. Tracing can be done in a matter of microseconds, and the
result will be conveniently printed out on the monitor of a phone company
officer. ESS is also programmed to pick up any "foreign tones" on the phone
line such as the many varied tones emulated by boxes. ESS can be identified
by a few features common in it. The 911 emergency service is covered in
the later versions of ESS. Also, you are given the dial tone first when
using a pay phone unlike that of SxS. Calling services like call forwarding,
speed calling, and call waiting are also common to ESS. One other feature
common to ESS is ANI (Automatic Number Identification) for long distance
calls. As you can see, ESS is basically the zenith of all switching systems,
and it will probably plague the entire country by the early 1990's. Soon
after, we should be looking forward to a system called CLASS. This switching
system will contain the feature of having the number of the person that
is calling you printed out on your phone. What have I concluded about these
switching systems? Well, they are not good enough. I know a few people
employed by the phone company, and I know for a fact that they do not have
enough time these days to worry about code users, especially in large,
metropolitan areas. So, I will go out on a limb here, and say that a large
portion of people will never have to worry about the horrors of ESS. ]
Written by Ye Cap'n ==============================================================================
= New Gizmo Can Change Voice Gender = ==============================================================================
The most amazing device has turned up in the new Hammacher Schlemmer catalog:
the telephone voice gender changer. What it does is change the pitch of
your voice from, say, soprano to bass -- a most efficient way to dissuade
an obscene phone caller just as he's getting warmed up. That is not the
same as running a 45 r.p.m. record at 33. In digital conversion, the pitch
can be changed without altering the speed. The device runs on a 9-volt
batter and attaches to the telephone mouth piece with a rubber coupler
that takes but a moment to slip on and off. With the changer switched on,
says Lloyd Gray, a Hammacher Schlemmer technical expert, "the effect is
similar to what you hear when they interview an anonymous woman on television
and disguise her voice by deepening it." "It's better for changing a woman's
voice to a man's than the other way around," Gray said. A man can use it
to raise the pitch of his voice, but he still won't sound like a woman."
A man could, however, use the changer to disguise his voice. But with the
device set on high, Gray's voice still could be identified as his own.
On low, his normal tenor became so gravel like that the words were unintelligible.
] Supplied by Tracker and The Reporter ==============================================================================
We look for information in anyway related to the newsletter. If you have
something of interests, or something that you saw on television, or in
the newspaper, then upload it to one of the boards listed below. You will
receive full credit. Pirate's Hollow..................................................(415)593-6784
Bates Motel......................................................(619)267-0293
==============================================================================
Brought to you by the Jolly Roger in the Cookbook!!!!!!!!!!!!!!!!!! ##############################################################################
# _________________________________ # # /he Remote Informer Newsletter!
# # # #----------------------------------------------------------------------------#
# November TRI Issue: 05 # #----------------------------------------------------------------------------#
# # # The Editors: Tracker, Ye Cap'n, Norman Bates, and The Reporter #
# # ##############################################################################
==============================================================================
= AT&T Rates = ==============================================================================
WASHINGTON -- American Telephone & Telegraph Co. proposed Tuesday to
lower its interstate long-distance rates by an average of 3.6 percent to
reflect reduced costs in connecting to the local telephone network. The
largest decrease -- 6.3 percent -- would be seen in day time prices "because
of the need to make those rates more competitive," AT&T said. Rates
for calls made during evening hours would drop 2.2 percent and calls made
during the late night and weekends would be cut by 0.8 percent, the company
said. The rate reductions would take effect Jan. 1, if they are approved
by the Federal Communications Commission. Reacting to the proposed price
cuts, MCI Communications Corp. and US Sprint Communications Co., the nation's
second-largest and third-largest long distance companies respectively,
said their response would depend on what the FCC finally approves but both
said they intended to remain competitive with AT&T. AT&T, the nation's
largest long-distance company, proposed to the FCC that its rates drop
as much as $800 million, but AT&T said the exact amount will depend
on the access charges the FCC allows the local telephone companies to collect
from long distance carriers, which must pay the fees to hook into the phone
local network. AT&T has challenged the new access rates filed by the
regional Bell operating companies, contending they are more than $1 billion
too high. In proposing its new rates, the long-distance leader told the
FCC it expects local companies' access fees to fall by at least $200 million
-- which would amount to an average rate reduction of less than 1 percent.
But the company said it believes the FCC will order an additional $600
million in reductions based on AT&T's challenge. "We're confident the
FCC will recognize that access charges filed by the local telephone companies
need to be substantially reduced, which would mean more savings for our
customers," said Larry Garfinkel, AT&T vice president for marketing.
He said the company filed its proposed rates based on disputed charges
because "we wanted to let the public react ... and further to let the FCC
have full knowledge of where we were heading given our expectation that
we had a valid basis for our dispute." AT&T's long-distance rates have
fallen by about 34 percent since the company was stripped of its local
operating companies by an antitrust decree nearly four years ago. Since
then, phone rate payers have been paying a larger share of the costs of
maintaining the local network through monthly subscriber line charges,
now $2.60 for residential customers. That has reduced the long-distance
companies' share of local network expenses, which they pay in the form
of access charges. Jack Grubman, a telephone analyst with PaineWebber Inc.,
said AT&T's proposal targets business customers because "that's where
the competition is and where the better (profit) margins are." In addition,
it aims to keep the pressure on competition in international calling by
extending discounts to more customers. Grubman added that, if the company's
rate proposal is approved by the FCC, he would expect no further cuts in
AT&T rates in 1988. Wendell Lind, AT&T administrator of rates and
tariffs, said the cuts for business and residential customers are about
the same because business cuts are offset by a proposed $128 million increase
in AT&T's private line rates. AT&T is the only long-distance company
whose rates are regulated by the FCC, but its prices set the pace for the
industry. Though AT&T is far larger than any of its competitors, its
market share has been declining since divestiture and the company now says
it serves about 75 percent of the market. In addition to the reductions
in basic long-distance rates, AT&T proposed cutting prices by 5 percent
and 5.7 percent for its Pro-America calling plans. The company also proposed
to reduce prices by 2.9 percent for its 800 Service customers and 4.4 percent
for WATS customers, although it would increase the monthly access line
charges for those plans by $3.20 to reflect higher special access charges
filed by the local phone companies. ] Supplied by Tracker and The Reporter
==============================================================================
= US Sprint Operator Service Traffic Increases 40% = = New Center Added
In Dallas = ==============================================================================
ORLANDO, Fla. -- US Sprint Wednesday announced its long distance operators
who began saying, "May I help you?" just five months ago, are now handling
3.5 million calls a month. The fiber-optic long-distance carrier, offering
the only operator service alternative to AT&T has experienced a 40
percent growth in operator service calls since it announced its service
July 1. Amanda Weathersby, US Sprint vice president of product marketing,
said Tuesday, "More and more people are taking advantage of our call completion
assistance and alternative billing arrangements. "Customer surcharges are
the same as AT&T with the added benefit of US Sprint's fiber-optic
quality and lower long-distance rates." US Sprint currently offers person-to-person,
station-to-station, call completion and collect calling. US Sprint has
announced an agreement with US WEST Service Link that will allow anyone
to call on US Sprint and charge their calls to a Regional Bell Operating
Co. calling card beginning in first quarter 1988. "Previously, our operator
service was available only on pre-subscribed US Sprint phones and recently
we added operator assistance for US Sprint FON CARD customers," Weathersby
said. "With this new agreement, we'll be able to expand our operator service
to markets such as pay phones, hospitals, and hotels/motels." The newest
24-hour operator service center in Dallas began operations on Oct. 5. US
Sprint's other operator service centers are in: Cherry Hill, N.J.; Atlanta;
Lombard, Ill. and Reno, Nev. US Sprint is a joint venture of United Telecommunications
Inc. of Kansas City, Mo. and GTE Corp. of Stamford, Conn. ] Supplied by
Tracker and The Reporter ==============================================================================
= Pacific Bell Pursuing Calling Card Thief = ==============================================================================
SAN FRANCISCO--(BW)--Pacific Bell is warning consumers to protect their
telephone calling cards like any other credit card in the wake of a series
of frauds by people posing as phone company employees. A Pacific Bell spokesman
says customers in the 213, 805 and 916 area codes are being victimized
by someone who says he is a telephone company employee investigating calling
card fraud. The individual calls people at home at odd hours, asking for
their calling card numbers. He then sells the numbers to people who use
the numbers to make long distance phone calls. As recently as Monday of
this week, 180 long distance calls were billed to a Sacramento area resident
who had given his number to the thief just three hours earlier. According
to Pacific Bell, this kind of scheme and other forms of calling card fraud
cost telephone customers nationwide half a billion dollars a year. The
company offered these tips to consumers to avoid becoming a victim of calling
card fraud: Never give your calling card number or personal identification
number to anyone. Any telephone company employee with a legitimate need
to know the number has access to it. Treat your calling card like any other
credit card. Report its loss immediately by calling the 800 number on the
back of the card 800-621-0430. If you receive a suspicious call regarding
your telephone calling card, report it by calling the 800 number on the
back of the card. If you receive a call from someone claiming to be a telephone
company employee and asking for your calling card number, ask for a name
and number to call back. Then call the local Pacific Bell business office
to report the incident. One suspect was arrested in Southern California
last week by a quick thinking customer who did just that. Pacific Bell
immediately contacted the local police department. A suspect holding seven
stolen calling card numbers was arrested minutes later. Pacific Bell and
long-distance telephone companies will credit customers for calling card
charges determined to be fraudulent. Pacific Bell is a subsidiary of Pacific
Telesis Group, a diversified telecommunications corporation based in San
Francisco. ] Supplied by Tracker and The Reporter ==============================================================================
We look for information in anyway related to the newsletter. If you have
something of interests, or something that you saw on television, or in
the newspaper, then upload it to one of the boards listed below. You will
receive full credit. Pirate's Hollow..................................................(415)593-6784
Bates Motel......................................................(619)267-0293
==============================================================================
Brought to you in the Cookbook courtesy of the Jolly Roger!!!!!!!!!!!
The Phreaker's
Guide to Loop Lines courtesy of the Jolly Roger
A loop is a wonderous device which
the telephone company created as test numbers for telephone repairmen when
testing equipment. By matching the tone of the equipment with the tone
of the loop, repairmen can adjust and test the settings of their telephone
equipment. A loop, basically, consists of two different telephone numbers.
Let's use A and B as an example. Normally if you call A, you will hear
a loud tone (this is a 1004 hz tone), and if you call B, the line will
connect, and will be followed by silence. This is the format of a loop
line. Now, if somebody calls A and someone else calls B--Viola!--A and
B loop together, and one connection is made. Ma Bell did this so repairmen
can communicate with each other without having to call their own repair
office. They can also use them to exchange programs, like for ANA or Ringback.
Also, many CO's have a "Loop Assignment Center". If anyone has any information
on these centers please tell me. Anyway, that is how a loop is constructed.
From this information, anyone can find an actual loop line. Going back
to the A and B example, Note: the tone side and the silent side can be
either A or B. Don't be fooled if the phone company decides to scramble
them around to be cute. As you now know, loops come in pairs of numbers.
Usually, right after each other. For example: 817-972-1890 and 817-972-1891
Or, to save space, one loop line can be written as 817-972-1890/1. This
is not always true. Sometimes, the pattern is in the tens or hundreds,
and, occaisionally, the numbers are random. In cities, usually the phone
company has set aside a phone number suffix that loops will be used for.
Many different prefixes will correspond with that one suffix. In Arlington,
Texas, a popular suffix for loops is 1893 and 1894, and a lot of prefixes
match with them to make the number. For Example: 817-460-1893/4 817-461-1893/4
817-465-1893/4 817-467-1893/4 817-469-1893/4 ...are all loops... or a shorter
way to write this is: 817-xxx-1893/4 xxx= 460, 461, 465, 467, 469 Note:
You can mix-and-match a popular suffix with other prefixs in a city, and
almost always find other loops or test numbers. Note: For Houston, the
loop suffixes are 1499 and 1799. And for Detroit it's 9996 and 9997. When
there are a large number of loops with the same prefix format, chances
are that many loops will be inter-locked. Using the above example of Arlington
loops again, (I will write the prefixes to save space) 460, 461, and 469
are interlocked loops. This means that only one side can be used at a given
time. This is because they are all on the same circuit. To clarify, if
817-461-1893 is called, 817-460 and 469-1893 cannot be called because that
circuit is being used. Essentialy, interlocked loops are all the same line,
but there are a variety of telephone numbers to access the line. Also,
if the operator is asked to break in on a busy loop line he/she will say
that the circuit is overloaded, or something along those lines. This is
because Ma Bell has taken the checking equipment off the line. However,
there are still many rarely used loops which can be verfied and can have
emergency calls taken on them. As you have found out, loops come in many
types. Another type of loop is a filtered loop. These are loop lines that
the tel co has put a filter on, so that normal human voices cannot be heard
on either line. However, other frequencies may be heard. It all depends
on what the tel co wants the loop to be used for. If a loop has gotten
to be very popular with the local population or used frequently for conferences,
etc. the tel co may filter the loop to stop the unwanted "traffic". Usually,
the filter will be removed after a few months, though. ----------------Brought
to you by the Jolly Roger
How Ma Bell Works
by the Jolly Roger
In this article, I will first describe
the termination, wiring, and terminal hardware most commonly used in the
Bell system, and I will include section on methods of using them. -------------
LOCAL NETWORK ------------- The local telephone network between the central
office/exchange and the telephone subscribers can be briefly described
as follows: From the central office (or local exchange) of a certain prefix(es),
underground area trunks go to each area that has that prefix (Usually more
than one prefix per area.) At every few streets or tract areas, the underground
cables surface. They then go to the telephone pole (or back underground,
depending on the area) and then to the subsribers house (or in the case
of an apartment building or mutliline business, to a splitter or dis- tribution
box/panel). Now that we have the basics, I'll try and go in-depth on the
subject. ------------------ UNDERGROUND CABLES ------------------ These
are sometimes inter-office trunks, but usually in a residential area they
are trunk lines that go to bridging heads or distribution cases. The cables
are about 2-3 inches thick (varies), and are either in a metal or pvc-type
pipe (or similiar). Rarely (maybe not in some remote rural areas) are the
cables just 'alone' in the ground. Instead they are usually in an underground
cement tunnel (resembles a small sewer or storm- drain.) The manholes are
>heavy< and will say 'Bell system' on them. they can be opened with
a 1/2 inch wide crowbar (Hookside) inserted in the top rectangular hole.
There are ladder rungs to help you climb down. You will see the cable pipes
on the wall, with the blue and white striped one being the inter-office
trunk (at least in my area). The others are local lines, and are usually
marked or color coded. There is almost always a posted color code chart
on the wall, not to mention Telco manuals de- scribing the cables and terminals,
so I need not get into detail. Also, there is usually some kind of test
equipment, and often Bell test sets are left in there. -------------- BRIDGING
HEADS -------------- The innocent-looking grayish-green boxes. These can
be either trunk bridges or bridging for residences. The major trunk bridging
heads are usually larger, and they have the 'Western Electric' logo at
the bottom, whereas the normal bridging heads (which may be different in
some areas-depending on the company you are served by. GTE B.H.'s look
slightly different. Also, do not be fooled by sprinkler boxes!) They can
be found in just about every city. To open a bridging head: if it is locked
(and you're feeling destructive), put a hammer or crowbar (the same one
you used on the manhole) in the slot above the top hinge of the right door.
Pull hard, and the door will rip off. Very effective! If it isn't locked
(as usual), take a 7/8 inch hex socket and with it, turn the bolt about
1/8 of a turn to the right (you should hear a spring release inside). Holding
the bolt, turn the handle all the way to the left and pull out. To Check
for a test-set (which are often left by Bell employees), go inside - First
check for a test-set (which are often left by Bell employees). There should
be a panel of terminals and wires. Push the panel back about an inch or
so, and rotate the top latch (round with a flat section) downward. Release
the panel and it will fall all the way forward. There is usually a large
amount of wire and extra terminals. The test-sets are often hidden here,
so don't overlook it (Manuals, as well, are sometimes placed in the head).
On the right door is a metal box of alligator clips. Take a few (Compliments
of Bell.). On each door is a useful little round metal device. (Says 'insert
gently' or' clamp gently - do not overtighten' etc..) On the front of the
disc, you should find two terminals. These are for your test set. (If you
dont have one, dont despair -I'll show you ways to make basic test sets
later in this article). Hook the ring (-) wire to the 'r' terminal; and
the tip (+) wire to the other. (By the way, an easy way to determine the
correct polarity is with a 1.5v LED. Tap it to the term. pair, if it doesnt
light, switch the poles until it does. When it lights,find the longer of
the two LED poles: This one will be on the tip wire (+). Behind the disc
is a coiled up cord. This should have two alligator clips on it.. Its very
useful, because you dont have to keep connecting and disconnecting the
fone (test set) itself, and the clips work nicely. On the terminal board,
there should be about 10 screw terminals per side. Follow the wires, and
you can see which cable pairs are active. Hook the clips to the terminal
pair, and you're set! Dial out if you want, or just listen (If someone's
on theline). Later, I'll show you a way to set up a true 'tap' that will
let the person dial out on his line and receive calls as normal, and you
can listen in the whole time. More about this later... On major prefix-area
bridging heads, you can see 'local loops' ,which are two cable pairs (cable
pair = ring+tip, a fone line) that are directly connected to each other
on the terminal board. These 'cheap loops' as they are called, do not work
nearLy as well as the existing ones set up in the switching hardware at
the exchange office. (Try scanning your prefixes' 00xx to 99xx #'s.) The
tone sides will announce themselves with the 1008 hz loop tone, and the
hang side will give no response. The first person should dial the 'hang'
side, and the other person dial the tone side, and the tone should stop
if you have got the right loop.) If you want to find the number of the
line that you're on, you can either try to decipher the 'bridging log'
(or whatever), which is on the left door. If that doesnt work, you can
use the follwing: --------------------------- ANI # (Automatic Number ID)
--------------------------- This is a Telco test number that reports to
you the number that youre calling from (It's the same, choppy 'Bell bitch'
voice that you get when you reach a disconnected #) For the 213 NPA - Dial
1223 408 NPA - Dial 760 914 NPA - Dial 990 These are extremely useful when
messing with any kind of line terminals, house boxes, etc. Now that we
have bridging heads wired, we can go on... (don't forget to close and latch
the box after all... Wouldnt want GE and Telco people mad, now, would we?)
------------------------------------- "CANS" - Telephone Distribution Boxes
------------------------------------- Basically, two types: 1> Large, rectangular
silver box at the end of each street. 2> Black, round, or rectangular thing
at every telephone pole. Type 1 - This is the case that takes the underground
cable from the bridge and runs it to the telephone pole cable (The lowest,
largest one on the telephone pole.) The box is always on the pole nearest
the briging head, where the line comes up. Look for the 'Call before you
Dig - Underground cable' stickers.. The case box is hinged, so if you want
to climb the pole, you can open it with no problems. These usually have
2 rows of terminal sets. You could try to impersonate a Telco technician
and report the number as 'new active' (giving a fake name and fake report,
etc.) I dont recommend this, and it probably won't (almost positively won't)
work, but this is basically what Telco linemen do). Type 2 - This is the
splitter box for the group of houses around the pole (Usually 4 or 5 houses).
Use it like I mentioned before. The terminals (8 or so) will be in 2 horizontal
rows of sets. The extra wires that are just 'hanging there' are provisions
for extra lines to residences (1 extra line per house, thats why the insane
charge for line #3!) If its the box for your house also, have fun and swap
lines with your neighbor! 'Piggyback' them and wreak havoc on the neighborhood
(It's eavesdropping time...) Again, I don't recommend this, and its difficult
to do it correctly. Moving right along... ------------------------------
APARTMENT / BUSINESS MULTILINE DISTRIBUTION BOXES ------------------------------
Found outside the buliding (most often on the right side, but not always...
Just follow the wire from the telephone pole) or in the basement. It has
a terminal for all the lines in the building. Use it just like any other
termination box as before. Usually says 'Bell system' or similar. Has up
to 20 terminals on it (usually.) the middle ones are grounds (forget these).
The wires come from the cable to one row (usually the left one), with the
other row of terminals for the other row of terminals for the building
fone wire pairs. The ring (-) wire is usually the top terminal if the set
in the row (1 of 10 or more), and the tip is in the clamp/screw below it.
This can be reversed, but the cable pair is always terminated one-on-top-of-each-
other, not on the one next to it. (I'm not sure why the other one is there,
probably as aprovision for extra lines) Don't use it though, it is usually
to close to the other terminals, and in my experiences you get a noisy
connection. Final note: Almost every apartment, business, hotel, or anywhere
there is more than 2 lines this termination lines this termination method
is used. If you can master this type, you can be in control of many things...
Look around in your area for a building that uses this type, and practice
hooking up to the line, etc. As an added help,here is the basic 'standard'
color-code for multiline terminals/wiring/etc... Single line: Red = Ring
Green = Tip Yellow = Ground * * (Connected to the ringer coil in individual
and bridged ringer phones (Bell only) Usually connected to the green (Tip)
Ring (-) = Red White/Red Stripe Brown White/Orange Stripe Black/Yellow
Stripe Tip (+) = Green (Sometimes yellow, see above.) White/Green Stripe
White/Blue Stripe Blue Black/White Stripe Ground = Black Yellow ----------------------
RESIDENCE TERMINAL BOX ---------------------- Small, gray (can be either
a rubber (Pacific Telephone) or hard plastic (AT & T) housing deal
that connects the cable pair from the splitter box (See type 2, above)
on the pole to your house wiring. Only 2 (or 4, the 2 top terminals are
hooked in parallel with the same line) terminals, and is very easy to use.
This can be used to add more lines to your house or add an external line
outside the house. --------- TEST SETS --------- Well, now you can consider
yourself a minor expert on the terminals and wiring of the local telephone
network. Now you can apply it to whatever you want to do.. Here's another
helpful item: How to make a Basic Test-Set and how to use it to dial out,
eavsdrop, or seriously tap and record line activity. These are the (usually)
orange hand set fones used by Telco technicians to test lines. To make
a very simple one, take any Bell (or other, but I recommend a good Bell
fone like a princess or a trimline. gte flip fones work excllently, though..)
fone and follow the instructions below. Note: A 'black box' type fone mod
will let you tap into their line, and with the box o, it's as if you werent
there. they can recieve calls and dial out, and you can be listening the
whole time! very useful. With the box off, you have a normal fone test
set. Instructions: A basic black box works well with good results. Take
the cover off the fone to expose the network box (Bell type fones only).
The
Getting Money
out of Pay Phones by the Jolly Roger
I will now share with you my experiences
with pay telephones. You will discover that it is possible to get money
from a pay phone with a minimum of effort. Theory: Most pay phones use
four wires for the transmission of data and codes to the central office.
Two of them are used for voice (usually red and green), one is a ground,
and the last is used with the others for the transmission of codes. It
is with this last wire that you will be working with. On the pay phone
that I usually did this to, it was colored purple, but most likely will
be another color. What you will do is simply find a pay phone which has
exposed wires, such that one of them can be disconnected and connected
at ease without fear of discovery. You will discover that it is usually
a good idea to have some electrical tape along with you and some tool for
cutting this tape. Through trial and error, you will disconnect one wire
at a time starting with the wires different than green and red. You do
want a dial tone during this operation. What you want to disconnect is
the wire supplying the codes to the telephone company so that the pay phone
will not get the 'busy' or 'hang-up' command. Leave this wire disconnected
when you discover it. What will happen: Anytime that someone puts any amount
of money into the pay phone, the deposit will not register with the phone
company and it will be held in the 'temporary' chamber of the pay phone.
Then, (a day later or so) you just code back to the phone, reconnect the
wire, and click the hook a few times and the phone will dump it all out
the shute. (What is happening is that the 'hangup' code that the phone
was not receiving due to the wire being disconnected suddenly gets the
code and dumps its' 'temporary' storage spot.) You can make a nice amount
of money this way, but remember that a repairman will stop by every few
times it is reported broken and repair it, so check it at least once a
day. Enjoy and have fun.. Many phones I have done this to, and it works
well with each.. --------------------Jolly Roger
Computer Based
PBX Courtesy of the Jolly Roger
(Originally an Apple ][ file for forgive
the upper case!) TO GET A BETTER UNDERSTANDING OF WHAT A PBX CAN DO, HERE
ARE A FEW BASIC FUNDAMENTALS.THE MODERN PBX IS A COMBINED COMPUTER,MASS
STORAGE DEVICE, AND OF COURSE A SWITCHING SYSTEM THAT CAN: [1] PRODUCE
ITEMIZED,AUTOMATED BILLING PROCEDURES,TO ALLOW THE IDENTIFICATION AND MANAGEMENT
OF TOLL CALLS. [HAHAHA] [2] COMBINE DAYTIME VOICE GRADE COMMUNICATION CIRCUITS
INTO WIDEBAND DATA CHANNELS FOR NIGHT TIME HIGH SPEED DATA TRANSFERS. [3]
HANDLES ELECTRONIC MAIL [ INCLUDING OFFICE MEMOS ]. [4] COMBINE VOICE CHANNELS
INTO A WIDEBAND AUDIO/VISUAL CONFERENCE CIRCUIT,WITH THE ABILITY TO XFER
AND CAPTURE SLIDES,FLIPCHARTS,PICTURES OF ANY KIND. BOTH THE EXTERNAL AND
INTERNAL CALLING CAPACITY OF THE PBX SYSTEM MUST BE CAREFULLY CONSIDERED
BECAUSE MANY BUSINESS OPERATIONS RUN A VERY HIGH RATIO OF INTERNAL STATION
TO STATION DIALING AND A LOW CAPACITY SYSTEM WILL NOT HANDLE THE REQUESTED
TRAFFIC LOAD. A CRITICAL FACTOR IS THE NUMBER OF TRUNKS AND THE CENTRAL
OFFICE FACILITIES THAT ARE USED FOR OUTSIDE CONNECTIONS.ANOTHER IS THE
NUMBER OF JUNCTIONS OR [LINKS] THAT MAKE UP THE INTERNAL CALLING PATHS.
TO UNDERSTAND THE SERVICES AVAILABLE ON A TYPICAL COMPUTER RUN PBX IT IS
NECESSARY TO INTRODUCE THE SUBJECT OF TIME DIVISION SWITCHING.IN A TIME
DIVISION SWITCHING NETWORK ALL CONNECTIONS ARE MADE VIA A SINGLE COMMON
BUS CALLED (OF COURSE) A 'TIME-DIVISION BUS'.EVERY LINE TRUNK THAT REQUIRES
A CONNECTION WITH ANOTHER IS PROVIDED WITH A PORT CIRCUIT.ALL PORT CIRCUITS
HAVE ACCESS TO THE TIME DIVISION BUS THROUGH A TIME DIVISION SWITCH. [WHEN
TWO PORTS REQUKRE CONNECTION,THEIR TIME DIVISION SWITCHES OPERATE AT A
VERY HIGH FREQUENCY (16,000 TIMES PER SECOND).THIS TECHNIQUE,WHICH IS CALLED
'SPEECH SAMPLING',ALLOWS MANY SIMULTANEOUS CONNECTIONS OVER THE SAME TIME
DIVKSION BUS.EACH CONNECTION IS ASSIGNED A TIME INTERVAL,THE 'TIME SLOT'
,AND THE NUMBER OF TIME SLOTS IDENTIFIES THE NUMBER OF SIMULTANEOUS CONNECT-
IONS AMONG PORTS.] THE NEXT CRITICAL ITEM IS CIRCUIT PACKS.THE SYSTEM ELEMENTS
THAT WE WILL BE DESCRIBING IN FUTURE TUTORIALS [LINES/TRUNKS/SWITCHES,MEMORY
AND CONTROL] ARE CONTAINED ON PLUG IN CIRCUIT PACKS.EACH LINE CIRCUIT PACK
CONTAINS A NUMBER OF LINES,IN EXAMPLE,FOUR.BUT THE ASSIGNMENT OF STATION
NUMBERS TO ACTUAL PHONE LINE CIRCUITS IS FLEXIBLE. THE SYSTEM MEMORY IS
CONTAINED IN CIRCUIT PACKS WHICH PROVIDE THE CALL PROCESSING FUNCTIONS.THE
CIRCUIT PACKS ARE HELD IN SMALL FRAMES CALLED 'CARRIERS'.WITHIN EACH CARRIER,THE
CIRCUIT PACKS ARE PLUGGED INTO POSITIONS: THE 'SLOTS'.EVERY CIRCUIT CAN
BE ADDRESSED BY,SAY A FIVE DIGIT NUMBER WHICH TELLS ITS LOCATION BY CARRIER-SLOT-CIRCUIT....
[STARTING TO GET THE IDEA?] THERE CAN BE THREE TYPES OF CARRIERS IN A MODERN
PBX SYSTEM: O LINE CARRIERS O TRUNK CARRIERS O CONTROL CARRIERS THE LINE
CARRIERS CONTAIN STATION LINES.IN A.T.& T.'S "DIMENSION" MODEL,FOR
EXAMPLE,A TOTAL OF 52 TO 64 LINES ARE PROVIDED.THE TRUNK CARRIERS CONTAIN
SLOTS FOR 16 TRUNK CIRCUIT PACKS.THE CONTROL CARRIER INCLUDES PROCESSOR,
MEMORY,CONTROL CIRCUITRY,DATA CHANNELS FOR ATTENDANT CONSOLE CONTROL AND
TRAFFIC MEASUREMENT OUTPUTS. PBX SYSTEMS WILL DIRECTLY REFLECT THE TYPES
OF SERVICES OFFERED AT THE C.O. O CCSA O CCIS O PICTUREPHONES [SOONER THAN
YOU THINK MY PHRIENDS] COMMON CONTROL SWITCHING ARRANGEMENTS ( CCSA ) PERMIT
ANY UNRESTRICTED TELE- PHONE STATION TO CALL ANY OTHET INTERNAL OR EXTERNAL
SYSTEM STATION BY USING THE STANDARD SEVEN DIGIT NUMBER.ALTERNATE ROUTING
IS A FEATURE OF CCSA SERVICE THE INTERFACILITY,ALTERNATE ROUTED CALLING
PATHS ARE ACCOMPLISHED AT THE TELE- PHONE COMPANY CENTRAL OFFICE LEVEL,NOT
AT THE PBX LEVEL. A SYSTEM OF INTEREST TO LARGE SCALE TELEPHONE USERS IS
COMMON CHANNEL INTER- OFFICE SIGNALLING (CCIS).TYPICALLY,THIS TECHNIQUE
EMPLOYS COMMON CHANNELS TO CARRY ALL INTERFACILITY SIGNALLING INSTRUCTIONS:
DIAL PULSES,ON HOOK (IDLE), OFF HOOK (BUSY),AND SO ON,BETWEEN TWO SWITCHING
CENTERS. [ GETTING WARM ]. CCIS REPLACES OLDER METHODS OF INTEROFFICE SIGNALLING
SUCH AS 'IN BAND' AND 'OUT OF BAND' TECHNIQUES. BY THE WAY,REAL PHREAKS
ARE SELLING THEIR BOXES TO IDIOTS WHO STILL THINK THE'RE WORTH ALOT...THE
FORMER (IN BAND) TRANSMITS SIGNALLING DATA WITHIN THE NORMAL CONVERSATION
BANDWIDTH.IT'S SHORTCOMING IS THAT FALSE INFORMATION MAY BE TRANSMITTED
DUE TO UNIQUE TONE OR NOISE COMBINATIONS SET UP IN THE TALKING PATH. [THIS
IS THE OFFICIAL REASONING]. OUT OF BAND SIGNALLING TECHNIQUES PLACED THE
INTEROFFICE DATA IN SPECIAL CHANNELS,GENERALLY ADJACENT TO AND IMMEDIATELY
ABOVE THE VOICE PATH.TO PRE- SERVE INTERCHANNEL INTEGRITY,OUT OF BAND SIGNALLING
REQUIRES VERY EFFECIENT FILTERING OR GREATER 'BAND GUARD' SEPERATION BETWEEN
CHANNELS. Brought to you in the Cookbook courtesy of the Jolly Roger!!!!!!!!!!!!
Subject: PC-Pursuit Port Statistic's Date: 06/29/89 Written by: PC-Pursuit
Users ============================================================ Introduction:
============= The last 30 days of PC-Pursuit have been extremely controversial.
Users and ex-users have demanded accurate statistics, and Telenet has provided
us with very little. And the data that was provided is questionable. Well,
here is some data that is guaranteed to be accurate and make Telenet scream.
If you wish to update this data on your own, we will tell you how later
in this text. The following chart consists of all the direct Telenet addresses
of the PC-Pursuit city nodes and the total number of modems on each node.
Here is what the data means: NJNEW/3 2011 .12 56 ! ! ! ! \-- Total Number
of Modems in NJNEW ! ! ! \- Last Working Suffix of Address sequence. !
! \- Direct Telenet Address Prefix. ! \--- Baud Rate of This Port is 300.
\--------- Mnemonic. Please note that there are several perfectly legal
ways to connect to a PC-Pursuit port such as NJNEW/3: Ways To Connect to
NJNEW/3: 1) C D/NJNEW/3,PCP10000,
Red Box Plans
by the Jolly Roger
Red boxing is simulating the tones
produced by public payphones when you drop your money in. The tones are
beeps of 2200 Hz + 1700 Hz Nickle = 1 beep for 66 milliseconds. Dime =
2 beeps, each 66 milliseconds with a 66 millisecond pause between beeps.
Quarter = 5 beeps, each 33 milliseconds with a 33 millisecond pause between
beeps. There are two commonly used methods being used by Phreaks to make
free calls. 1. An electronic hand-held device that is made from a pair
of Wien-bridge oscillators with the timing controlled by 555 timing chips.
2. A tape recording of the tones produced by a home computer. One of the
best computers to use would be an Atari ST. It is one of the easier computers
to use because the red box tones can be produced in basic with only about
5 statments. --------------------Jolly Roger
[__RemObS_________________________]
by the Jolly Roger
Some of you may have heard of devices
called Remobs which stands for Remote Observation System. These Devices
allow supposedly authorized telephone employees to dial into them from
anywhere, and then using an ordinary touch tone fone, tap into a customer's
line in a special receive only mode. [The mouthpiece circuit is deactivated,
allowing totally silent observation from any fone in the world (Wire tapping
without a court order is against the law)] [__How Remobs Work______________]
Dial the number of a Remob unit. Bell is rumored to put them in the 555
information exchanges, oron special access trunks [Unreachable except via
blue box]. A tone will then be heard for approximately 2 seconds and then
silence. You must key in (In DTMF) a 2 to 5 digit access code while holding
each digit down at least 1 second. If the code is not entered within 5
or 6 seconds, the Remob will release and must be dialed again. If the code
is supposedly another tone will be heard. A seven digit subscriber fone
number can then be entered [The Remob can only handle certain 'exchanges'
which are prewired, so usually one machine cannot monitor an entire NPA].
The Remob will then connect to the subscribers line. The listener will
hear the low level idle tone as long as the monitored party is on hook.
As the monitored party dials [rotary or DTMF], the listener would hear
[And Record] the number being dialed. Then the ENTIRE conversation, datalink,
whatever is taking place, all without detection. There is no current box
which can detect Remob observation, since it is being done with the telephone
equipment that makes the connection. When the listener is finished monitoring
of that particular customer, he keys the last digit of the access code
to disconnects him from the monitored line and return to the tone so that
he can key in another 7 digit fone #. When the listener is totally finished
with the Remob, he keys a single 'disconnect digit' which disconnects him
from the Remob so that the device can reset and be ready for another caller.
[_History of Remobs_______________] Bell has kept the existance of Remobs
very low key. Only in 1974, Bell acknowledged that Remobs existed. The
device was first made public during hearings on "Telephone Monitoring Practices
by Federal Agencies" before a subcommittee on government operations. House
of Representatives, Ninety-Third Congress, June 1974. It has since been
stated by Bell that the Remob devices are used exclusively for monitoring
Bell employees such as operators, information operators, etc., to keep
tabs on their performance. [Suuureee, were stupid] [__Possible Uses for
Remobs__] The possible uses of Remobs are almost as endless as the uses
of self created fone line. Imagine the ability to monitor bank lines etc,
just off the top of my head I can think of these applications: Data Monitoring
of: TRW National Credit Bureau AT&T Cosmos Bank Institutions Compuserve
and other Networks. Voice Monitoring of: Bank Institutions Mail Order buisnesses.
Bell Telephone themselves. Any place handling sensitive or important information.
Anyone that you may not like. With just one Remob, someone could get hundreds
of credit cards, find out who was on vacation, get compuserve passwords
by the dozens, disconnect peoples fones, do credit checks, find out about
anything that they may want to find out about. Im sure you brilliant can
see the value of a telephone hobbiest and a telecommunications enthusist
getting his hands on a few choice Remobs.
Scarlet Box Plans
by the Jolly Roger
The purpose of a Scarlet box is to
create a very bad conection, it can be used to crash a BBS or just make
life miserable for those you seek to avenge. Materials: 2 alligator clips,
3 inch wire, or a resister (plain wire will create greatest amount of static)
(Resister will decrease the amount of static in porportion to the resister
you are using) Step (1): Find the phone box at your victims house, and
pop the cover off. Step (2): Find the two prongs that the phone line you
wish to box are connected to. Step (3): Hook your alligator clips to your
(wire/resister). Step (4): Find the lower middle prong and take off all
wires connected to it, i think this disables the ground and call waiting
and shit like that. Step (5): Now take one of the alligator clips and attach
it to the upper most prong, and take the other and attach it to the lower
middle prong. Step (6): Now put the cover back on the box and take off!!
** ######## ** ** # #### # ** ######## / # #### # / ######## / / / / /
/ / / **/ ** ** ** ** ** (**)= prongs ** (/) = (wire/resister) (##)= some
phone bullshit --------------------Jolly Roger Silver Box Plans by the
Jolly Roger Introduction: ------------ First a bit of Phone Trivia. A standard
telephone keypad has 12 buttons. These buttons, when pushed, produce a
combination of two tones. These tones represent the row and column of the
button you are pushing. 1 1 1 2 3 4 0 3 7 9 6 7 697 (1) (2) (3) 770 (4)
(5) (6) 851 (7) (8) (9) 941 (*) (0) (#) So (1) produces a tone of 697+1209,
(2) produces a tone of 697+1336, etc. Function: -------- What the Silver
Box does is just creates another column of buttons, with the new tone of
1633. These buttons are called A, B, C, and D. Usefulness: ---------- Anyone
who knows anything about phreaking should know that in the old days of
phreaking, phreaks used hardware to have fun instead of other people's
Sprint and MCI codes. The most famous (and useful) was the good ol' Blue
Box. However, Ma Bell decided to fight back and now most phone systems
have protections against tone-emitting boxes. This makes boxing just about
futile in most areas of the United States (ie those areas with Crossbar
or Step-By-Step). If you live in or near a good-sized city, then your phone
system is probably up-to-date (ESS) and this box (and most others) will
be useless. However, if you live in the middle of nowhere (no offense intended),
you may find a use for this and other boxes. Materials: --------- 1 Foot
of Blue Wire 1 Foot of Grey Wire 1 Foot of Brown Wire 1 Small SPDT Switch
(*) 1 Standard Ma Bell Phone (*) SPDT = Single Pole/Double Throw Tools:
----- 1 Soldering Iron 1 Flat-Tip Screwdriver Procedure: --------- (1)
Loosen the two screws on the bottom of the phone and take the casinf off.
(2) Loosen the screws on the side of the keypad and remove the keypad from
the mounting bracket. (3) Remove the plastic cover from the keypad. (4)
Turn the keypad so that *0# is facing you. Turn the keypad over. You'll
see a bunch of wires, contacts, two Black Coils, etc. (5) Look at the Coil
on the left. It will have five (5) Solder Contacts facing you. Solder the
Grey Wire to the fourth Contact Pole from the left. (6) Solder the other
end of the Grey Wire to the Left Pole of the SPDT Switch. (7) Find the
Three (3) Gold-Plated Contacts on the bottom edge of the keypad. On the
Left Contact, gently seperate the two touching Connectors (they're soldered
together) and spread them apart. (8) Solder the Brown Wire to the Contact
farthest from you, and solder the other end to the Right Pole of the SPDT
Switch. (9) Solder the Blue Wire to the Closest Contact, and the other
end to the Center Pole of the SPDT Switch.››(10) Put the phone back together.
Using The Silver Box: -------------------- What you have just done was
installed a switch that will change the 369# column into an ABCD column.
For example, to dial a 'B', switch to Silver Box Tones and hit '6'. Noone
is sure of the A, B, and C uses. However, in an area with an old phone
system, the 'D' button has an interesting effect. Dial Directory Assistance
and hold down 'D'. The phone will ring, and you should get a pulsing tone.
If you get a pissed-off operator, you have a newer phone system with defenses
against Silver Boxes. At the pulsing tone, dial a 6 or 7. These are loop
ends. -----------------Jolly Roger Bell Trashing by the Jolly Roger The
Phone Co. will go to extreams on occasions. In fact, unless you really
know what to expect from them, they will suprise the heck out of you with
their "unpublished tarriffs". Recently, a situation was brought to my attention
that up till then I had been totaly unaware of, least to mention, had any
concern about. It involved gar- bage! The phone co. will go as far as to
prosecute anyone who rumages through their garbage and helps himself to
some Of course, they have their reasons for this, and no doubt benefit
from such action. But, why should they be so picky about garbage? The answer
soon became clear to me: those huge metal bins are filled up with more
than waste old food and refuse... Although it is Pacific Tele. policy to
recycle paper waste products, sometimes employees do overlook this sacred
operation when sorting the garbage. Thus top-secret confidential Phone
Co. records go to the garbage bins instead of the paper shredders. Since
it is constantly being updated with "company memorandums, and supplied
with extensive reference material, the Phone co. must continualy dispose
of the outdated materials. Some phone companies are supplied each year
with the complete "System Practices" guide. This publication is an over
40 foot long library of reference material about everything to do with
telephones. As the new edition arrives each year, the old version of "System
Practices" must also be thrown out. I very quickly figured out where some
local phone phreaks were getting their material. They crawl into the garbage
bins and remove selected items that are of particular interest to them
and their fellow phreaks. One phone phreak in the Los Angeles area has
salvaged the complete 1972 edition of "Bell System Practices". It is so
large and was out of order (the binders had been removed) that it took
him over a year to sort it out and create enough shelving for it in his
garage. Much of this "Top Secret" information is so secret that most phone
companies have no idea what is in their files. They have their hands full
simply replacing everything each time a change in wording requires a new
revision. It seems they waste more paper than they can read! It took quite
a while for Hollywood Cal traffic manager to figure out how all of the
local phone phreaks constantly discovered the switchroom test numbers Whenever
someone wanted to use the testboard, they found the local phone phreaks
on the lines talking to all points all over the world. It got to the point
where the local garbage buffs knew more about the office operations than
the employees themselves. One phreak went so far as to call in and tell
a switchman what his next daily assignment would be. This, however, proved
to be too much. The switchman traced the call and one phone phreak was
denied the tool of his trade. In another rather humorous incident, a fellow
phreak was rumaging through the trash bin when he heard somone apraoching.
He pressed up against the side of the bin and silently waited for the goodies
to come. You can imagine his surprise when the garbage from the lunchroom
landed on his head. Most people find evenings best for checking out their
local telco trash piles. The only thing necessary is a flashlight and,
in the case mentioned above, possibly a rain coat. A word of warning though,
before you rush out and dive into the trash heap. It is probably illegal,
but no matter where you live, you certainly won't get the local policeman
to hold your flashlight for you. --------------------Jolly Roger
Canadian WATS
Phonebook courtesy of the Jolly Roger
800-227-4004 ROLM Collagen Corp. 800-227-8933
ROLM Collagen Corp. 800-268-4500 Voice Mail 800-268-4501 ROLM Texaco 800-268-4505
Voice Mail 800-268-6364 National Data Credit 800-268-7800 Voice Mail 800-268-7808
Voice Mail 800-328-9632 Voice Mail 800-387-2097 Voice Mail 800-387-2098
Voice Mail 800-387-8803 ROLM Canadian Tire 800-387-8861 ROLM Canadian Tire
800-387-8862 ROLM Canadian Tire 800-387-8863 ROLM Canadian Tire 800-387-8864
ROLM Canadian Tire 800-387-8870 ROLM Halifax Life 800-387-8871 ROLM Halifax
Life 800-387-9115 ASPEN Sunsweep 800-387-9116 ASPEN Sunsweep 800-387-9175
PBX [Hold Music=CHUM FM] 800-387-9218 Voice Messenger 800-387-9644 Carrier
800-426-2638 Carrier 800-524-2133 Aspen 800-663-5000 PBX/Voice Mail [Hold
Music=CFMI FM] 800-663-5996 Voice Mail (5 rings) 800-847-6181 Voice Mail
NOTES: Each and every one of these numbers is available to the 604 (British
Columbia) Area Code. Most are available Canada Wide and some are located
in the United States. Numbers designated ROLM have been identified as being
connected to a ROLM Phonemail system. Numbers designated ASPEN are connected
to an ASPEN voice message system. Numbers designated VOICE MAIL have not
been identified as to equipment in use on that line. Numbers designated
carrier are answered by a modem or data set. Most Voice Message systems,
and ALL Rolms, sound like an answering machine. Press 0 during the recording
when in a rolm, * or # or other DTMF in other systems, and be propelled
into another world... Brought to you in the Cookbook by the Jolly Roger!!!!!!!!!!!!!!!!
Canadian WATS Phonebook courtesy of the Jolly Roger 800-227-4004 ROLM Collagen
Corp. 800-227-8933 ROLM Collagen Corp. 800-268-4500 Voice Mail 800-268-4501
ROLM Texaco 800-268-4505 Voice Mail 800-268-6364 National Data Credit 800-268-7800
Voice Mail 800-268-7808 Voice Mail 800-328-9632 Voice Mail 800-387-2097
Voice Mail 800-387-2098 Voice Mail 800-387-8803 ROLM Canadian Tire 800-387-8861
ROLM Canadian Tire 800-387-8862 ROLM Canadian Tire 800-387-8863 ROLM Canadian
Tire 800-387-8864 ROLM Canadian Tire 800-387-8870 ROLM Halifax Life 800-387-8871
ROLM Halifax Life 800-387-9115 ASPEN Sunsweep 800-387-9116 ASPEN Sunsweep
800-387-9175 PBX [Hold Music=CHUM FM] 800-387-9218 Voice Messenger 800-387-9644
Carrier 800-426-2638 Carrier 800-524-2133 Aspen 800-663-5000 PBX/Voice
Mail [Hold Music=CFMI FM] 800-663-5996 Voice Mail (5 rings) 800-847-6181
Voice Mail NOTES: Each and every one of these numbers is available to the
604 (British Columbia) Area Code. Most are available Canada Wide and some
are located in the United States. Numbers designated ROLM have been identified
as being connected to a ROLM Phonemail system. Numbers designated ASPEN
are connected to an ASPEN voice message system. Numbers designated VOICE
MAIL have not been identified as to equipment in use on that line. Numbers
designated carrier are answered by a modem or data set. Most Voice Message
systems, and ALL Rolms, sound like an answering machine. Press 0 during
the recording when in a rolm, * or # or other DTMF in other systems, and
be propelled into another world... Brought to you in the Cookbook by the
Jolly Roger!!!!!!!!!!!!!!!! Hacking TRW by the Jolly Roger When you call
TRW, the dial up will identify itself with the message "TRW". It will then
wait for you to type the appropiate answer back (such as CTRL-G) Once This
has been done, the system will say "CIRCUIT BUILDING IN PROGRESS" Along
with a few numbers. After this, it clears the screen (CTRL L) followed
by a CTRL-Q. After the system sends the CTRL-Q, It is ready for the request.
You first type the 4 character identifyer for the geographical area of
the account.. (For Example) TCA1 - for certain Calif. & Vicinity subscribers.
TCA2 - A second CALF. TRW System. TNJ1 - Their NJ Database. TGA1 - Their
Georgia Database. The user then types A
Hacking Vax's
& Unix by the Jolly Roger
Unix is a trademark of At&t (and
you know what that means) _______________________________________ In this
article, we discuss the unix system that runs on the various vax systems.
If you are on another unix-type system, some commands may differ, but since
it is licenced to bell, they can't make many changes. _______________________________________
Hacking onto a unix system is very difficult, and in this case, we advise
having an inside source, if possible. The reason it is difficult to hack
a vax is this: Many vax, after you get a carrier from them, respond=> Login:
They give you no chance to see what the login name format is. Most commonly
used are single words, under 8 digits, usually the person's name. There
is a way around this: Most vax have an acct. called 'suggest' for people
to use to make a suggestion to the system root terminal. This is usually
watched by the system operator, but at late he is probably at home sleeping
or screwing someone's brains out. So we can write a program to send at
the vax this type of a message: A screen freeze (Cntrl-s), screen clear
(system dependant), about 255 garbage characters, and then a command to
create a login acct., after which you clear the screen again, then unfreeze
the terminal. What this does: When the terminal is frozen, it keeps a buffer
of what is sent. well, the buffer is about 127 characters long. so you
overflow it with trash, and then you send a command line to create an acct.
(System dependant). after this you clear the buffer and screen again, then
unfreeze the terminal. This is a bad way to do it, and it is much nicer
if you just send a command to the terminal to shut the system down, or
whatever you are after... There is always, *Always* an acct. called root,
the most powerful acct. to be on, since it has all of the system files
on it. If you hack your way onto this one, then everything is easy from
here on... On the unix system, the abort key is the Cntrl-d key. watch
how many times you hit this, since it is also a way to log off the system!
A little about unix architechture: The root directory, called root, is
where the system resides. After this come a few 'sub' root directories,
usually to group things (stats here, priv stuff here, the user log here...).
Under this comes the superuser (the operator of the system), and then finally
the normal users. In the unix 'Shell' everything is treated the same. By
this we mean: You can access a program the same way you access a user directory,
and so on. The way the unix system was written, everything, users included,
are just programs belonging to the root directory. Those of you who hacked
onto the root, smile, since you can screw everything... the main level
(exec level) prompt on the unix system is the $, and if you are on the
root, you have a # (superuser prompt). Ok, a few basics for the system...
To see where you are, and what paths are active in regards to your user
account, then type => pwd This shows your acct. seperated by a slash with
another pathname (acct.), possibly many times. To connect through to another
path, or many paths, you would type: You=> path1/path2/path3 and then you
are connected all the way from path1 to path3. You can run the programs
on all the paths you are connected to. If it does not allow you to connect
to a path, then you have insufficient privs, or the path is closed and
archived onto tape. You can run programs this way also: you=> path1/path2/path3/program-name
Unix treats everything as a program, and thus there a few commands to learn...
To see what you have access to in the end path, type=> ls for list. this
show the programs you can run. You can connect to the root directory and
run it's programs with=> /root By the way, most unix systems have their
log file on the root, so you can set up a watch on the file, waiting for
people to log in and snatch their password as it passes thru the file.
To connect to a directory, use the command: => cd pathname This allows
you to do what you want with that directory. You may be asked for a password,
but this is a good ay of finding other user names to hack onto. The wildcard
character in unix, if you want to search down a path for a game or such,
is the *. => ls /* Should show you what you can access. The file types
are the same as they are on a dec, so refer to that section when examining
file. To see what is in a file, use the => pr filename command, for print
file. We advise playing with pathnames to get the hang of the concept.
There is on-line help available on most systems with a 'help' or a '?'.
We advise you look thru the help files and pay attention to anything they
give you on pathnames, or the commands for the system. You can, as a user,
create or destroy directories on the tree beneath you. This means that
root can kill everything but root, and you can kill any that are below
you. These are the => mkdir pathname => rmdir pathname commands. Once again,
you are not alone on the system... type=> who to see what other users are
logged in to the system at the time. If you want to talk to them=> write
username Will allow you to chat at the same time, without having to worry
about the parser. To send mail to a user, say => mail And enter the mail
sub-system. To send a message to all the users on the system, say => wall
Which stands for 'write all'. By the way, on a few systems, all you have
to do is hit the
Verification
Circuits courtesy of the Jolly Roger
(originally an Apple ][ file so forgive
the upper case!) 1. ONE BUSY VERIFICATION CONFERENCE CIRCUIT IS ALWAYS
PROVIDED.THE CIRCUIT IS A THREE-WAY CONFERENCE BRIDGE THAT ENABLES AN OPERERATOR
TO VERIFY THE BUSY/IDLE CONDITION OF A SUBSCRIBER LINE.UPON REQUEST OF
A PARTY ATTEMPTING TO REACH A SPECIFIED DIRECTORY NUMBER, THE OPERATOR
DIALS THE CALLED LINE NUMBER TO DETERMINE IF THE LINE IS IN USE,IF THE
RECEIVER IS OFF THE HOOK,OR IF THE LINE IS IN LOCKOUT DUE TO A FAULT CONDITKON.THE
OPERATOR THEN RETURNS TO THE PARTY TRYING TO REACH THE DIRE CTORY NUMBER
AND STATES THE CONDITION OF THE LINE.LINES WITH DATA SECURITY CAN NOT BE
ACCESSED FOR BUSY VERIFICATION WHEN THE LINE IS IN USE.(REFER ALSO TO DATA
SECURITY) 2. THREE PORTS ARE ASSIGNED TO EACH BUSY VERIFICATION CONFERENCE
CIRCUIT.ONE PORT IS FOR OPERATOR ACCESS AND TWO PORTS ARE USED TO SPLIT
AN EXISTING CONNECTION.TO VERKFY THE BUSY/IDLE CONDITION OF A LINE,THE
OPERATOR ESTABLISHED A CONNECTION TO THE OPERATOR ACCESS PORT AND DIALS
THE DIRECTORY NUMBER OF THE LINE TO BE VERIFIED.IF THE LINE IS IN USE,THE
EXISTING CONNECTION IS BROKEN AND IMMEDIATLY RE-ESTABLISHED THROUGH THE
OTHER TWO PORTS OF THE BUSY VERIFICATION CIRCUIT WITHOUT INTERRUPTION.
BUSY VERIFICATION CIRCUIT IS CONTROLLED BY ACCESS CODE. A DEDICATED TRUNK
CAN BE USED BUT IS NOT NECESSARY. 3. THE BUSY VREIFICATION CIRCUIT ALSO
CAN BE USED FOR TEST VERIFY FROM THE WIRE CHIEFS TEST PANEL. B. ADDITIONAL
BUSY VERIFICATION CONFERENCE CIRCUITS (002749) O.K. THERE IT IS-RIGHT OUT
OF AN ESS MANUAL WORD FOR WORD! (AND IM GETTING 25 LINEAR FEET OF ESS MANUALS!!!
NOT COUNTING THE STACK RECEIVED SO FAR! Brought to you in the Cookbook
by the Jolly Roger!!!! Verification Circuits courtesy of the Jolly Roger
(originally an Apple ][ file so forgive the upper case!) 1. ONE BUSY VERIFICATION
CONFERENCE CIRCUIT IS ALWAYS PROVIDED.THE CIRCUIT IS A THREE-WAY CONFERENCE
BRIDGE THAT ENABLES AN OPERERATOR TO VERIFY THE BUSY/IDLE CONDITION OF
A SUBSCRIBER LINE.UPON REQUEST OF A PARTY ATTEMPTING TO REACH A SPECIFIED
DIRECTORY NUMBER, THE OPERATOR DIALS THE CALLED LINE NUMBER TO DETERMINE
IF THE LINE IS IN USE,IF THE RECEIVER IS OFF THE HOOK,OR IF THE LINE IS
IN LOCKOUT DUE TO A FAULT CONDITKON.THE OPERATOR THEN RETURNS TO THE PARTY
TRYING TO REACH THE DIRE CTORY NUMBER AND STATES THE CONDITION OF THE LINE.LINES
WITH DATA SECURITY CAN NOT BE ACCESSED FOR BUSY VERIFICATION WHEN THE LINE
IS IN USE.(REFER ALSO TO DATA SECURITY) 2. THREE PORTS ARE ASSIGNED TO
EACH BUSY VERIFICATION CONFERENCE CIRCUIT.ONE PORT IS FOR OPERATOR ACCESS
AND TWO PORTS ARE USED TO SPLIT AN EXISTING CONNECTION.TO VERKFY THE BUSY/IDLE
CONDITION OF A LINE,THE OPERATOR ESTABLISHED A CONNECTION TO THE OPERATOR
ACCESS PORT AND DIALS THE DIRECTORY NUMBER OF THE LINE TO BE VERIFIED.IF
THE LINE IS IN USE,THE EXISTING CONNECTION IS BROKEN AND IMMEDIATLY RE-ESTABLISHED
THROUGH THE OTHER TWO PORTS OF THE BUSY VERIFICATION CIRCUIT WITHOUT INTERRUPTION.
BUSY VERIFICATION CIRCUIT IS CONTROLLED BY ACCESS CODE. A DEDICATED TRUNK
CAN BE USED BUT IS NOT NECESSARY. 3. THE BUSY VREIFICATION CIRCUIT ALSO
CAN BE USED FOR TEST VERIFY FROM THE WIRE CHIEFS TEST PANEL. B. ADDITIONAL
BUSY VERIFICATION CONFERENCE CIRCUITS (002749) O.K. THERE IT IS-RIGHT OUT
OF AN ESS MANUAL WORD FOR WORD! (AND IM GETTING 25 LINEAR FEET OF ESS MANUALS!!!
NOT COUNTING THE STACK RECEIVED SO FAR! Brought to you in the Cookbook
by the Jolly Roger!!!!
White Box Plans
by the Jolly Roger
Introduction: ------------ The White
Box is simply a portable Touch-Tone keypad. For more information on Touch-Tone,
see my Silver Box Plans. Materials: --------- 1 Touch-Tone Keypad 1 Miniature
1000 to 8 Ohm Transformer (Radio Shack # 273-1380) 1 Standard 8 Ohm Speaker
2 9V Batteries 2 9V Battery Clips Procedure: --------- (1) Connect the
Red Wire from the Transformer to either terminal on the Speaker. (2) Connect
the White Wire from the Transformer to the other terminal on the Speaker.
(3) Connect the Red Wire from one Battery Clip to the Black Wire from the
other Battery Clip. (4) Connect the Red Wire from the second Battery Clip
to the Green Wire from the Keypad. (5) Connect the Blue Wire from the Keypad
to the Orange/Black Wire from the Keypad. (6) Connect the Black Wire from
the first Battery Clip to the two above wires (Blue and Black/Orange).
(7) Connect the Black Wire from the Keypad to the Blue Wire from the Transformer.
(8) Connect the Red/Green Wire from the Keypad to the Green Wire from the
Transformer. (9) Make sure the Black Wire from the Transformer and the
remaining wires from the Keypad are free. (10) Hook up the Batteries. Optional:
-------- (1) Put it all in a case. (2) Add a Silver Box to it. Use: ---
Just use it like a normal keypad, except put the speaker next to the receiver
of the phone you're using. ---------------------Jolly Roger
The BLAST Box
Courtesy of the Jolly Roger
Ever want to really make yourself be
heard? Ever talk to someone on the phone who just doesn't shut up? Or just
call the operator and pop her eardrum? Well, up until recently it has been
impossible for you to do these things. That is, unless of course you've
got a blast box. All a blast box is, is a really cheap amplifier, (around
5 watts or so) connected in place of the microphone on your telephone.
It works best on model 500 AT&T Phones, and if constructed small enough,
can be placed inside the phone. Construction: Construction is not really
important. Well it is, but since I'm letting you make your own amp, I really
don't have to include this. Usage: Once you've built your blast box, simply
connect a microphone (or use the microphone from the phone) to the input
of the amplifier, and presto. There it is. Now, believe it or not, this
device actually works. (At least on crossbar.) It seems that Illinois bell
switching systems allow quite alot of current to pass right through the
switching office, and out to whoever you're calling. When you talk in the
phone, it comes out of the other phone (again it works best if the phone
that you're calling has the standard western electric earpiece) incredibly
loud. This device is especially good for PBS Subscription drives. Have
"Phun", and don't get caught! ---------------------Jolly Roger
Dealing with
the Rate & Route Operator
It seems that fewer and fewer people
have blue boxes these days, and that is really too bad. Blue boxes, while
not all that great for making free calls (since the TPC can tell when the
call was made, as well as where it was too and from), are really a lot
of fun to play with. Short of becoming a real live TSPS operator, they
are about the only way you can really play with the network. For the few
of you with blue boxes, here are some phrases which may make life easier
when dealing with the rate & route (R&R) operators. To get the
R&R op, you send a KP + 141 + ST. In some areas you may need to put
another NPA before the 141 (i.e., KP + 213 + 141 + ST), if you have no
local R&R ops. The R&R operator has a myriad of information, and
all it takes to get this data is mumbling cryptic phrases. There are basically
four special phrases to give the R&R ops. They are NUMBERS route, DIRECTORY
route, OPERATOR route, and PLACE NAME. To get an R&R an area code for
a city, one can call the R&R operator and ask for the numbers route.
For example, to find the area code for Carson City, Nevada, we'd ask the
R&R op for "Carson City, Nevada, numbers route, please." and get the
answer, "Right... 702 plus." meaning that 702 plus 7 digits gets us there.
Sometimes directory assistance isn't just NPA + 131. The way to get these
routings is to call R&R and ask for "Anaheim, California, directory
route, please." Of course, she'd tell us it was 714 plus, which means 714
+ 131 gets us the D.A. op there. This is sort of pointless example, but
I couldn't come up with a better one on short notice. Let's say you wanted
to find out how to get to the inward operator for Sacremento, California.
The first six digits of a number in that city will be required (the NPA
and an NXX). For example, let us use 916 756. We would call R&R, and
when the operator answered, say, "916 756, operator route, please." The
operator would say, "916 plus 001 plus." This means that 916 + 001 + 121
will get you the inward operator for Sacramento. Do you know the city which
corresponds to 503 640? The R&R operator does, and will tell you that
it is Hillsboro, Oregon, if you sweetly ask for "Place name, 503 640, please."
For example, let's say you need the directory route for Sveg, Sweden. Simply
call R&R, and ask for, "International, Baden, Switzerland. TSPS directory
route, please." In response to this, you'd get, "Right... Directory to
Sveg, Sweden. Country code 46 plus 1170." So you'd route yourself to an
international sender, and send 46 + 1170 to get the D.A. operator in Sweden.
Inward operator routings to various countries are obtained the same way
"International, London, England, TSPS inward route, please." and get "Country
code 44 plus 121." Therefore, 44 plus 121 gets you inward for London. Inwards
can get you language assitance if you don't speak the language. Tell the
foreign inward, "United Staes calling. Language assitance in completing
a call to (called party) at (called number)." R&R operators are people
are people too, y'know. So always be polite, make sure use of 'em, and
dial with care. ---------------Jolly Roger
Cellular Phreaking
courtesy of The Jolly Roger
The cellular/mobile phone system is
one that is perfectly set up to be exploited by phreaks with the proper
knowledge and equipment. Thanks to deregulation, the regional BOC's (Bell
Operating Companies) are scattered and do not communicate much with each
other. Phreaks can take advantage of this by pretending to be mobile phone
customers whose "home base" is a city served by a different BOC, known
as a "roamer". Since it is impractical for each BOC to keep track of the
customers of all the other BOC's, they will usually allow the customer
to make the calls he wishes, often with a surcharge of some sort. The bill
is then forwarded to the roamer's home BOC for collection. However, it
is fairly simple (with the correct tools) to create a bogus ID number for
your mobile phone, and pretend to be a roamer from some other city and
state, that's "just visiting". When your BOC tries to collect for the calls
from your alleged "home BOC", they will discover you are not a real customer;
but by then, you can create an entirely new electronic identity, and use
that instead. How does the cellular system know who is calling, and where
they are? When a mobile phone enters a cell's area of transmission, it
transmits its phone number and its 8 digit ID number to that cell, who
will keep track of it until it gets far enough away that the sound quality
is sufficiently diminished, and then the phone is "handed off" to the cell
that the customer has walked or driven into. This process continues as
long as the phone has power and is turned on. If the phone is turned off
(or the car is), someone attempting to call the mobile phone will receive
a recording along the lines of "The mobile phone customer you have dialed
has left the vehicle or driven out of the service area." When a call is
made to a mobile phone, the switching equipment will check to see if the
mobile phone being called is "logged in", so to speak, or present in one
of the cells. If it is, the call will then act (to the speaking parties)
just like a normal call - the caller may hear a busy tone, the phone may
just ring, or the call may be answered. How does the switching equipment
know whether or not a particular phone is authorized to use the network?
Many times, it doesn't. When a dealer installs a mobile phone, he gives
the phone's ID number (an 8 digit hexadecimal number) to the local BOC,
as well as the phone number the BOC assigned to the customer. Thereafter,
whenever a phone is present in one of the cells, the two numbers are checked
- they should be registered to the same person. If they don't match, the
telco knows that an attempted fraud is taking place (or at best, some transmission
error) and will not allow calls to be placed or received at that phone.
However, it is impractical (especially given the present state of deregulation)
for the telco to have records of every cellular customer of every BOC.
Therefore, if you're going to create a fake ID/phone number combination,
it will need to be "based" in an area that has a cellular system (obviously),
has a different BOC than your local area does, and has some sort of a "roamer"
agreement with your local BOC. How can one "phreak" a cellular phone? There
are three general areas when phreaking cellular phones; using one you found
in an unlocked car (or an unattended walk-about model), modifying your
own chip set to look like a different phone, or recording the phone number/ID
number combinations sent by other local cellular phones, and using those
as your own. Most cellular phones include a crude "password" system to
keep unauthorized users from using the phone - however, dealers often set
the password (usually a 3 to 5 digit code) to the last four digits of the
customer's mobile phone number. If you can find that somewhere on the phone,
you're in luck. If not, it shouldn't be TOO hard to hack, since most people
aren't smart enough to use something besides "1111", "1234", or whatever.
If you want to modify the chip set in a cellular phone you bought (or stole),
there are two chips (of course, this depends on the model and manufacturer,
yours may be different) that will need to be changed - one installed at
the manufacturer (often epoxied in) with the phone's ID number, and one
installed by the dealer with the phone number, and possible the security
code. To do this, you'll obviously need an EPROM burner as well as the
same sort of chips used in the phone (or a friendly and unscrupulous dealer!).
As to recording the numbers of other mobile phone customers and using them;
as far as I know, this is just theory... but it seems quite possible, if
you've got the equipment to record and decode it. The cellular system would
probably freak out if two phones (with valid ID/phone number combinations)
were both present in the network at once, but it remains to be seen what
will happen. -----------------Jolly Roger
Cheesebox Plans
Courtesy of The Jolly Roger
A Cheesebox (named for the type of
box the first one was found in) is a type of box which will, in effect,
make your telephone a Pay-Phone.....This is a simple,modernized, and easy
way of doing it.... Inside Info:These were first used by bookies many years
ago as a way of making calls to people without being called by the cops
or having their numbers traced and/or tapped...... How To Make A Modern
Cheese Box Ingredients: ------------ 1 Call Forwarding service on the line
1 Set of Red Box Tones The number to your prefix's Intercept operator (do
some scanning for this one) How To: ------- After you find the number to
the intercept operator in your prefix, use your call-forwarding and forward
all calls to her...this will make your phone stay off the hook(actually,
now it waits for a quarter to be dropped in)...you now have a cheese box...
In Order To Call Out On This Line:You must use your Red Box tones and generate
the quarter dropping in...then,you can make phone calls to people...as
far as I know, this is fairly safe, and they do not check much...Although
I am not sure, I think you can even make credit-card calls from a cheesebox
phone and not get traced...
HOW TO START
YOUR OWN CONFERENCES! Brought to you by The Jolly Roger
BLACK BART SHOWED HOW TO START A CONFERENCE
CALL THRU AN 800 EXCHANGE, AND I WILL NOW EXPLAIN HOW TO START A CONFERENCE
CALL IN A MORE ORTHODOX FASHIO, THE 2600 HZ. TONE. FIRSTLY, THE FONE COMPANY
HAS WHAT IS CALLED SWITCHING SYSTEMS. THERE ARE SE VERAL TYPES, BUT THE
ONE WE WILL CONCERN OURSELVES WITH, IS ESS (ELECTRONIC SWITCHING SYSTEM).
IF YOUR AREA IS ZONED FOR ESS, DO NOT START A CONFERENCE CALL VIA THE 2600
HZ. TONE, OR BELL SECURITY WILL NAIL YOUR ASS! TO FND OUT IF YOU ARE UNDER
ESS, CALL YOUR LOCAL BUSINESS OFFICE, AND ASK THEM IF YOU CAN GET CALL
WAITING/FORWARDING, AND IF YOU CAN, THAT MEANS THAT YOU ARE IN ESS COUNTRY
, AND CONFERENCE CALLING IS VERY, VERY DANGEROUS!!! NOW, IF YOU ARE NOT
IN ESS, YOU WILL NEED THE FOLLOWING EQUIPMENT: AN APPLE CAT II MODEM A
COPY OF TSPS 2 OR CAT'S MEOW A TOUCH TONE FONE LINE AND A TOUCH TONE FONE.
(TRUE TONE) NOW, WITH TSPS 2, DO THE FOLLOWING: RUN TSPS 2 CHOSE OPTION
1 CHOSE OPTION 6 CHOSE SUB-OPTION 9 NOW TYPE: 1-514-555-1212 (DASHES ARE
NOT NEEDED) LISTEN WITH YOUR HANDSET, AND AS SOON AS YOU HEAR A LOUD 'CLICK',
THEN TYPE $ TO GENERATE THE 2600 HZ. TONE. THIS OBNOXIOUS TONE WILL CONTINUE
FOR A FEW SECONDS, THEN LISTEN AGAIN AND YOU SHOULD HEAR ANOTHER LOUD 'CLICK'.
NOW TYPE: KM2130801050S WHERE 'K' = KP TONE 'M' = MULTI FREQUENCY MODE
'S' = S TONE NOW LISTEN TO THE HANDSET AGAIN, AND WAIT UNTIL YOU HEAR THE
'CLICK' AGAIN. THEN TYPE: KM2139752975S WHERE 2139751975 IS THE NUMBER
TO BILL THE CONFERENCE CALL TO. NOTE: 213-975- 1975 IS A DISCONNECTED NUMBER,
AND I STRONGLY ADVISE THAT YOU ONLY BILL THE CALL TO THIS NUMBER, OR THE
FONE COMPANY WILL FIND OUT, AND THEN.......... REMEBER, CONFERENCE CALLS
ARE ITEMIZED, SO IF YOU DO BILL IT TO AN ENEMY'S NUMB ER, HE CAN EASILY
FIND OUT WHO DID IT AND HE CAN BUST YOU! YOU SHOULD NOW HEAR 3 BEEPS, AND
A SHORT PRE-RECORDED MESSAGE. FROM HERE ON, EVERYTHING IS ALL MENU DRIVEN.
CONFERENCE CALL COMMANDS ---------- ---- -------- FROM THE '#' MODE: 1
= CALL A NUMBER 6 = TRANSFER CONTROL 7 = HANGS UP THE CONFERENCE CALL 9
= WILL CALL A CONFERENCE OPERATR STAY AWAY FROM 7 AND 9! IF FOR SOME REASON
AN OPERATOR GETS ON-LINE, HANG UP! IF YOU GET A BUSY SIGNAL AFTER KM2130801050S,
THAT MEANS THAT THE TELECONFEREN CING LINE IS TEMPORARILY DOWN. TRY LATER,
PREFERRABLY FROM 9AM TO 5PM WEEK DAYS, SINCE CONFERENCE CALLS ARE PRIMARILY
DESIGNED FOR BUSINESS PEOPLE. THE LEECH Gold Box Plans by The Jolly Roger
HOW TO BUILD IT _______________ You will need the following: Two 10K OHM
and three 1.4K OHM resistors Two 2N3904 transistors Two Photo Cells Two
Red LED'S (The more light produced the better) A box that will not let
light in Red and Green Wire Light from the #1 LED must shine directly on
the photocell #1. The gold box I made needed the top of the LED's to touch
the photo cell for it to work. The same applies to the #2 photo cell and
LED. 1 :-PHOTOCELL--: : : : :BASE : 1 TTTTT : +LED- TRANSISTOR : TTTTT
: : : : -I(-- : :COLLECTOR RED1--< >:--: :-------:-----GREEN2 -I(--
: ----------: : : 2 :-/+/+/-/+/+/-/+/+/-/+/+/ LED 10K 10K 1.4K 1.4K RESISTORES
2 -PHOTOCELL----------------- : : :BASE : TTTTT : TRANSISTOR : TTTTT :
: :EMITTER : GREEN1- --------------------------RED2 : : /+/+/ 1.4K The
1.4K resistor is variable and if the second part of the gold box is skipped
it will still work but when someone picks up the phone they will hear a
faint dial tone in the background and might report it to the Gestapo er...(AT&T).
1.4K will give you good reception with little risk of a Gestapo agent at
your door. Now that you have built it take two green wires of the same
length and strip the ends, twist two ends together and connect them to
green1 and place a piece of tape on it with "line #1" writing on it. Continue
the process with red1 only use red wire. Repeat with red2 and green2 but
change to line #2. HOW TO INSTALL ______________ You will need to find
two phone lines that are close together. Label one of teh phone lines "Line
#1". Cut the phone lines and take the outer coating off it. Tere should
be 4 wires. Cut the yellow and black wires off and strip the red and green
wires for both lines. Line #1 should be in two pieces. Take the green wire
of one end and connect it to one of the green wires on the gold box. Take
the other half of line #1 and hook the free green wire to the green wire
on the phone line. Repeat the process with red1 and the other line. All
you need to do now is to write down the phone numbers of the place you
hooked it up at and go home and call it. You should get a dial tone!!!
If not, try changing the emittor with the collector. Have a great time
with this! -----------Jolly Roger The History of ESS Courtesy of the Jolly
Roger Of all the new 1960s wonders of telephone technology - satellites,
ultra modern Traffic Service Positions (TSPS) for operators, the picturephone,
and so on - the one that gave Bell Labs the most trouble, and unexpectedly
became the greatest development effort in Bell System's history, was the
perfection of an electronic switching system, or ESS. It may be recalled
that such a system was the specific end in view when the project that had
culminated in the invention of the transistor had been launched back in
the 1930s. After successful accomplishment of that planned miracle in 1947-48,
further delays were brought about by financial stringency and the need
for further development of the transistor itself. In the early 1950s, a
Labs team began serious work on electronic switching. As early as 1955,
Western Electric became involved when five engineers from the Hawthorne
works were assigned to collaborate with the Labs on the project. The president
of AT&T in 1956, wrote confidently, "At Bell Labs, development of the
new electronic switching system is going full speed ahead. We are sure
this will lead to many improvements in service and also to greater efficiency.
The first service trial will start in Morris, Ill., in 1959." Shortly thereafter,
Kappel said that the cost of the whole project would probably be $45 million.
But it gradually became apparent that the developement of a commercially
usable electronic switching system - in effect, a computerized telephone
exchange - presented vastly greater technical problems than had been anticipated,
and that, accordingly, Bell Labs had vastly underestimated both the time
and the investment needed to do the job. The year 1959 passed without the
promised first trial at Morris, Illinois; it was finally made in November
1960, and quickly showed how much more work remained to be done. As time
dragged on and costs mounted, there was a concern at AT&T and something
approaching panic at Bell Labs. But the project had to go forward; by this
time the investment was too great to be sacrificed, and in any case, forward
projections of increased demand for telephone service indicated that within
a phew years a time would come when, without the quantum leap in speed
and flexibility that electronic switching would provide, the national network
would be unable to meet the demand. In November 1963, an all-electronic
switching system went into use at the Brown Engineering Company at Cocoa
Beach, Florida. But this was a small installation, essentially another
test installation, serving only a single company. Kappel's tone on the
subject in the 1964 annual report was, for him, an almost apologetic: "Electronic
switching equipment must be manufactured in volume to unprecedented standards
of reliability.... To turn out the equipment economically and with good
speed, mass production methods must be developed; but, at the same time,
there can be no loss of precision..." Another year and millions of dollars
later, on May 30, 1965, the first commercial electric centeral office was
put into service at Succasunna, New Jersey. Even at Succasunna, only 200
of the town's 4,300 subscribers initially had the benefit of electronic
switching's added speed and additional services, such as provision for
three party conversations and automatic transfer of incoming calls. But
after that, ESS was on its way. In January 1966, the second commercial
installation, this one serving 2,900 telephones, went into service in Chase,
Maryland. By the end of 1967 there were additional ESS offices in California,
Connecticut, Minnesota, Georgia, New York, Florida, and Pennsylvania; by
the end of 1970 there were 120 offices serving 1.8 million customers; and
by 1974 there were 475 offices serving 5.6 million customers. The difference
between conventional switching and electronic switching is the difference
between "hardware" and "software"; in the former case, maintenence is done
on the spot, with screwdriver and pliers, while in the case of electronic
switching, it can be done remotely, by computer, from a centeral point,
making it possible to have only one or two technicians on duty at a time
at each switching center. The development program, when the final figures
were added up, was found to have required a staggering four thousand man-years
of work at Bell Labs and to have cost not $45 million but $500 million!
The Lunch Box
Courtesy of the Jolly Roger
Introduction =========== The Lunch
Box is a VERY simple transmitter which can be handy for all sorts of things.
It is quite small and can easily be put in a number of places. I have successfully
used it for tapping fones, getting inside info, blackmail and other such
things. The possibilities are endless. I will also include the plans or
an equally small receiver for your newly made toy. Use it for just about
anything. You can also make the transmitter and receiver together in one
box and use it as a walkie talkie. Materials you will need ======================
(1) 9 volt battery with battery clip (1) 25-mfd, 15 volt electrolytic capacitor
(2) .0047 mfd capacitors (1) .022 mfd capacitor (1) 51 pf capacitor (1)
365 pf variable capacitor (1) Transistor antenna coil (1) 2N366 transistor
(1) 2N464 transistor (1) 100k resistor (1) 5.6k resistor (1) 10k resistor
(1) 2meg potentiometer with SPST switch Some good wire, solder, soldering
iron, board to put it on, box (optional) Schematic for The Lunch Box ===========================
This may get a tad confusing but just print it out and pay attention. [!]
! 51 pf ! ---+---- ------------base collector ! )( 2N366 +----+------/\/\/----GND
365 pf () emitter ! ! )( ! ! +-------- ---+---- ! ! ! ! ! ! ! GND / .022mfd
! ! 10k\ ! ! ! / GND +------------------------emitter ! ! ! 2N464 / .0047
! base collector 2meg \----+ ! ! +--------+ ! / ! GND ! ! ! GND ! ! ! +-------------+.0047+--------------------+
! ! ! +--25mfd-----+ -----------------------------------------+ ! ! microphone
+--/\/\/-----+ ---------------------------------------------+ 100k ! !
GND---->/<---------------------!+!+!+---------------+ switch Battery
from 2meg pot. Notes about the schematic ========================= 1. GND
means ground 2. The GND near the switch and the GND by the 2meg potentiometer
should be connected. 3. Where you see: )( () )( it is the transistor antenna
coil with 15 turns of regular hook-up wire around it. 4. The middle of
the loop on the left side (the left of "()") you should run a wire down
to the "+" which has nothing attached to it. There is a .0047 capacitor
on the correct piece of wire. 5. For the microphone use a magnetic earphone
(1k to 2k). 6. Where you see "[!]" is the antenna. Use about 8 feet of
wire to broadcast approx 300ft. Part 15 of the FCC rules and regulation
says you can't broadcast over 300 feet without a license. (Hahaha). Use
more wire for an antenna for longer distances. (Attach it to the black
wire on the fone line for about a 250 foot antenna!) Operation of the Lunch
Box ========================== This transmitter will send the signals over
the AM radio band. You use the variable capacitor to adjust what freq.
you want to use. Find a good unused freq. down at the lower end of the
scale and you're set. Use the 2 meg pot. to adjust gain. Just fuck with
it until you get what sounds good. The switch on the 2meg is for turning
the Lunch Box on and off. When everything is adjusted, turn on an AM radio
adjust it to where you think the signal is. Have a friend lay some shit
thru the Box and tune in to it. That's all there is to it. The plans for
a simple receiver are shown below: The Lunch Box receiver ======================
(1) 9 volt battery with battery clip (1) 365 pf variable capacitor (1)
51 pf capacitor (1) 1N38B diode (1) Transistor antenna coil (1) 2N366 transistor
(1) SPST toggle switch (1) 1k to 2k magnetic earphone Schematic for receiver
====================== [!] ! 51 pf ! +----+----+ ! ! ) 365 pf (----+ !
) ! ! +---------+---GND ! +---*>!----base collector----- diode 2N366 earphone
emitter +----- ! ! GND ! - + - battery + GND------>/<------------+ switch
Closing statement ================= This two devices can be built for under
a total of $10.00. Not too bad. Using these devices in illegal ways is
your option. If you get caught, I accept NO responsibility for your actions.
This can be a lot of fun if used correctly. Hook it up to the red wire
on the phone line and it will send the conversation over the air waves.
Enjoy! The Lunch Box Courtesy of the Jolly Roger Introduction ===========
The Lunch Box is a VERY simple transmitter which can be handy for all sorts
of things. It is quite small and can easily be put in a number of places.
I have successfully used it for tapping fones, getting inside info, blackmail
and other such things. The possibilities are endless. I will also include
the plans or an equally small receiver for your newly made toy. Use it
for just about anything. You can also make the transmitter and receiver
together in one box and use it as a walkie talkie. Materials you will need
====================== (1) 9 volt battery with battery clip (1) 25-mfd,
15 volt electrolytic capacitor (2) .0047 mfd capacitors (1) .022 mfd capacitor
(1) 51 pf capacitor (1) 365 pf variable capacitor (1) Transistor antenna
coil (1) 2N366 transistor (1) 2N464 transistor (1) 100k resistor (1) 5.6k
resistor (1) 10k resistor (1) 2meg potentiometer with SPST switch Some
good wire, solder, soldering iron, board to put it on, box (optional) Schematic
for The Lunch Box =========================== This may get a tad confusing
but just print it out and pay attention. [!] ! 51 pf ! ---+---- ------------base
collector ! )( 2N366 +----+------/\/\/----GND 365 pf () emitter ! ! )(
! ! +-------- ---+---- ! ! ! ! ! ! ! GND / .022mfd ! ! 10k\ ! ! ! / GND
+------------------------emitter ! ! ! 2N464 / .0047 ! base collector 2meg
\----+ ! ! +--------+ ! / ! GND ! ! ! GND ! ! ! +-------------+.0047+--------------------+
! ! ! +--25mfd-----+ -----------------------------------------+ ! ! microphone
+--/\/\/-----+ ---------------------------------------------+ 100k ! !
GND---->/<---------------------!+!+!+---------------+ switch Battery
from 2meg pot. Notes about the schematic ========================= 1. GND
means ground 2. The GND near the switch and the GND by the 2meg potentiometer
should be connected. 3. Where you see: )( () )( it is the transistor antenna
coil with 15 turns of regular hook-up wire around it. 4. The middle of
the loop on the left side (the left of "()") you should run a wire down
to the "+" which has nothing attached to it. There is a .0047 capacitor
on the correct piece of wire. 5. For the microphone use a magnetic earphone
(1k to 2k). 6. Where you see "[!]" is the antenna. Use about 8 feet of
wire to broadcast approx 300ft. Part 15 of the FCC rules and regulation
says you can't broadcast over 300 feet without a license. (Hahaha). Use
more wire for an antenna for longer distances. (Attach it to the black
wire on the fone line for about a 250 foot antenna!) Operation of the Lunch
Box ========================== This transmitter will send the signals over
the AM radio band. You use the variable capacitor to adjust what freq.
you want to use. Find a good unused freq. down at the lower end of the
scale and you're set. Use the 2 meg pot. to adjust gain. Just fuck with
it until you get what sounds good. The switch on the 2meg is for turning
the Lunch Box on and off. When everything is adjusted, turn on an AM radio
adjust it to where you think the signal is. Have a friend lay some shit
thru the Box and tune in to it. That's all there is to it. The plans for
a simple receiver are shown below: The Lunch Box receiver ======================
(1) 9 volt battery with battery clip (1) 365 pf variable capacitor (1)
51 pf capacitor (1) 1N38B diode (1) Transistor antenna coil (1) 2N366 transistor
(1) SPST toggle switch (1) 1k to 2k magnetic earphone Schematic for receiver
====================== [!] ! 51 pf ! +----+----+ ! ! ) 365 pf (----+ !
) ! ! +---------+---GND ! +---*>!----base collector----- diode 2N366 earphone
emitter +----- ! ! GND ! - + - battery + GND------>/<------------+ switch
Closing statement ================= This two devices can be built for under
a total of $10.00. Not too bad. Using these devices in illegal ways is
your option. If you get caught, I accept NO responsibility for your actions.
This can be a lot of fun if used correctly. Hook it up to the red wire
on the phone line and it will send the conversation over the air waves.
Enjoy!
Olive Box Plans
Courtesy of the Jolly Roger
This is a relatively new box, and all
it basically does is serve as a phone ringer. You have two choices for
ringers, a piezoelectric transducer (ringer), or a standard 8 ohm speaker.
The speaker has a more pleasant tone to it, but either will do fine. This
circuit can also be used in conjunction with a rust box to control an external
something or other when the phone rings. Just connect the 8 ohm speaker
output to the inputs on the rust box, and control the pot to tune it to
light the light (which can be replaced by a relay for external controlling)
when the phone rings. ______________ | | ^ NC --|-- 5 4 --|-----/\/\/------->G
| | / R2 G<----)|----|-- 6 3 --|-- NC | C3 | U1 | -------|-- 7 2 --|----------
--- -- - > TO RINGER | | ----|-- 8 1 --|-- | |______________| | | ---/\/\/----|(-----
L1 | R1 C1 ------------------------------------------ L2 a. Main ringer
TTL circuit (>::::::::::::::::::::::::::::::::::::::::::::::::::::::::<)
_ FROM PIN 2 < - -- --- ----------| |_| |------------->G P1 b. Peizoelectric
transducer (>::::::::::::::::::::::::::::::::::::::::::::::::::::::::<)
__ /| FROM PIN 2 < - -- --- ---------|(---------. .-------| |/ | >||<
|S1| | >||< --| | | >||< | |__|\ | G<---------.>||<.--- \|
T1 c. Elctro magnetic transducer Parts List ---------- U1 - Texas Instruments
TCM1506 T1 - 4000:8 ohm audio transfomer S1 - 8 ohm speaker R1 - 2.2k resistor
R2 - External variable resistor; adjusts timing frequency C1 - .47uF capacitor
C2 - .1uF capacitor C3 - 10uF capacitor L1 - Tip L2 - Ring L1 and L2 are
the phone line. Shift Rate: ----------- This is the formula for determining
the shift rate: 1 1 SR = --------------------- = ------------ = 6.25 Hz
(DSR(1/f1)+DSR(1/f2)) 128 128 ---- + ---- 1714 1500 DSR = Shift Devider
Rate ratio = 128 f1 = High Output Frequency = 1714 f2 = Low Output Frequency
= 1500 The Tron Box Written by The GREAT Captain Crunch!! Courtesy of the
Jolly Roger ------------------R-----F---- I I I I I I I I- (C) (C) (C)
I I I I- I I I I ----------------------------- (C)=CAPACITOR F =FUSE R
=RESISTOR I,- ARE WIRE PARTS LIST: (3) ELECTROLYTIC CAPACITORS RATED AT
50V(LOWEST) .47UF (1) 20-30OHM 1/2 WATT RESISTOR (1) 120VOLT FUSE (AMP
RATING BEST TO USE AT LEAST HALF OF TOTAL HOUSE CURRENT OR EVEN LESS IT
KEEPS YOU FROM BLOWING YOUR BREAKER JUST IN CASE...) (1) POWER CORD (CUT
UP AN EXTENSTION CORD. NEED PLUG PART AND WIRE) (1) ELECTRICALLY INSULATED
BOX REST OF SIF YOUR DONT FILL COMFORTABLE ABOUT ELECTRICITY THEN DONT
PLAY WITH THIS THERE IS VOLTAGE PRESENT THAT WILL ***KILL*** YOU......................
THE THING WORKS WHEN THE LOAD IN YOUR HOUSE IS LOW LIKE AT NIGHT TIME.
IT WILL PUT A REVERSE PHASE SIGNAL ON THE LINE AND CANCEL OUT THE OTHER
PHASE AND PUT A REVERSE PHASE RUNNING EVERYTHING IN THE HOUSE. WELL IF
YOU HAVE EVER SWITCHED THE POWER LEADS ON A D.C. (BATTERY POWERED) MOTOR
YOU WILL SEE THAT IT RUNS BACKWARDS WELL YOUR ELECTRIC METER SORT OF WORKS
THIS WAY...SO REVERSE PHASE MAKES THE METER SLOW DOWN AND IF YOUR LUCKY
IT WILL GO BACKWARDS. ANYWAY IT MEANS A CHEAPER ELECTRIC BILL.
More TRW Info
Courtesy of the Jolly Roger
Trw is a large database in which company's
and banks can run credit checks on their customers. Example: John Jones
orders 500$ worth of stereo equipment from the Joe Blow Electronic distributtng
Co. Well it could be that he gave the company a phony credit card number,
or doesn't have enough credit, etc. Well they call up Trw and then run
a check on him, trw then lists his card numbers (everything from sears
to visa) and tells the numbers, credit, when he lost it last (if he ever
did) and then of course tells if he has had any prior problems paying his
bills. I would also like to add that although Trw contains information
on millions of people, not every part of the country is served, although
the major area are.. So if you hate someone and live in a small state,
you probably wont be able to order him 300 pink toilet seats from K-mart.
Logging on ========== To log on, you dial-up your local access number (or
long-distance, what ever turns you on) and wait for it to say "trw" at
this promt, you type either an "A" or a "Ctrl-G" and it will say "circuit
building in progress" it will wait for a minute and then clear the screen,
now you will type one of the following. Tca1 Tca2 Tnj1 Tga1 This is to
tell it what geographical area the customer is in, it really doesnt matter
which you use, because trw will automatically switch when it finds the
record.. Next, you will type in the pswd and info on the person you are
trying to get credit info on: you type it in a format like this: Rts Pswd
Lname Fname ...,House number First letter of street name Zip
Sodium Chlorate
by the Jolly Roger
Sodium Chlorate is a strong oxidizer
used in the manufacture of explosives. It can be used in place of Potassium
Chlorate. Material Required Sources ----------------- ------- 2 carbon
or lead rods (1 in. diameter Dry Cell Batteries by 5 in. long) (2-1/2 in.
diameter by 7" long) or plumbing supply store Salt, or ocean water Grocery
store or ocean Sulfuric acid, diluted Motor Vehicle Batteries Motor Vehicle
Water 2 wires, 16 gauge (3/64 in. diameter approx.), 6 ft. long, insulated.
Gasoline 1 gallon glass jar, wide mouth (5 in. diameter by 6 in. high approx.)
Sticks String Teaspoon Trays Cup Heavy cloth Knife Large flat pan or tray
Procedure --------- 1) Mix 1/2 cup of salt into the one gallon glass jar
with 3 litres (3 quarts) of water. 2) Add 2 teaspoons of battery acid to
the solution and stir vigorously for 5 minutes. 3) Strip about 4 inches
of insulation from both ends of the two wires. 4) With knife and sticks,
shape 2 strips of wood 1 by 1/8 by 1-1/2. Tie the wood strips to the lead
or carbon rods so that they are 1-1/2 incles apart. 5) Connect the rods
to the battery in a motor vehicle with the insulated wire. 6) Submerge
4-1/2 inches of the rods in the salt water solution. 7) With gear in neutral
position, start the vehicle engine. Depress the accelerator approx. 1/5
of its full travel. 8) Run the engine with the accelerator in this position
for 2 hours, then shut it down for 2 hours. 9) Repeat this cycle for a
total of 64 hours while maintaining the level of the acid-salt water solution
in the glass jar. CAUTION: This arrangement employs voltages which can
be quite dangerous! Do not touch bare wire leads while engine is running!!
10) Shut off the engine. Remove the rods from the glass jar and disconnect
wire leads from the battery. 11) Filter the solution through the heavy
cloth into a flat pan or tray, leaving the sediment at the bottom of the
glass jar. 12) Allow the water in the filtered solution to evaporate at
room temperature (approx. 16 hours). The residue is approximately 60% or
more sodium chlorate which is pure enough to be used as an explosive ingredient.
---------------Jolly Roger
Mercury Fulminate
by the Jolly Roger
Mercury Fulminate is used as a primary
explosive in the fabrication of detonators. It is to be used with a booster
explosive such as picric acid or RDX (which are elsewhere in this Cookbook).
Material Required Source ----------------- ------ Nitric Acid, 90% conc.
(1.48 sp. gr) Elsewhere in this Cookbook, or in industrial metal processors
Mercury Thermometers, mercury switches, old radio tubes Ethyl (grain) alcohol
(90%) Filtering material Paper towels Teaspoon measure (1/4, 1/2. and 1
tsp. capacity)-aluminum, stainless steel or wax coated Heat Source Clean
wooden stick Clean water Glass containers Tape Syringe Procedure: ---------
1) Dilute 5 teaspoons of nitric acid with 2-1/2 teaspoons of clean water
in a glass container by adding the acid to the water. 2) Dissolve 1/8 teaspoon
of mercury in the diluted nitric acid. This will yield dark red fumes.
NOTE: It may be necessary to add water, on drop at a time, to the mercury-acid
solution in order to start a reaction. CAUTION: Acid will burn skin and
destroy clothing. If any is spilled, wash it away with a large quantity
of water. Do NOT inhale fumes! 3) Warm 10 teaspoons of the alcohol in a
container until the alcohol feels warm to the inside of the wrist. 4) Pour
the metal-acid solution into the warm alcohol. Reaction should start in
less than 5 minutes. Dense white fumes will be given off during the reaction.
As time lapses, the fumes will become less dense. Allow 10 to 15 minutes
to complete reaction. Fulminate will settle to the bottom. CAUTION: This
reaction generates large quantities of toxic, flammable fumes. The process
MUST be conducted outdoors or in a well-ventilated area, away from sparks
or open flames. DO NOT inhale fumes! 5) Filter the solution through a paper
towel into a container. Crystals may stick to the side of the container.
If so, tilt and squirt water down the sides of the container until all
of the material collects on the filter paper. 6) Wash the crystals with
6 teaspoons of ethyl alcohol. 7) Allow these mercury fulminate crystals
to air dry. CAUTION: Handle dry explosive with great care. Do not scrape
or handle it roughly! Keep away from sparks or open flames. Store in a
cool, dry place. ----------------Jolly Roger
Improvised Black
Powder by the Jolly Roger
Black powder can be prepared in a simple,
safe manner. It may be used as blasting or gun powder. Material Required
----------------- Potassium Nitrate, granulated, 3 cups (3/4 liter) Wood
charcoal, powdered, 2 cups Sulfur, powdered, 1/2 cup Alcohol, 5 pints (2-1/2
liters) (whiskey, rubbing alcohol, etc.) Water, 3 cups (3/4 liter) Heat
source 2 buckets - each 2 gallon (7-1/2 litres) capacity, at least one
of which is heat resistant (metal, ceramic, etc.) Flat window screening,
at least 1 foot (30 cm) square Large wooden stick Cloth, at leat 2 feet
(60 cm) square Procedure: --------- 1) Place alcohol in one of the buckets.
2) Place potassium nitrate, charcoal, and sulfur in the heat resistant
bucket. Add 1 cup water and mix thoroughly with wooden stick until all
ingrediants are dissolved. 3) Add remaining water (2 cups) to mixture.
Place bucket on heat source and stir until small bubbles begin to form.
CAUTION: DO NOT boil mixture. Be sure ALL mixture stays wet. If any is
dry, as on sides of pan, it may ignite! 4) Remove bucket from heat and
pour mixture into alcohol while stirring vigorously. 5) Let alcohol mixture
stand about 5 minutes. Strain mixture through cloth to obtain black powder.
Discard liquid. Wrap cloth around black powder and squeeze to remove all
excess liquid. 6) Place screening over dry bucket. Place workable amount
of damp powder on screen and granulate by rubbing solid through screen.
NOTE: If granulated particles appear to stick together and change shape,
recombine entire batch of powder and repeat steps 5 & 6. 7) Spread
granulated black powder on flat, dry surface so that layer about 1/2 inch
(1-1/4 cm) is formed. Allow to dry. Use radiator, or direct sunlight. This
should be dried as soon as possible, preferably in an hour. The longer
the drying period, the less effective the black powder. CAUTION: Remove
from heat AS SOON AS granules are dry. Black powder isnow ready to use.
Nitric Acid by
the Jolly Roger
Nitric Acid is used in the preparation
of many explosives, incediary mixtures, and acid delay timers. It may be
prepared by distilling a mixture of potassium nitrate and concentrated
sulfuric acid. Material Required Sources ----------------- ------- Potassium
Nitrate (2 parts by volume) Elsewhere in this Cookbook, or drug store CONCENTRATED
sulfuric acid (1 part by volume) Motor vehicle batteries Industrial plants
2 bottles or ceramin jugs (narrow necks are preferable) Pot or frying pan
Heat source (wood, charcoal, or coal) Tape (paper, electrical, masking,
but NOT cellophane!) Paper or rags IMPORTANT: If sulfuric acid is obtained
from a motor vehicle battery, concentrate it by boiling it UNTIL white
fumes appear. DO NOT INHALE FUMES NOTE: The amount of nitric acid produced
is th same as the amount of potassium nitrate. Thus, for two tablespoons
of nitric acid, use 2 tablespoons of potassium nitrate and 1 tablespoonful
of concentrated sulfuric acid. Procedure: --------- 1) Place dry potassium
nitrate in bottle or jug. Add sulfuric acid. Do not fill the bottle more
than 1/4 full. Mix until paste is formed. CAUTION: DO NOT INHALE FUMES!
2) Wrap paper or rags around necks of two bottles. securly tape necks of
two bottles together. Be sure that bottles are flush against each other
and that there are no air spaces. 3) Support bottles on rocks or cans so
that empty bottle is SLIGHTLY lower than bottle containing paste so that
nitric acid that is formed in receiving bottle will not run into other
bottle. 4) Build fire in pot or frying pan. 5) Gently heat bottle containing
mixture by gently moving fire in and out. As red fumes begin to appear
periodically pour cool water over empty receiving bottle. Nitric acid will
befin to form in receiving bottle. CAUTION: Do not overheat or wet bottle
containing mixture or it may shatter. As an added precaution, place bottle
to be heated in heat resistant container filled with sand or gravel. Heat
this outer container to produce nitric acid. 6) Continue the above process
until no more red fumes are formed. If the nitric acid formed in the receiving
bottle is not clear (cloudy) pour it into cleaned bottle and repeat steps
2-6. CAUTION: Nitric acid should be ket away from all combustables and
should be kept in a SEALED CERAMIC OR GLASS container. DO NOT inhale fumes!
----------------Jolly Roger
Dust Bomb Instructions
by the Jolly Roger
An initiator which will initiate common
material to produce dust explosions can be rapidly and easily constructed.
This type of charge is ideal for the destruction of enclosed areas such
as rooms or buildings. Material Required ----------------- A flat can,
3 in. (8 cm) in diameter and 1-1/2 in. (3-3/4 cm) high. A 6- 1/2 ounce
tuna can serves the purpose quite well. Blasting cap Explosive Aluminum
(may be wire, cut sheet, flattened can, or powder) Large nail, 4 in. (10
cm) long Wooden rod - 1/4 in. (6 mm) diameter Flour, gasoline, and powder
or chipped aluminum NOTE: Plastic explosive produce better explosions than
cast explosives. Procedure: --------- 1) Using the nail, press a hole through
the side of the tuna can 3/8 inch to 1/2 inch (1 to 1-1/2 cm) from the
bottom. Using a rotating and lever action, enlarge the hole until it will
accomodate the blasting cap. 2) Place the wooden rod in the hole and position
the end of the rod at the center of the can. 3) Press explosive into the
can, being sure to surround the rod, until it is 3/4 inch (2 cm) from the
top of the can. Carefully remove the wooden rod. 4) Place the aluminum
metal on top of the explosive. 5) Just before use, insert the blasting
cap into the cavity made by the rod. The initiator is now ready to use.
NOTE: If it is desired to carry the initiator some distance, cardboard
may be pressed on top of the aluminum to insure against loss of material.
How to Use: ---------- This particular unit works quite well to initiate
charges of five pounds of flour, 1/2 gallon (1-2/3 litres) of gasoline,
or two pounds of flake painters aluminum. The solid materials may merely
be contained in sacks or cardboard cartons. The gasoline may be placed
in plastic coated paper milk cartons, as well as plastic or glass bottles.
The charges are placed directly on top of the initiator and the blasting
cap is actuated electrically or by a fuse depending on the type of cap
employed. this will destroy a 2,000 cubic feet enclosure (building 10 x
20 x 10 feet). Note: For larger enclosures, use proportionally larger initiators
and charges. ---------------Jolly Roger Carbon-Tet
Explosive by the Jolly Roger
A moist explosive mixture can be made
from fine aluminum powder combined with carbon tetrachloride or tetrachloroethylene.
This explosive can be detonated with a blasting cap. Material Required
Source ----------------- ------ Fine aluminum bronzing powder Paint store
Carbon Tetrachloride Pharmacy, or fire or extinguisher fluid tetrachloroethylene
Dry cleaners, pharmacy Stirring rod (wood) Mixing container (bowl, bucket,
etc.) Measuring container (cup, tablespoon, etc.) Storage container (jar,
can, etc.) Blasting cap Pipe, can or jar Procedure: --------- 1) Measure
out two parts aluminum powder to one part carbon tetrachloride or tetrachlorethylene
liquid into mixing container, adding liquid to powder while stirring with
the wooden rod. 2) Stir until the mixture becomes the consistency of honey
syrup. CAUTION: Fumes from the liquid are dangerous and should not be inhaled.
3) Store explosive in a jar or similar water proof container until ready
to use. The liquid in the mixture evaporates quicky when not confined.
NOTE: Mixture will detonate in this manner for a period of 72 hours. How
to Use: ---------- 1) Pour this mixture into an iron or steel pipe which
has an end cap threaded on one end. If a pipe is not available, you may
use a dry tin can or glass jar. 2) Insert blasting cap just beneath the
surface of the explosive mix. NOTE: Confining the open end of the container
will add to the effectiveness of the explosive. ---------------Jolly Roger
Making Picric
Acid from Aspirin by the Jolly Roger
Picric Acid can be used as a booster
explosive in detonators, a high explosive charge, or as an intermediate
to preparing lead picrate. Material Required ----------------- Aspirin
tablets (5 grains per tablet) Alcohol, 95% pure Sulfuric acid, concentrated,
(if battery acid, boil until white fumes disappear) Potassium Nitrate (see
elsewhere in this Cookbook) Water Paper towels Canning jar, 1 pint Rod
(glass or wood) Glass containers Ceramic or glass dish Cup Teaspoon Tablespoon
Pan Heat source Tape Procedure: --------- 1) Crush 20 aspirin tablets in
a glass container. Add 1 teaspoon of water and work into a paste. 2) Add
approximately 1/3 to 1/2 cup of alcohol (100 millilitres) to the aspirin
paste; stir while pouring. 3) Filter the alcohol-aspirin solution through
a paper towel into another glass container. Discard the solid left in the
paper towel. 4) Pour the filtered solution into a glass or ceramic dish.
5) Evaporate the alcohol and water from the solution by placing the dish
into a pan of hot water. White powder will remain in the dish after evaporation.
NOTE: The water in the pan should be at hot bath temperature, not boiling,
approx. 160 to 180 degress farenheit. It should not burn the hands. 6)
Pour 1/3 cup (80 millilitres) of concentrated sulfuric acid into a canning
jar. Add the white powder to the sulfuric acid. 7) Heat canning jar of
sulfuric acid in a pan of simmering hot water bath for 15 minutes; then
remove jar from the bath. Solution will turn to a yellow-orange color.
8) Add 3 level teaspoons (15 grams) of potassium nitrate in three portions
to the yellow-orange solution; stir vigorously during additions. Solution
will turn red, then back to a yellow-orange color. 9) Allow the solution
to cool to ambient room temperature while stirring occasionally. 10) Slowly
pour the solution, while stirring, into 1-1/4 cup (300 millilitres) of
cold water and allow to cool. 11) Filter the solution through a paper towel
into a glass container. Light yellow particles will collect on the paper
towel. 12) Wash the light yellow particles with 2 tablespoons (25 millilitres)
of water. Discard the waste liquid in the container. 13) Place articles
in ceramic dish and set in a hot water bath, as in step 5, for 2 hours.
--------------Jolly Roger
Reclamation of
RDX from C-4 Explosives by the Jolly Roger
RDX can be obtained from C-4 explosives
with the use of gasoline. It can be used as a booster explosive for detonators
or as a high explosive charge. Material Required ----------------- Gasoline
C-4 explosive 2 - pint glass jars, wide mouth Paper towels Stirring rod
(glass or wood) Water Ceramic or glass dish Pan Heat source Teaspoon Cup
Tape NOTE: Water, Ceramic or glass dish, pan, & heat source are all
optional. The RDX can be air dried instead. Procedure: --------- 1) Place
1-1/2 teaspoons (15 grams) of C-4 explosive in one of the pint jars. Add
1 cup (240 milliliters) of gasoline. NOTE: These quantities can be increased
to obtain more RDX. For example, use 2 gallons of gasoline per 1 cup of
C-4. 2) Knead and stir the C-4 with the rod until the C-4 has broken down
into small particles. Allow mixture to stand for 1/2 hour. 3) Stir the
mixture again until a fine white powder remains on the bottom of the jar.
4) Filter the mixture through a paper towel into the other glass jar. Wash
the particles collected on the paper towel with 1/2 cup (120 milliliters)
of gasoline. Discard the waste liquid. 5) Place the RDX particles in a
glass or ceramic dish. Set the dish in a pan of hot water, not boiling
and dry for a period of 1 hour. NOTE: The RDX particles may be air dried
for a period of 2 to 3 hours. --------------Jolly Roger
Egg-based Gelled
Flame Fuels by the Jolly Roger
The white of any bird egg can be used
to gel gasoline for use as a flame fuel which will adhere to target surfaces.
Materials Required ------------------ Parts by Volume Ingredient How used
Common Source -------- ---------- -------- ------------- 85 Gasoline Motor
Fuel Gas Stations Stove Fuel Motor Vehicle Solvent 14 Egg Whites Food Food
Store Industrial Farms Processes Any one of the following: 1 Table Salt
Food Sea Water Industrial Natural Brine Processes Food Store 3 Ground Coffee
Food Coffee Plant Food Store 3 Dried Tea Leaves Food Tea Plant Food Store
3 Cocoa Food Cacao Tree Food Store 2 Sugar Sweetening Sugar Cane foods
Food Store 1 Saltpeter Pyrotechnics Natural (Potassium Explosives Deposits
Nitrate) Matches Drug Store Medicine 1 Epsom Salts Medicine Natural Mineral
Water Kisserite Industrial Drug Store Processes Food Store 2 Washing Soda
Washing Cleaner Food Store (Sal Soda) Medicine Drug Store Photography Photo
Supply Store 1 1/2 Baking Soda Baking Food Store Manufacturing Drug Store
of: Beverages Medicines and Mineral Waters 1 1/2 Aspirin Medicine Drug
Store Food Store Procedure: --------- CAUTION: Make sure that ther are
no open flames in the area when mixing flame fuels! NO SMOKING!! 1) Seperate
the egg white from the yolk. This can be done by breaking the egg into
a dish and carefully removing the yolk with a spoon. 2) Pour egg white
into a jar, bottle, or other container, and add gasoline. 3) Add the salt
(or other additive) to the mixture and stir occasionally until gel forms
(about 5 to 10 minutes). NOTE: A thicker gelled flame fuel can be obtained
by putting the capped jar in hot (65 degrees Centegrade) water for about
1/2 hour and then letting them cool to room temperature. (DO NOT HEAT THE
GELLED FUEL CONTAINING COFFEE!!) ----------------------Jolly Roger
Clothespin Switch
by the Jolly Roger
A spring type clothespin is used to
make a circuit closing switch to actuate explosive charges, mines, booby
traps, and alarm systems. Material Required: ----------------- Spring type
clothespin Sold copper wire -- 1/16 in. (2 mm) in diameter Strong string
on wire Flat piece of wood (roughly 1/8 x 1" x 2") Knife Procedure: ---------
1) Strip four in. (10 cm) of insulation from the ends of 2 solid copper
wires. Scrape the copper wires with pocket knife until the metal is shiny.
2) Wind one scraped wire tightly on jaw of the clothespin, and the other
wire on the other jaw. 3) Make a hole in one end of the flat piece of wood
using a knife, heated nail or drill. 4) Tie strong string or wire through
the hole. 5) Place flat piece of wood between the jaws of the clothespin
switch. Basic Firing Circuit: -------------------- ______________ | |---------------------------\
| initiator |----------\ | strong -------------- | | twine | | \ | _---------_________
| --------- | | \clothespin \ / \ / switch \ / \ / \ / + - ---------- |
| | battery| ---------- When the flat piece of wood is removed by pulling
the string, the jaws of the clothespin will close, completing the circuit.
CAUTION: Do not attach the battery until the switch and trip wire have
been emplaced and examined. Be sure that the flat piece of wood is seperating
the jaws of the switch. -----------------Jolly Roger
Flexible Plate
Switch by the Jolly Roger
This flexible plate switch is used
for initiating emplaced mines and explosives. Material Required: -----------------
Two flexible metal sheets one approximately 10 in. (25 cm) square one approximately
10 in. x 8 in. (20 cm) Piece of wood 10 in. square x 1 in. thick Four soft
wood blocks 1 in. x 1 in. x 1/4 in. Eight flat head nails, 1 in. long Connecting
wires Adhesive tape Procedure: --------- 1) Nail 10 in. by 8 in. metal
sheet to 10 in. square piece of wood so that 1 in. of wood shows on each
side of the metal. Leave one of the nails sticking up about 1/4 in. 2)
Strip insulation from the end of one connecting wire. Wrap this end around
the nail and drive the nail all the way in. 3) Place the four wood blocks
on the corners of the wood base. 4) Place the 10 in. square flexible metal
sheet so that it rests on the blocks in line with the wood base. 5) Drive
four nails through the metal sheet and the blocks (1 per block) to fasten
the sheet to the wood base. A second connecting wire is atached to one
of the nails as in step #2. 6) Wrap the adhesive tape around the edges
of the plate and wood base. This will assure that no dirt or other foreign
matter will get between the plates and prevent the switch from operating.
How to use: ---------- The switch is placed in a hole in the path of expected
traffic and covered with a thin layer of dirt or other camouflaging material.
The mine or other explosive device connected to the switch can be buried
with the switch or emplaced elsewhere as desired. When a vehicle passes
over the switch, the two metal plates make contact closing the firing circuit.
----------------Jolly Roger
Low Signature
Systems (Silencers) by the Jolly Roger
Low signature systems (silencers) for
improvised small arms weapons can be made from steel gas or water pipe
and fittings. Material Required: ----------------- Grenade Container Steel
pipe nipple, 6 in. (15 cm) long - (see table 1 for diameter) 2 steel pipe
couplings - (see table 2 for dimensions) Cotton cloth - (see table 2) Drill
Absorbent cotton Procedure: --------- 1) Drill hole in grenade container
at both ends to fit outside diameter of pipe nipple. (see table 1) -> /----------------------\
/ | | 2.75 in | ) ( <-holes dia. \ | | -> \-----------------------/
|-----------------------| 5 in. 2) Drill four rows of holes in pipe nipple.
Use table 1 for diameter and location of holes. (Note: I suck at ASCII
art!) 6 in. |-----------------------------------| _____________________________________
___ | O O O O O O O O O O O O O O O O O | | C (nom. dia.) -------------------------------------
(size of hole) | \ / (space between) B (dia.) A 3) Thread one of the pipe
couplings on the drilled pipe nipple. 4) Cut coupling length to allow barrel
of weapon to thread fully into low signature system. Barrel should butt
against end of the drilled pipe nipple. 5) Seperate the top half of the
grenade container from the bottom half. 6) Insert the pipe nipple in the
drilled hole at the base of the bottom half of the container. Pack theabsorbent
cotton inside the container and around the pipe nipple. 7) Pack the absorbent
cotton in top half of grenade container leaving hole in center. Assemble
container to the bottom half. 8) Thread the other coupling onto the pipe
nipple. Note: A longer container and pipe nipple, with same "A" and "B"
dimensions as those given, will furthur reduce the signature of the system.
How to use: ---------- 1) Thread the low signature system on the selected
weapon securely. 2) Place the proper cotton wad size into the muzzle end
of the system (see table 2) 3) Load weapon 4) Weapon is now ready for use
TABLE 1 -- Low Signature System Dimensions ------------------------------------------
(Coupling) Holes per (4 rows) A B C D Row Total ------------------------------------------------------------------------
.45 cal 3/8 1/4 3/8 3/8 12 48 .38 cal 3/8 1/4 1/4 1/4 12 48 9 mm 3/8 1/4
1/4 1/4 12 48 7.62 mm 3/8 1/4 1/4 1/4 12 48 .22 cal 1/4 5/32 1/8* 1/8 14
50 ------------------------------------------------------------------------
*Extra Heavy Pipe (All dimensions in inches) TABLE 2 -- Cotton Wadding
- Sizes --------------------------------- -------------------------------------------------
Weapon Cotton Wadding Size -------------------------------------------------
.45 cal 1-1/2 x 6 inches .38 cal 1 x 4 inches 9 mm 1 x 4 inches 7.62 mm
1 x 4 inches .22 cal Not needed -------------------------------------------------
------------------Jolly Roger Delay Igniter from
a Cigarette by the Jolly Roger
A simple and economical (everyone wants
to save money haha) time delay can be made with a common cigarette. Materials
Required: ------------------ Cigarette Paper match String (shoelace or
similar cord) Fuse cord (improvised or commercial) Procedure: ---------
1) Cut end of fuse cord at a slant to expose inner core 2) Light cigarette
in normal fashion. Place a paper match so that the had is over exposed
exposed end of fuse cord and tie both to the side of the burning cigarette
with string. 3) Position the burning cigarette with fuse so that it burns
freely. A suggested method is to hang the delay on a twig. Note: Common
dry cigarettes burn about 1 inch every 7 or 8 minutes in still air. (Now
I am talking about all except American brands, which burn about 1 inch
every 4-5 minutes) If the fuse cord is place one inch from the burning
end of the cigarette a time delay of 7 or 8 minutes will result. Delay
time will vary depending upon type of cigarette, wind, moisture, and other
atmospherc conditions (get to know your cigarette!) To obtain accurate
delay time, a test run should be made under "use" conditions. ----------------Jolly
Roger
Nicotine by the
Jolly Roger
Nicotine is an abundant poison. Easily
found in tobacco products, in concentrated form a few drops can quickly
kill someone. Here is how to concentrate it: First get a can of chewing
tobacco or pipe tobacco. Remove the contents and soak in water overnight
in a jar (about 2/3 cup of water will do...). In the morning, strain into
another jar the mixture through a porous towel. Then wrap the towel around
the ball of tobacco and squeeze it until all of the liquid is in the jar.
Throw away the tobacco--you will not need it anymore. Now you have two
options. I recommend the first. It makes the nicotine more potent. 1) Allow
to evaporate until a sticky syrup results in the jar. This is almost pure
nicotine (hell, it is pure enough for sure!). 2) Heat over low flame until
water is evaporated and a thick sticky syrup results (I don't know how
long it takes... shouldn't take too long, though.). Now all you have to
do, when you wish to use it, is to put a few drops in a medicine dropper
or equivalent, and slip about 4 or 5 drops into the victim's coffee. Coffee
is recommended since it will disguise the taste. Since nicotine is a drug,
the victim should get quite a buzz before they turn their toes up to the
daisies, so to speak. Note: If the syrup is too sticky, dilute it with
a few drops of water. And while you are at it, better add an extra drop
to the coffee just to be sure! ----------------Jolly Roger
Nail Grenade
by the Jolly Roger
Effective fragmentation grenades can
be made from a block of tnt or other blasting explosive and nails. Material
Required: ----------------- Block of TNT or other blasting explosive Nails
Non-electric (military or improvised) blasting cap Fuse Cord Tape, string,
wire, or glue Procedure: --------- 1) If an explosive charge other than
a standard TNT block is used, make a hole in the center of the charge for
inserting the blasting cap. TNT can be drilled with relative safety. With
plastic explosives, a hole can be made by pressing a round stick into the
center of the charge. The hole should be deep enough that the blasting
cap is totally within the explosive. 2) Tape, tie, or glue one or two rows
of closely packed nails to the sides of the explosive block. Nails should
completely cover the four surfaces of the block. 3) Place blasting cap
on one end of the fuse cord and crimp with pliers. NOTE: To find out how
long the fuse cord should be, check the time it takes a known length to
burn. If 12 inches (30 cm) burns for 30 seconds, a 10 second delay will
require a 4 inch (10 cm) fuse. 4) Insert the blasting cap in the hole in
the block of explosive. Tape or tie fuse cord securly in place so that
it will not fall out when the grenade is thrown. Alternate Use: -------------
An effective directional anti-personnel mine can be made by placing nails
on only one side of the explosive block. For thi case, and electric blasting
cap can be used. ------------------Jolly Roger
The Bell Glossary
courtesy of the Jolly Roger ......................................................................
......................................................................
. The Bell Glossary - .. . by .. . /\<\ /\<\ .. . \>\>ad \>\>arvin
.. ......................................................................
......................................................................
ACD: Automatic Call Distributor - A system that automatically distributes
calls to operator pools (providing services such as intercept and directory
assistance), to airline ticket agents, etc. Administration: The tasks of
record-keeping, monitoring, rearranging, prediction need for growth, etc.
AIS: Automatic Intercept System - A system employing an audio-response
unit under control of a processor to automatically provide pertinent info
to callers routed to intercept. Alert: To indicate the existence of an
incoming call, (ringing). ANI: Automatic Number Identification - Often
pronounced "Annie," a facility for automatically identify the number of
the calling party for charging purposes. Appearance: A connection upon
a network terminal, as in "the line has two network appearances." Attend:
The operation of monitoring a line or an incoming trunk for off-hook or
seizure, respectively. Audible: The subdued "image" of ringing transmitted
to the calling party during ringing; not derived from the actual ringing
signal in later systems. Backbone Route: The route made up of final-group
trunks between end offices in different regional center areas. BHC: Busy
Hour Calls - The number of calls placed in the busy hour. Blocking: The
ratio of unsuccessful to total attempts to use a facility; expresses as
a probability when computed a priority. Blocking Network: A network that,
under certain conditions, may be unable to form a transmission path from
one end of the network to the other. In general, all networks used within
the Bell Systems are of the blocking type. Blue Box: Equipment used fraudulently
to synthesize signals, gaining access to the toll network for the placement
of calls without charge. BORSCHT Circuit: A name for the line circuit in
the central office. It functions as a mnemonic for the functions that must
be performed by the circuit: Battery, Overvoltage, Ringing, Supervision,
Coding, Hybrid, and Testing. Busy Signal: (Called-line-busy) An audible
signal which, in the Bell System, comprises 480hz and 620hz interrupted
at 60IPM. Bylink: A special high-speed means used in crossbar equipment
for routing calls incoming from a step-by-step office. Trunks from such
offices are often referred to as "bylink" trunks even when incoming to
noncrossbar offices; they are more properly referred to as "dc incoming
trunks." Such high-speed means are necessary to assure that the first incoming
pulse is not lost. Cable Vault: The point which phone cable enters the
Central Office building. CAMA: Centralized Automatic Message Accounting
- Pronounced like Alabama. CCIS: Common Channel Interoffice Signaling -
Signaling information for trunk connections over a separate, nonspeech
data link rather that over the trunks themselves. CCITT: International
Telegraph and Telephone Consultative Committee- An International committee
that formulates plans and sets standards for intercountry communication
means. CDO: Community Dial Office - A small usually rural office typically
served by step-by-step equipment. CO: Central Office - Comprises a switching
network and its control and support equipment. Occasionally improperly
used to mean "office code." Centrex: A service comparable in features to
PBX service but implemented with some (Centrex CU) or all (Centrex CO)
of the control in the central office. In the later case, each station's
loop connects to the central office. Customer Loop: The wire pair connecting
a customer's station to the central office. DDD: Direct Distance Dialing
- Dialing without operator assistance over the nationwide intertoll network.
Direct Trunk Group: A trunk group that is a direct connection between a
given originating and a given terminating office. EOTT: End Office Toll
Trunking - Trunking between end offices in different toll center areas.
ESB: Emergency Service Bureau - A centralized agency to which 911 "universal"
emergency calls are routed. ESS: Electronic Switching System - A generic
term used to identify as a class, stored-program switching systems such
as the Bell System's No.1 No.2, No.3, No.4, or No.5. ETS: Electronic Translation
Systems - An electronic replacement for the card translator in 4A Crossbar
systems. Makes use of the SPC 1A Processor. False Start: An aborted dialing
attempt. Fast Busy: (often called reorder) - An audible busy signal interrupted
at twice the rate of the normal busy signal; sent to the originating station
to indicate that the call blocked due to busy equipment. Final Trunk Group:
The trunk group to which calls are routed when available high-usage trunks
overflow; these groups generally "home" on an office next highest in the
hierarchy. Full Group: A trunk group that does not permit rerouting off-contingent
foreign traffic; there are seven such offices. Glare: The situation that
occurs when a two-way trunk is seized more or less simultaneously at both
ends. High Usage Trunk Group: The appellation for a trunk group that has
alternate routes via other similar groups, and ultimately via a final trunk
group to a higher ranking office. Intercept: The agency (usually an operator)
to which calls are routed when made to a line recently removed from a service,
or in some other category requiring explanation. Automated versions (ASI)
with automatic voiceresponse units are growing in use. Interrupt: The interruption
on a phone line to disconnect and connect with another station, such as
an Emergence Interrupt. Junctor: A wire or circuit connection between networks
in the same office. The functional equivalent to an intraoffice trunk.
MF: Multifrequency - The method of signaling over a trunk making use of
the simultaneous application of two out of six possible frequencies. NPA:
Numbering Plan Area. ONI: Operator Number Identification - The use of an
operator in a CAMA office to verbally obtain the calling number of a call
originating in an office not equipped with ANI. PBX: Private Branch Exchange
- (PABX: Private Automatic Branch Exchange) An telephone office serving
a private customer, Typically , access to the outside telephone network
is provided. Permanent Signal: A sustained off-hook condition without activity
(no dialing or ringing or completed connection); such a condition tends
to tie up equipment, especially in earlier systems. Usually accidental,
but sometimes used intentionally by customers in high-crime-rate areas
to thwart off burglars. POTS: Plain Old Telephone Service - Basic service
with no extra "frills". ROTL: Remote Office Test Line - A means for remotely
testing trunks. RTA: Remote Trunk Arrangement - An extension to the TSPS
system permitting its services to be provided up to 200 miles from the
TSPS site. SF: Single Frequency. A signaling method for trunks: 2600hz
is impressed upon idle trunks. Supervise: To monitor the status of a call.
SxS: (Step-by-Step or Strowger switch) - An electromechanical office type
utilizing a gross-motion stepping switch as a combination network and distributed
control. Talkoff: The phenomenon of accidental synthesis of a machine-intelligible
signal by human voice causing an unintended response. "whistling a tone".
Trunk: A path between central offices; in general 2-wire for interlocal,
4-wire for intertoll. TSPS: Traffic Service Position System - A system
that provides, under stored- program control, efficient operator assistance
for toll calls. It does not switch the customer, but provides a bridge
connection to the operator. X-bar: (Crossbar) - An electromechanical office
type utilizing a "fine-motion" coordinate switch and a multiplicity of
central controls (called markers). There are four varieties: No.1 Crossbar:
Used in large urban office application; (1938) No 3 Crossbar: A small system
started in (1974). No.4A/4M Crossbar: A 4-wire toll machine; (1943). No.5
Crossbar: A machine originally intended for relatively small suburban applications;
(1948) Crossbar Tandem: A machine used for interlocal office switching.
Phone Dial Locks
-- How to Beat'em courtesy of the Jolly Roger
Have you ever been in an office or
somewhere and wanted to make a free phone call but some asshole put a lock
on the phone to prevent out-going calls? Fret no more phellow phreake,
for every system can be beaten with a little knowledge! There are two ways
to beat this obstacle, first pick the lock, I don't have the time to teach
locksmithing so we go to the second method which takes advantage of telephone
electronics. To be as simple as possibnle when you pick up the phone you
complete a circuit known as a local loop. When you hang up you break the
circuit. When you dial (pulse) it also breaks the circuit but not long
enough to hang up! So you can "Push-dial." To do this you >>> RAPIDLY <<<
depress the switchhook. For example, to dial an operator (and then give
her the number you want to call) >>> RAPIDLY <<< & >>> EVENLY
<<< depress the switchhook 10 times. To dial 634-1268, depress
6 X'S pause, then 3 X'S, pause, then 4X'S, etc. It takes a little practice
but you'll get the hang of it. Try practicing with your own # so you'll
get a busy tone when right. It'll also work on touch-tone(tm) since a DTMF
line will also accept pulse. Also, never depress the switchhook for more
than a second or it'll hang up! Finally, remember that you have just as
much right to that phone as the asshole who put the lock on it! (From the
Official Phreaker's Guide) Exchange Scanning courtesy of the Jolly Roger
Almost every exchange in the bell system has test #'s and other "goodies"
such as loops with dial-ups. These "goodies" are usually found betweed
9900 and 9999 in your local exchange. If you have the time and initiative,
scan your exchange and you may become lucky! Here are some findings in
the 914-268 exchange: 9900 - ANI 9901 - ANI 9927 - OSC. TONE (POSSIBLE
TONE SIDE OF A LOOP) 9936 - VOICE # TO THE TELCO CENTRAL OFFICE 9937 -
VOICE # TO THE TELCO CENTRAL OFFICE 9941 - COMPUTER (DIGITAL VOICE TRANSMISSION?)
9960 - OSC. TONE (TONE SIDE LOOP) MAY ALSO BE A COMPUTER IN SOME EXCHANGES
9961 - NO RESPONSE (OTHER END OF LOOP?) 9962 - NO RESPONSE (OTHER END OF
LOOP?) 9963 - NO RESPONSE (OTHER END OF LOOP?) 9966 - COMPUTER (SEE 9941)
9968 - TONE THAT DISAPPEARS--RESPONDS TO CERTAIN TOUCH-TONE KEYS Most of
the numbers between 9900 & 9999 will ring or go to a "what #, please?"
operator. (from the Official Phreaker's Manual)
Exchange Scanning
courtesy of the Jolly Roger
Almost every exchange in the bell system
has test #'s and other "goodies" such as loops with dial-ups. These "goodies"
are usually found betweed 9900 and 9999 in your local exchange. If you
have the time and initiative, scan your exchange and you may become lucky!
Here are some findings in the 914-268 exchange: 9900 - ANI 9901 - ANI 9927
- OSC. TONE (POSSIBLE TONE SIDE OF A LOOP) 9936 - VOICE # TO THE TELCO
CENTRAL OFFICE 9937 - VOICE # TO THE TELCO CENTRAL OFFICE 9941 - COMPUTER
(DIGITAL VOICE TRANSMISSION?) 9960 - OSC. TONE (TONE SIDE LOOP) MAY ALSO
BE A COMPUTER IN SOME EXCHANGES 9961 - NO RESPONSE (OTHER END OF LOOP?)
9962 - NO RESPONSE (OTHER END OF LOOP?) 9963 - NO RESPONSE (OTHER END OF
LOOP?) 9966 - COMPUTER (SEE 9941) 9968 - TONE THAT DISAPPEARS--RESPONDS
TO CERTAIN TOUCH-TONE KEYS Most of the numbers between 9900 & 9999
will ring or go to a "what #, please?" operator. (from the Official Phreaker's
Manual)
A Short History
of Phreaking courtesy of the Jolly Roger
Well now we know a little vocabulary,
and now its into history, Phreak history. Back at MIT in 1964 arrived a
student by the name of Stewart Nelson, who was extremely interested in
the telephone. Before entering MIT, he had built autodialers, cheese boxes,
and many more gadgets. But when he came to MIT he became even more interested
in "fone-hacking" as they called it. After a little while he naturally
started using the PDP-1, the schools computer at that time, and from there
he decided that it would be interesting to see whether the computer could
generate the frequencies required for blue boxing. The hackers at MIT were
not interested in ripping off Ma Bell, but just exploring the telephone
network. Stew (as he was called) wrote a program to generate all the tones
and set off into the vast network. Now there were more people phreaking
than the ones at MIT. Most people have heard of Captain Crunch (No not
the cereal), he also discovered how to take rides through the fone system,
with the aid of a small whistle found in a cereal box (can we guess which
one?). By blowing this whistle, he generated the magical 2600hz and into
the mouthpiece it sailed, giving him complete control over the system.
I have heard rumors that at one time he made about 1/4 of the calls coming
out of San Francisco. He got famous fast. He made the cover of people magazine
and was interviewed several times (as you'll soon see). Well he finally
got caught after a long adventurous career. After he was caught he was
put in jail and was beaten up quite badly because he would not teach other
inmates how to box calls. After getting out, he joined Apple computer and
is still out there somewhere. Then there was Joe the Whistler, blind form
the day he was born. He could whistle a perfect 2600hz tone. It was rumored
phreaks used to call him to tune their boxes. Well that was up to about
1970, then from 1970 to 1979, phreaking was mainly done by college students,
businessmen and anyone who knew enough about electronics and the fone company
to make a 555 Ic to generate those magic tones. Businessmen and a few college
students mainly just blue box to get free calls. The others were still
there, exploring 800#'s and the new ESS systems. ESS posed a big problem
for phreaks then and even a bigger one now. ESS was not widespread, but
where it was, blue boxing was next to impossible except for the most experienced
phreak. Today ESS is installed in almost all major cities and blue boxing
is getting harder and harder. 1978 marked a change in phreaking, the Apple
][, now a computer that was affordable, could be programmed, and could
save all that precious work on a cassette. Then just a short while later
came the Apple Cat modem. With this modem, generating all blue box tones
was easy as writing a program to count form one to ten (a little exaggerated).
Pretty soon programs that could imitate an operator just as good as the
real thing were hitting the community, TSPS and Cat's Meow, are the standard
now and are the best. 1982-1986: LD services were starting to appear in
mass numbers. People now had programs to hack LD services, telephone exchanges,
and even passwords. By now many phreaks were getting extremely good and
BBS's started to spring up everywhere, each having many documentations
on phreaking for the novice. Then it happened, the movie War Games was
released and mass numbers of sixth grade to all ages flocked to see it.
The problem wasn't that the movie was bad, it was that now EVERYONE wanted
to be a hacker/phreak. Novices came out in such mass numbers, that bulletin
boards started to be busy 24 hours a day. To this day, they still have
not recovered. Other problems started to occur, novices guessed easy passwords
on large government computers and started to play around... Well it wasn't
long before they were caught, I think that many people remember the 414-hackers.
They were so stupid as to say "yes" when the computer asked them whether
they'd like to play games. Well at least it takes the heat off the real
phreaks/hacker/krackers. (from the Official Phreaker's Manual) -----> Courtesy
of the Jolly Roger<----- ***** The AAG Proudly Presents The AAG Proudly
Presents ***** * * * +----------------------------------------------+ *
* * * Secrets of the Little Blue Box * * * * by Ron Rosenbaum * * Typed
by One Farad Cap/AAG * * * * -A story so incredible it may even make you
* * feel sorry for the phone company- * * * * (First of four files) * *
* * +----------------------------------------------+ * * * ***** The AAG
Proudly Presents The AAG Proudly Presents ***** Dudes... These four files
contain the story, "Secrets of the Little Blue Box", by Ron Rosenbaum.
-A story so incredible it may even make you feel sorry for the phone company-
Printed in the October 1971 issue of Esquire Magazine. If you happen to
be in a library and come across a collection of Esquire magazines, the
October 1971 issue is the first issue printed in the smaller format. The
story begins on page 116 with a picture of a blue box. --One Farad Cap,
Atlantic Anarchist Guild The Blue Box Is Introduced: Its Qualities Are
Remarked I am in the expensively furnished living room of Al Gilbertson
(His real name has been changed.), the creator of the "blue box." Gilbertson
is holding one of his shiny black-and-silver "blue boxes" comfortably in
the palm of his hand, pointing out the thirteen little red push buttons
sticking up from the console. He is dancing his fingers over the buttons,
tapping out discordant beeping electronic jingles. He is trying to explain
to me how his little blue box does nothing less than place the entire telephone
system of the world, satellites, cables and all, at the service of the
blue-box operator, free of charge. "That's what it does. Essentially it
gives you the power of a super operator. You seize a tandem with this top
button," he presses the top button with his index finger and the blue box
emits a high-pitched cheep, "and like that" -- cheep goes the blue box
again -- "you control the phone company's long-distance switching systems
from your cute little Princes phone or any old pay phone. And you've got
anonymity. An operator has to operate from a definite location: the phone
company knows where she is and what she's doing. But with your beeper box,
once you hop onto a trunk, say from a Holiday Inn 800 (toll-free) number,
they don't know where you are, or where you're coming from, they don't
know how you slipped into their lines and popped up in that 800 number.
They don't even know anything illegal is going on. And you can obscure
your origins through as many levels as you like. You can call next door
by way of White Plains, then over to Liverpool by cable, and then back
here by satellite. You can call yourself from one pay phone all the way
around the world to a pay phone next to you. And you get your dime back
too." "And they can't trace the calls? They can't charge you?" "Not if
you do it the right way. But you'll find that the free-call thing isn't
really as exciting at first as the feeling of power you get from having
one of these babies in your hand. I've watched people when they first get
hold of one of these things and start using it, and discover they can make
connections, set up crisscross and zigzag switching patterns back and forth
across the world. They hardly talk to the people they finally reach. They
say hello and start thinking of what kind of call to make next. They go
a little crazy." He looks down at the neat little package in his palm.
His fingers are still dancing, tapping out beeper patterns. "I think it's
something to do with how small my models are. There are lots of blue boxes
around, but mine are the smallest and most sophisticated electronically.
I wish I could show you the prototype we made for our big syndicate order."
He sighs. "We had this order for a thousand beeper boxes from a syndicate
front man in Las Vegas. They use them to place bets coast to coast, keep
lines open for hours, all of which can get expensive if you have to pay.
The deal was a thousand blue boxes for $300 apiece. Before then we retailed
them for $1500 apiece, but $300,000 in one lump was hard to turn down.
We had a manufacturing deal worked out in the Philippines. Everything ready
to go. Anyway, the model I had ready for limited mass production was small
enough to fit inside a flip-top Marlboro box. It had flush touch panels
for a keyboard, rather than these unsightly buttons, sticking out. Looked
just like a tiny portable radio. In fact, I had designed it with a tiny
transistor receiver to get one AM channel, so in case the law became suspicious
the owner could switch on the radio part, start snapping his fingers, and
no one could tell anything illegal was going on. I thought of everything
for this model -- I had it lined with a band of thermite which could be
ignited by radio signal from a tiny button transmitter on your belt, so
it could be burned to ashes instantly in case of a bust. It was beautiful.
A beautiful little machine. You should have seen the faces on these syndicate
guys when they came back after trying it out. They'd hold it in their palm
like they never wanted to let it go, and they'd say, 'I can't believe it.
I can't believe it.' You probably won't believe it until you try it." The
Blue Box Is Tested: Certain Connections Are Made About eleven o'clock two
nights later Fraser Lucey has a blue box in the palm of his left hand and
a phone in the palm of his right. He is standing inside a phone booth next
to an isolated shut-down motel off Highway 1. I am standing outside the
phone booth. Fraser likes to show off his blue box for people. Until a
few weeks ago when Pacific Telephone made a few arrests in his city, Fraser
Lucey liked to bring his blue box (This particular blue box, like most
blue boxes, is not blue. Blue boxes have come to be called "blue boxes"
either because 1) The first blue box ever confiscated by phone-company
security men happened to be blue, or 2) To distinguish them from "black
boxes." Black boxes are devices, usually a resistor in series, which, when
attached to home phones, allow all incoming calls to be made without charge
to one's caller.) to parties. It never failed: a few cheeps from his device
and Fraser became the center of attention at the very hippest of gatherings,
playing phone tricks and doing request numbers for hours. He began to take
orders for his manufacturer in Mexico. He became a dealer. Fraser is cautious
now about where he shows off his blue box. But he never gets tired of playing
with it. "It's like the first time every time," he tells me. Fraser puts
a dime in the slot. He listens for a tone and holds the receiver up to
my ear. I hear the tone. Fraser begins describing, with a certain practiced
air, what he does while he does it. "I'm dialing an 800 number now. Any
800 number will do. It's toll free. Tonight I think I'll use the -----
(he names a well-know rent-a-car company) 800 number. Listen, It's ringing.
Here, you hear it? Now watch." He places the blue box over the mouthpiece
of the phone so that the one silver and twelve black push buttons are facing
up toward me. He presses the silver button -- the one at the top -- and
I hear that high-pitched beep. "That's 2600 cycles per second to be exact,"
says Lucey. "Now, quick. listen." He shoves the earpiece at me. The ringing
has vanished. The line gives a slight hiccough, there is a sharp buzz,
and then nothing but soft white noise. "We're home free now," Lucey tells
me, taking back the phone and applying the blue box to its mouthpiece once
again. "We're up on a tandem, into a long-lines trunk. Once you're up on
a tandem, you can send yourself anywhere you want to go." He decides to
check out London first. He chooses a certain pay phone located in Waterloo
Station. This particular pay phone is popular with the phone-phreaks network
because there are usually people walking by at all hours who will pick
it up and talk for a while. He presses the lower left-hand corner button
which is marked "KP" on the face of the box. "That's Key Pulse. It tells
the tandem we're ready to give it instructions. First I'll punch out KP
182 START, which will slide us into the overseas sender in White Plains."
I hear a neat clunk-cheep. "I think we'll head over to England by satellite.
Cable is actually faster and the connection is somewhat better, but I like
going by satellite. So I just punch out KP Zero 44. The Zero is supposed
to guarantee a satellite connection and 44 is the country code for England.
Okay... we're there. In Liverpool actually. Now all I have to do is punch
out the London area code which is 1, and dial up the pay phone. Here, listen,
I've got a ring now." I hear the soft quick purr-purr of a London ring.
Then someone picks up the phone. "Hello," says the London voice. "Hello.
Who's this?" Fraser asks. "Hello. There's actually nobody here. I just
picked this up while I was passing by. This is a public phone. There's
no one here to answer actually." "Hello. Don't hang up. I'm calling from
the United States." "Oh. What is the purpose of the call? This is a public
phone you know." "Oh. You know. To check out, uh, to find out what's going
on in London. How is it there?" "Its five o'clock in the morning. It's
raining now." "Oh. Who are you?" The London passerby turns out to be an
R.A.F. enlistee on his way back to the base in Lincolnshire, with a terrible
hangover after a thirty-six-hour pass. He and Fraser talk about the rain.
They agree that it's nicer when it's not raining. They say good-bye and
Fraser hangs up. His dime returns with a nice clink. "Isn't that far out,"
he says grinning at me. "London, like that." Fraser squeezes the little
blue box affectionately in his palm. "I told ya this thing is for real.
Listen, if you don't mind I'm gonna try this girl I know in Paris. I usually
give her a call around this time. It freaks her out. This time I'll use
the ------ (a different rent-a-car company) 800 number and we'll go by
overseas cable, 133; 33 is the country code for France, the 1 sends you
by cable. Okay, here we go.... Oh damn. Busy. Who could she be talking
to at this time?" A state police car cruises slowly by the motel. The car
does not stop, but Fraser gets nervous. We hop back into his car and drive
ten miles in the opposite direction until we reach a Texaco station locked
up for the night. We pull up to a phone booth by the tire pump. Fraser
dashes inside and tries the Paris number. It is busy again. "I don't understand
who she could be talking to. The circuits may be busy. It's too bad I haven't
learned how to tap into lines overseas with this thing yet." Fraser begins
to phreak around, as the phone phreaks say. He dials a leading nationwide
charge card's 800 number and punches out the tones that bring him the time
recording in Sydney, Australia. He beeps up the weather recording in Rome,
in Italian of course. He calls a friend in Boston and talks about a certain
over-the-counter stock they are into heavily. He finds the Paris number
busy again. He calls up "Dial a Disc" in London, and we listen to Double
Barrel by David and Ansil Collins, the number-one hit of the week in London.
He calls up a dealer of another sort and talks in code. He calls up Joe
Engressia, the original blind phone-phreak genius, and pays his respects.
There are other calls. Finally Fraser gets through to his young lady in
Paris. They both agree the circuits must have been busy, and criticize
the Paris telephone system. At two-thirty in the morning Fraser hangs up,
pockets his dime, and drives off, steering with one hand, holding what
he calls his "lovely little blue box" in the other. You Can Call Long Distance
For Less Than You Think "You see, a few years ago the phone company made
one big mistake," Gilbertson explains two days later in his apartment.
"They were careless enough to let some technical journal publish the actual
frequencies used to create all their multi-frequency tones. Just a theoretical
article some Bell Telephone Laboratories engineer was doing about switching
theory, and he listed the tones in passing. At ----- (a well-known technical
school) I had been fooling around with phones for several years before
I came across a copy of the journal in the engineering library. I ran back
to the lab and it took maybe twelve hours from the time I saw that article
to put together the first working blue box. It was bigger and clumsier
than this little baby, but it worked." It's all there on public record
in that technical journal written mainly by Bell Lab people for other telephone
engineers. Or at least it was public. "Just try and get a copy of that
issue at some engineering-school library now. Bell has had them all red-tagged
and withdrawn from circulation," Gilbertson tells me. "But it's too late.
It's all public now. And once they became public the technology needed
to create your own beeper device is within the range of any twelve-year-old
kid, any twelve-year-old blind kid as a matter of fact. And he can do it
in less than the twelve hours it took us. Blind kids do it all the time.
They can't build anything as precise and compact as my beeper box, but
theirs can do anything mine can do." "How?" "Okay. About twenty years ago
A.T.&T. made a multi-billion-dollar decision to operate its entire
long-distance switching system on twelve electronically generated combinations
of twelve master tones. Those are the tones you sometimes hear in the background
after you've dialed a long-distance number. They decided to use some very
simple tones -- the tone for each number is just two fixed single-frequency
tones played simultaneously to create a certain beat frequency. Like 1300
cycles per second and 900 cycles per second played together give you the
tone for digit 5. Now, what some of these phone phreaks have done is get
themselves access to an electric organ. Any cheap family home-entertainment
organ. Since the frequencies are public knowledge now -- one blind phone
phreak has even had them recorded in one of the talking books for the blind
-- they just have to find the musical notes on the organ which correspond
to the phone tones. Then they tape them. For instance, to get Ma Bell's
tone for the number 1, you press down organ keys F~5 and A~5 (900 and 700
cycles per second) at the same time. To produce the tone for 2 it's F~5
and C~6 (1100 and 700 c.p.s). The phone phreaks circulate the whole list
of notes so there's no trial and error anymore." He shows me a list of
the rest of the phone numbers and the two electric organ keys that produce
them. "Actually, you have to record these notes at 3 3/4 inches-per-second
tape speed and double it to 7 1/2 inches-per-second when you play them
back, to get the proper tones," he adds. "So once you have all the tones
recorded, how do you plug them into the phone system?" "Well, they take
their organ and their cassette recorder, and start banging out entire phone
numbers in tones on the organ, including country codes, routing instructions,
'KP' and 'Start' tones. Or, if they don't have an organ, someone in the
phone-phreak network sends them a cassette with all the tones recorded,
with a voice saying 'Number one,' then you have the tone, 'Number two,'
then the tone and so on. So with two cassette recorders they can put together
a series of phone numbers by switching back and forth from number to number.
Any idiot in the country with a cheap cassette recorder can make all the
free calls he wants." "You mean you just hold the cassette recorder up
the mouthpiece and switch in a series of beeps you've recorded? The phone
thinks that anything that makes these tones must be its own equipment?"
"Right. As long as you get the frequency within thirty cycles per second
of the phone company's tones, the phone equipment thinks it hears its own
voice talking to it. The original granddaddy phone phreak was this blind
kid with perfect pitch, Joe Engressia, who used to whistle into the phone.
An operator could tell the difference between his whistle and the phone
company's electronic tone generator, but the phone company's switching
circuit can't tell them apart. The bigger the phone company gets and the
further away from human operators it gets, the more vulnerable it becomes
to all sorts of phone phreaking." A Guide for the Perplexed "But wait a
minute," I stop Gilbertson. "If everything you do sounds like phone-company
equipment, why doesn't the phone company charge you for the call the way
it charges its own equipment?" "Okay. That's where the 2600-cycle tone
comes in. I better start from the beginning." The beginning he describes
for me is a vision of the phone system of the continent as thousands of
webs, of long-line trunks radiating from each of the hundreds of toll switching
offices to the other toll switching offices. Each toll switching office
is a hive compacted of thousands of long-distance tandems constantly whistling
and beeping to tandems in far-off toll switching offices. The tandem is
the key to the whole system. Each tandem is a line with some relays with
the capability of signalling any other tandem in any other toll switching
office on the continent, either directly one-to-one or by programming a
roundabout route through several other tandems if all the direct routes
are busy. For instance, if you want to call from New York to Los Angeles
and traffic is heavy on all direct trunks between the two cities, your
tandem in New York is programmed to try the next best route, which may
send you down to a tandem in New Orleans, then up to San Francisco, or
down to a New Orleans tandem, back to an Atlanta tandem, over to an Albuquerque
tandem and finally up to Los Angeles. When a tandem is not being used,
when it's sitting there waiting for someone to make a long-distance call,
it whistles. One side of the tandem, the side "facing" your home phone,
whistles at 2600 cycles per second toward all the home phones serviced
by the exchange, telling them it is at their service, should they be interested
in making a long-distance call. The other side of the tandem is whistling
2600 c.p.s. into one or more long-distance trunk lines, telling the rest
of the phone system that it is neither sending nor receiving a call through
that trunk at the moment, that it has no use for that trunk at the moment.
"When you dial a long-distance number the first thing that happens is that
you are hooked into a tandem. A register comes up to the side of the tandem
facing away from you and presents that side with the number you dialed.
This sending side of the tandem stops whistling 2600 into its trunk line.
When a tandem stops the 2600 tone it has been sending through a trunk,
the trunk is said to be "seized," and is now ready to carry the number
you have dialed -- converted into multi-frequency beep tones -- to a tandem
in the area code and central office you want. Now when a blue-box operator
wants to make a call from New Orleans to New York he starts by dialing
the 800 number of a company which might happen to have its headquarters
in Los Angeles. The sending side of the New Orleans tandem stops sending
2600 out over the trunk to the central office in Los Angeles, thereby seizing
the trunk. Your New Orleans tandem begins sending beep tones to a tandem
it has discovered idly whistling 2600 cycles in Los Angeles. The receiving
end of that L.A. tandem is seized, stops whistling 2600, listens to the
beep tones which tell it which L.A. phone to ring, and starts ringing the
800 number. Meanwhile a mark made in the New Orleans office accounting
tape notes that a call from your New Orleans phone to the 800 number in
L.A. has been initiated and gives the call a code number. Everything is
routine so far. But then the phone phreak presses his blue box to the mouthpiece
and pushes the 2600-cycle button, sending 2600 out from the New Orleans
tandem to the L.A. tandem. The L.A. tandem notices 2600 cycles are coming
over the line again and assumes that New Orleans has hung up because the
trunk is whistling as if idle. The L.A. tandem immediately ceases ringing
the L.A. 800 number. But as soon as the phreak takes his finger off the
2600 button, the L.A. tandem assumes the trunk is once again being used
because the 2600 is gone, so it listens for a new series of digit tones
- to find out where it must send the call. Thus the blue-box operator in
New Orleans now is in touch with a tandem in L.A. which is waiting like
an obedient genie to be told what to do next. The blue-box owner then beeps
out the ten digits of the New York number which tell the L.A. tandem to
relay a call to New York City. Which it promptly does. As soon as your
party picks up the phone in New York, the side of the New Orleans tandem
facing you stops sending 2600 cycles to you and stars carrying his voice
to you by way of the L.A. tandem. A notation is made on the accounting
tape that the connection has been made on the 800 call which had been initiated
and noted earlier. When you stop talking to New York a notation is made
that the 800 call has ended. At three the next morning, when the phone
company's accounting computer starts reading back over the master accounting
tape for the past day, it records that a call of a certain length of time
was made from your New Orleans home to an L.A. 800 number and, of course,
the accounting computer has been trained to ignore those toll-free 800
calls when compiling your monthly bill. "All they can prove is that you
made an 800 toll-free call," Gilbertson the inventor concludes. "Of course,
if you're foolish enough to talk for two hours on an 800 call, and they've
installed one of their special anti-fraud computer programs to watch out
for such things, they may spot you and ask why you took two hours talking
to Army Recruiting's 800 number when you're 4-F. But if you do it from
a pay phone, they may discover something peculiar the next day -- if they've
got a blue-box hunting program in their computer -- but you'll be a long
time gone from the pay phone by then. Using a pay phone is almost guaranteed
safe." "What about the recent series of blue-box arrests all across the
country -- New York, Cleveland, and so on?" I asked. "How were they caught
so easily?" "From what I can tell, they made one big mistake: they were
seizing trunks using an area code plus 555-1212 instead of an 800 number.
Using 555 is easy to detect because when you send multi-frequency beep
tones of 555 you get a charge for it on your tape and the accounting computer
knows there's something wrong when it tries to bill you for a two-hour
call to Akron, Ohio, information, and it drops a trouble card which goes
right into the hands of the security agent if they're looking for blue-box
user. "Whoever sold those guys their blue boxes didn't tell them how to
use them properly, which is fairly irresponsible. And they were fairly
stupid to use them at home all the time. "But what those arrests really
mean is than an awful lot of blue boxes are flooding into the country and
that people are finding them so easy to make that they know how to make
them before they know how to use them. Ma Bell is in trouble." And if a
blue-box operator or a cassette-recorder phone phreak sticks to pay phones
and 800 numbers, the phone company can't stop them? "Not unless they change
their entire nationwide long-lines technology, which will take them a few
billion dollars and twenty years. Right now they can't do a thing. They're
screwed." Captain Crunch Demonstrates His Famous Unit There is an underground
telephone network in this country. Gilbertson discovered it the very day
news of his activities hit the papers. That evening his phone began ringing.
Phone phreaks from Seattle, from Florida, from New York, from San Jose,
and from Los Angeles began calling him and telling him about the phone-phreak
network. He'd get a call from a phone phreak who'd say nothing but, "Hang
up and call this number." When he dialed the number he'd find himself tied
into a conference of a dozen phone phreaks arranged through a quirky switching
station in British Columbia. They identified themselves as phone phreaks,
they demonstrated their homemade blue boxes which they called "M-Fers"
(for "multi-frequency," among other things) for him, they talked shop about
phone-phreak devices. They let him in on their secrets on the theory that
if the phone company was after him he must be trustworthy. And, Gilbertson
recalls, they stunned him with their technical sophistication. I ask him
how to get in touch with the phone-phreak network. He digs around through
a file of old schematics and comes up with about a dozen numbers in three
widely separated area codes. "Those are the centers," he tells me. Alongside
some of the numbers he writes in first names or nicknames: names like Captain
Crunch, Dr. No, Frank Carson (also a code word for a free call), Marty
Freeman (code word for M-F device), Peter Perpendicular Pimple, Alefnull,
and The Cheshire Cat. He makes checks alongside the names of those among
these top twelve who are blind. There are five checks. I ask him who this
Captain Crunch person is. "Oh. The Captain. He's probably the most legendary
phone phreak. He calls himself Captain Crunch after the notorious Cap'n
Crunch 2600 whistle." (Several years ago, Gilbertson explains, the makers
of Cap'n Crunch breakfast cereal offered a toy-whistle prize in every box
as a treat for the Cap'n Crunch set. Somehow a phone phreak discovered
that the toy whistle just happened to produce a perfect 2600-cycle tone.
When the man who calls himself Captain Crunch was transferred overseas
to England with his Air Force unit, he would receive scores of calls from
his friends and "mute" them -- make them free of charge to them -- by blowing
his Cap'n Crunch whistle into his end.) "Captain Crunch is one of the older
phone phreaks," Gilbertson tells me. "He's an engineer who once got in
a little trouble for fooling around with the phone, but he can't stop.
Well, they guy drives across country in a Volkswagen van with an entire
switchboard and a computerized super-sophisticated M-F-er in the back.
He'll pull up to a phone booth on a lonely highway somewhere, snake a cable
out of his bus, hook it onto the phone and sit for hours, days sometimes,
sending calls zipping back and forth across the country, all over the world...."
Back at my motel, I dialed the number he gave me for "Captain Crunch" and
asked for G---- T-----, his real name, or at least the name he uses when
he's not dashing into a phone booth beeping out M-F tones faster than a
speeding bullet and zipping phantomlike through the phone company's long-distance
lines. When G---- T----- answered the phone and I told him I was preparing
a story for Esquire about phone phreaks, he became very indignant. "I don't
do that. I don't do that anymore at all. And if I do it, I do it for one
reason and one reason only. I'm learning about a system. The phone company
is a System. A computer is a System, do you understand? If I do what I
do, it is only to explore a system. Computers, systems, that's my bag.
The phone company is nothing but a computer." A tone of tightly restrained
excitement enters the Captain's voice when he starts talking about systems.
He begins to pronounce each syllable with the hushed deliberation of an
obscene caller. "Ma Bell is a system I want to explore. It's a beautiful
system, you know, but Ma Bell screwed up. It's terrible because Ma Bell
is such a beautiful system, but she screwed up. I learned how she screwed
up from a couple of blind kids who wanted me to build a device. A certain
device. They said it could make free calls. I wasn't interested in free
calls. But when these blind kids told me I could make calls into a computer,
my eyes lit up. I wanted to learn about computers. I wanted to learn about
Ma Bell's computers. So I build the little device, but I built it wrong
and Ma Bell found out. Ma Bell can detect things like that. Ma Bell knows.
So I'm strictly rid of it now. I don't do it. Except for learning purposes."
He pauses. "So you want to write an article. Are you paying for this call?
Hang up and call this number." He gives me a number in a area code a thousand
miles away of his own. I dial the number. "Hello again. This is Captain
Crunch. You are speaking to me on a toll-free loop-around in Portland,
Oregon. Do you know what a toll-free loop around is? I'll tell you. He
explains to me that almost every exchange in the country has open test
numbers which allow other exchanges to test their connections with it.
Most of these numbers occur in consecutive pairs, such as 302 956-0041
and 302 956-0042. Well, certain phone phreaks discovered that if two people
from anywhere in the country dial the two consecutive numbers they can
talk together just as if one had called the other's number, with no charge
to either of them, of course. "Now our voice is looping around in a 4A
switching machine up there in Canada, zipping back down to me," the Captain
tells me. "My voice is looping around up there and back down to you. And
it can't ever cost anyone money. The phone phreaks and I have compiled
a list of many many of these numbers. You would be surprised if you saw
the list. I could show it to you. But I won't. I'm out of that now. I'm
not out to screw Ma Bell. I know better. If I do anything it's for the
pure knowledge of the System. You can learn to do fantastic things. Have
you ever heard eight tandems stacked up? Do you know the sound of tandems
stacking and unstacking? Give me your phone number. Okay. Hang up now and
wait a minute." Slightly less than a minute later the phone rang and the
Captain was on the line, his voice sounding far more excited, almost aroused.
"I wanted to show you what it's like to stack up tandems. To stack up tandems."
(Whenever the Captain says "stack up" it sounds as if he is licking his
lips.) "How do you like the connection you're on now?" the Captain asks
me. "It's a raw tandem. A raw tandem. Ain't nothin' up to it but a tandem.
Now I'm going to show you what it's like to stack up. Blow off. Land in
a far away place. To stack that tandem up, whip back and forth across the
country a few times, then shoot on up to Moscow. "Listen," Captain Crunch
continues. "Listen. I've got line tie on my switchboard here, and I'm gonna
let you hear me stack and unstack tandems. Listen to this. It's gonna blow
your mind." First I hear a super rapid-fire pulsing of the flutelike phone
tones, then a pause, then another popping burst of tones, then another,
then another. Each burst is followed by a beep-kachink sound. "We have
now stacked up four tandems," said Captain Crunch, sounding somewhat remote.
"That's four tandems stacked up. Do you know what that means? That means
I'm whipping back and forth, back and forth twice, across the country,
before coming to you. I've been known to stack up twenty tandems at a time.
Now, just like I said, I'm going to shoot up to Moscow." There is a new,
longer series of beeper pulses over the line, a brief silence, then a ring.
"Hello," answers a far-off voice. "Hello. Is this the American Embassy
Moscow?" "Yes, sir. Who is this calling?" says the voice. "Yes. This is
test board here in New York. We're calling to check out the circuits, see
what kind of lines you've got. Everything okay there in Moscow?" "Okay?"
"Well, yes, how are things there?" "Oh. Well, everything okay, I guess."
"Okay. Thank you." They hang up, leaving a confused series of beep-kachink
sounds hanging in mid-ether in the wake of the call before dissolving away.
The Captain is pleased. "You believe me now, don't you? Do you know what
I'd like to do? I'd just like to call up your editor at Esquire and show
him just what it sounds like to stack and unstack tandems. I'll give him
a show that will blow his mind. What's his number? I ask the Captain what
kind of device he was using to accomplish all his feats. The Captain is
pleased at the question. "You could tell it was special, couldn't you?"
Ten pulses per second. That's faster than the phone company's equipment.
Believe me, this unit is the most famous unit in the country. There is
no other unit like it. Believe me." "Yes, I've heard about it. Some other
phone phreaks have told me about it." "They have been referring to my,
ahem, unit? What is it they said? Just out of curiosity, did they tell
you it was a highly sophisticated computer-operated unit, with acoustical
coupling for receiving outputs and a switch-board with multiple-line-tie
capability? Did they tell you that the frequency tolerance is guaranteed
to be not more than .05 percent? The amplitude tolerance less than .01
decibel? Those pulses you heard were perfect. They just come faster than
the phone company. Those were high-precision op-amps. Op-amps are instrumentation
amplifiers designed for ultra-stable amplification, super-low distortion
and accurate frequency response. Did they tell you it can operate in temperatures
from -55 degrees C to +125 degrees C?" I admit that they did not tell me
all that. "I built it myself," the Captain goes on. "If you were to go
out and buy the components from an industrial wholesaler it would cost
you at least $1500. I once worked for a semiconductor company and all this
didn't cost me a cent. Do you know what I mean? Did they tell you about
how I put a call completely around the world? I'll tell you how I did it.
I M-Fed Tokyo inward, who connected me to India, India connected me to
Greece, Greece connected me to Pretoria, South Africa, South Africa connected
me to South America, I went from South America to London, I had a London
operator connect me to a New York operator, I had New York connect me to
a California operator who rang the phone next to me. Needless to say I
had to shout to hear myself. But the echo was far out. Fantastic. Delayed.
It was delayed twenty seconds, but I could hear myself talk to myself."
"You mean you were speaking into the mouthpiece of one phone sending your
voice around the world into your ear through a phone on the other side
of your head?" I asked the Captain. I had a vision of something vaguely
autoerotic going on, in a complex electronic way. "That's right," said
the Captain. "I've also sent my voice around the world one way, going east
on one phone, and going west on the other, going through cable one way,
satellite the other, coming back together at the same time, ringing the
two phones simultaneously and picking them up and whipping my voice both
ways around the world back to me. Wow. That was a mind blower." "You mean
you sit there with both phones on your ear and talk to yourself around
the world," I said incredulously. "Yeah. Um hum. That's what I do. I connect
the phone together and sit there and talk." "What do you say? What do you
say to yourself when you're connected?" "Oh, you know. Hello test one two
three," he says in a low-pitched voice. "Hello test one two three," he
replied to himself in a high-pitched voice. "Hello test one two three,"
he repeats again, low-pitched. "Hello test one two three," he replies,
high-pitched. "I sometimes do this: Hello Hello Hello Hello, Hello, hello,"
he trails off and breaks into laughter. Why Captain Crunch Hardly Ever
Taps Phones Anymore Using internal phone-company codes, phone phreaks have
learned a simple method for tapping phones. Phone-company operators have
in front of them a board that holds verification jacks. It allows them
to plug into conversations in case of emergency, to listen in to a line
to determine if the line is busy or the circuits are busy. Phone phreaks
have learned to beep out the codes which lead them to a verification operator,
tell the verification operator they are switchmen from some other area
code testing out verification trunks. Once the operator hooks them into
the verification trunk, they disappear into the board for all practical
purposes, slip unnoticed into any one of the 10,000 to 100,000 numbers
in that central office without the verification operator knowing what they're
doing, and of course without the two parties to the connection knowing
there is a phantom listener present on their line. Toward the end of my
hour-long first conversation with him, I asked the Captain if he ever tapped
phones. "Oh no. I don't do that. I don't think it's right," he told me
firmly. "I have the power to do it but I don't... Well one time, just one
time, I have to admit that I did. There was this girl, Linda, and I wanted
to find out... you know. I tried to call her up for a date. I had a date
with her the last weekend and I thought she liked me. I called her up,
man, and her line was busy, and I kept calling and it was still busy. Well,
I had just learned about this system of jumping into lines and I said to
myself, 'Hmmm. Why not just see if it works. It'll surprise her if all
of a sudden I should pop up on her line. It'll impress her, if anything.'
So I went ahead and did it. I M-Fed into the line. My M-F-er is powerful
enough when patched directly into the mouthpiece to trigger a verification
trunk without using an operator the way the other phone phreaks have to.
"I slipped into the line and there she was talking to another boyfriend.
Making sweet talk to him. I didn't make a sound because I was so disgusted.
So I waited there for her to hang up, listening to her making sweet talk
to the other guy. You know. So as soon as she hung up I instantly M-F-ed
her up and all I said was, 'Linda, we're through.' And I hung up. And it
blew her head off. She couldn't figure out what the hell happened. "But
that was the only time. I did it thinking I would surprise her, impress
her. Those were all my intentions were, and well, it really kind of hurt
me pretty badly, and... and ever since then I don't go into verification
trunks." Moments later my first conversation with the Captain comes to
a close. "Listen," he says, his spirits somewhat cheered, "listen. What
you are going to hear when I hang up is the sound of tandems unstacking.
Layer after layer of tandems unstacking until there's nothing left of the
stack, until it melts away into nothing. Cheep, cheep, cheep, cheep," he
concludes, his voice descending to a whisper with each cheep. He hangs
up. The phone suddenly goes into four spasms: kachink cheep. Kachink cheep
kachink cheep kachink cheep, and the complex connection has wiped itself
out like the Cheshire cat's smile. The MF Boogie Blues The next number
I choose from the select list of phone-phreak alumni, prepared for me by
the blue-box inventor, is a Memphis number. It is the number of Joe Engressia,
the first and still perhaps the most accomplished blind phone phreak. Three
years ago Engressia was a nine-day wonder in newspapers and magazines all
over America because he had been discovered whistling free long-distance
connections for fellow students at the University of South Florida. Engressia
was born with perfect pitch: he could whistle phone tones better than the
phone-company's equipment. Engressia might have gone on whistling in the
dark for a few friends for the rest of his life if the phone company hadn't
decided to expose him. He was warned, disciplined by the college, and the
whole case became public. In the months following media reports of his
talent, Engressia began receiving strange calls. There were calls from
a group of kids in Los Angeles who could do some very strange things with
the quirky General Telephone and Electronics circuitry in L.A. suburbs.
There were calls from a group of mostly blind kids in ----, California,
who had been doing some interesting experiments with Cap'n Crunch whistles
and test loops. There was a group in Seattle, a group in Cambridge, Massachusetts,
a few from New York, a few scattered across the country. Some of them had
already equipped themselves with cassette and electronic M-F devices. For
some of these groups, it was the first time they knew of the others. The
exposure of Engressia was the catalyst that linked the separate phone-phreak
centers together. They all called Engressia. They talked to him about what
he was doing and what they were doing. And then he told them -- the scattered
regional centers and lonely independent phone phreakers -- about each other,
gave them each other's numbers to call, and within a year the scattered
phone-phreak centers had grown into a nationwide underground. Joe Engressia
is only twenty-two years old now, but along the phone-phreak network he
is "the old man," accorded by phone phreaks something of the reverence
the phone company bestows on Alexander Graham Bell. He seldom needs to
make calls anymore. The phone phreaks all call him and let him know what
new tricks, new codes, new techniques they have learned. Every night he
sits like a sightless spider in his little apartment receiving messages
from every tendril of his web. It is almost a point of pride with Joe that
they call him. But when I reached him in his Memphis apartment that night,
Joe Engressia was lonely, jumpy and upset. "God, I'm glad somebody called.
I don't know why tonight of all nights I don't get any calls. This guy
around here got drunk again tonight and propositioned me again. I keep
telling him we'll never see eye to eye on this subject, if you know what
I mean. I try to make light of it, you know, but he doesn't get it. I can
head him out there getting drunker and I don't know what he'll do next.
It's just that I'm really all alone here, just moved to Memphis, it's the
first time I'm living on my own, and I'd hate for it to all collapse now.
But I won't go to bed with him. I'm just not very interested in sex and
even if I can't see him I know he's ugly. "Did you hear that? That's him
banging a bottle against the wall outside. He's nice. Well forget about
it. You're doing a story on phone phreaks? Listen to this. It's the MF
Boogie Blues. Sure enough, a jumpy version of Muskrat Ramble boogies its
way over the line, each note one of those long-distance phone tones. The
music stops. A huge roaring voice blasts the phone off my ear: "AND THE
QUESTION IS..." roars the voice, "CAN A BLIND PERSON HOOK UP AN AMPLIFIER
ON HIS OWN?" The roar ceases. A high-pitched operator-type voice replaces
it. "This is Southern Braille Tel. & Tel. Have tone, will phone." This
is succeeded by a quick series of M-F tones, a swift "kachink" and a deep
reassuring voice: "If you need home care, call the visiting-nurses association.
First National time in Honolulu is 4:32 p.m." Joe back in his Joe voice
again: "Are we seeing eye to eye? 'Si, si,' said the blind Mexican. Ahem.
Yes. Would you like to know the weather in Tokyo?" This swift manic sequence
of phone-phreak vaudeville stunts and blind-boy jokes manages to keep Joe's
mind off his tormentor only as long as it lasts. "The reason I'm in Memphis,
the reason I have to depend on that homosexual guy, is that this is the
first time I've been able to live on my own and make phone trips on my
own. I've been banned from all central offices around home in Florida,
they knew me too well, and at the University some of my fellow scholars
were always harassing me because I was on the dorm pay phone all the time
and making fun of me because of my fat ass, which of course I do have,
it's my physical fatness program, but I don't like to hear it every day,
and if I can't phone trip and I can't phone phreak, I can't imagine what
I'd do, I've been devoting three quarters of my life to it. "I moved to
Memphis because I wanted to be on my own as well as because it has a Number
5 crossbar switching system and some interesting little independent phone-company
districts nearby and so far they don't seem to know who I am so I can go
on phone tripping, and for me phone tripping is just as important as phone
phreaking." Phone tripping, Joe explains, begins with calling up a central-office
switch room. He tells the switchman in a polite earnest voice that he's
a blind college student interested in telephones, and could he perhaps
have a guided tour of the switching station? Each step of the tour Joe
likes to touch and feel relays, caress switching circuits, switchboards,
crossbar arrangements. So when Joe Engressia phone phreaks he feels his
way through the circuitry of the country garden of forking paths, he feels
switches shift, relays shunt, crossbars swivel, tandems engage and disengage
even as he hears -- with perfect pitch -- his M-F pulses make the entire
Bell system dance to his tune. Just one month ago Joe took all his savings
out of his bank and left home, over the emotional protests of his mother.
"I ran away from home almost," he likes to say. Joe found a small apartment
house on Union Avenue and began making phone trips. He'd take a bus a hundred
miles south in Mississippi to see some old-fashioned Bell equipment still
in use in several states, which had been puzzling. He'd take a bus three
hundred miles to Charlotte, North Carolina, to look at some brand-new experimental
equipment. He hired a taxi to drive him twelve miles to a suburb to tour
the office of a small phone company with some interesting idiosyncrasies
in its routing system. He was having the time of his life, he said, the
most freedom and pleasure he had known. In that month he had done very
little long-distance phone phreaking from his own phone. He had begun to
apply for a job with the phone company, he told me, and he wanted to stay
away from anything illegal. "Any kind of job will do, anything as menial
as the most lowly operator. That's probably all they'd give me because
I'm blind. Even though I probably know more than most switchmen. But that's
okay. I want to work for Ma Bell. I don't hate Ma Bell the way Gilbertson
and some phone phreaks do. I don't want to screw Ma Bell. With me it's
the pleasure of pure knowledge. There's something beautiful about the system
when you know it intimately the way I do. But I don't know how much they
know about me here. I have a very intuitive feel for the condition of the
line I'm on, and I think they're monitoring me off and on lately, but I
haven't been doing much illegal. I have to make a few calls to switchmen
once in a while which aren't strictly legal, and once I took an acid trip
and was having these auditory hallucinations as if I were trapped and these
planes were dive-bombing me, and all of sudden I had to phone phreak out
of there. For some reason I had to call Kansas City, but that's all." A
Warning Is Delivered At this point -- one o'clock in my time zone -- a
loud knock on my motel-room door interrupts our conversation. Outside the
door I find a uniformed security guard who informs me that there has been
an "emergency phone call" for me while I have been on the line and that
the front desk has sent him up to let me know. Two seconds after I say
good-bye to Joe and hang up, the phone rings. "Who were you talking to?"
the agitated voice demands. The voice belongs to Captain Crunch. "I called
because I decided to warn you of something. I decided to warn you to be
careful. I don't want this information you get to get to the radical underground.
I don't want it to get into the wrong hands. What would you say if I told
you it's possible for three phone phreaks to saturate the phone system
of the nation. Saturate it. Busy it out. All of it. I know how to do this.
I'm not gonna tell. A friend of mine has already saturated the trunks between
Seattle and New York. He did it with a computerized M-F-er hitched into
a special Manitoba exchange. But there are other, easier ways to do it."
Just three people? I ask. How is that possible? "Have you ever heard of
the long-lines guard frequency? Do you know about stacking tandems with
17 and 2600? Well, I'd advise you to find out about it. I'm not gonna tell
you. But whatever you do, don't let this get into the hands of the radical
underground." (Later Gilbertson, the inventor, confessed that while he
had always been skeptical about the Captain's claim of the sabotage potential
of trunk-tying phone phreaks, he had recently heard certain demonstrations
which convinced him the Captain was not speaking idly. "I think it might
take more than three people, depending on how many machines like Captain
Crunch's were available. But even though the Captain sounds a little weird,
he generally turns out to know what he's talking about.") "You know," Captain
Crunch continues in his admonitory tone, "you know the younger phone phreaks
call Moscow all the time. Suppose everybody were to call Moscow. I'm no
right-winger. But I value my life. I don't want the Commies coming over
and dropping a bomb on my head. That's why I say you've got to be careful
about who gets this information." The Captain suddenly shifts into a diatribe
against those phone phreaks who don't like the phone company. "They don't
understand, but Ma Bell knows everything they do. Ma Bell knows. Listen,
is this line hot? I just heard someone tap in. I'm not paranoid, but I
can detect things like that. Well, even if it is, they know that I know
that they know that I have a bulk eraser. I'm very clean." The Captain
pauses, evidently torn between wanting to prove to the phone-company monitors
that he does nothing illegal, and the desire to impress Ma Bell with his
prowess. "Ma Bell knows how good I am. And I am quite good. I can detect
reversals, tandem switching, everything that goes on on a line. I have
relative pitch now. Do you know what that means? My ears are a $20,000
piece of equipment. With my ears I can detect things they can't hear with
their equipment. I've had employment problems. I've lost jobs. But I want
to show Ma Bell how good I am. I don't want to screw her, I want to work
for her. I want to do good for her. I want to help her get rid of her flaws
and become perfect. That's my number-one goal in life now." The Captain
concludes his warnings and tells me he has to be going. "I've got a little
action lined up for tonight," he explains and hangs up. Before I hang up
for the night, I call Joe Engressia back. He reports that his tormentor
has finally gone to sleep -- "He's not blind drunk, that's the way I get,
ahem, yes; but you might say he's in a drunken stupor." I make a date to
visit Joe in Memphis in two days. A Phone Phreak Call Takes Care of Business
The next morning I attend a gathering of four phone phreaks in ----- (a
California suburb). The gathering takes place in a comfortable split-level
home in an upper-middle-class subdivision. Heaped on the kitchen table
are the portable cassette recorders, M-F cassettes, phone patches, and
line ties of the four phone phreaks present. On the kitchen counter next
to the telephone is a shoe-box-size blue box with thirteen large toggle
switches for the tones. The parents of the host phone phreak, Ralph, who
is blind, stay in the living room with their sighted children. They are
not sure exactly what Ralph and his friends do with the phone or if it's
strictly legal, but he is blind and they are pleased he has a hobby which
keeps him busy. The group has been working at reestablishing the historic
"2111" conference, reopening some toll-free loops, and trying to discover
the dimensions of what seem to be new initiatives against phone phreaks
by phone-company security agents. It is not long before I get a chance
to see, to hear, Randy at work. Randy is known among the phone phreaks
as perhaps the finest con man in the game. Randy is blind. He is pale,
soft and pear-shaped, he wears baggy pants and a wrinkly nylon white sport
shirt, pushes his head forward from hunched shoulders somewhat like a turtle
inching out of its shell. His eyes wander, crossing and recrossing, and
his forehead is somewhat pimply. He is only sixteen years old. But when
Randy starts speaking into a telephone mouthpiece his voice becomes so
stunningly authoritative it is necessary to look again to convince yourself
it comes from a chubby adolescent Randy. Imagine the voice of a crack oil-rig
foreman, a tough, sharp, weather-beaten Marlboro man of forty. Imagine
the voice of a brilliant performance-fund gunslinger explaining how he
beats the Dow Jones by thirty percent. Then imagine a voice that could
make those two sound like Stepin Fetchit. That is sixteen-year-old Randy's
voice. He is speaking to a switchman in Detroit. The phone company in Detroit
had closed up two toll-free loop pairs for no apparent reason, although
heavy use by phone phreaks all over the country may have been detected.
Randy is telling the switchman how to open up the loop and make it free
again: "How are you, buddy. Yeah. I'm on the board in here in Tulsa, Oklahoma,
and we've been trying to run some tests on your loop-arounds and we find'em
busied out on both sides.... Yeah, we've been getting a 'BY' on them, what
d'ya say, can you drop cards on 'em? Do you have 08 on your number group?
Oh that's okay, we've had this trouble before, we may have to go after
the circuit. Here lemme give 'em to you: your frame is 05, vertical group
03, horizontal 5, vertical file 3. Yeah, we'll hang on here.... Okay, found
it? Good. Right, yeah, we'd like to clear that busy out. Right. All you
have to do is look for your key on the mounting plate, it's in your miscellaneous
trunk frame. Okay? Right. Now pull your key from NOR over the LCT. Yeah.
I don't know why that happened, but we've been having trouble with that
one. Okay. Thanks a lot fella. Be seein' ya." Randy hangs up, reports that
the switchman was a little inexperienced with the loop-around circuits
on the miscellaneous trunk frame, but that the loop has been returned to
its free-call status. Delighted, phone phreak Ed returns the pair of numbers
to the active-status column in his directory. Ed is a superb and painstaking
researcher. With almost Talmudic thoroughness he will trace tendrils of
hints through soft-wired mazes of intervening phone-company circuitry back
through complex linkages of switching relays to find the location and identity
of just one toll-free loop. He spends hours and hours, every day, doing
this sort of thing. He has somehow compiled a directory of eight hundred
"Band-six in-WATS numbers" located in over forty states. Band-six in-WATS
numbers are the big 800 numbers -- the ones that can be dialed into free
from anywhere in the country. Ed the researcher, a nineteen-year-old engineering
student, is also a superb technician. He put together his own working blue
box from scratch at age seventeen. (He is sighted.) This evening after
distributing the latest issue of his in-WATS directory (which has been
typed into Braille for the blind phone phreaks), he announces he has made
a major new breakthrough: "I finally tested it and it works, perfectly.
I've got this switching matrix which converts any touch-tone phone into
an M-F-er." The tones you hear in touch-tone phones are not the M-F tones
that operate the long-distance switching system. Phone phreaks believe
A.T.&T. had deliberately equipped touch tones with a different set
of frequencies to avoid putting the six master M-F tones in the hands of
every touch-tone owner. Ed's complex switching matrix puts the six master
tones, in effect put a blue box, in the hands of every touch-tone owner.
Ed shows me pages of schematics, specifications and parts lists. "It's
not easy to build, but everything here is in the Heathkit catalog." Ed
asks Ralph what progress he has made in his attempts to reestablish a long-term
open conference line for phone phreaks. The last big conference -- the
historic "2111" conference -- had been arranged through an unused Telex
test-board trunk somewhere in the innards of a 4A switching machine in
Vancouver, Canada. For months phone phreaks could M-F their way into Vancouver,
beep out 604 (the Vancouver area code) and then beep out 2111 (the internal
phone-company code for Telex testing), and find themselves at any time,
day or night, on an open wire talking with an array of phone phreaks from
coast to coast, operators from Bermuda, Tokyo and London who are phone-phreak
sympathizers, and miscellaneous guests and technical experts. The conference
was a massive exchange of information. Phone phreaks picked each other's
brains clean, then developed new ways to pick the phone company's brains
clean. Ralph gave M F Boogies concerts with his home-entertainment-type
electric organ, Captain Crunch demonstrated his round-the-world prowess
with his notorious computerized unit and dropped leering hints of the "action"
he was getting with his girl friends. (The Captain lives out or pretends
to live out several kinds of fantasies to the gossipy delight of the blind
phone phreaks who urge him on to further triumphs on behalf of all of them.)
The somewhat rowdy Northwest phone-phreak crowd let their bitter internal
feud spill over into the peaceable conference line, escalating shortly
into guerrilla warfare; Carl the East Coast international tone relations
expert demonstrated newly opened direct M-F routes to central offices on
the island of Bahrein in the Persian Gulf, introduced a new phone-phreak
friend of his in Pretoria, and explained the technical operation of the
new Oakland-to Vietnam linkages. (Many phone phreaks pick up spending money
by M-F-ing calls from relatives to Vietnam G.I.'s, charging $5 for a whole
hour of trans-Pacific conversation.) Day and night the conference line
was never dead. Blind phone phreaks all over the country, lonely and isolated
in homes filled with active sighted brothers and sisters, or trapped with
slow and unimaginative blind kids in straitjacket schools for the blind,
knew that no matter how late it got they could dial up the conference and
find instant electronic communion with two or three other blind kids awake
over on the other side of America. Talking together on a phone hookup,
the blind phone phreaks say, is not much different from being there together.
Physically, there was nothing more than a two-inch-square wafer of titanium
inside a vast machine on Vancouver Island. For the blind kids >there<
meant an exhilarating feeling of being in touch, through a kind of skill
and magic which was peculiarly their own. Last April 1, however, the long
Vancouver Conference was shut off. The phone phreaks knew it was coming.
Vancouver was in the process of converting from a step-by-step system to
a 4A machine and the 2111 Telex circuit was to be wiped out in the process.
The phone phreaks learned the actual day on which the conference would
be erased about a week ahead of time over the phone company's internal-news-and-shop-talk
recording. For the next frantic seven days every phone phreak in America
was on and off the 2111 conference twenty-four hours a day. Phone phreaks
who were just learning the game or didn't have M-F capability were boosted
up to the conference by more experienced phreaks so they could get a glimpse
of what it was like before it disappeared. Top phone phreaks searched distant
area codes for new conference possibilities without success. Finally in
the early morning of April 1, the end came. "I could feel it coming a couple
hours before midnight," Ralph remembers. "You could feel something going
on in the lines. Some static began showing up, then some whistling wheezing
sound. Then there were breaks. Some people got cut off and called right
back in, but after a while some people were finding they were cut off and
couldn't get back in at all. It was terrible. I lost it about one a.m.,
but managed to slip in again and stay on until the thing died... I think
it was about four in the morning. There were four of us still hanging on
when the conference disappeared into nowhere for good. We all tried to
M-F up to it again of course, but we got silent termination. There was
nothing there." The Legendary Mark Bernay Turns Out To Be "The Midnight
Skulker" Mark Bernay. I had come across that name before. It was on Gilbertson's
select list of phone phreaks. The California phone phreaks had spoken of
a mysterious Mark Bernay as perhaps the first and oldest phone phreak on
the West Coast. And in fact almost every phone phreak in the West can trace
his origins either directly to Mark Bernay or to a disciple of Mark Bernay.
It seems that five years ago this Mark Bernay (a pseudonym he chose for
himself) began traveling up and down the West Coast pasting tiny stickers
in phone books all along his way. The stickers read something like "Want
to hear an interesting tape recording? Call these numbers." The numbers
that followed were toll-free loop-around pairs. When one of the curious
called one of the numbers he would hear a tape recording pre-hooked into
the loop by Bernay which explained the use of loop-around pairs, gave the
numbers of several more, and ended by telling the caller, "At six o'clock
tonight this recording will stop and you and your friends can try it out.
Have fun." "I was disappointed by the response at first," Bernay told me,
when I finally reached him at one of his many numbers and he had dispensed
with the usual "I never do anything illegal" formalities which experienced
phone phreaks open most conversations. "I went all over the coast with
these stickers not only on pay phones, but I'd throw them in front of high
schools in the middle of the night, I'd leave them unobtrusively in candy
stores, scatter them on main streets of small towns. At first hardly anyone
bothered to try it out. I would listen in for hours and hours after six
o'clock and no one came on. I couldn't figure out why people wouldn't be
interested. Finally these two girls in Oregon tried it out and told all
their friends and suddenly it began to spread." Before his Johny Appleseed
trip Bernay had already gathered a sizable group of early pre-blue-box
phone phreaks together on loop-arounds in Los Angeles. Bernay does not
claim credit for the original discovery of the loop-around numbers. He
attributes the discovery to an eighteen-year-old reform school kid in Long
Beach whose name he forgets and who, he says, "just disappeared one day."
When Bernay himself discovered loop-arounds independently, from clues in
his readings in old issues of the Automatic Electric Technical Journal,
he found dozens of the reform-school kid's friends already using them.
However, it was one of Bernay's disciples in Seattle that introduced phone
phreaking to blind kids. The Seattle kid who learned about loops through
Bernay's recording told a blind friend, the blind kid taught the secret
to his friends at a winter camp for blind kids in Los Angeles. When the
camp session was over these kids took the secret back to towns all over
the West. This is how the original blind kids became phone phreaks. For
them, for most phone phreaks in general, it was the discovery of the possibilities
of loop-arounds which led them on to far more serious and sophisticated
phone-phreak methods, and which gave them a medium for sharing their discoveries.
A year later a blind kid who moved back east brought the technique to a
blind kids' summer camp in Vermont, which spread it along the East Coast.
All from a Mark Bernay sticker. Bernay, who is nearly thirty years old
now, got his start when he was fifteen and his family moved into an L.A.
suburb serviced by General Telephone and Electronics equipment. He became
fascinated with the differences between Bell and G.T.&E. equipment.
He learned he could make interesting things happen by carefully timed clicks
with the disengage button. He learned to interpret subtle differences in
the array of clicks, whirrs and kachinks he could hear on his lines. He
learned he could shift himself around the switching relays of the L.A.
area code in a not-too-predictable fashion by interspersing his own hook-switch
clicks with the clicks within the line. (Independent phone companies --
there are nineteen hundred of them still left, most of them tiny island
principalities in Ma Bell's vast empire -- have always been favorites with
phone phreaks, first as learning tools, then as Archimedes platforms from
which to manipulate the huge Bell system. A phone phreak in Bell territory
will often M-F himself into an independent's switching system, with switching
idiosyncrasies which can give him marvelous leverage over the Bell System.
"I have a real affection for Automatic Electric Equipment," Bernay told
me. "There are a lot of things you can play with. Things break down in
interesting ways." Shortly after Bernay graduated from college (with a
double major in chemistry and philosophy), he graduated from phreaking
around with G.T.&E. to the Bell System itself, and made his legendary
sticker-pasting journey north along the coast, settling finally in Northwest
Pacific Bell territory. He discovered that if Bell does not break down
as interestingly as G.T.&E., it nevertheless offers a lot of "things
to play with." Bernay learned to play with blue boxes. He established his
own personal switchboard and phone-phreak research laboratory complex.
He continued his phone-phreak evangelism with ongoing sticker campaigns.
He set up two recording numbers, one with instructions for beginning phone
phreaks, the other with latest news and technical developments (along with
some advanced instruction) gathered from sources all over the country.
These days, Bernay told me, he had gone beyond phone-phreaking itself.
"Lately I've been enjoying playing with computers more than playing with
phones. My personal thing in computers is just like with phones, I guess
-- the kick is in finding out how to beat the system, how to get at things
I'm not supposed to know about, how to do things with the system that I'm
not supposed to be able to do." As a matter of fact, Bernay told me, he
had just been fired from his computer-programming job for doing things
he was not supposed to be able to do. he had been working with a huge time-sharing
computer owned by a large corporation but shared by many others. Access
to the computer was limited to those programmers and corporations that
had been assigned certain passwords. And each password restricted its user
to access to only the one section of the computer cordoned off from its
own information storager. The password system prevented companies and individuals
from stealing each other's information. "I figured out how to write a program
that would let me read everyone else's password," Bernay reports. "I began
playing around with passwords. I began letting the people who used the
computer know, in subtle ways, that I knew their passwords. I began dropping
notes to the computer supervisors with hints that I knew what I know. I
signed them 'The Midnight Skulker.' I kept getting cleverer and cleverer
with my messages and devising ways of showing them what I could do. I'm
sure they couldn't imagine I could do the things I was showing them. But
they never responded to me. Every once in a while they'd change the passwords,
but I found out how to discover what the new ones were, and I let them
know. But they never responded directly to the Midnight Skulker. I even
finally designed a program which they could use to prevent my program from
finding out what it did. In effect I told them how to wipe me out, The
Midnight Skulker. It was a very clever program. I started leaving clues
about myself. I wanted them to try and use it and then try to come up with
something to get around that and reappear again. But they wouldn't play.
I wanted to get caught. I mean I didn't want to get caught personally,
but I wanted them to notice me and admit that they noticed me. I wanted
them to attempt to respond, maybe in some interesting way." Finally the
computer managers became concerned enough about the threat of information-stealing
to respond. However, instead of using The Midnight Skulker's own elegant
self-destruct program, they called in their security personnel, interrogated
everyone, found an informer to identify Bernay as The Midnight Skulker,
and fired him. "At first the security people advised the company to hire
me full-time to search out other flaws and discover other computer freaks.
I might have liked that. But I probably would have turned into a double
double agent rather than the double agent they wanted. I might have resurrected
The Midnight Skulker and tried to catch myself. Who knows? Anyway, the
higher-ups turned the whole idea down." You Can Tap the F.B.I.'s Crime
Control Computer in the Comfort of Your Own Home, Perhaps Computer freaking
may be the wave of the future. It suits the phone-phreak sensibility perfectly.
Gilbertson, the blue-box inventor and a lifelong phone phreak, has also
gone on from phone-phreaking to computer-freaking. Before he got into the
blue-box business Gilbertson, who is a highly skilled programmer, devised
programs for international currency arbitrage. But he began playing with
computers in earnest when he learned he could use his blue box in tandem
with the computer terminal installed in his apartment by the instrumentation
firm he worked for. The print-out terminal and keyboard was equipped with
acoustical coupling, so that by coupling his little ivory Princess phone
to the terminal and then coupling his blue box on that, he could M-F his
way into other computers with complete anonymity, and without charge; program
and re-program them at will; feed them false or misleading information;
tap and steal from them. He explained to me that he taps computers by busying
out all the lines, then going into a verification trunk, listening into
the passwords and instructions one of the time sharers uses, and them M-F-ing
in and imitating them. He believes it would not be impossible to creep
into the F.B.I's crime control computer through a local police computer
terminal and phreak around with the F.B.I.'s memory banks. He claims he
has succeeded in re-programming a certain huge institutional computer in
such a way that it has cordoned off an entire section of its circuitry
for his personal use, and at the same time conceals that arrangement from
anyone else's notice. I have been unable to verify this claim. Like Captain
Crunch, like Alexander Graham Bell (pseudonym of a disgruntled-looking
East Coast engineer who claims to have invented the black box and now sells
black and blue boxes to gamblers and radical heavies), like most phone
phreaks, Gilbertson began his career trying to rip off pay phones as a
teenager. Figure them out, then rip them off. Getting his dime back from
the pay phone is the phone phreak's first thrilling rite of passage. After
learning the usual eighteen different ways of getting his dime back, Gilbertson
learned how to make master keys to coin-phone cash boxes, and get everyone
else's dimes back. He stole some phone-company equipment and put together
his own home switchboard with it. He learned to make a simple "bread-box"
device, of the kind used by bookies in the Thirties (bookie gives a number
to his betting clients; the phone with that number is installed in some
widow lady's apartment, but is rigged to ring in the bookie's shop across
town, cops trace big betting number and find nothing but the widow). Not
long after that afternoon in 1968 when, deep in the stacks of an engineering
library, he came across a technical journal with the phone tone frequencies
and rushed off to make his first blue box, not long after that Gilbertson
abandoned a very promising career in physical chemistry and began selling
blue boxes for $1,500 apiece. "I had to leave physical chemistry. I just
ran out of interesting things to learn," he told me one evening. We had
been talking in the apartment of the man who served as the link between
Gilbertson and the syndicate in arranging the big $300,000 blue-box deal
which fell through because of legal trouble. There has been some smoking.
"No more interesting things to learn," he continues. "Physical chemistry
turns out to be a sick subject when you take it to its highest level. I
don't know. I don't think I could explain to you how it's sick. You have
to be there. But you get, I don't know, a false feeling of omnipotence.
I suppose it's like phone-phreaking that way. This huge thing is there.
This whole system. And there are holes in it and you slip into them like
Alice and you're pretending you're doing something you're actually not,
or at least it's no longer you that's doing what you thought you were doing.
It's all Lewis Carroll. Physical chemistry and phone-phreaking. That's
why you have these phone-phreak pseudonyms like The Cheshire Cat, the Red
King, and The Snark. But there's something about phone-phreaking that you
don't find in physical chemistry." He looks up at me: "Did you ever steal
anything?" "Well yes, I..." "Then you know! You know the rush you get.
It's not just knowledge, like physical chemistry. It's forbidden knowledge.
You know. You can learn about anything under the sun and be bored to death
with it. But the idea that it's illegal. Look: you can be small and mobile
and smart and you're ripping off somebody large and powerful and very dangerous."
People like Gilbertson and Alexander Graham Bell are always talking about
ripping off the phone company and screwing Ma Bell. But if they were shown
a single button and told that by pushing it they could turn the entire
circuitry of A.T.&T. into molten puddles, they probably wouldn't push
it. The disgruntled-inventor phone phreak needs the phone system the way
the lapsed Catholic needs the Church, the way Satan needs a God, the way
The Midnight Skulker needed, more than anything else, response. Later that
evening Gilbertson finished telling me how delighted he was at the flood
of blue boxes spreading throughout the country, how delighted he was to
know that "this time they're really screwed." He suddenly shifted gears.
"Of course. I do have this love/hate thing about Ma Bell. In a way I almost
like the phone company. I guess I'd be very sad if they were to disintegrate.
In a way it's just that after having been so good they turn out to have
these things wrong with them. It's those flaws that allow me to get in
and mess with them, but I don't know. There's something about it that gets
to you and makes you want to get to it, you know." I ask him what happens
when he runs out of interesting, forbidden things to learn about the phone
system. "I don't know, maybe I'd go to work for them for a while." "In
security even?" "I'd do it, sure. I just as soon play -- I'd just as soon
work on either side." "Even figuring out how to trap phone phreaks? I said,
recalling Mark Bernay's game." "Yes, that might be interesting. Yes, I
could figure out how to outwit the phone phreaks. Of course if I got too
good at it, it might become boring again. Then I'd have to hope the phone
phreaks got much better and outsmarted me for a while. That would move
the quality of the game up one level. I might even have to help them out,
you know, 'Well, kids, I wouldn't want this to get around but did you ever
think of -- ?' I could keep it going at higher and higher levels forever."
The dealer speaks up for the first time. He has been staring at the soft
blinking patterns of light and colors on the translucent tiled wall facing
him. (Actually there are no patterns: the color and illumination of every
tile is determined by a computerized random-number generator designed by
Gilbertson which insures that there can be no meaning to any sequence of
events in the tiles.) "Those are nice games you're talking about," says
the dealer to his friend. "But I wouldn't mind seeing them screwed. A telephone
isn't private anymore. You can't say anything you really want to say on
a telephone or you have to go through that paranoid bullshit. 'Is it cool
to talk on the phone?' I mean, even if it is cool, if you have to ask 'Is
it cool,' then it isn't cool. You know. 'Is it cool,' then it isn't cool.
You know. Like those blind kids, people are going to start putting together
their own private telephone companies if they want to really talk. And
you know what else. You don't hear silences on the phone anymore. They've
got this time-sharing thing on long-distance lines where you make a pause
and they snip out that piece of time and use it to carry part of somebody
else's conversation. Instead of a pause, where somebody's maybe breathing
or sighing, you get this blank hole and you only start hearing again when
someone says a word and even the beginning of the word is clipped off.
Silences don't count -- you're paying for them, but they take them away
from you. It's not cool to talk and you can't hear someone when they don't
talk. What the hell good is the phone? I wouldn't mind seeing them totally
screwed." The Big Memphis Bust Joe Engressia never wanted to screw Ma Bell.
His dream had always been to work for her. The day I visited Joe in his
small apartment on Union Avenue in Memphis, he was upset about another
setback in his application for a telephone job. "They're stalling on it.
I got a letter today telling me they'd have to postpone the interview I
requested again. My landlord read it for me. They gave me some runaround
about wanting papers on my rehabilitation status but I think there's something
else going on." When I switched on the 40-watt bulb in Joe's room -- he
sometimes forgets when he has guests -- it looked as if there was enough
telephone hardware to start a small phone company of his own. There is
one phone on top of his desk, one phone sitting in an open drawer beneath
the desk top. Next to the desk-top phone is a cigar-box-size M-F device
with big toggle switches, and next to that is some kind of switching and
coupling device with jacks and alligator plugs hanging loose. Next to that
is a Braille typewriter. On the floor next to the desk, lying upside down
like a dead tortoise, is the half-gutted body of an old black standard
phone. Across the room on a torn and dusty couch are two more phones, one
of them a touch-tone model; two tape recorders; a heap of phone patches
and cassettes, and a life-size toy telephone. Our conversation is interrupted
every ten minutes by phone phreaks from all over the country ringing Joe
on just about every piece of equipment but the toy phone and the Braille
typewriter. One fourteen-year-old blind kid from Connecticut calls up and
tells Joe he's got a girl friend. He wants to talk to Joe about girl friends.
Joe says they'll talk later in the evening when they can be alone on the
line. Joe draws a deep breath, whistles him off the air with an earsplitting
2600-cycle whistle. Joe is pleased to get the calls but he looked worried
and preoccupied that evening, his brow constantly furrowed over his dark
wandering eyes. In addition to the phone-company stall, he has just learned
that his apartment house is due to be demolished in sixty days for urban
renewal. For all its shabbiness, the Union Avenue apartment house has been
Joe's first home-of-his-own and he's worried that he may not find another
before this one is demolished. But what really bothers Joe is that switchmen
haven't been listening to him. "I've been doing some checking on 800 numbers
lately, and I've discovered that certain 800 numbers in New Hampshire couldn't
be reached from Missouri and Kansas. Now it may sound like a small thing,
but I don't like to see sloppy work; it makes me feel bad about the lines.
So I've been calling up switching offices and reporting it, but they haven't
corrected it. I called them up for the third time today and instead of
checking they just got mad. Well, that gets me mad. I mean, I do try to
help them. There's something about them I can't understand -- you want
to help them and they just try to say you're defrauding them." It is Sunday
evening and Joe invites me to join him for dinner at a Holiday Inn. Frequently
on Sunday evening Joe takes some of his welfare money, calls a cab, and
treats himself to a steak dinner at one of Memphis' thirteen Holiday Inns.
(Memphis is the headquarters of Holiday Inn. Holiday Inns have been a favorite
for Joe ever since he made his first solo phone trip to a Bell switching
office in Jacksonville, Florida, and stayed in the Holiday Inn there. He
likes to stay at Holiday Inns, he explains, because they represent freedom
to him and because the rooms are arranged the same all over the country
so he knows that any Holiday Inn room is familiar territory to him. Just
like any telephone.) Over steaks in the Pinnacle Restaurant of the Holiday
Inn Medical Center on Madison Avenue in Memphis, Joe tells me the highlights
of his life as a phone phreak. At age seven, Joe learned his first phone
trick. A mean baby-sitter, tired of listening to little Joe play with the
phone as he always did, constantly, put a lock on the phone dial. "I got
so mad. When there's a phone sitting there and I can't use it... so I started
getting mad and banging the receiver up and down. I noticed I banged it
once and it dialed one. Well, then I tried banging it twice...." In a few
minutes Joe learned how to dial by pressing the hook switch at the right
time. "I was so excited I remember going 'whoo whoo' and beat a box down
on the floor." At age eight Joe learned about whistling. "I was listening
to some intercept non working-number recording in L.A.- I was calling L.A.
as far back as that, but I'd mainly dial non working numbers because there
was no charge, and I'd listen to these recordings all day. Well, I was
whistling 'cause listening to these recordings can be boring after a while
even if they are from L.A., and all of a sudden, in the middle of whistling,
the recording clicked off. I fiddled around whistling some more, and the
same thing happened. So I called up the switch room and said, 'I'm Joe.
I'm eight years old and I want to know why when I whistle this tune the
line clicks off.' He tried to explain it to me, but it was a little too
technical at the time. I went on learning. That was a thing nobody was
going to stop me from doing. The phones were my life, and I was going to
pay any price to keep on learning. I knew I could go to jail. But I had
to do what I had to do to keep on learning." The phone is ringing when
we walk back into Joe's apartment on Union Avenue. It is Captain Crunch.
The Captain has been following me around by phone, calling up everywhere
I go with additional bits of advice and explanation for me and whatever
phone phreak I happen to be visiting. This time the Captain reports he
is calling from what he describes as "my hideaway high up in the Sierra
Nevada." He pulses out lusty salvos of M-F and tells Joe he is about to
"go out and get a little action tonight. Do some phreaking of another kind,
if you know what I mean." Joe chuckles. The Captain then tells me to make
sure I understand that what he told me about tying up the nation's phone
lines was true, but that he and the phone phreaks he knew never used the
technique for sabotage. They only learned the technique to help the phone
company. "We do a lot of troubleshooting for them. Like this New Hampshire/Missouri
WATS-line flaw I've been screaming about. We help them more than they know."
After we say good-bye to the Captain and Joe whistles him off the line,
Joe tells me about a disturbing dream he had the night before: "I had been
caught and they were taking me to a prison. It was a long trip. They were
taking me to a prison a long long way away. And we stopped at a Holiday
Inn and it was my last night ever using the phone and I was crying and
crying, and the lady at the Holiday Inn said, 'Gosh, honey, you should
never be sad at a Holiday Inn. You should always be happy here. Especially
since it's your last night.' And that just made it worse and I was sobbing
so much I couldn't stand it." Two weeks after I left Joe Engressia's apartment,
phone-company security agents and Memphis police broke into it. Armed with
a warrant, which they left pinned to a wall, they confiscated every piece
of equipment in the room, including his toy telephone. Joe was placed under
arrest and taken to the city jail where he was forced to spend the night
since he had no money and knew no one in Memphis to call. It is not clear
who told Joe what that night, but someone told him that the phone company
had an open-and-shut case against him because of revelations of illegal
activity he had made to a phone-company undercover agent. By morning Joe
had become convinced that the reporter from Esquire, with whom he had spoken
two weeks ago, was the undercover agent. He probably had ugly thoughts
about someone he couldn't see gaining his confidence, listening to him
talk about his personal obsessions and dreams, while planning all the while
to lock him up. "I really thought he was a reporter," Engressia told the
Memphis Press-Seminar. "I told him everything...." Feeling betrayed, Joe
proceeded to confess everything to the press and police. As it turns out,
the phone company did use an undercover agent to trap Joe, although it
was not the Esquire reporter. Ironically, security agents were alerted
and began to compile a case against Joe because of one of his acts of love
for the system: Joe had called an internal service department to report
that he had located a group of defective long-distance trunks, and to complain
again about the New Hampshire/Missouri WATS problem. Joe always liked Ma
Bell's lines to be clean and responsive. A suspicious switchman reported
Joe to the security agents who discovered that Joe had never had a long-distance
call charged to his name. Then the security agents learned that Joe was
planning one of his phone trips to a local switching office. The security
people planted one of their agents in the switching office. He posed as
a student switchman and followed Joe around on a tour. He was extremely
friendly and helpful to Joe, leading him around the office by the arm.
When the tour was over he offered Joe a ride back to his apartment house.
On the way he asked Joe -- one tech man to another -- about "those blue
boxers" he'd heard about. Joe talked about them freely, talked about his
blue box freely, and about all the other things he could do with the phones.
The next day the phone-company security agents slapped a monitoring tape
on Joe's line, which eventually picked up an illegal call. Then they applied
for the search warrant and broke in. In court Joe pleaded not guilty to
possession of a blue box and theft of service. A sympathetic judge reduced
the charges to malicious mischief and found him guilty on that count, sentenced
him to two thirty-day sentences to be served concurrently and then suspended
the sentence on condition that Joe promise never to play with phones again.
Joe promised, but the phone company refused to restore his service. For
two weeks after the trial Joe could not be reached except through the pay
phone at his apartment house, and the landlord screened all calls for him.
Phone-phreak Carl managed to get through to Joe after the trial, and reported
that Joe sounded crushed by the whole affair. "What I'm worried about,"
Carl told me, "is that Joe means it this time. The promise. That he'll
never phone-phreak again. That's what he told me, that he's given up phone-phreaking
for good. I mean his entire life. He says he knows they're going to be
watching him so closely for the rest of his life he'll never be able to
make a move without going straight to jail. He sounded very broken up by
the whole experience of being in jail. It was awful to hear him talk that
way. I don't know. I hope maybe he had to sound that way. Over the phone,
you know." He reports that the entire phone-phreak underground is up in
arms over the phone company's treatment of Joe. "All the while Joe had
his hopes pinned on his application for a phone-company job, they were
stringing him along getting ready to bust him. That gets me mad. Joe spent
most of his time helping them out. The bastards. They think they can use
him as an example. All of sudden they're harassing us on the coast. Agents
are jumping up on our lines. They just busted ------'s mute yesterday and
ripped out his lines. But no matter what Joe does, I don't think we're
going to take this lying down." Two weeks later my phone rings and about
eight phone phreaks in succession say hello from about eight different
places in the country, among them Carl, Ed, and Captain Crunch. A nationwide
phone-phreak conference line has been reestablished through a switching
machine in --------, with the cooperation of a disgruntled switchman. "We
have a special guest with us today," Carl tells me. The next voice I hear
is Joe's. He reports happily that he has just moved to a place called Millington,
Tennessee, fifteen miles outside of Memphis, where he has been hired as
a telephone-set repairman by a small independent phone company. Someday
he hopes to be an equipment troubleshooter. "It's the kind of job I dreamed
about. They found out about me from the publicity surrounding the trial.
Maybe Ma Bell did me a favor busting me. I'll have telephones in my hands
all day long." "You know the expression, 'Don't get mad, get even'?" phone-phreak
Carl asked me. "Well, I think they're going to be very sorry about what
they did to Joe and what they're trying to do to us." (an excellent story
presented here by Jolly Roger. Taken from the Official Hacker's Guide.
Originally seen by myself in some book and I cannot remember the name of
it.) -->Courtesy of the Jolly Roger<-- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$ $ $ THE HISTORY OF BRITISH PHREAKING $ $ -=- -=-=-=- -- -=-=-=- -=-=-=-=-
$ $ $ $ THE SECOND IN A SERIES OF $ $ THE HISTORY OF.....PHILES $ $ $ $
WRITTEN AND UPLOADED BY: $ $ $ $$$$$$$$$$$$-=>LEX LUTHOR<=-$$$$$$$$$$$
$ AND $ $ THE LEGION OF DOOM! $ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTE: THE BRITISH POST OFFICE, IS THE U.S. EQUIVALENT OF MA BELL. IN BRITAIN,
PHREAKING GOES BACK TO THE EARLY FIFTIES, WHEN THE TECHNIQUE OF 'TOLL A
DROP BACK' WAS DISCOVERED. TOLL A WAS AN EXCHANGE NEAR ST. PAULS WHICH
ROUTED CALLS BETWEEN LONDON AND NEARBY NON-LONDON EXCHANGES. THE TRICK
WAS TO DIAL AN UNALLOCATED NUMBER, AND THEN DEPRESS THE RECEIVER-REST FOR
1/2 SECOND. THIS FLASHING INITIATED THE 'CLEAR FORWARD' SIGNAL, LEAVING
THE CALLER WITH AN OPEN LINE INTO THE TOLL A EXCHANGE.THE COULD THEN DIAL
018, WHICH FORWARDED HIM TO THE TRUNK EXCHANGE AT THAT TIME, THE FIRST
LONG DISTANCE EXCHANGE IN BRITAIN AND FOLLOW IT WITH THE CODE FOR THE DISTANT
EXCHANGE TO WHICH HE WOULD BE CONNECTED AT NO EXTRA CHARGE. THE SIGNALS
NEEDED TO CONTROL THE UK NETWORK TODAY WERE PUBLISHED IN THE "INSTITUTION
OF POST OFFICE ENGINEERS JOURNAL" AND REPRINTED IN THE SUNDAY TIMES (15
OCT. 1972). THE SIGNALLING SYSTEM THEY USE: SIGNALLING SYSTEM NO. 3 USES
PAIRS OF FREQUENCIES SELECTED FROM 6 TONES SEPARATED BY 120HZ. WITH THAT
INFO, THE PHREAKS MADE "BLEEPERS" OR AS THEY ARE CALLED HERE IN THE U.S.
"BLUE BOX", BUT THEY DO UTILIZE DIFFERENT MF TONES THEN THE U.S., THUS,
YOUR U.S. BLUE BOX THAT YOU SMUGGLED INTO THE UK WILL NOT WORK, UNLESS
YOU CHANGE THE FREQUENCIES. IN THE EARLY SEVENTIES, A SIMPLER SYSTEM BASED
ON DIFFERENT NUMBERS OF PULSES WITH THE SAME FREQUENCY (2280HZ) WAS USED.
FOR MORE INFO ON THAT, TRY TO GET A HOLD OF: ATKINSON'S "TELEPHONY AND
SYSTEMS TECHNOLOGY". IN THE EARLY DAYS OF BRITISH PHREAKING, THE CAMBRIDGE
UNIVERSITY TITAN COMPUTER WAS USED TO RECORD AND CIRCULATE NUMBERS FOUND
BY THE EXHAUSTIVE DIALING OF LOCAL NETWORKS. THESE NUMBERS WERE USED TO
CREATE A CHAIN OF LINKS FROM LOCAL EXCHANGE TO LOCAL EXCHANGE ACROSS THE
COUNTRY, BYPASSING THE TRUNK CIRCUITS. BECAUSE THE INTERNAL ROUTING CODES
IN THE UK NETWORK ARE NOT THE SAME AS THOSE DIALED BY THE CALLER, THE PHREAKS
HAD TO DISCOVER THEM BY 'PROBE AND LISTEN' TECHNIQUES OR MORE COMMONLY
KNOWN IN THE U.S.-- SCANNING. WHAT THEY DID WAS PUT IN LIKELY SIGNALS AND
LISTENED TO FIND OUT IF THEY SUCCEEDED. THE RESULTS OF SCANNING WERE CIRCULATED
TO OTHER PHREAKS. DISCOVERING EACH OTHER TOOK TIME AT FIRST, BUT EVENTUALLY
THE PHREAKS BECAME ORGANIZED. THE "TAP" OF BRITAIN WAS CALLED "UNDERCURRENTS"
WHICH ENABLED BRITISH PHREAKS TO SHARE THE INFO ON NEW NUMBERS, EQUIPMENT
ETC. TO UNDERSTAND WHAT THE BRITISH BRITISH PHREAKS DID, THINK OF THE PHONE
NETWORK IN THREE LAYERS OF LINES: LOCAL, TRUNK, AND INTERNATIONAL.#IN THE
UK, SUBSCRIBER TRUNK DIALING (STD), IS THE MECHANISM WHICH TAKES A CALL
FROM THE LOCAL LINES AND (LEGITIMATELY) ELEVATES IT TO A TRUNK OR INTERNATIONAL
LEVEL.#THE UK PHREAKS FIGURED THAT A CALL AT TRUNK LEVEL CAN BE ROUTED
THROUGH ANY NUMBER OF EXCHANGES, PROVIDED THAT THE RIGHT ROUTING CODES
WERE FOUND AND USED CORRECTLY. THEY ALSO HAD TO DISCOVER HOW TO GET FROM
LOCAL TO TRUNK LEVEL EITHER WITHOUT BEING CHARGED (WHICH THEY DID WITH
A BLEEPER BOX) OR WITHOUT USING (STD). CHAINING HAS ALREADY BEEN MENTIONED
BUT IT REQUIRES LONG STRINGS OF DIGITS AND SPEECH GETS MORE AND MORE FAINT
AS THE CHAIN GROWS, JUST LIKE IT DOES WHEN YOU STACK TRUNKS BACK AND FORTH
ACROSS THE U.S.#THE WAY THE SECURITY REPS SNAGGED THE PHREAKS WAS TO PUT
A SIMPLE 'PRINTERMETER' OR AS WE CALL IT: A PEN REGISTER ON THE SUSPECTS
LINE, WHICH SHOWS EVERY DIGIT DIALED FROM THE SUBSCRIBERS LINE. THE BRITISH
PREFER TO GET ONTO THE TRUNKS RATHER THAN CHAINING. ONE WAY WAS TO DISCOVER
WHERE LOCAL CALLS USE THE TRUNKS BETWEEN NEIGHBORING EXCHANGES, START A
CALL AND STAY ON THE TRUNK INSTEAD OF RETURNING TO THE LOCAL LEVEL ON REACHING
THE DISTANT SWITCH. THIS AGAIN REQUIRED EXHAUSTIVE DIALING AND MADE MORE
WORK FOR TITAN; IT ALSO REVEALED 'FIDDLES', WHICH WERE INSERTED BY POST
OFFICE ENGINEERS. WHAT FIDDLING MEANS IS THAT THE ENGINEERS REWIRED THE
EXCHANGES FOR THEIR OWN BENEFIT. THE EQUIPMENT IS MODIFIED TO GIVE ACCESS
TO A TRUNK WITH OUT BEING CHARGED, AN OPERATION WHICH IS PRETTY EASY IN
STEP BY STEP (SXS) ELECTROMECHANICAL EXCHANGES, WHICH WERE INSTALLED IN
BRITAIN EVEN IN THE 1970S (NOTE: I KNOW OF A BACK DOOR INTO THE CANADIAN
SYSTEM ON A 4A CO., SO IF YOU ARE ON SXS OR A 4A, TRY SCANNING 3 DIGIT
EXCHANGES, IE: DIAL 999,998,997 ETC.#AND LISTEN FOR THE BEEP-KERCHINK,
IF THERE ARE NO 3 DIGIT CODES WHICH ALLOW DIRECT ACCESS TO A TANDEM IN
YOUR LOCAL EXCHANGE AND BYPASSES THE AMA SO YOU WON'T BE BILLED, NOT HAVE
TO BLAST 2600 EVERY TIME YOU WISH TO BOX A CALL. A FAMOUS BRITISH 'FIDDLER'
REVEALED IN THE EARLY 1970S WORKED BY DIALING 173. THE CALLER THEN ADDED
THE TRUNK CODE OF 1 AND THE SUBSCRIBERS LOCAL NUMBER. AT THAT TIME, MOST
ENGINEERING TEST SERVICES BEGAN WITH 17X, SO THE ENGINEERS COULD HIDE THEIR
FIDDLES IN THE NEST OF SERVICE WIRES. WHEN SECURITY REPS STARTED SEARCHING,
THE FIDDLES WERE CONCEALED BY TONES SIGNALLING: 'NUMBER UNOBTAINALBE' OR
'EQUIPMENT ENGAGED' WHICH SWITCHED OFF AFTER A DELAY. THE NECESSARY RELAYS
ARE SMALL AND EASILY HIDDEN. THERE WAS ANOTHER SIDE TO PHREAKING IN THE
UK IN THE SIXTIES. BEFORE STD WAS WIDESPREAD, MANY 'ORDINARY' PEOPLE WERE
DRIVEN TO. OCCASIONAL PHREAKING FROM SHEER FRUSTRATION AT THE INEFFICIENT
OPERATOR CONTROLLED TRUNK SYSTEM. THIS CAME TO A HEAD DURING A STRIKE ABOUT
1961 WHEN OPERATORS COULD NOT BE REACHED. NOTHING COMPLICATED WAS NEEDED.
MANY OPERATORS HAD BEEN IN THE HABIT OF REPEATING THE CODES AS THEY DIALLED
THE REQUESTED NUMBERS SO PEOPLE SOON LEARNT THE NUMBERS THEY CALLED FREQUENTLY.
THE ONLY 'TRICK' WAS TO KNOW WHICH EXCHANGES COULD BE DIALLED THROUGH TO
PASS ON THE TRUNK NUMBER.CALLERS ALSO NEEDED A PRETTY QUIET PLACE TO DO
IT, SINCE TIMING RELATIVE TO CLICKS WAS IMPORTANT THE MOST FAMOUS TRIAL
OF BRITISH PHREAKS WAS CALLED THE OLD BAILY TRIAL.#WHICH STARTED ON 3 OCT.
1973.#WHAT THEY PHREAKS DID WAS TO DIAL A SPARE NUMBER AT A LOCAL CALL
RATE BUT INVOLVING A TRUNK TO ANOTHER EXCHANGE THEN THEY SEND A 'CLEAR
FORWARD' TO THEIR LOCAL EXCHANGE, INDICATING TO IT THAT THE CALL IS FINISHED;BUT
THE DISTANT EXCHANGE DOESN'T REALIZE BECAUSE THE CALLER'S PHONE IS STILL
OFF THE HOOK. THEY NOW HAVE AN OPEN LINE INTO THE DISTANT TRUNK EXCHANGE
AND SENDS TO IT A 'SEIZE' SIGNAL: '1' WHICH PUTS HIM ONTO ITS OUTGOING
LINES NOW, IF THEY KNOW THE CODES, THE WORLD IS OPEN TO THEM. ALL OTHER
EXCHANGES TRUST HIS LOCAL EXCHANGE TO HANDLE THE BILLING; THEY JUST INTERPRET
THE TONES THEY HEAR. MEAN WHILE, THE LOCAL EXCHANGE COLLECTS ONLY FOR A
LOCAL CALL. THE INVESTIGATORS DISCOVERED THE PHREAKS HOLDING A CONFERENCE
SOMEWHERE IN ENGLAND SURROUNDED BY VARIOUS PHONE EQUIPMENT AND BLEEPER
BOXES, ALSO PRINTOUTS LISTING 'SECRET' POST OFFICE CODES. (THEY PROBABLY
GOT THEM FROM TRASHING?) THE JUDGE SAID: "SOME TAKE TO HEROIN, SOME TAKE
TO TELEPHONES" FOR THEM PHONE PHREAKING WAS NOT A CRIME BUT A HOBBY TO
BE SHARED WITH PHELLOW ENTHUSIASTS AND DISCUSSED WITH THE POST OFFICE OPENLY
OVER DINNER AND BY MAIL. THEIR APPROACH AND ATTITUDE TO THE WORLDS LARGEST
COMPUTER, THE GLOBAL TELEPHONE SYSTEM, WAS THAT OF SCIENTISTS CONDUCTING
EXPERIMENTS OR PROGRAMMERS AND ENGINEERS TESTING PROGRAMS AND SYSTEMS.
THE JUDGE APPEARED TO AGREE, AND EVEN ASKED THEM FOR PHREAKING CODES TO
USE FROM HIS LOCAL EXCHANGE!!! (Left Untouched as I got it...-----JR) -------->Courtesy
of The Jolly Roger<-------- Bad as Shit Recently, a telephone fanatic
in the northwest made an interesting discovery. He was exploring the 804
area code (Virginia) and found out that the 840 exchange did something
strange. In the vast majority of cases, in fact in all of the cases except
one, he would get a recording as if the exchange didn't exist. However,
if he dialed 804-840 and four rather predictable numbers, he got a ring!
After one or two rings, somebody picked up. Being experienced at this kind
of thing, he could tell that the call didn't "supe", that is, no charges
were being incurred for calling this number. (Calls that get you to an
error message, or a special operator, generally don't supervise.) A female
voice, with a hint of a Southern accent said, "Operator, can I help you?"
"Yes," he said, "What number have I reached?" "What number did you dial,
sir?" He made up a number that was similar. "I'm sorry that is not the
number you reached." Click. He was fascinated. What in the world was this?
He knew he was going to call back, but before he did, he tried some more
experiments. He tried the 840 exchange in several other area codes. In
some, it came up as a valid exchange. In others, exactly the same thing
happened -- the same last four digits, the same Southern belle. Oddly enough,
he later noticed, the areas worked in seemed to travel in a beeline from
Washington DC to Pittsburgh, PA. He called back from a payphone. "Operator,
can I help you?" "Yes, this is the phone company. I'm testing this line
and we don't seem to have an identification on your circuit. What office
is this, please?" "What number are you trying to reach?" "I'm not trying
to reach any number. I'm trying to identify this circuit." "I'm sorry,
I can't help you." "Ma'am, if I don't get an ID on this line, I'll have
to disconnect it. We show no record of it here." "Hold on a moment, sir."
After about a minute, she came back. "Sir, I can have someone speak to
you. Would you give me your number, please?" He had anticipated this and
he had the payphone number ready. After he gave it, she said, "Mr. XXX
will get right back to you." "Thanks." He hung up the phone. It rang. INSTANTLY!
"Oh my God," he thought, "They weren't asking for my number -- they were
confirming it!" "Hello," he said, trying to sound authoritative. "This
is Mr. XXX. Did you just make an inquiry to my office concerning a phone
number?" "Yes. I need an identi--" "What you need is advice. Don't ever
call that number again. Forget you ever knew it." At this point our friend
got so nervous he just hung up. He expected to hear the phone ring again
but it didn't. Over the next few days he racked his brains trying to figure
out what the number was. He knew it was something big -- that was pretty
certain at this point. It was so big that the number was programmed into
every central office in the country. He knew this because if he tried to
dial any other number in that exchange, he'd get a local error message
from his CO, as if the exchange didn't exist. It finally came to him. He
had an uncle who worked in a federal agency. He had a feeling that this
was government related and if it was, his uncle could probably find out
what it was. He asked the next day and his uncle promised to look into
the matter. The next time he saw his uncle, he noticed a big change in
his manner. He was trembling. "Where did you get that number?!" he shouted.
"Do you know I almost got fired for asking about it?!? They kept wanting
to know where I got it." Our friend couldn't contain his excitement. "What
is it?" he pleaded. "What's the number?!" "IT'S THE PRESIDENT'S BOMB SHELTER!"
He never called the number after that. He knew that he could probably cause
quite a bit of excitement by calling the number and saying something like,
"The weather's not good in Washington. We're coming over for a visit."
But our friend was smart. he knew that there were some things that were
better off unsaid and undone. (A fucking great story from the Official
Phreaker's Guide) ------------Jolly Roger
Telenet Courtesy
of the Jolly Roger
It seems that not many of you know
that Telenet is connected to about 80 computer-networks in the world. No,
I don't mean 80 nodes, but 80 networks with thousands of unprotected computers.
When you call your local Telenet- gateway, you can only call those computers
which accept reverse-charging- calls. If you want to call computers in
foreign countries or computers in USA which do not accept R-calls, you
need a Telenet-ID. Did you ever notice that you can type ID XXXX when being
connected to Telenet? You are then asked for the password. If you have
such a NUI (Network-User-ID) you can call nearly every host connected to
any computer-network in the world. Here are some examples: 026245400090184
:Is a VAX in Germany (Username: DATEXP and leave mail for CHRIS !!!) 0311050500061
:Is the Los Alamos Integrated computing network (One of the hosts connected
to it is the DNA (Defense Nuclear Agency)!!!) 0530197000016 :Is a BBS in
New Zealand 024050256 :Is the S-E-Bank in Stockholm, Sweden (Login as GAMES
!!!) 02284681140541 :CERN in Geneva in Switzerland (one of the biggest
nuclear research centers in the world) Login as GUEST 0234212301161 :A
Videotex-standard system. Type OPTEL to get in and use the ID 999_ with
the password 9_ 0242211000001 :University of Oslo in Norway (Type LOGIN
17,17 to play the Multi-User-Dungeon !) 0425130000215 :Something like ITT
Dialcom, but this one is in Israel ! ID HELP with password HELP works fine
with security level 3 0310600584401 :Is the Washington Post News Service
via Tymnet (Yes, Tymnet is connected to Telenet, too !) ID and Password
is: PETER You can read the news of the next day ! The prefixes are as follows:
02624 is Datex-P in Germany 02342 is PSS in England 03110 is Telenet in
USA 03106 is Tymnet in USA 02405 is Telepak in Sweden 04251 is Isranet
in Israel 02080 is Transpac in France 02284 is Telepac in Switzerland 02724
is Eirpac in Ireland 02704 is Luxpac in Luxembourg 05252 is Telepac in
Singapore 04408 is Venus-P in Japan ...and so on... Some of the countries
have more than one packet-switching-network (USA has 11, Canada has 3,
etc). OK. That should be enough for the moment. As you see most of the
passwords are very simple. This is because they must not have any fear
of hackers. Only a few German hackers use these networks. Most of the computers
are absolutely easy to hack !!! So, try to find out some Telenet-ID's and
leave them here. If you need more numbers, leave e-mail. I'm calling from
Germany via the German Datex-P network, which is similar to Telenet. We
have a lot of those NUI's for the German network, but none for a special
Tymnet-outdial-computer in USA, which connects me to any phone #. CUL8R,
Mad Max PS: Call 026245621040000 and type ID INF300 with password DATACOM
to get more Informations on packet-switching-networks ! PS2: The new password
for the Washington Post is KING !!!! Fucking with the Operator courtesy
of the Jolly Roger Ever get an operator who gave you a hard time, and you
didn't know what to do? Well if the operator hears you use a little Bell
jargon, she might wise up. Here is a little diagram (excuse the artwork)
of the structure of operators /--------\ /------\ /-----\ !Operator!--
> ! S.A. ! --->! BOS ! \--------/ \------/ \-----/ ! ! V /-------------\
! Group Chief ! \-------------/ Now most of the operators are not bugged,
so they can curse at you, if they do ask INSTANTLY for the "S.A." or the
Service Assistant. The operator does not report to her (95% of them are
hers) but they will solve most of your problems. She MUST give you her
name as she connects & all of these calls are bugged. If the SA gives
you a rough time get her BOS (Business Office Supervisor) on the line.
S/He will almost always back her girls up, but sometimes the SA will get
tarred and feathered. The operator reports to the Group Chief, and S/He
will solve 100% of your problems, but the chances of getting S/He on the
line are nill. If a lineman (the guy who works out on the poles) or an
installation man gives you the works ask to speak to the Installation Foreman,
that works wonders. Here is some other bell jargon, that might come in
handy if you are having trouble with the line. Or they can be used to lie
your way out of situations.... An Erling is a line busy for 1 hour, used
mostly in traffic studies A Permanent Signal is that terrible howling you
get if you disconnect, but don't hang up. Everyone knows what a busy signal
is, but some idiots think that is the *Actual* ringing of the phone, when
it just is a tone "beeps" when the phone is ringing, wouldn't bet on this
though, it can (and does) get out of sync. When you get a busy signal that
is 2 times as fast as the normal one, the person you are trying to reach
isn't really on the phone, (he might be), it is actually the signal that
a trunk line somewhere is busy and they haven't or can't reroute your call.
Sometimes you will get a Recording, or if you get nothing at all (Left
High & Dry in fone terms) all the recordings are being used and the
system is really overused, will probably go down in a little while. This
happened when Kennedy was shot, the system just couldn't handle the calls.
By the way this is called the "reorder signal" and the trunk line is "blocked".
One more thing, if an overseas call isn't completed and doesn't generate
any money for AT&T, is is called an "Air & Water Call". ==Phrack
Inc.== Volume One, Issue One, Phile #4 of 8 THE PHONE PHREAK'S FRY-UM GUIDE
COMPILED BY THE IRON SOLDIER WITH HELP FROM DR. DOVE NOTE: THIS GUIDE IS
STILL BEING COMPILED, AND AS PHONE PHREAKS LEARN MORE IN THE ART OF VENGEANCE
IT WILL ALWAYS EXPAND. "Vengeance is mine", says the Phreak. METHOD 1-PHONE
LINE PHUN Call up the business office. It should be listed at the front
of the white pages. Say you wanted to disconnect Scott Korman's line. DIAL
800-xxx-xxxx. "Hello, this is Mr. Korman, I'm moving to California and
would like to have my phone service disconnected. I'm at the airport now.
I'm calling from a payphone, my number is [414] 445 5005. You can send
my final bill to: (somewhere in California). Thank you." METHOD 2-PHONE
BOOKS Call up the business office from a pay phone. Say : "Hello, I'd like
to order a Phone Book for Upper Volta (or any out-of-the way area with
Direct Dialing). This is Scott Korman, ship to 3119 N. 44th St. Milwaukee,
WI 53216. Yes, I under stand it will cost $xx($25-$75!!). Thank you." METHOD
3-PHONE CALLS Call up a PBX, enter the code and get an outside line. Then
dial 0+ the number desired to call. You will hear a bonk and then an operator.
Say, "I'd like to charge this to my home phone at 414-445-5005. Thank you."
A friend and I did this to a loser, I called him at 1:00 AM and we left
the fone off the hook all night. I calculated that it cost him $168. METHOD
4-MISC SERVICES Call up the business office once again from a payfone.
Say you'd like call waiting, forwarding, 3 way, etc. Once again you are
the famed loser Scott Korman. He pays-you laugh. You don't know how funny
it was talking to him, and wondering what those clicks he kept hearing
were. METHOD 5-CHANGED & UNPUB Do the same as in #4, but say you'd
like to change and unlist your (Scott's) number. Anyone calling him will
get: "BEW BEW BEEP. The number you have reached, 445-5005, has been changed
to a non-published number. No further....." METHOD 6-FORWRDING This required
an accomplice or two or three. Around Christmas time, go to Toys 'R' Us.
Get everyone at the customer service or manager's desk away ("Hey, could
you help me"). then you get on their phone and dial (usually dial 9 first)
and the business office again. This time, say you are from Toys 'R' Us,
and you'd like to add call forwarding to 445-5005. Scott will get 100-600
calls a day!!! METHOD 7-RUSSIAN CALLER Call a payphone at 10:00 PM. Say
to the operator that you'd like to book a call to Russia. Say you are calling
from a payphone, and your number is that of the loser to fry (e.g. 445-5005).
She will say that she'll have to call ya back in 5 hours, and you ok that.
Meanwhile the loser (e.g.) Scott, will get a call at 3:00 AM from an operator
saying that the call he booked to Russia is ready. IF YOU HAVE ANY QUESTIONS
LEAVE E-MAIL FOR ME ON ANY BOARD I'M ON. The Iron Soldier TSF-The Second
Foundation! International Country Code Listing courtesy of the Jolly Roger
*UNITED KINGDOM/IRELAND ------------------------------------ IRELAND.........................353
UNITED KINGDOM...................44 *EUROPE ------------------------------------
ANDORRA..........................33 AUSTRIA..........................43
BELGIUM..........................32 CYPRUS..........................357
CZECHOLSLOVAKIA..................42 DENMARK..........................45
FINLAND.........................358 FRANCE...........................33
GERMAN DEMOCRATIC REPUBLIC.......37 GERMANY, FEDERAL REPUBLIC OF.....49
GIBRALTAR.......................350 GREECE...........................30
HUNGARY..........................36 ICELAND.........................354
ITALY............................39 LIECHTENSTEIN....................41
LUXEMBOURG......................352 MONACO...........................33
NETHERLANDS......................31 NORWAY...........................47
POLAND...........................48 PORTUGAL........................351
ROMANIA..........................40 SAN MARINO.......................39
SPAIN............................34 SWEDEN...........................46
SWITZERLAND......................41 TURKEY...........................90
VATICAN CITY.....................39 YUGOSLAVIA.......................38
*CENTRAL AMERICA ------------------------------------ BELIZE..........................501
COSTA RICA......................506 EL SALVADOR.....................503
GUATEMALA.......................502 HONDURAS........................504
NICARAGUA.......................505 PANAMA..........................507
*AFRICA ------------------------------------ ALGERIA.........................213
CAMEROON........................237 EGYPT............................20
ETHIOPIA........................251 GABON...........................241
IVORY COAST.....................225 KENYA...........................254
LESOTHO.........................266 LIBERIA.........................231
LIBYA...........................218 MALAWI..........................265
MOROCCO.........................212 NAMIBIA.........................264
NIGERIA.........................234 SENEGAL.........................221
SOUTH AFRICA.....................27 SWAZILAND.......................268
TANZANIA........................255 TUNISIA.........................216
UGANDA..........................256 ZAMBIA..........................260
ZIMBABWE........................263 *PACIFIC ------------------------------------
AMERICAN SAMOA..................684 AUSTRAILIA.......................61
BRUNEI..........................673 FIJI............................679
FRENCH POLYNESIA................689 GUAM............................671
HONG KONG.......................852 INDONESIA........................62
JAPAN............................81 KOREA, REPUBLIC OF...............82
MALAYSIA.........................60 NEW CALEDONIA...................687
NEW ZEALAND......................64 PAPUA NEW GUINEA................675
PHILIPPINES......................63 SAIPAN..........................670
SINGAPORE........................65 TAIWAN..........................886
THAILAND.........................66 *INDIAN OCEAN ------------------------------------
PAKISTAN.........................92 SRI LANKA........................94
*SOUTH AMERICA ------------------------------------ ARGENTINA........................54
BOLIVIA.........................591 BRAZIL...........................55
CHILE............................56 COLOMBIA.........................57
ECUADOR.........................593 GUYANA..........................592
PARAGUAY........................595 PERU.............................51
SURINAME........................597 URUGUAY.........................598
VENEZUELA........................58 *NEAR EAST ------------------------------------
BAHRAIN.........................973 IRAN.............................98
IRAQ............................964 ISRAEL..........................972
JORDAN..........................962 KUWAIT..........................965
OMAN............................968 QATAR...........................974
SAUDI ARABIA....................966 UNITED ARAB EMIRATES............971
YEMEN ARAB REPUBLIC.............967 *CARIBBEAN/ATLANTIC ------------------------------------
FRENCH ANTILLES.................596 GUANTANAMO BAY (US NAVY BASE)....53
HAITI...........................509 NETHERLANDS ANTILLES............599
ST. PIERRE AND MIQUELON.........508 *INDIA ------------------------------------
INDIA............................91 *CANADA ------------------------------------
TO CALL CANADA, DIAL 1 + AREA CODE + LOCAL NUMBER. *MEXICO ------------------------------------
TO CALL MEXICO, DIAL 011 + 52 + CITY CODE+ LOCAL NUMBER. To dial international
calls: International Access Code + Country code + Routing code Example
: To call Frankfurt, Germany, you would do the following: 011 + 49 + 611
+ (# wanted) + # sign(octothrope) The # sign at the end is to tell Bell
that you are done entering in all the needed info.
The Infinity
Transmitter courtesy of the Jolly Roger
Originally typed by: <<