Copy Link
Add to Bookmark
Report

Ocean County Phone Punx 07

eZine's profile picture
Published in 
Ocean County Phone Punx
 · 26 Apr 2019

  

Ocean County Phone Punx Presents
OCPP07
February 26, 1998
Last Updated February 26, 1998



Contents
Intro - Mohawk
Phreak World News - Mohawk
Learning How To Phreak - Mohawk
Resource Bin - Mr. Seuss
The AOL Problem Revisited - Editorial - Mohawk
Rural Output Devices - Neptunium Overkill
NXX Scanning - Mohawk
Reality - American Anarchist
Anarchy With Paging Systems - Mohawk
1-800 GUSWAG0 - Mr. Seuss
Payphone Profiles Part 2 - Mohawk
Fighting Back - Mohawk
Busted - Mohawk
Letters
News







Intro-Mohawk

This is starting off to be a very interesting year for

phreaking. I'll talk more about that in the new section, "Phreak

World News"
. About a week after Issue 6 was released, we had to

move the webpage. Not everyone knew about our new URL at

ocpp.home.ml.org, so a few people were left wondering where

the page was. That should be our URL for a long time. However,

your never sure what's going to happen, so you should get on the

mailing list by mailing ocpp@hotmail.com.

The next issue which will be released on April 26th will

mark our 1 year anniversary. It will be our biggest issue to date.

But before that issue comes out, there are a few things that need

to be cleared up. First off, the OCPP is published on the 26th

of every other month. The January issue was our first special

issue. Our next special issue will probably be in July.

Within the next two months, the site will be updated many

times. We hope to get more of the text file section back up. We

will also redo the layout of some section on the site. The

alt.phreaking site will also be worked on extensively.















.....The Staff of the OCPP.....


Mohawk.................Editor in chief

Mr. Seuss .............Technical editor/Head technical writer

Checkmate..............Staff writer

Phear..................Staff writer/Graphics

American Anarchist.....Staff writer

Punkroq................Editor

X-Logik................News editor

The Assassin...........The official hitman of the OCPP

V-Rok..................He just looks slick all day


















If you would like to become a distro site, mail: ocpp@hotmail.com


To be notified of any URL changes and issue releases, get on the

mailing list: ocpp@hotmail.com


Disclaimer and Copyright info is located at the end of the issue.















Phreak World News-Mohawk


This is the first installment of Phreak World News. PWN

will cover the news that is happening in the "scene". We will mostly

be covering updates of websites and zines. This is also where I'll put

updates of Matrix and any cons that might be going on. If you would

like your new zine, new site, update, movie, con, or whatever,

email: ocpp@hotmail.com



Headlines

Telephone Free Planet update

The Havoc Technical Journal and it's problems

PLA updates and AOLRIOT 98

The debut release of Security Breach





Telephone Free Planet update

Telephone Free Planet has released what might be it's final

issue. Issue 6 was released on January 25th. Keystroke had to finish

editing this issue for unknown reasons. The site says that TFP will end

in April. Issue 7 will come out in March or April. My prediction

looks to becoming true but I'm not at all happy about it. You can

visit the remains of TFP at: http://tfp.nothing.org




The Havoc Technical Journal and it's problems


It just keeps getting worse. In the beginning of February,

thtj.com went down. It remained down till this day. I thought that they

switched servers and I just didn't know about it. I was proved very

wrong on February 22nd when the long overdue Issue 19 was posted on

alt.phreaking

Here is the beginning of the post of that post:

--------------------
Hi.

THTJ 19 was almost ready for release on February 2nd; Scud sent me a
preview release, all that was left was for Scud to write the editorial
(a tribute to KungFuFox [cause he had died{sorta}]) and for me to edit
it. But then...

[20:51] *** Scud-O has quit IRC (Ping timeout for
Scud-O[mulder.clark.net])

He was never to be seen again.

Now, Scud has a habit of disappearing for a few days before and after a
new THTJ is scheduled for release, so I didn't worry much, until....

Session Start: Thu Feb 05 15:49:45 1998
<snip>
[15:51] <Jf_> dude...whats happened to www.thtj.com?!?!?!?
<Key-----> E-GAD&(&$#(*#@&$(*#@&()$&#@$&#(@*$&!@()$#@
<Key-----> !*($)#*@!
<Key-----> I DUNNO
<Key-----> BRB!#!#
<Key-----> strange

I thought things couldn't get any worse... until!!@#@!#@!


Session Start: Mon Feb 09 15:39:54 1998
<snip>
[22:30] *** alienphrk (b33r@204.164.105.242) has joined #phreak
[22:31] <alienphrk> oh fuck when is kff getting back?
[22:33] <alienphrk> this is so not cool
* KeyIdol Returned: Idle 225 mins
<KeyIdol> hi
<KeyIdol> he isnt!
[22:34] <alienphrk> KEY
[22:34] <alienphrk> dood
[22:34] <alienphrk> i need yer help
<KeyIdol> sure thing!
[22:34] <alienphrk> check yer msg

Session Start: Mon Feb 09 22:34:30 1998
[22:34] <alienphrk> uhmm..
[22:34] <alienphrk> i got a letter from a gov. offical
[22:34] <alienphrk> talking about lightspan2000 in one of the thtj
articles
<KeyIdol> tee
<KeyIdol> go on
[22:34] <alienphrk> hehe
[22:35] <alienphrk> they are going to sue me unless i take the thtj
issue of my page
<KeyIdol> maybe thats why www.thtj.com is down <-- clever, am i not?!
[22:36] <alienphrk> to stop distrobuting the issue
[22:36] <alienphrk> the guy came up to my house today
[22:36] <alienphrk> and handed it to my mom
[22:36] <alienphrk> im at private school so she called me about it
[22:37] <alienphrk> exactly
[22:37] <alienphrk> and then i take it off the page
[22:37] <alienphrk> they told me to delete it
[22:37] <alienphrk> off of my putah
<KeyIdol> IM THE ONLY ONE LEFT
<KeyIdol> FOX AND SCUD ARE GONE
<KeyIdol> ALIEN
<KeyIdol> IM NEXT TO GO
[22:43] <alienphrk> what issue was it in?
<KeyIdol> dunno
<KeyIdol> hehe!
[22:43] <alienphrk> damnit heh
[22:44] <alienphrk> found it
<KeyIdol> what one?
[22:45] <alienphrk> written by XiLiCoN
[22:45] <alienphrk> LiteSpan2000
<KeyIdol> errr
<KeyIdol> what issue :P
[22:48] <alienphrk> 16
Session Close: Mon Feb 09 23:22:56 1998

Scary, eh?!

The plot thickens later on, but I wun go into details. It seems that
some company is upset with Xilicon's article in THTJ 16; I doubt
any government agencies are involved.

So, since thtj.com is down and Scud doesn't come on IRC anymore
(even though I ping his static IP and nbtstat -a it and he is connected
to his ISP) I'll post THTJ19 here. THTJ 20 is due out in a week, but
since I don't have any articles for it yet, it probably won't be out
for a long time. You can still read TFP though, issue #7 should be
released sometime next month. http://tfp.nothing.org


-------------------------

Until thtj.com gets back up, you can get all the issues of THTJ

at the OCPP at: http://ocpp.home.ml.org If you would like

to contact Keystroke to help him out with the THTJ and/or TFP

email him at: Keystoke@thepentagon.com





PLA updates and AOLRIOT 98



Finally some good news. The PLA is still kicking ass after almost

a year since they stopped releasing new issues. Here is a mass mailing

that they sent out:


------------------

KPLA!
----
A few of us have made the final decision to go ahead and run with
the idea of KPLA Internet Television so be expecting our
mini-episodes to start appearing on phonelosers.org within the next
six months.

Basically KPLA will be the old 'zine in RealMedia format. You'll see
instructional videos, practical jokes, cool music and a lot of really
idiotic stuff. The nice guys over at http://www.freespeech.org have
even offered us storage space for the streaming RealVideo files.

Each episode will vary in length but probably average around 10 - 20
minutes. We'll also offer the episodes on video tapes and/or .AVI
zip disks/CD-ROMs for those of you who can't stand streaming
RealVideo. If you have something you think would be worth
contributing to the show, you can send videotape to PLA, 1013
Kingswood Court, Celina, OH, 45822.

CGI Scripts:
-----------
I've started exploring the wonderful world of cgi scripting. If
you'd like to download a few useful CGI scripts such as a web
discussion board, a chat room or a logging utility, visit the
FruitWare CGI page at
http://www.phonelosers.org/FruitWare/scripts.htm .

New to phonelosers.org:
----------------------
Here are a few of the newer features on phonelosers.org:

Screw the PLA! This page is a listing of
people/organizations/whatever that have tried to end the PLA or
tried to cash in on the PLA name. A recent experience with a company
that sells hardcopy texts of PLA on the web motivated me to make
this page. http://www.phonelosers.org/screw_us.htm

Private Investigator Links: If you're trying to get the goods on
someone, this is the place to begin your search. A lot of web search
forms are located here to locate people, businesses and just about
everything else. Also, you'll find phone company homepages and links
to real private investigators when you finally give up trying to
find the guy yourself. http://www.phonelosers.org/pi.htm

Discussion Board: Fire up a discussion with other losers on our
discussion board. This has a wide range of topics and usually you'll
find plenty of morons just yelling back and forth at each other but
it's kind of fun. http://www.phonelosers.org/FruitWare/

Other PLA Sites: As always, there's a slew of other PLA sites on the
web, hopefully near your home town. The sole purpose of these sites
are to help people find others who live around them and are into the
same sort of computer & telephone shenanigans. Check out this list
and see if there's a Loser in your hometown and if there isn't,
create a page yourself! http://www.phonelosers.org/plasites.htm

New PLA GIFs Released!: In case you haven't noticed yet, there are
now 12 PLA GIFs for your viewing pleasure. The latest one was
released just a few months ago. Check them out on
http://www.phonelosers.org/photos.htm
----------------------------------

There is another AOL Riot being planned calling AOLRIOT98. The

interesting thing is it is sort of a phreak riot. For more details go to

the PLA website at http://www.phonelosers.org They aren't organizing it,

there just postin the info.




The debut release of Security Breach


The first issue of Security Breach has been released. You can get

it at the OCPP at: http://ocpp.home.ml.org This zine looks to have

a lot of promise. Issue 2 should be out soon. The OCPP will be the

official distribution site of Security Breach as they do not have

a website at the present time. If you would like the OCPP to be a distro

site for your whether you have a website or not, email ocpp@hotmail.com

















Learning How To Phreak-Mohawk




It has come to my attention that there are a number of people

that read this zine that don't even know a thing about phreaking. That's

OK though and that's why we have a variety of articles, from newbie to

advanced. However, none of our articles dealt with people that are

clueless. Now I could sit here and talk about boxes and dumb crap like

every other beginner phreak text but the way I see it, you learn a lot

better when you find stuff out yourself. This article will teach you

how to search and learn.


Websites

Websites are where you will get the bulk of your info and

they are the best place to start. To find a website go to a search

engine and type in words like: phreaking, hacking, redbox, wardial,

etc. That will bring up a list of websites. Click on each one until

you find one with some phreaking stuff on it.

There aren't too many websites that have just phreaking stuff on

it so you will have to sift through a lot of hacking texts to get

to the phreaking ones. Some of the stuff the search engine finds

will be a text file. Download this but then go to the site it is on

to get more. If the URL for the text file is:

http://www.sss.com/jjj/redbox.txt, backtrack to sss.com/jjj/ and find

the page itself. It will most likely be jjj/main.html or index.html

Once you find some texts, download everything. You might want to

download a few beginner hacking texts but that's up to you. Now that

you have downloaded everything you can, go to the links section on that

page. I suggest you bookmark this site so you can come back to it,

especially if it has a lot of links. Follow the links until you find

another website with different phreaking texts. Follow this process

until you have a ton of texts. Than read, read, read, and read some more.

Once, you have an idea of what phreaking is about than you will be able

to concentrate on what you want to learn about.

Because technology changes so often the methods of phreaking

also change. Many articles you will find were written during

the early 80's, or "the golden age of phreaking". These are some of the

best phreaking texts you will find but they are very outdated. There

aren't too many texts that were written within the last few years. But

that's where zines come in. Phreaking zines provide some of the best

up to date info that you can ever hope to find. Read every issue of

every zine you can find. Most zines have letter sections where you can

write in and ask a question. Some zines are to busy to answer you

personally. I'm not gonna mention any names but there probably to busy

doing Hacker TV specials where they think there cool as shit cuz they

got 5 whole seconds of air time. Some zines only release a few issues

and then close down. That's why it's important to download all the issues

while you can. In fact, that rule should be followed with all H/P

sites. If you put off gettin some files from a site for a few days, it

might not be there tomorrow.


News Groups


This is the place to go to once you know the basics of phreaking.

The best one to go to is alt.phreaking. Other newsgroups are:

alt.2600, alt.2600.phreakz, alt.hack.nl, alt.hacker, alt.hacking,

alt.ph.uk, de.org.ccc.

Whether you just read posts and never respond or you become responsible

for half of the posts on there, newsgroups are a great way to learn and

keep in touch with what's goin on in the phreaking world. When you first

get on to a NG you might want to watch for a while to see how

things work. Each one is different and one stupid post can brand you

as a lamer. I don't make these rules. One thing to look for, is

the FAQ if the NG has one. Hopefully this will answer some of your

questions. Once you get a feel for the NG and the people on it, you

can post stuff like, I'm interested in learning more about XXX, anyone

got any suggestions?



Bulletin Boards

All the old timers, like myself, remember the good old days

of BBSing. Remember FidoNet? Now that almost everyone is on the internet

and underground BBS are pretty much a thing of the past. However, their

are some great BBS still out there. These are a great (and free if their

local) way to get files and meet people in your area. How do you find BBS

in your area? The best way to do it is ask on a newsgroup. BBS

are pretty much self explanatory. If you don't find any in your area,

you might want to call up a BBS that isn't in local. You'll have to

shell out some dollars (assuming your paying for it) to call but

most all BBS have numbers to other BBS on them. Write these numbers

down and call them up. Repeat this process until you find one in your

area. Like I said before, don't hold your breath.

Meetings

Check 2600 magazine to see if there are any meetings in your

area. If there is, go to one. If you go and say your new to phreaking,

you've been reading a lot, and you want to learn as much as possible,

they'll be glad to have you. Everyone is always looking for phreaks

in their area. As long as you don't go their and say you own your

own warez chatroom on AOL, you'll be fine. If you find that their isn't

a meeting in your area, then post a message on a few news groups like:

Any meetings in the XXX area?? You should get a few responses. If

you don't get any, try again about once or twice a month. If all else

fails move to New York City.


That should get you off on the right foot. I went a little farther

than just how to learn about phreaking but I figured I'd help you guys

out a little.















The Resource Bin-Mr. Seuss

Ever been told to go look it up, but had no clue WHERE to look?

This is a list of websites, newsgroups, and other places that has aided

in my own research.


Websites


Bellcore Search: This should be really obvious. Info on very theoretical
stuff, mostly switching. Bite your tongue if you come here because they let
almost nothing by for free.
(http://www.bellcore.com/
BC.dynjava?PowerNavigationAndSearchPNASGeneralPowerNavigationAndSearch)

Telecom Archives: This page is an archive of the comp.dcom.telecom
newsgroup. The FAQ is excellent, the articles are good and if all else
fails you can post to the newsgroup.
(http://hyperarchive.lcs.mit.edu/telecom-archives/)

Telecom Information Resources: This is simply a monstrous list of
telecom/networking FAQs and sites. Don't bother unless you're looking into
arcane topics and have a good working knowledge of the topic already; most
people listed on this site never heard about PCMCIA.
(http://www.spp.umich.edu/telecom/technical-info.html)

PacBell Search: Surprisingly helpful, PacBell search will outline lots of
InterLATA carrier information for you (including the law), COCOTs, and
other sundry phone related info.
(http://www.pacbell.com/ir/search/index.html)

LexiCat Search Demo: This site is a REAL gem. It offers a searchable
index of terms (it cross references everything), as well as articles and
reports on related topics. Warning: This is a demo for a product. After
10 searches it resets itself and won't allow you back. Reload the page
after every few searches or else.
(http://www.tra.com/cgi-bin/ft-LexiMot/ID=19970912152925603/lexi7800.html)

Blackbox Search: Try their search if you need info on LANs or direct
connection. This is an online catalog, but you can still extract enough
useful stuff to make going here worthwhile.
(http://www.blackbox.com)

Lucent: These people are pretty straightforward about what they offer.
Lucent makes STUFF, unlike Bellcore which peddles information. Accordingly,
Lucent will talk and talk and talk about their products.
(http://www.lucent.com/search/search.html)

Raytheon: These people unsettle me a bit. Raytheon is a blanket electronics
firm that holds primarily DoD contracts. If you have a morbid interest in
missile guidance you'll LOVE this site. They also hold contracts on
encrypted voice switches used in the DSN.
(http://www.electrospace.com/business/telecomm.htm)

Lockheed Martin: Now controls NPA allocation (They bought it from Bellcore.
Here ends an era.), and is happily distributing for free all sorts of
useful information Bellcore used to sell for A LOT of money. This site
lists all SACs, NPAs, and some stuff I didn't think was publicly available.
(http://www.nanpa.com/)

555-1212: These people appear to be a low budget setup, but they offer an
RBOC map (It only shows major providers. Local dialtone offices are not
displayed), NPA lookup, telephone number lookup, etc.
(http://www.555-1212.com/)

Country/Area/City/Code/Decoder: Pretty self explanatory.
(http://www.xmission.com/~americom/aclookup.html)

International payphone index:
(http://www.cybercafe.org/cybercafe/pubtel/pubtel.html)

AT&T Toll Free Directory: I use the print edition for browsing in general,
but this is a handy site to have around.
(http://att.net/dir800/)

Database America: This is the only Web based reverse directory in service.
It's far from infailable, but it works often enough.
(http://www.databaseamerica.com/html/gpfind.htm)




Newsgroups


alt.dcom.telecom
alt.dcom.telecom.tech

These are the newsgroups where networking specialists hangout in their off
hours to BS about work. Ask them questions, they will usually answer at
length. I've received a handful of hostile responses, but only when I came
right out and started asking about military phone systems (I got the answer
anyway so I don't care).

comp.dcom.sys.nortel

A spinoff newsgroup for discussion of Nortel systems.




Printed Materials


Bellcore Catalog: Handy-dandy reference for acronyms and vague ideas. If
you have the money to purchase the documents (they do take credit cards
and personal checks) I would recommend requesting this catalog. It's free.

AT&T Catalog: I know it's there, it's usability is unknown. Better be good,
$5 shipping.

Blackbox Catalog: Shiny and colorful, the Blackbox catalog looks neat if
nothing else. Reading it will give you a decent idea of where the industry
is at, and it will provide you with ANYTHING if you have the money (if it
isn't listed they'll custom build it for you. Too bad iÕm broke). Catalog
is free.

DMS Books: If you ever take an interest in Nortel's DMS line they distribute
catalogs of software modules that have excellent descriptions of what the
switches can do.

AT&T Business Buyers Guide. Printed toll free directory, it's really
useful for simple browsing. I have no idea why I own one or how it came
to my door, but it did. Any library will have a copy.

Graybar Catalog




Phone Numbers


Ameritech RespOrg: The only 800/888 reverse directory known to us at the
OCPP. This service will also usually give a trouble reporting number, the
POTS number the 800/888 terminates at.
(800-337-4194)



Mail


Tasty Bits from the Technology Front: Bulky title, great service. This is
an automailer that sends out telecom/computer related information on an
irregular schedule. Subscribe, it'll keep you informed about general topics
and you can be conversational if nothing else.
(http://www.tbtf.com/#autosub)
















The AOL Problem Revisited - Editorial - Mohawk


In Issue three, I wrote an editorial talking about the

discrimination of people who use AOL. Now that it's six months

later, I've come to realize that this problem isn't gonna stop.

The fact is, there are a ton of ignorant people in the world

and a lot of them are on the Net. No matter what we do, we

can't change the stereotype that has been stuck to AOLers. Some

people just love to stir things up. This can be seen a lot in

Newsgoups. Somebody will post something that is going to cause

controversy and fighting. I guess some people just get off

on that stuff. Instead of replying "Not all AOLers are lamers"

and stuff like that, just ignore them. If they have a webpage, don't

go there. If they have a zine don't buy it or read it. This kinda

sucks because I always support zines even if I don't like them.

However, I'd rather see no zine, than a zine full of hatred and

ignorance.



This was posted on alt.phreaking. This post inspired me to write

this editorial.

>I realy like AOL, it gives the lamers something to do rather than hack
>BBS's and keeps them from fucking with other systems on the net.
>Imagine what all the bored oh-day k0de kiddie AOL w0rri0rz would do if
>they didn't have AOL to fuck with. They'd get an ISP account, start
>reading bugtraq, and actually start learning something. Then we'd all
>be fucked cause the hacking rate on the net would "shewt threw the rewf",
>the phedz would be called in, CERT would actually serve some purpose,
>people would get busted, people would go to jail. Everyone should get
>down and pray that AOL never goes away.



This is my reply to his post. It turned into a speech.

Is this really necessary? I'm sure most of you on AOL wanna write

this guy back and tell him what an asshole he is. I've expressed my

opinion on this matter a number of times in many different forums. I

realize that this problem of judging people by what ISP they have is

never going to end. Writing/posting back saying "not all aolers are

lamers"
and shit like that only makes things worse. Think about who your

dealing with. Most, notice how I say most and not all, of these people

are fat, ugly, 13 year old kids who have no friends outside of cyberspace.

They get judged everyday in school by their looks and get their asses

kicked day in and day out. They are very ignorant and they are really

pissed off. So what do they do? They sit home all day, memorizing the in

and outs of UNIX, watch wargames 10 times in a row, sit on IRC for 14

hours strait and they get qualified as a hacker. Then they degrade people

for not being as smart as them and for having a certain ISP. The best

thing to do in this situation, is just ignore them and be glad your not as

ignorant as them. Judging people before you get to them is wrong no

matter what the case is. It's a cyber version of racism in my opinion and

that really sucks. If your one of these ignorant people, think for a

second. "I'm judging people because they look a certain way or they have

a certain ISP"
. How stupid is that?? Where will that get you. I've

never heard of a girl not going out with someone because the guy had a

certain ISP. I never heard of someone gettin turned down because they had

a certain ISP. Grow up already. You wanna talk about lamers. Sure their

are a ton of misinformed kids out there that ask stupid questions. Just

ignore them. But who's more lame, some kid asking a dumb question or some

kid being ignorant?




I got so many emails telling me how much they liked the post,

I figured I'd put it in this issue. The following is just one of those

emails.



From: MD

I LOVED THAT SPEECH MAN....... MADE ME CRY INSIDE
I AGREE WITH YOU 100%



















Rural Output Devices-Neptunium Overkill

INTRO:
This article is about, you guessed it: Output Devices in

the country. A fellow phreak and I camped out in the country and

checked out the output devices there. They have the tall greenish

ones, and of course are not locked........our phone company is

Ameritech: no, I don't live in NJ, so yours may differ but will

probably follow the same idea. Well, let's have some phun, shall we?


MATERIALS:
7/16 Hex Driver
Beige Box (See OCPP05 for more info)
Flashlight
<Editor’s note: locking pliers are a big help too>



PROCEDURE:
OK, unbolt it and remove the covers. There should

be 20 terminals total, 10 rows, two terminals in each row. There

should be a blue wire hooked up to the left terminal in the 6th row

and a blue and white wire connected to the right terminal in the 6th

row <editors note: cross connect wires vary in color>. Clip the red

clip to the same terminal that the blue and white wire is connected to.

Connect the green clip to the same one that the blue wire is hooked up to.

If you have a dial tone, good work. If you don't have a tone, then your

beige box is probably made wrong. Here's a quick diagram:

-----------------
| o o |
| o o |
| o o |
| o o |
Clip the | o o | Clip the
tip here------>o o<------ring here
| o o |
| o o |
| o o |
| o o |
-----------------

o = terminals


TIPS & TRICKS:
If you didn't get a dial tone there may be a few

problems besides the beige box, so try clipping onto the actual wires

and you might get a dial tone that way. Warning while

participating in this expedition you may get a few small shocks, but

don't worry because it's only 6v. Also make sure you are using the

6th terminal, we didn't have much luck with the other terminals.

<Editor’s note: Any terminals can be active. That he found only the
sixth pair to be good is likely coincidence.>


Well, good luck.




<editor's note: In New Jersey, these are found in neighborhoods that
don't have telephonepoles. Almost all of the neighborhoods that were
built at the same time or developments as they're called, have these.
These pedestal terminals (their proper name) take the place of most
medium sized wiring cabinets. All cabling is run underground.>
















NXX Scanning-Mohawk


Most of us are familiar with exchange scanning. We scan for

VMBs, terminals, test numbers, and so on. However, most of us are

not familiar with scanning for exchanges themselves or, NXX scanning.

I don't know if anyone else has ever wrote about this subject before,

and if it has another name, but that's what I'm gonna call it.

My theory is this: In some areas, there are certain

exchanges that are reserved for special needs. These NXX's are kept

secret by not being published in any phonebook and they do not

serve the general public. The main use for these is most likely

government related. Washington D.C. probably has the most of

the secret NXXs. From what I hear, when you call most government

buildings, you always get an operator. I can't see this happening.

I'm sure there are a lot of operator assisted numbers but not all.

There has to be a few direct. I have yet to prove any of these claims,

so I am leaving it at a theory.

Besides secret exchanges, you can also find a few test exchanges

and your local ANAC (3 digit number you call to hear what number

your calling from). I'm sure there is more out there that that but,

I have 5 mins of free time in each month so I have yet to look into

this deeper.

How do you go about doing this? Open up any wordprocessor

program and type the numbers 00-99. Do it neatly and in a row so you

can fit 2 of these tables on a page. Print out at least 8 of these

tables. There are no NXX's that begin with 0 or 1 so label the first

table 2, then the second table 3, and so on.

Now that you have your nice little tables printed out, open

up your trusty phonebook. Start with 2XX and go through the first

NPA. Cross out each NXX that appears in the phonebook. Before you

start you should cross out all the N11 service numbers, 211, 311,

etc. Also cross out, 500, 700, 800, 900, and 950. You should try

the service codes in your area because many places don't use them

for their intended purposes. For example, 211 is a popular test

exchange. Also, NXX's that are the same as the NPA's in that state

are not aren't used so that you don't get confused when calling

213-213-XXXX. After that, about half of your numbers will be crossed

out. Now move on to the next NPA and repeat the process. To really

cut down on time, use big NPA's and/or NPA's that are right next to

each other. Once you have about 10-15 NXX's write them down on a

seprate sheet of paper.

Repeat this process for all the NXX's. This sounds like

a real bitch but I did it in about 20 minutes. Now you have a list

of numbers. One of these should be your local ANAC (or the number

you call to hear what number your calling from) unless you live

an in area where ANAC's aren't reached as a plant test. These

places use NXX-XXXX numbers for ANAC. The rest of these

are either test exchanges, exchanges that are not being used,

and hopefully, secret exchanges.

This is where the scanning part of it comes in. Take your

list of numbers and dial them up. Try them with different NPA's

and different XXXX's. Don't worry about calling long distance.

If any of these numbers work, it'll be worth it.















Reality - American Anarchist


The hacking and phreaking community. The active ones that belong to

this community seem to have their own set of guidelines, rules, boundaries,

and expectations. We have our beliefs and thoughts on the actions of the

Feds (Federal Government) and Secret Service. We complete actions that many

citizens find disturbing. We have the information in our possession that

controls the outcome of tomorrow.

There is also the jail sentences that plague the nation. The anger

that arises in the minds of the public. The terror that continues forth

when a mishap has taken place. Welcome to reality.



The Beginning

When the newcomers arrive and enter the hacking and phreaking

community, they feel this warm "tingly" feeling inside of them. They are

like a seven-year-old on Christmas morning. They jump at firsthand that

they will learn a lot more than they are supposed to and that they will

later use this mass amount of information to impress their friends.

All neophytes have their way of receiving this information. Some may

go straight to the search engines [which are always a plus for the

beginner], or they ask around. They have so many questions that are

unanswered and they will continuously ask until their benefits and

answers are met. It seems that the information that is freely available

(in some places), is a fantastic treat to the neophyte. The savor the

"treat" and use it to their own benefit. Although, sometimes the beginner

may seem that they know enough, this is absolutely not so. You can never

learn enough.

As time progresses, the neophyte has already had a wealth of

information flowed into his brain. He has most likely subscribed to

countless mailing lists and newsgroups. It is a normal routine for the

neophyte. When they awaken from their sleep, they check their mailbox

(which most likely is congested with posts from his mailing lists and they

check the newsgroups for the latest "hacker information". It seems that the

newcomers do not yet understand what hacking and phreaking is all truly

about, and what the hackers and phreakers of this world go through each and

every day.

It is common to where the "elite" stare down at the newcomers and

ridicule them that they will never become as "cool" and "k-rad" as them. It

is all around us, and disgusts a lot of us, but we have learned to tolerate

a portion of it. The ones who consider themselves "elite" find it humorous

to make the newcomers afraid and angry. They chortle and try to create the

fact that the newcomers are useless and pathetic. But, weren't the "elite"

newcomers once to get where they are today?



The Conflict

As the Feds and Secret Service breathe down the necks of hackers and

phreakers twenty-four hours a day, we began to ponder why they are so

against us. The first point we consider is their incompetence. They do not

yet [and probably will never] understand why we are the way we are. As

every hacker and phreaker uses in their defense (which is actually true),

is that we just want the information the Internet and computers bring us.

When we hear about a particular, interesting bit of information about the

Internet or computers, we jump at the first moment to get as much detail

about it.

The Feds and Secret Service do not take that into consideration. They

do not seem to hear us when we try to make our point. They consider

everything we have to say in our defense "pointless". They do not

understand that the only way to find more information that is not freely

available is to "hack" into systems and experiment with the telephones,

phone lines, and telecommunications. Although, the Feds and Secret Service

still seem to see us as "terrorists" and "highly dangerous".

The public also sees eye-to-eye with the Feds and Secret Service.

The parents of the hacker and phreaker teenagers do not listen to the

complaints and defense that the sons and daughters try to tell to them.

The parents seem to think that the teenage hackers and phreakers are not

serious and that they are only "a kid". This enrages the teenagers. Many

perform specific acts to try and prove to their parents and the public that

they are just more than "a kid".

Even though the parents do not see it, the children of this world are

the most powerful [and most likely most intelligent] people on Earth. Many

teenagers are teaching their parents about the Internet and computers and

the parents and public still seem to think that they are just "a kid"!

But, there are parents and adults that respect how a child and

teenager lives and acts. They take their intelligence into consideration

and support them anyway they can. This can bring a smile to a concerned

hacker and phreaker.



The History

Hackers and phreakers have came a long way. From MIT, the development

of UNIX, to the Kevin Mitnick saga. We all come from different countries,

religions, and backgrounds. We think and act in different ways and share

information with strangers. The technology we have today started with

computers, and that was where the first "exploring" and hackers and

phreakers appeared.

"Hackers and phreakers run the planet", as some would say. "We

control how the Internet works. We control what happens in tomorrow's New

York Post. We control the lives of others."
This may be true in some areas,

but mostly they assume that since there are thousands of hackers and

phreakers out there, that we can take over the planet. This also may be

true, but it probably will not happen in the next few decades.

Many of us have been thrown in a jail cell for a number of months [or

years], and most of the accusations from the police and so called "crimes"

that we commit are based on harmless acts.

Let's take a look at Ed Cummings a.k.a. Bernie S. He was thrown in

jail for having possession of modified tone dialer that was [and can] be

legally purchased at a Radio Shack store and programming equipment. This

got some of the public and fellow hackers and phreakers enraged. While in

jail, he was brutally beaten by an inmate and was not put in maximum

protection. As the story continued, he had to go through much pain,

aggravation, that caused the ones who looked up to him to become even more

incredibly furious. Later, a giant amount of cheers and gratitude arose

when the notice of Bernies release spread. That relieved a lot of tension

and anger in the Internet dimensions.

As the Feds and Secret Service continue to prosecute harmless and

innocent hackers and phreakers for an unlimited number of reasons. This

yet again infuriates the hackers and phreakers who read and hear about it.

The government sees no disturbance in this. Since we are just "pathetic

little losers"
, we have no control of what events could follow because of

the government's foolish acts and prosecutions.

Hackers and phreakers have a long history and would take a

country-size library to record it all. We all have our own beliefs, ideas,

emotions, and thoughts. Maybe even one day, one of us could become

president.



The Codes

There are hundreds of codes in the hacker and phreaker community, and

most of them are made up by a few people that the hackers and phreakers in

the world live by, but the more official ones are listed here:

Respect. This is a code that must always be taken into consideration.
Hackers and phreakers come from many nationalities, religions, races,
and backgrounds, and we each have our way of acting. Whether or not
someone likes another or if one despises what another knows or has,
respect should be first. We cannot quarrel each day for hours on that
one person "doesn't use Linux so they are not k-rad", or that "he
doesn't know how to hack DSS, so he must be a dumbass"
. Respect
should always be in our mind and we should take the word into great
thought and consideration.

Trust. As some would say, "Don't trust everyone or everything you
hear."
This is mostly true. There will be ones who will worm their
way out of something and lie to you either to gain your respect or
your belief that what they say is true. But in some cases, trust can
bring problems. If you are arguing with yourself on something that is
yet to be decided if it is true or not, you will get aggravated and
angry and get yourself into a tough spot. If you ask someone of their
abilities and skills and do not trust them [even the are telling the
truth], then you will gain the assumption that you cannot trust
anyone. Trust is yet a very important factor in the hacking and
phreaking community and should be taken close look at and understood
thoroughly.

Fear. This is very common in the hacking and phreaking community.
Most of the fear arises in chat rooms. A group of combatants verse
each other into "hacker wars" and continue the "war" until there is
finally a winner. The "war" is usually between a group of cocky high-
schoolers. The many of them usually show of their "hacking ability"
by threatening the "opponent" and this is where trust usually comes
in. The combatants base their trust on if the other is telling the
truth about what he can do or what he will do to. Ones who have
fairly not enough knowledge onto whether the other can really do what
he is bragging that he can do, fear comes into the game. The neophyte
would develop this sense of fear inside him thinking, "Oh damn! I
don't want that to happen! I might lose my Internet account! Oh
man!..."
But the neophyte tries to avoid showing fear to make the
other more dangerous and making the neophyte more vulnerable.

Lamers. It seems that everyone of us belongs to a certain position.
It seems that the "elite" continue to look down on the neophyte and
think, "Oh god, another hacker wannabe wanting to be elite. Like that
will ever happen! What a lamer!"
It seems that if the neophyte does
not know a certain amount or know something specific about something,
then they would be considered a "hacker wannabe lamer". Many try to
talk the "elite" into ceasing the ridiculous ways, but it is
unavoidable. Everyone has their own beliefs and thoughts toward
others, and since there are an incredible number of them, it stands
to be unavoidable. The neophyte can take this rather serious and
the neophyte might happen to panic from their own anger, that they
might get reckless and start searching for ways to "destroy" the
person who called them a lamer. But then, shouldn't we all think
back? How did the "elite" get "elite" in the first place? Weren't we
all neophytes once before?



The Forthcoming

The hacking and phreaking community will never fall. The community

itself and the ones who belong to the long-time community will never

disappear. The hacking and phreaking spirit will remain in those who are

active in hacking and phreaking and the ones that have retired. We will

always remember the trial and error some have gone through and the

discoveries we have unearthed long ago. The old school ways will never die,

as well as the new paths and treasures. Hacking and phreaking has

circulated all over the world since it began. There are those who use it

toward their knowledge and desire and those who use it toward their own

mischievous ways. Either way, hacking and phreaking has it's own

attitudes, beliefs, ideas, reflections, and point of views. Hacking and

phreaking still have many hidden secrets that are left to find and we will

just have to explore and wait for the new face of hacking and phreaking.

















Anarchy With Paging Systems-Mohawk


Phreaks would love to grab hold of a paging system and

do whatever they please with it. Years ago you could say

"transfer me to extension XXX and then you'd be heard throughout

the store screaming weird crap and obscenities, Nowadays, people

have become smarter and paging systems have become more sophisticated.

This article will teach you create anarchy with a paging system using

a very simple method that requires no phreaking knowledge whatsoever.

This method uses social engineering (SE) and is a great way to hone your

SE skills. At first this might seem like it is rather lame but,

if you read it all the way through, you will be amazed at what you

can accomplished with very little effort.

First of all, find one of those big home improvement stores.

The best stores to get are the ones with phones in every isle and

that are very busy. Once you get that done, look in the phonebook

and get the number to the store. Now, call the place up. Ask to

be transferred to a certain department, it doesn't matter which one.

Then ask them to transfer you to another department. Then tell this

department that you Joe Cool from department X. Make up a story that

your a new employee and the phone is busted. Ask how the paging system

works (specifically, what to dial to page people). They'll give you

some kind of code to access the system. This can be anything from

a 1 digit code to a 5 digit code, maybe even more. Ask some more

questions about how the phones in general work, extensions, accessing

outside lines, etc. Write down everything. BS with the guy a little

just to look legit. These places employ so many people that it is

near impossible for anyone to know everyone. Ask him to transfer

you to the front desk, operator, or whoever controls the phone.

Sometimes the customer service desk controls the phones.

Tell this person the same story. Ask them how to work the phones,

access an outside line and from what phones you can access them.

Basically, have the same conversation but go into more detail. After

you got all the information you need, ask them to page someone for you

just to seem legit.

Now you have to go to the store. Don't bring your notes because

if you get caught, they will provide nice evidence to the cops. Try

to wear an outfit similar to that of an employee's uniform. That way

you won't stand out when your on a phone. Find a phone in an isle that's

not to visible and is not busy. Dial the extension to get on the paging

system.

Depending on how sick you are will depend on what you do. For

a simple joke, page weird people to certain places. Keep in current and

someone who everyone knows. If I was doing this today I would say

"
will Monica Lewinsky please come to the oval office". This will make

everyone in the place laugh and you probably won't get in trouble at

all. That can be rather lame and is hardly worth all the trouble. If

you wanna cause a mild riot and you're pretty daring, you can say

"
Attention all customers, for the next 10 minutes everything in the

paint department is free" or something to that effect. Can you

imagine the employee's reaction when they have a 100 or so people

demanding free stuff? Make sure you leave the place and don't come

back. Try not to look suspicious.

However, there are those people that are really, really twisted.

I advise none of you to actually do this. I could care less if you

kill someone but I don't feel like being in court so don't do it. Make

sure you have a getaway car handy for this one. Get on the paging

system and say "
Attention all customers there is a bomb in the building,

do not panic. We are experiencing problems with our fire alarm system

so we are asking you to slowly and calmly exit the building." This will

cause a huge panic and a stampede that looks like the running of the bulls.

You'll probably kill someone cuz old people have heart attacks in

situations like this. This is also a great way to rob the place or the

people there. If you get caught you'll be in a lot of trouble. Either

way you'll probably make the news and you'll be ruining hundreds if not

thousands of people's day at the same time. And that's what it's all

about isn't it? Ruing someone's day. Some of the more technical advanced

might have found this article kind of basic and lame, but think about all

the damage one person can do with such little effort. That's the main

point of this article.
















1-800 GUSWAG0-Mr. Seuss


MCI’s 1-800 GUSWAG0 is one of the most popular ANACs on the

circuit. However, most users fail to question the extra information read

back to them. This ANAC is the only one known to the OCPP that reads back

ANI II information.

The information read back is mostly used for internal auditing

and can be ignored. The ARU ID identifies the audio response unit, the

hardware that synthesizes speech. The line number identifies the hunt

group trunk the call was routing on. The purpose of the call interactive

number is unknown. The important information follows the prompt: "
the

ANI number is". The first two digits are the ANI II digits, which

identify the class of service of the calling party.


ANI II Digits

00
Plain Old Telephone Service (POTS) - non-coin service
requiring no special treatment
01
Multiparty line (more than 2) - ANI cannot be provided
on 4 or 8 party lines. The presence of this "
01" code
will cause an Operator Number Identification (ONI)
function to be performed at the distant location. The
ONI feature routes the call to a CAMA operator or to an
Operator Services System (OSS) for determination of
the calling number.
02
ANI Failure - the originating switching system
indicates (by the "
02" code), to the receiving office that
the calling station has not been identified. If the
receiving switching system routes the call to a CAMA
or Operator Services System, the calling number may
be verbally obtained and manually recorded. If manual
operator identification is not available, the receiving
switching system (e.g., an interLATA carrier without
operator capabilities) may reject the call.
06
Station Level Rating - The "
06" digit pair is used when
the customer has subscribed to a class of service in
order to be provided with real time billing information.
For example, hotel/motels, served by PBXs, receive
detailed billing information, including the calling
party’s room number. When the originating switching
system does not receive the detailed billing
information, e.g., room number, this "
06" code allows
the call to be routed to an operator or operator services
system to obtain complete billing information. The
rating and/or billing information is then provided to the
service subscriber. This code is used only when the
directory number (DN) is not accompanied by an
automatic room/account identification.
07
Special Operator Handling Required - calls generated
from stations that require further operator or Operator
Services System screening are accompanied by the
"
07" code. The code is used to route the call to an
operator or Operator Services System for further
screening and to determine if the station has a
denied-originating class of service or special
routing/billing procedures. If the call is unauthorized,
the calling party will be routed to a standard intercept
message.
20
Automatic Identified Outward Dialing (AIOD) - without
AIOD, the billing number for a PBX is the same as the
PBX Directory Number (DN). With the AIOD feature,
the originating line number within the PBX is provided
for charging purposes. If the AIOD number is available
when ANI is transmitted, code "
00" is sent. If not, the
PBX DN is sent with ANI code "
20". In either case,
the AIOD number is included in the AMA record.
23
Coin or Non-Coin - on calls using database access,
e.g., 800, ANI II 23 is used to indicate that the
coin/non-coin status of the originating line cannot be
positively distinguished for ANI purposes by the SSP.
The ANI II pair 23 is substituted for the II pairs which
would otherwise indicate that the non-coin status is
known, i.e., 00, or when there is ANI failure. ANI II
23 may be substituted for a valid 2-digit ANI pair on
0-800 calls. In all other cases, ANI II 23 should not be
substituted for a valid 2-digit ANI II pair which is
forwarded to an SSP from an EAEO. Some of the
situations in which the ANI II 23 may be sent:

* Calls from non-conforming end offices
(CAMA or LAMA types) with combined
coin/non-coin trunk groups.
* 0-800 Calls
* Type 1 Cellular Calls
* Calls from PBX
* Trunks
* Calls from Centrex Tie Lines

24
800 Service Call - when an 800 Service database
location converts an 800 number to a POTS number, it
replaces the received ANI code with this "
24" code
before returning the POTS number to locations
requesting ANI. If the received 800 number is not
converted to a POTS number, the database returns the
received ANI code along with the received 800
number. Thus, this "
24" code indicates that this is an
800 Service call since that fact can no longer be
recognized simply by examining the called address.
27
Code 27 identifies a line connected to a pay station
which uses network provided coin control signaling. II
27 is used to identify this type of pay station line
irrespective of whether the pay station is provided by a
LEC or a non-LEC. II 27 is transmitted from the
originating end office on all calls made from these
lines.
29
Prison/Inmate Service - the ANI II digit pair 29 is used
to designate lines within a confinement/detention
facility that are intended for inmate/detainee use and
require outward call screening and restriction (e.g., 0+
collect only service). A confinement/detention facility
may be defined as including, but not limited to,
Federal, State and/or Local prisons, juvenile facilities,
immigration and naturalization confinement/detention
facilities, etc., which are under the administration of
Federal, State, City, County, or other Governmental
agencies. Prison/Inmate Service lines will be identified
by the customer requesting such call screening and
restriction. In those cases where private paystations are
located in confinement/detention facilities, and the same
call restrictions applicable to Prison/Inmate Service
required, the ANI II digit for Prison/Inmate Service
will apply if the line is identified for Prison/Inmate
Service by the customer.
30-32
Intercept - where the capability is provide to route
intercept calls (either directly or after an announcement
recycle) to an access tandem with an associated Telco
Operator Services System, the following ANI codes
should be used:

30 Intercept (blank) - for calls to unassigned
directory number (DN)

31 Intercept (trouble) - for calls to directory
numbers (DN) that have been manually placed
in trouble-busy state by Telco personnel

32 Intercept (regular) - for calls to recently
changed or disconnected numbers
34
Telco Operator Handled Call - after the Telco Operator
Services System has handled a call for an IC, it may
change the standard ANI digits to "
34", before
outpulsing the sequence to the IC, when the Telco
performs all call handling functions, e.g., billing. The
code tells the IC that the BOC has performed billing on
the call and the IC only has to complete the call.
52
Outward Wide Area Telecommunications Service
(OUTWATS) - this service allows customers to make
calls to a certain zone(s) or band(s) on a direct dialed
basis for a flat monthly charge or for a charge based on
accumulated usage. OUTWATS lines can dial
station-to-station calls directly to points within the
selected band(s) or zone(s). The LEC performs a
screening function to determine the correct charging
and routing for OUTWATS calls based on the
customer’s class of service and the service area of the
call party. When these calls are routed to the
interexchange carrier via a combined WATS-POTS
trunk group, it is necessary to identify the WATS calls
with the ANI code "
52".
60
TRS - ANI II digit pair 60 indicates that the associated
call is a TRS call delivered to a transport carrier from a
TRS Provider and that the call originated from an
unrestricted line (i.e., a line for which there are no
billing restrictions). Accordingly, if no request for
alternate billing is made, the call will be billed to the
calling line.
61
Cellular/Wireless PCS (Type 1) - The "
61" digit pair is
to be forwarded to the interexchange carrier by the local
exchange carrier for traffic originating from a
cellular/wireless PCS carrier over type 1 trunks. (Note:
ANI information accompanying digit pair "
61"
identifies only the originating cellular/wireless PCS
system, not the mobile directory placing the call.
62
Cellular/Wireless PCS (Type 2) - The "
62" digit pair is
to be forwarded to the interexchange carrier by the
cellular/wireless PCS carrier when routing traffic over
type 2 trunks through the local exchange carrier access
tandem for delivery to the interexchange carrier. (Note:
ANI information accompanying digit pair "
62"
identifies the mobile directory number placing the call
but does not necessarily identify the true call point of
origin.)
63
Cellular/Wireless PCS (Roaming) - The "
63" digit pair
is to be forwarded to the interexchange carrier by the
cellular/wireless PCS subscriber "
roaming" in another
cellular/wireless PCS network, over type 2 trunks
through the local exchange carrier access tandem for
delivery to the interexchange carrier. (Note: Use of
"
63" signifies that the "called number" is used only for
network routing and

  
should not be disclosed to the
cellular/wireless PCS subscriber. Also, ANI
information accompanying digit pair "63" identifies the
mobile directory number forwarding the call but does
not necessarily identify the true forwarded-call point of
origin.)
66
TRS - ANI II digit pair 66 indicates that the associated
call is a TRS call delivered to a transport carrier from a
TRS Provider, and that the call originates from a
hotel/motel. The transport carrier can use this
indication, along with other information (e.g., whether
the call was dialed 1+ or 0+) to determine the
appropriate billing arrangement (i.e., bill to room or
alternate bill).
67
TRS - ANI II digit pair 67 indicates that the associated
call is a TRS call delivered to a transport carrier from a
TRS Provider and that the call originated from a
restricted line. Accordingly, sent paid calls should not
be allowed and additional screening, if available,
should be performed to determine the specific
restrictions and type of alternate billing permitted.
70
Code 70 identifies a line connected to a pay station
(including both coin and coinless stations) which does
not use network provided coin control signaling. II 70
is used to identify this type pay station line
irrespective of whether the pay station is provided by
a LEC or a non-LEC. II 70 is transmitted from the originating end office on all calls made from these lines.
93
Access for private virtual network types of service: the
ANI code "93" indicates, to the IC, that the originating
call is a private virtual network type of service call.
















Payphone Profiles Part 2-Mohawk


Intellicall

Astratel 2


This phone is your normal Bell style payphone. Nothing to fancy

about the design. They seem to be rather behind in the payphone business.

Some of the stuff they offer is pretty old. The software that comes with

it gives you an example of how behind these people are. They have

pictures of their software on floppy disks. I haven't seen a floppy

disk since high school. The computer in the picture is old as dirt

and the software looks like the automated card catalog that libraries

use. The only interesting thing this phone has is the way it protects

the owner from international coin call fraud. When you place an

international coin call the phone dials into the Intellicall network.

The call is then monitored to make sure that coins continue to be

collected. If the line gets screwed with, the phone disconnects

the call.




Specs-

Operating temperature -30 to 60 degrees C

Operating Humidity 10-90% relative

Line Powered

Weight 45 pounds

Processor 32-bit, low voltage


Memory-
RAM 1MB, upgrade to 2MB

ROM 2MB, upgrade to 4MB








Features-



Spanish and English voice prompts built in.

The owner can program the phone to use either language or both. I want
to own a phone where their is no Spanish speaking people but have the
phone programmed for Spanish only. I have a sick sense of humor.


Electronic Coin Handling System (ECHS).

The ECHS consists of an anti-stuffing device coupled with the
MARS MS16 electronic coin validator. This eliminates coin jams and
coin chute stuffing. This is done by capturing foreign objects
inserted in the coin slot. What happens is: If it doesn't fit
through the coin validator, it goes into this little trash can
like section for the technician to remove. This is what got me
into phreaking over 10 years ago when my dad showed me how to
stuff a payphone. I never thought I'd be writing an article on
how it is being prevented.


211 automated customer refund service

This provides immediate customer service. Callers dial customer service
and the operators give them another call. They have a complete call
detail record to review the last transaction. This is suppose to save
money by eliminating the process of mailing out 25 cent checks. I can see
6 dollar checks but who goes to the bank with a 25 cent check? Now that I
think about it, can you imagine the look on the tellers face when she
realizes you waited on line for 10 minutes for a quarter? You get to
phreak people out and get paid for it. Now it would be 35 cents but
it's the same idea. For an added kick, ask to have that it in one dime,
5 pennies, and 4 nickels.


Coin collection alarms and cash box totals

This monitors for unauthorized entry and generates automatic call outs
during cash box collections to identify time of coin collection and coin
total to make sure no ones rippin you off. Alarm call outs are
generated that identify immediate service requirements such as full
coin box, missing handset, low activity, coin jam, and system/software
problems. I wonder if that payphone had an alarm when I took a bunch
of M-80's and, uh, nevermind.

Service callout

Allows the service technician in the field to request a download of
rates and program the phone without the assistance of office personnel.



Options-


Coin handling

Can be fitted with mechanical or electronic coin mechanisms.


Intelli*star

This is Intellicall's patented store and forward technology. It
performs all functions associated with placing a 0+ phone call.
0+ calls are changed to a 1+ call inside the phone.
This also lets you control your 0+ traffic so that you don't
have to rely on outside service providers.


Card reader options

Phones can be ordered from the factory with card readers.








Nortel
Millennium payphones


Millennium payphones are the top of the line phones. You usally
see these phones in hotels and airports. These phones have everything.
You can even have advertisements on the scrolling display screen. As
you would expect, they also have some of the most advanced fraud
protection features.





Millennium Desk Terminals

The Desk phone series are found in hotels and large businesses.

They don't use coins so it's a lot cheaper to run. It's also harder to

phreak cuz it validates the card instead of you typing in pin numbers.

The coolest thing about it is that it has a data jack so you can

hook up laptop.



Specs

Weight - 3.3 pounds

Operating temperature - 0 to 50 degrees Celsius
Non operating temperature - -40 to 70 degrees Celsius

Line Requirements - Standard analog loop with answer supervision
using battery reversal



Features


RJ-11 data jack

This let's the you connect a computer so you can access email and
other services.


Self Diagnostics

This allows the phone to monitor it's operation. But unlike other
phones that just tells you what's going, this phone actually does
something about it. The phone calls the nearest service center
when it needs attention. That's pretty damn cool. "Yeah Joe, your
phone called me today. Said somethin about some Phone Punx
reprogramming the display screen".


Quick Access Keys

These are one touch keys that allow you to access security, local
businesses, and other services. These keys can be programmed
to dial a free or a paid call.


Vacuum Fluorescent Display

This is what I talked about before. The screen gives you instructions
on how to use the phone. It can also be programmed to display ads.


Language Select Key

This key allows callers to choose the primary or alternate
language. The primary language is always English. The primary
language can be either Spanish, French, or Japanese. This
changes audio and visual instructions.


Voice Prompts

Voice Prompts gives you dialing instructions. The prompts are recorded
and not synthesized.


Next Call Key

This key makes it easy to place a multiple calls with the same card.
I guess it's a bitch to keep putting the card back in and setting it
back up. You can also use this if you screw up when dialing.





Specific Models of Desk terminals


M1351
Desk Terminal with Magnetic Stripe Card Reader

This phone has a Magnetic Stripe Card Reader so the caller

can pay for the call with a credit card or a calling card.


M1361
Desk Terminal with Multi Card Reader

This phone has a Multi Card Reader so that the caller can use

a credit card, calling card, smart card, or cash card. The smart

card and cash card are known as integrated circuit or chip card.

These cards are pre-paid cards and the phone subtracts the amount

of credit you used and stores the value on the card.







Millennium Multi-Pay Terminals

Multi-Pay Terminal is just a fancy name for a payphone that accepts

a variety of payment methods. This phone looks like your normal

bell style phone except it has a card reader, display screen, and

all the other buttons that I will talk about. Unlike the Desk

Terminals, these phones except coins.



Specs

Weight - 42 pounds

Operating temperature - -40 to 60 degrees Celsius
Non-Operating temperature - -50 to 70 degrees Celsius

Line requirements - Standard analog loop with answer supervision
using battery reversal.



Features

Multi-Pay Terminals have many of the same features that the
Desk Terminals have. Therefore, I will not add a description
of the similar features because I will just be repeating myself.


Language Select Key

Voice Prompts

Self Diagnostic System

Vacuum Fluorescent Display

Next Call Key

Quick Access Keys

Multi-Card Reader

Recessed Coin Slot

The Recessed Coin Slot can except all US coins including $1 coins.

Electronic Coin Validator

The Electronic Coin Validator is equipped with a sensor to prevent
the use of slugs of foreign coins




Specific Models of Multi-Pay Terminals (MPT)


M1231
MPT with multi card reader

This phone accepts coins, smart chip, and magnetic stripe cards.

It can also accommodate future card technologies.


M1221
MPT with smart card reader

This phone can accept coins and smart chip cards.


M1211
MPT with magnetic stripe card reader

This phone can accept coins, calling cards, and credit card.















Fighting Back-Mohawk




Security and Fraud Newsletter
Frequency: 12 issues per year
Subscription Price: £645/US$1097

This is proof that phreaking is a money making business. Not

for us, but for the people trying to stop us. Basically this guy gets

paid $1100 a year person for taking articles in different zines and

putting them in his own words. Damn, if he gets only 50 people to buy

the newsletter that's about $55,000 a year. Hell, I'm gonna quit my job

and sell articles. Seriously though, I would never do that. This

is almost like a scam in my opinion. The following is a summary

of what the newsletter is about.




Each month the S&F Newsletter uncovers all the latest issues,

identifies problem areas and highlights the methods, products and current

industry solutions to this prevalent problem, or so they say. They

show you how to combat fraud and to speed up the time that you

detect it.



Each issue covers:

Fraud Detection and Prevention
Phone Cloning & Subscriber Fraud
Card Forgery & Phone Breaking
Standards & Imminent Legislation
Privacy & Data Protection
Customer Care & Billing Issues


They also give you:

Analysis - Find out how just how big the fraud problem really is
Reports - Instances of Fraud, including prosecutions undertaken
Competitor Information - Know what your competitors are doing to beat
fraud and find out how effective their strategies are proving.
Product Reviews - keeping you informed about the latest and best telecoms
security products



They claim that S&F newsletter will allow you to:

- Stay up to date on the most effective ways of combating each type
of fraud
- Avoid being out-flanked by the fraudsters or overtaken by your
competitors
-Find out what anti-fraud software is currently available
and in use by telcos world-wide
-Discover what fraud detection packages will reap the best rewards for
your business
-Keep informed on the grey areas currently being exploited by fraudsters
-Spot the potential gaps in your procedures and systems before someone
else does







Corsair completes PhonePrint expansion for AT&T Wireless Services

Fraud prevention system fights roaming fraud in Southern California and
Las Vegas

Corsair Communications, Inc. announced today the expansion of its

PhonePrint* cellular fraud prevention system into three AT&T Wireless

Services markets.

The system protects subscribers in Santa Barbara, Oxnard-Ventura,

and Las Vegas. In 1995, AT&T Wireless was among the first wireless

providers to adopt the Corsair system. AT&T Wireless began the recent

expansion project to reduce exposure to roaming fraud in markets in

Southern California and Las Vegas, Nevada.

"While our sister company in Los Angeles has used PhonePrint to make

serious progress in their fraud fighting efforts over the past two

years, we had seen roaming fraud gradually increase in our adjacent

markets," said Erin Cord, AT&T Wireless' director of business security

for the Western Region.

"The cloners were being shut down in Los Angeles, and they were

moving out to our markets to harvest numbers for use in L.A., as well as

other major metropolitan areas. We implemented PhonePrint primarily to

stop this infiltration of roaming cloners."

According to David Thompson, Corsair's vice president for marketing,

the situation in California and Las Vegas is part of a trend, in which

fraud is moving to smaller cities and suburban areas. "Even markets with

no home fraud problem now have to watch their exposure to roaming fraud

closely," said Thompson.

"There's no predicting where the cloners will turn next, nor when

they'll do it. They can target a market and wreak financial havoc with

amazing speed. Carriers understand the seriousness of this exposure, and

they're protecting themselves now."











Busted-Mohawk



Swedish police nab cannabis promoting hackers

Two young Swedish hackers who turned a Swedish county's home page

into an advertisement for pornography and cannabis and broke into the U.S.

space agency's computer system have been tracked down, local media reported.

After a year-long hunt, police in Umea in northern Sweden finally

traced the two youths, aged 18 and 15, and seized their computers, the

newspaper Vasterbottens Folkblad said on Wednesday. Police were quoted

as saying no charges would be laid because no economic crime had been

committed.

They said the older of the two youths was known to the authorities

after his involvement in a case of illegal data entries and computer fraud

two years ago for which an older youth was sent to jail.













Letters-Mohawk



From: DSto3133

I have read with great pleasure your posts and newsletter. However, I

tried to get the CNA division of Bell Atlantic for the 609 area code and

the # that you had on the list doesn't work anymore. I think it was

201 xxx 7676 ( I don't have it right next to me at this moment) Could

you please give me the new # I really need to do a look up on a non-pub

# and the operators in this area have no clue what a FACS or MLACS or

DPACS is. I could use some help here. Thanks for any you can provide.



<What the hell list is this? I didn't post any CNA number on any
list. I don't know the NJ CNA number and I don't know you, so why would
I just give it to you? I can't stop wondering what goes through
some people's mind when they write letters like this.>





From: Ralph

How do I find the number to dial that will ring back the phone I'm

calling from? I'm in area code 410.

<Read the article "NXX Scanning".>





From: Rising Sun

First, I don't know if you use AOL as server space or as your primary

ISP but I have never run into any one from AOL that has actually known

what they are talking about. I would say I'll trust AOLers a little

more, but your what 1 out of 50,000,000 or something like that, but

anyways its a great zine. In issue one, about turning your car into

a phreaking unit, a good power converter for the car can be found at

the shack. I think they discontinued them this year, but they run about

50 dollars and have 4 sockets instead of 2. Also, i wouldn't recommend

trying to run a pc off of a car battery for more then about 30 min,

we had one running for about an hour and a half and out battery

was DRAINED!!! We couldn't even turn the engine over (the look at the

tow guys face when he saw the monitor in the back seat hooked up to a

tower was worth the 30 dollar bill. Issue one is the only one I've read

so far, any ways, me and a few buddies are starting a um, what the hell

would you call this, kinda like a club I guess. We're calling it CIT, we

want to get local chapters together and publish a zine, which is still

in progress. I don't know where you are geographically, but we're in

IL. If you would be interested in starting a local chapter kinda

thingy would be kinda cool. We hold our meetings on the second or

third saturday of every month (we have had two on the 2nd and two

on the 3rd saturday, so its still kinda undecided), it keeps the 2600

meetings and these pretty balanced. Our meetings have consisted of a

few different things. The first meeting we went around and jumped into

Amertich dumpsters and played with a junction box. The second we sat in

a cafe and talked. The people that are attending are generally more

phreaking related and not so much into hacking. I am just starting to

make a web page for the group. We would like to have articles and

what not written by us, and not stolen from other people. If you

would like to maybe publish your articles in a CIT monthly\weekly\yearly\

what the fuck lets go for quarterly news letter zine kinda

thing it would be cool. I dont mean this to come off like I'm trying

to absorb the whole zine or anything. Anyways its late, I kinda got

to get going. Tell me what you think about all this.




<Well. I have lost count, but this has got to be 45,608 time that
we have been asked to join something. I think we have had more offers
that we do actual readers. Don't get me wrong, we're flattered that you
invited us to join your um, uh, thing. However, we have specific goals
that we are trying to accomplish and since I am a control freak, I just
can't end the zine and write for another one. The OCPP will remain the
OCPP until I decide we have accomplished everything that we set out to
do. When this will happen, I have no idea. I doubt it will be anytime
soon though. I am considering writing something for another zine. It
will most likely be a rewrite of an article that was already in an
issue of OCPP. I'm not going to say anything else about this cuz I don't
know if it's gonna happen. If it does I'll be sure to let you guys know.
If I ever do end the OCPP I might consider writing for another zine.
Keywords-might and consider. However, don't let this discourage
anyone. If I get the right offer I just might accept it. Right now,
all I'm usin AOL for is email, OCPP wise anyway. I use it a lot for
my band though on other accounts. A lot of people that own clubs and
crap like that in the NY area are on AOL and it is a big help that
I am on it too. Since there is only 11 or so million AOL members
that would make me 1 out of only 11 million. I am not the only
"non-lamer" on AOL. There is a load of phreaks on AOL that know
a lot more than me. If you've ever stopped by alt.phreaking you'd see
that half of the posts are made by AOLers. I know a lot of phreaks
on AOL that are sorta in denial. They use their Hotmail accounts to
send/receive mail and to post to newsgroups. With all the ignorant people
out there I can't blame them, but I think you shouldn't hide that fact
that your on AOL. I understand you have your reasons.>



From: Sheepdog
Holy Shit! How the hell did a phreaker group come out of a shity place

like Ocean County?! It's great that you managed this but to my knowledge

I wouldn't think possible. Anyway add me to the list.



<That's my life story, proving everyone wrong. What amazes me even more
is that someone actually knows about Ocean County.>




From: Mr. N

I really like your zine. I want to help you guys but I'm not much

of a writer. Is there anything else I can do. I'm just a begining

phreak so that's why. I know a lot about hacking so I could write

about that if you want. If I do write something, are their any

benefit's that I would get?



<Thanks for the compliment. Well there are many ways you can help out
us or any other zine for that matter. Say if your talking about
phreaking with someone, you could say "ever check out the OCPP, THTJ,
etc." If you have a H/P/A website add a link to us and your other
favorite zines/sites. Write us a letter (which you did) letting
us know what you like and dislike. Let us know what you would
like to see done/covered in future issues. The list goes on and on.
The more people that read the zine, the better it gets. As far as
benefits go, we already publish the zine for free. There are
benefits though. I don't even mention them to anyone most of the
time and I'm not going to here. The more articles you write, the
more benefits you get. I take care of my staff, they know that.>




From: Crash Override

Hackers Unite!
Hack the Planet!
Take down the Gibson!


<This letter was sent to Mr. Seuss. Hmm, do you think he might have
been influenced by the movie "Hackers". I know it sounds really
farfetched and you probably think I'm on crack, but I think he's
seen it once or twice. But then again, what do I know, I'm just the
King of Nynex.>

















News



Headlines

Bell Atlantic introduces Name and Number Deliver Service

Intersphere launches website for MGM's upcoming Interactive game, WarGames

Bells go 0-4 in long distance requests with FCC

Bill Gates gets egg on face in Brussels

Corsair completes PhonePrint expansion for AT&T Wireless Services

FBI probing "hacking" of U.S. defense computers









Bell Atlantic Introduces Name And Number Delivery Service


Bell Atlantic-New York has taken the frustration out of
phone calls that are never answered.

Callers can now leave their name and telephone number for the person
they are calling when their call goes unanswered. This new Bell Atlantic
service, known as Name and Number Delivery Service, is available to many
customers on the east side of Manhattan; Long Island City and Astoria in
Queens; the Kingsbridge section of the Bronx; and in the Bay Ridge and
Canarsie sections of Brooklyn.

Those who use the service will be able to leave their name and
telephone number for most Bell Atlantic customers in the New York
metropolitan area -- Long Island, the five boroughs of New York City, and
Westchester, Rockland and Putnam counties.

Here's how the service works:

When a call is unanswered, callers hear a series of simple voice
prompts, or commands, that will enable them to leave their name and
telephone number for the person they are calling. Bell Atlantic's
network will record the information and then call the number every
half-hour for the next eight hours. No attempts to deliver the message
will be made between 10 p.m. to 7 a.m. weekdays or 10 p.m. to 9 a.m.
weekends.

When the call is finally answered, a recording will announce that
someone was trying to reach them, and that Bell Atlantic is attempting
to deliver that person's name and telephone number. The information is
played twice.

The charge for the service is 75 cents for the caller. There is no
charge for the person receiving the message. The service can be used by
callers with either Touch Tone or rotary service.

"Despite the widespread use of voice mail and answering machines,
many calls still go unanswered," said Rich McCusker, Bell Atlantic
director of Messaging Services "This innovative service takes the hassles
out of trying to reach someone. It's easy to use, providing our customers
with greater control and convenience."


Where available, Name and Number Delivery Service is automatically
on customers' lines. They do not need to call Bell Atlantic to order the
service. If customers want more information about the service, or if
they want the service removed from their line, they should call
1-800-742-2220.





Intersphere launches website for MGM's upcoming Interactive game, WarGames

Intersphere Communications Ltd. Monday announced the launch of the
newest website for client Metro Goldwyn Mayer, designed to promote the MGM
Interactive game WarGames.

The site is created for the upcoming release, which is based on
the very successful movie of the same name. It can be found at
http://www.wargamesmgm.com/. This is the second site designed by
Intersphere for MGM. In October of this year Intersphere launched
the site for the interactive game Return Fire II
(http://www.returnfire2.com/).


Created by Interactive Studios, UK and distributed by MGM
Interactive, the strategy game builds on the hacker theme of the
movie. Players will experience up to 30 campaign-based missions
scripted by the original producer and director of the motion picture.
High resolution SVGA display and a 3D engine will allow for full
rotation of the playfield.

The playfield itself will feature six environments with real-time
weather, realistic sound effects and an intense soundtrack. The game
will allow for both single and multi-player gameplay.

The site features game information, sound files from the movie
and the opportunity to logon and register to receive e-mail as the
site is developed. Compelling graphic, copy and audio content
provide users with an exciting preview of the upcoming game. There
are also links to the Return Fire II, Machine Hunter and MGM sites,
as well as Mplayer.

Intersphere Communications Ltd. is a full-service advertising
agency that emphasizes the use of the internet as a creative
communication medium. Company information can be found at their WWW
site at http://www.intersphere.com/.

Intersphere Communications Ltd. is a wholly owned subsidiary of
Interactive Gaming and Communications Corp., a publicly traded
company on the OTC Bulletin Board under the ticker symbol SBET.

MGM Interactive, a unit of Metro-Goldwyn-Mayer Inc., manages
creative development and production of interactive products for a
variety of multi-media platforms, as well as talent and developer
relationships.

In 1996, MGM Interactive released the critically acclaimed The
Ultimate James Bond: An Interactive Dossier and Chitty Chitty Bang
Bang's Adventure in Tinker Town. In 1997, the company released the
widely popular game Machine Hunter.

Metro-Goldwyn-Mayer Inc. is actively engaged in the worldwide
production and distribution of entertainment products, including
motion pictures, television programming, home video, interactive
software, music, licensed merchandise, a 1,600-title library, a
4,500-title home video library and a significant television library.

The company's operating units include MGM Pictures, United
Artists Pictures, MGM Worldwide Television, MGM Telecommunications
Group, MGM Distribution Co., MGM Home Entertainment and Consumer
Products Group, MGM Music, and MGM Interactive, among others.

URLs:
War Games Intersphere Communications Ltd.
http://www.wargamesmgm.com/ http://www.intersphere.com/.

MGM
http://www.MGM.com.





Bells go 0-4 in long distance requests with FCC

The government rejected a Bell telephone company's plan to offer
one-stop shopping for local and long distance services in Louisisana.
The 5-0 Federal Communications Commission vote marked the fourth
time the agency has turned down a regional Bell telephone comapany's
request to provdide long distance service to its local customers.
No requests have been approved. As in the earlier cases, the FCC
concluded that Bell South Corp. has not sufficiently opened its
local phone market to rivals, a condition for entering the
long distance business.






Bill Gates gets egg on face in Brussels

Microsoft Corp. Chairman Bill Gates got a face full of custard pie
during his visit to Brussels on Wednesday, organizers of the visit said.
The attack took place as Gates, fresh from a visit with world and business
leaders in the Swiss ski resort of Davos, was about to attend a reception
given by the Belgian Flemish community.

Organizers said five people, equipped with stocks of pies, appeared
to be involved in what was believed to have been a prank with commercial
intent. Shortly after the incident, a caller offered to sell Reuters
Television some film of the attack, from which Gates emerged spattered but
seemingly unscathed.
A Microsoft spokeswoman said Gates was "surprised and disappointed"
but unhurt by the attack. "From our perspective it's very unfortunate that
anybody should have to go through this," said Erin Brewer from the
company's Redmond, Wash. headquarters. She said Gates took some time to
clean up and then went ahead with his planned speech on technology and
education.

Brewer said she did not believe Gates or Microsoft would press
charges. She said the company understood the incident was the
work of Noel Godin, a Belgian who has made a name for himself and a
lucrative business out of hurling custard pies in the faces of the rich
and famous.

Asked whether Microsoft was concerned about Gates' security, Brewer
said, "We look at this is an isolated incident. He does have
appropriate security at all times."






Corsair completes PhonePrint expansion for AT&T Wireless Services

Fraud prevention system fights roaming fraud in Southern California and
Las Vegas

Corsair Communications, Inc. announced today the expansion of its
PhonePrint* cellular fraud prevention system into three AT&T Wireless
Services markets.

The system protects subscribers in Santa Barbara, Oxnard-Ventura,
and Las Vegas. In 1995, AT&T Wireless was among the first wireless
providers to adopt the Corsair system. AT&T Wireless began the recent
expansion project to reduce exposure to roaming fraud in markets in
Southern California and Las Vegas, Nevada.

"While our sister company in Los Angeles has used PhonePrint to make
serious progress in their fraud fighting efforts over the past two
years, we had seen roaming fraud gradually increase in our adjacent
markets," said Erin Cord, AT&T Wireless' director of business security
for the Western Region.

"The cloners were being shut down in Los Angeles, and they were
moving out to our markets to harvest numbers for use in L.A., as well as
other major metropolitan areas. We implemented PhonePrint primarily to
stop this infiltration of roaming cloners."

According to David Thompson, Corsair's vice president for marketing,
the situation in California and Las Vegas is part of a trend, in which
fraud is moving to smaller cities and suburban areas. "Even markets with
no home fraud problem now have to watch their exposure to roaming fraud
closely," said Thompson.

"There's no predicting where the cloners will turn next, nor when
they'll do it. They can target a market and wreak financial havoc with
amazing speed. Carriers understand the seriousness of this exposure, and
they're protecting themselves now."






FBI probing "hacking" of U.S. defense computers


The Pentagon and FBI are investigating intense, successful
efforts by computer ``hackers'' this month to obtain information from
U.S. military computers, a top defense official said Wednesday.
Deputy Defense Secretary John Hamre told reporters there was no
indication that the electronic break-ins over the last two weeks were
connected to a crisis over U.N. arms inspections in Iraq. He stressed
that ultra-sensitive classified systems had not been breached.
Hamre said it was apparently the most intense such effort to
date and although it might have been just a game, it was a "wake-up call"
on the vulnerability of government and corporate computers. "During the
last two weeks the (Defense) Department has experienced a fairly
heavy-duty cyber attack," Hamre told reporters. "In this case, we have
been working very closely with the attorney general and the FBI."
"We did not have any penetration of our classified networks,"
he said. "The unclassified networks, however, were penetrated."
Hamre said the incidents had intensified attempts by the
department to more quickly spot break-in attempts and catch those
responsible. "It has dramatically accelerated the Pentagon's and federal
government's plans to get on top of this problem,'' he said, stressing
that sensitive data on personnel, payrolls and other information was often
not adequately guarded by electronic "firewalls" in both corporations and
the military.
Hamre said it was not yet known where the attempts originated.
But he suggested they might be by amateurs in response to "contests"
among hackers. "There are hackers that enjoy just breaking into people's
computers to see what they can see. And, of course, there is always a
mystique about the Department of Defense," he told reporters.
"There are actually hacker clubs and there are hacker contests.
And, in that sense, the Department of Defense is vulnerable." But James
Glave, a senior technology writer for "Wired News" - an Internet news
service on the impact of computers on daily life - said he had seen no
indication that there had been a recent hacking effort aimed at the
Pentagon. "I've scanned the Internet news groups where hackers meet
and often boast about their accomplishments, and I haven't seen any
bragging," Glave told Reuters.
Hamre declined to discuss details of the latest efforts or to
reveal what information had been obtained. But he said the incidents
appeared to be similar to previous attempts by hackers to show that they
could get into protected systems. "This has all the appearances of just
being a game, somebody trying to get in so they can say they got it,"
Hamre said, adding such attempts were no joke to the government.
He said the recent incidents included attempts to set up
electronic "trap doors" in software systems through which information
could be siphoned. Sophisticated amateur computer hackers have been
previously convicted, fined and jailed for breaking into sensitive
military and other government information databases.
The director of the super-secret U.S. National Security Agency
said in October 1997 that the number of break-ins of Defense Department
systems was increasing dramatically. "I think it was, in many ways, a
wake-up call," Hamre said Wednesday of the recent incidents.











The OCPP is a free publication. Copyright 1997, 1998. All
information in this issue is property of the Ocean County Phone Punx.
Nothing may be copied or reproduced. Our staff and our ISPs are not
responsible for your actions. What you do with this information is
up to you.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT