Copy Link
Add to Bookmark
Report

Bootlegger 07

eZine's profile picture
Published in 
Bootlegger
 · 28 Dec 2019

  







SUBSCRIBE TO THE FAMOUS HARDCOPY
NEWSLETTER 2600.
2600 IS PUBLISHED MONTHLY.IT IS
CURRENTLY 8 PAGES IN LENGTH.EACH ISSUE
CONTAINS TIMELY NEWS AND INFORMATION
ABOUT THE EXCITING WORLD OF TELEPHONES
AND COMPUTERS.MOST OF THIS INFORMATION
IS VERY DIFFICULT TO FIND ANYWHERE ELSE.
2600 IS A DEFINATE MUST FOR THOSE
PHREAKS AND HACKERS WHO HAVE LIMITED
ACCESS TO ELECTRONIC BULLETIN BOARDS
AROUND THE COUNTRY.IT IS A GOOD WAT TO
STAY IN CONTACT WITH THE PHREAKING AND
HACKING SCENE AND ALSO TO COLLECT INFO
THAT WOULD BE USEFUL IN THE PERSUIT OF
YOUR FAVORATE HIGH TECHNOLOGY HOBBIES.
2600 IS ALSO AN IMPORTANT ASSET TO
THOSE INVOLVED WITH THE OTHER SIDE OF
COMPUTERS AND PHONE SECURITY-THE
SYSTEM ADMINISTRATORS OR EXPERTS.ALL
OF OUR ARTICLES ARE WRITTEN FROM THEIR
PERSPECTIVE OF COMPUTER HACKERS AND
PHONE PHREAKS,THE TRUE TECHNOLOGY
LOVERS.

YOU WONT SEE THIS SIDE REPRESENTED IN
MANY OTHER PLACES EITHER.WE INVITE OUR
READERS TO CONTRIBUTE BY SENDING
ARTICLES,LETTERS,NEWS,AND DATA THAT MAY
BE USEFULL TO OTHERS.
WE HOPE THAT YOU TAKE ADVANTAGE OF
THIS CHANCE TO SEE TECHNOLOGY IN A
DIFFERENT AND THRILLING WAY.

A SAMPLE ISSUE OF 2600 IS ONLY $1.
RATES ARE $12 ANNUALLY FOR INDIVIDUAL
SUBSCRIPTIONS,$30 ANNUALLY FOR BUSSINESS OR INSTITUTIONS,AND $20 OVERSEAS.
ALL BACK ISSUES ARE AVAILABLE FOR $2
EACH.EVERY MONTH IS AVALIABLE FROM JAN
84 (OUR FIRST ISSUE TO PRESENT).WRITE TO
2600
BX 752-B
MIDDLE ISLAND N.Y.11953-0752

516-751-2600

PLEASE INDICATE IF YOU DO WANT TO WRITE
FOR 2600,AND ASK FOR OUR AD RATES.

KEY MILESTONES OF TELEPHONE INDUSTRY EVOLUTION


1790 Optical telegraph system established in France

1819 Electricity/magnetism relation discovered
Magnetic needle telegraph operated

1845 Telegraph link Washington DC/Baltimore

1858 Submarine telegraph---Ireleand/Newfoundland

1876 U.S. Pat. No. 174456 to A.G. Bell for telephone

1877 First bBell telco formed

1878 3,000 phones in service
First telephone directory published--New Haven, CT.
First switchboard---New Haven, CT.

1880 Emma N. Nut--1st AT&T woman employee

1882 First underground cable

1885 Bell wins Elisha Gray patent suit
AT&T formed

1889 U.S. Pat. No. 447918 to Almon B. Strowger for automatic
telephone switchboard
First public paystation--Hartford, CT.

1892 First automatic switchboard--La Porte, IN

1895 Telephone traffic study published

1896 First telephone dial--Milwaukee, WS

1900 855,900 phones in service

1905 First unattended automatic telephone office
2,241,000 phones in service

1907 First Public Utility Commission authority for telephone
Wisconsin

1913 Kingsbury Commitment--Bell agrees to connect with
Independents and no more acquisitions
One piece telephone handsets (Independents only)

1915 First transcontinental call NYC (Bell) to San Francisco
(Watson)

1918 First carrier system--several voice channels over one
pair wires
Bell purchases 1st automatic switchboard--Norfolk, VA

1920 First automatic toll board

1924 15 million phones in service


1925 Bell Labs formed

1926 First radio telegraph
Colored telephones (Independents)

1930 Data transmitted 600 bits per second on phone lines

1934 U.S. Federal Communications Act--FCC established
Bell offers one piece handset

1940 Coaxial cable (increases voice channels)

1947 Transistor demonstrated by Bell Labs

1948 First national automatic toll billing system
First No. 5 crossbar--Media, PA

1949 U.S. Federal REA amended to include rural telephone
systems financing

1953 50 million phones in service

1955 Bell offers colored phones

1956 WE consent decree settlkes Justice antitrust suit--Bell
limited to furnishing common carrier communications
U.S. Appeals Court rules subscribers may purchase and
connect Hush-A-Phone to telco lines
First transatlantic telephone cable
First radio microwave telephone service

1958 Data Phone service introduces(Hi-speed over telephone
lines)
Data transmitted 1200 bits per second

1960 First electronic switching system field trial-Morris,IL
First satellite telephone calls-ECHO

1962 Telstar satellite launched

1963 Touch Tone dialing offered

1964 All digit numbering permitted by FCC

1965 FCC challenges and investigates AT&T interstate rates
and earnings
Early Bird satellite launched(1st communications
satellite)
Satellite service USA-Europe

1966 Data transmited 4800 bits per second

1968 Private ownership of subscriber terminals permitted
by FCC

1971 FCC approved specialized common carriers

1972 First commercial electronic switching systems(analog)

1974 AT&T established Belll System Purchased Products Div.--
Market opened to general trade suppliers

1975 Data transmitted at 56,000 bits per second

1976 First commercial digital electronic switching system

1977 First optical fiber transmission link in commercial
service(GTE-CA)
FCC Docket 19528 decision--interconnect without \
couplers--registration

1978 Common Channel Intertoll Signaling in service

1979 FCC Docket 20828(Computer II)decision announced--
deregulate all terminals
U.S. Court awards $1.8 billioin damage suit to MCI for
AT&T antitrust actions
1980 ACTS(Auto Coin Telephone System)
Telcos reorganize to meet unregulated competition
175 million phones--USA: 450 million phones--worldwide

1981 Japanese telcom market opens to international
competition

1982 Verdict in U.S. antitrust suit against AT&T

1983 Deregulation of all terminal equipment deadline

198? U.S. Federal Communications Act 1934 rewrite passed
Appeal verdict MCI/AT&T antitrust judgment

1989 Transatlantic fiber optics transmission link in
operation

199? Telephony is part of the information age


eral Communications Act


This article is from the January issue of MCI World, a monthly newsletter
published by MCI for it's employees.


CRACKING DOWN ON ABUSE

The nationwide attack on telephone fraud got a boost recently when the U.S.
Secret Service joined the effort to curb the crime that costs the industry
millions in lost revenue annually.

The Secret Service used new jurisdiction over the telephone fraud for the first
time to arrest five individuals in raids on four illegal "Call-Sell" operations
in New York City last November.

The five suspects are awaiting trial in federal court on charges based on a
Secret Service investigation conducted in cooperation with MCI and other
members of the long distance telephone industry.

The defendants were charged with violation of a law on Fraud In Connection With
Access Devices which carries maximum penalties of 15 years imprisonment and a
fine of $50,000, or twice the value of the fraudulent activity.

Several other investigations are under way and future arrests are expected,
according to a Secret Service spokesman.

MCI cooperated in the investigation as a company and through membership in the
Coomunications Fraud Control Association (CFCA), made up of some 35 telephone
industry firms.

"Because it's an industrywide problem, we have organized to crack down on all
kinds of fraud, from the isolated 'hacker' to more organized schemes to use
long distance lines illegally," said Everick Bowens, senior manager of MCI
security investigations and president of CFCA.

The Secret Service said that in the New York cases, the defendants operated
Call-Sell businesses out of their homes and charged "customers" a flat fee for
making long distance calls. They used "Blue Boxes" and stolen or compromised
authorization codes or credit card numbers to use the long-distance networks of
several companies.

Blue Boxes are electronic tone-generatine devices used to bypass billing
systems and gain access to company networks. They can be assembled from
generally available electronic parts or they can be purchased ready-made
through illegal sources.

In the New York raids, agents seized unauthorized code and credit card numbers,
four Blue Boxes and more than 20 telephones.

It is estimated that in 1984, fraud in the telecommunications industry totaled
$500 million nationwide, and approximately $70 million in the New York City
area.

CFCA members are primarily interexchange carriers, such as MCI, but resale
carriers and some Bell operating companies are also members, along with
representatives of computer services and credit card companies.

Bowens says CFCA is intensifying efforts to stop the spread of fraud. Among
other things, CFCA is developing educational packages for carriers and the
public to promote widespread understanding of telephone fraud and ways to
counter the crime.

"Our aim is jointly to prevent, detect, investigate and prosecute any
fraudulent use of our long-distance networks," Bowens said.

Authorization codes are obtained by theft from individuals and by "hackers" who
randomly try combinations of numbers by telephone or through computer scanning
of number combinations until a working code is "hit." Illegally obtained codes
are fraudulently used by "boiler room" telemarketing operations, for example,
or are passed along for use by individuals.

MCI had developed software to detect illegal entry into its network and it is
expected that the spread of dial 1 service, in which authorization codes are
not used, will help reduce the incidence of telephone fraud.


----------------END------------------


You reckon they mean us???????????????

What's wrong with them, can't they take a a joke???????????
of dial 1 service, in which authorization codes are not used, will help reduce
the incidence of telephone fraud.


----------------END------------------

















NOW IT SEEMS LIKE SOME OF YE KNAVES
HAVE BEEN CALLIN ME USIN UN-ORTHODOX
TECHNIQUES OF WHICH YE OL TELE COMP
ANIES TOTALLY FROWN UPON.HEE-HEE
ALSO,FROM TIME TO TIME,I GET CALLS
FROM TELE PERSONELL ASKIN BOUT WHO
CALLED ON A PARTICULAR TIME & DATE.
SEEMS LIKE I ALLWAYS FERGET & DONT
KNOW ANSWERS TO THOSE QUESTIONS,BUT
I DO HAVE PHUN ANTAGONIZING THOSE
FOOLISH ENOUGH TO ASK STUPID QUESTIONS.
ONE IN PARTICULAR WENT SOMETHING LIKE
THIS.

R-R-R-I-I-N-N-G-G

HELLO

THIS IS MS RICE FROM PACIFIC NORTHWEST
BELL,AND IM CALLING TO FIND OUT WHO
CALLED YOU FROM THE PORTLAND AREA AT
3.29 P.M. DEC 17,1985.

WELL,FIRST OF ALL I DONT KNOW AND IF
I DID I WOULDNT TELL YOU ANYWAY!

WHAT!SAYS YE IRATE TELCO EMPLOYEE.
THAT PERSON MADE AN ILLEGAL CALL AND
IF YOU DONT TELL ME WHOM IT WAS ILL
HAVE THE CHARGES BILLED TO YOUR #.

AH-HA THINKS YE OLE BOOTLEGGER.THIS
DUMMY JUST SCREWED UP BAD.SO I ASK
HER FOR HER TO IDENTIFY HERSELF AND
GIVE ME HER SUPERVISORS # WHICH SHE
BEGRUDGINGLY DOES THINKING I MAY
GIVE YE INFO SHE DESIRES TO HER SUPV
SINCE SHE JUST SCARED ME.HAR-HAR

NEEDLESS TO SAY YE BOOTLEGGER KNOWS
HIS LEGAL RIGHTS AND IMMEDIATELY CALLS
HER SUPERVISOR.

R-R-R-I-I-N-N-G-G

HELLO

IS THIS MS RICES SUPERVISOR AT PACIFIC
NORTHWEST BELL?

YES IT IS.

DID YOU KNOW THAT AN EMPLOYEE OF YOUR
COMPANY JUST COMMITTED SEVERAL FEDERAL
FELONIES?

OH MY GOD SHE EXCLAIMS,PLEASE TELL ME
WHAT HAPPENED.

AFTER EXPLAINING THE CALL TO HER AND
TELLING HER THAT MS RICE COMMITTED
EXTORTION AND FRAUD THREATS ON A
INTERSTATE COMMUNICATION CARRIER
AND ALSO BEING AN OFFICIAL REPRESEN
TATIVE OF PAC NW BELL SHE HAS ALSO
LEFT HER COMPANY OPEN TO CIVIL AND
CRIMINAL CHARGES FOR THREATENING
TO REVERSE CHARGES IN ORDER TO
EXTORT ILLEGALLY INFORMATION FROM
ME,AND I AM PLANNING ON CALLING YE
OLE FCC,PUC,AND FBI TO PRESS CHARGES.

PLEASE SAYS YE TELCO SUPV. ILL TALK
TO MS RICE AND MAKE SURE NOTHING LIKE
THIS EVER HAPPENS AGAIN.

O.K.SAYS I- BUT I WANT ONE THING

I WANT A SIGNED LETTER OF APOLOGY
FROM MS RICE ON PACIFIC NORTHWEST
BELL STATIONARY.




1 DAY LATER YE BELOW LETTER ARRIVES
ON PAC NW BELL STATIONARY.

IN REFERENCE TO OUR CONVERSATION ON
12-18-85 REGARDING CALLS MADE TO
YOUR TELEPHONE NUMBER,I APOLOGIZE
IF YOU FELT INCONVENIENCED OR
OFFENDED.PLEASE FEEL FREE TO CALL
IF YOU HAVE ANY QUESTIONS.

SINCERELY

J.L.RICE

SERVICE REPRESENTATIVE






STRIKE THE WAR MACHINE

NUFF SAID-
BOOTLEG






THIS YEARS TOP AWARD FOR THE WORST
COMPANY IN THE COMPUTER FIELD GOES
TO A NATIONWIDE DISTRIBUTOR OF
HARDWARE & SOFTWARE BY THE NAME OF

MICRO D

2801 S. YALE ST.
SANTA ANA,CA.92704-5850

1-800-MICR-OD1
1-800-854-9440

AND LET US NOT FORGET THE VICE-PRES
IN CHARGE OF SALES WHO SEEMS DETER-
MINED TO LEAD MICRO-D INTO THE
GUTTER WITH ALL THOSE OTHER SLEAZY
RIP-OFF DEALERS,NAMELY ONE

JOHN WINKELHAUS
1-714-540-4781

NOW ILL TELL YA WHY-

A WHILE BACK I WAS A DEALER FOR MICRO D
AND THEY ADVERTISED AN "ABATI" DAISY
WHEEL PRINTER FOR $275. AMONG THE AD
WAS FEATURED A 1 YR WARRANTEE.
ABOUT 6 MONTHS AGO I SOLD THIS PRINTER
TO THE BOOTLEGGER MAGAZINE WHICH INCLUDED THE 1 YR WARRANTEE.NEEDLESS TO SAY,IT
BROKE SHORTLY THEREAFTER!
NOW THINKING THAT MICRO D WOULD HONOR
THEIR WARRANTEE,I CALLED THEIR CUSTOMER
SERVICE DEPT ABOUT RETURNING IT FOR
WARRANTEE REPAIR.

LO AND BEHOLD I TWAS INFORMED THAT THEY
CANT FIX IT AND TOLD ME TO TAKE IT AT
MY OWN COST TO A REPAIR SHOP (OF WHICH
THEY HAD NO IDEA WHOM MAY BE FAMILIAR
WITH THESE LEMON PRINTERS).NATURALLY
BEING QUITE IRATE AT THIS SERVICE REP,
I ASKED TO TALK TO HER SUPERVISOR,WHOM
INFORMED ME THAT SHE COULDNT DO ANY-
THING EITHER!UP THE LADDER I WENT TO
MR.VICE PRES JOHN WINKELHAUS WHOM IN
HIS INFINATE WISDOM DECLARED THAT I
COULD SEND IT BACK TO JAPAN,BUT THEY
MAY NOT HONOR THEIR OWN WARRANTEE!

WOW!!! SAID I

YOU MEAN TO TELL ME THAT YOU SELL
PRODUCTS WITH WARRANTEES WHICH
CANNOT BE REPAIRED OR THEIR WARRAN
TEE HONORED BY YOUR COMPANY?
SEEMS LIKE MR WINKLEHAUS TWAS TOTALLY
DROVE UP BY MY ASKING HIM TO HONOR HIS
COMPANIES OWN WARRANTEE!!!

YES-I NOW HAVE AN ELECTONIC TECH FIXIN
THAT PRINTER(HOPEFULLY) AND AT MY OWN
EXPENSE.

NOW-IF YE EVER HAVE TO BUY SOMETHING
AT ANY COMPUTER STORE,MAY I SUGGEST
YOU FIRST ASK THEM IF THEIR
DISTRIBUTOR IS MICRO D. YOU MAY HAVE
SIMILAIR PROBLEMS WITH PRODUCTS COMM
ING FROM THIS LARGE NATIONWIDE DISTRIB
UTOR AND THE COMPUTER DEALERS CARRYING
THEIR MERCHANDISE.(ESPECIALLY WITH
THE ATTITUDE OF EXECUTIVES AT MICRO D
SUCH AS MR. WINKELHAUS.

NUFF SAID-
BOOTLEG

P.S. YOU'LL NOTICE YE TOLL FREE NUMBERS
TO THIS RIP-OFF COMPANY TIS LISTED
ABOVE! HAVE PHUN AND REQUEST THEIR
CATALOG & PRICE SHEETS SO YOULL
KNOW WHAT PRODUCTS TO AVOID.ALSO
TOLL FREE NUMBERS COST THEIR OWNER
SO-O-O MUCH MONEY WHEN YER
COMPUTER TIS SET ON AUTO-DIAL
REPEAT CALLING FOR A FEW MONTHS!

HAR-HAR-HAR










IF YA WONDER WHY I DONT LIST BOARDS OF
THE MONTH LATELY,ITS CAUSE ALL THE
BEST ONES ARE INVITATION ONLY NOW.
SEEMS LIKE A LOT OF GOOD BOARDS GOT
RAIDED LAST YEAR,SO YE REASONING FOR
PRIVACY.MOST OF MY PREDICTIONS HAVE
MATERALIZED SINCE LAST YEAR AND IM
LOOKING FOWARD TO CONGRESS PASSING
COMPUTER PRIVACY LAWS THIS YEAR.

LOOKS LIKE HBO HAD SOME PROBLEMS
SINCE IT STARTED SCRAMBLING.
SEEMS LIKE AN IRATE HAM HAS BEEN
SCRAMBLING SOME OF HBO'S PROGRAMS
VIA SATELITE UPLINKING.THOUGH YE
FED ARE RUNNIN RAGGED LOOKIN FOR
HIM,HE SAYS ILL STOP SCRAMBLIN
HBO WHEN THEY STOP!!1

LOTS OF HEAT IN YE FLORIDA AREA
LATELY.COPS MAKIN ILLEGAL RAIDS,
SEARCHES,TAPS,ETC. TRYIN TO
CONVINCE PEOPLE TO USE THEIR
COMPUTERS LEGALLY.

ALSO-SEEMS LIKE BLUE BOX PROGRAMS
ARE BEING CALLED BURGLAR TOOLS IN
SOME AREAS SO YE OLE COPS HAVE A
REASON TO BUST PEOPLE.WAIT
TILL THAT ONE HITS YE HIGHER COURTS.

1986 WILL SEE YE COMPUTER INDUSTRY
AGAIN DROPPIN PRICES AND BETTER
HARDWARE FOR LESS.SEEMS LIKE CORPOR
ATE AMERICA HAS JUST NOW PRAISED
86 AS THE YEAR OF TELECOMMUNICATION
DATA LINKS AS THE NEWEST FAD FOR
ALL THOSE YUPPIES WITH COMPUTERS.
SEEMS LIKE WE'VE BEEN DOIN THE
SAME THING FOR YEARS NOW.

NUFF SAID-
BOOTLEG
For those new to computing, here is a list of the more commonly misunderstood
terminology.


ACCESS TIME--The time between the instant at which information is called for
and the instant at which management expects the final report.

ASSUMED DECIMAL POINT--Located two positions to the right of a programmers
current salary, estimating his own worth.

BLOCK DIAGRAM--Schematic gibberish.

BIT--the increment by which programmers slowly go mad.

BRANCH INSTRUCTION--Advice from a district office.

CHAINING--A method of attaching programmers to desks to speed up output.

CHECKPOINT--The location from a programmer draws his salary.

COMMON LANGUAGE--The first thing a programmer must forget to be successful.

COMPLEMENT--An antique, outdated form of speech once used to express
appreciation.

CONSTANT--A type of pressure.

CONSTANT AREA--The stomach.

CORE STORAGE--A receptacle for the center section of apples.

COUNTER--A device over which Old Fashions are served.

DEBUGGING--Removing the needles from the haystack.

DIGIT EMMITTER--Sandals.

ERROR--What someone else made when they disagreed with your computer output.

EXTERNAL STORAGE--Wastebasket.

FIXED LENGTH WORD--Four letter words used by progammers in a state of
confusion.

FLOATING CONTROL--A characteristic exhibited when you have to go to the rest
room but can't leave the computer.

FLOATING POINT--The absolute limit before Floating Control is lost.

FLOW CHART--A graphic representation os the fastest route to the coffee
machine.

FORTRAN--Fortunately Our Readers Take Refreshers At Nightschool.

GARBAGE--Highly aromatic computer output.

HIGH SPEED PRINTER--Wife writing checks.

HOUSEKEEPING--Letting the next person clean up your mess in the computer room.

INDEX REGISTER--Constant source of irritation.

INPUT--Food, whiskey, beer, excedrin.

INTERNAL SORT--The stomach, liver and kidneys keep changing positions.

KEY PUNCH OPERATOR--The best informed source of information regarding the
weakesses of the system, New large scale compute and night clubs to hang out
at.

LIBRARY--An organized collection of obsolete material.

LOGICAL OPERATION--Getting out of Data Processing to marry a rich widow.

LOW ORDER POSITION--The programmers position in the chain of command.

MACRO--The last half of an expression: for example "Holy Macro".

MATHEMATICAL MODEL--46-26-38

MATHEMATICAL CHECK--The renumeration received by a mathematical model.

MEMORY DUMP--Amnesia.

MICROSECOND--The amount of time required for a program to hang up.

NUMERIC--46-26-38.

OFF LINE--Failure to pass a soberity test.

ON LINE--Full, but not drunk.

OVERFLOW--The result of being too much "Off Line".

PARAMETER--The absolute limit beyond which the secretary yells for help.

PROGRAMMER--Red eyed, mumbling mammal capable of conversing with inanimate
monsters.

OPTICAL SCANNER--Male visitor in the keypunch section.

SPECIAL CHARACTER--A character which is out of the ordinary, different, a
resident of Greewich village.
r help.

PROGRAMMER--Red eyed, mumbling mammal capable of conversing with inanimate
monsters.
THIS IS A LITTLE BIT OF THE THINGS TELCO COMPPNIES ARE PRINTING ABOUT US..ILL
KEEP YOU UP TO DATE REGARDING NEW INFO............



THE LONG DISTANCE LETTER
NEWS AND ANALYSIS FOR THE TELECOMMUNICATIONS EXECUTIVE

DECEMBER 1985
WASHINGTON D.C.
VOL.3, NO. 11

PHILLIPS PUBLISHING, INC.
"ACTIONABLE INFORMATION FOR THE 80'S"


Dear Executive:

FRAUD WASTES MILLIONS OF INDUSTRY'S DOLLARS!

Fraudulent use of toll services costs the long-distance industry millions
of dollars each year. And unlike access charges or even advertising costs,
expenses paid out as a result of unauthorized, illegal toll usage can never be
rationalized as a true cost of or a potential benefit for the business.
The problem of toll fraud diminishes the bottom line of every
long-distance company, whether the company is AT&T or a regional reseller of
service. Fraud costs the alternate long-distance industry alone $10 million
per month, estimated Teltec Saving President Robert Hurwitz, speaking at a
Competitive Telecommunications Association meeting.

THE TYPES OF FRAUD

The varieties of fraud, although many, are not indefinite. Yet industry
members readily agree that for every type of fraud that is either diminished or
eradicated, another pops up. James S. Minogue, a general attorney with
Satellite Business Systems, listed several varieties of fraud:
* BLUE BOXING occurs when people use tone generators, devices that
generate tones to bypass telephony billing systems (usually from a payphone),
to enter the network without being billed for the calls.
*HACKERS--perhaps the most infamous group--use computers to identify
authorization codes. Hackers fall into 2 categories--true crooks, and those
who indulge in breaking codes for ego gratification
("phone freaks"). The latter group uses the authorization codes. But these
computer whizzes also set up computer bulletin boards in which illegally
obtained long distance numbers or authorization codes are posted so others may
use them.
A variation of hacker's fraud is "prison fraud", said Minogue. Prisoners
have access to touch tone phones and simply sit by the phone and punch numbers.
"Sooner or later, they hit upon the right numbers," Minogue said.
Prisoners have also been known to illegally obtain authorization codes,
and by punching the pound key, hand the phone from inmate to inmate for their
different calls, a practice that once kept an access line of Execulines of
Florida, Inc. busy for more than 12 hours, Peter Sawn, marketing manager for
the Orlando-based company, told us.
That experience also included MCI, as the number used was an MCI travel
card. The prison was in Tennessee, but because of the switching equipment used
at the time, the calls were made via incoming
lines from Orlando, confounding both companies initially as to where the calls
were from. The Prison warden wouldn't agree to replace the Touch-Tone phones
with rotary dials, as Execulines suggested. with the crooks already in prison,
not much more could be done.
An outgrowth of hacker fraud is the set-up of telemarketing groups based
on the ill-gotten distribution codes. "The primary expense in these boiler
room or telemarketing operations is the telephone expense," noted Jim
Yarborough, vice president of corporate development for Advanced
telecommunications Corp., parent company of Transcall America and Direct Line,
long-distance companies serving the Southeast and Western United States,
respectively.
A number of these cases where telemarketing groups are fraudulently using
long-distance services are run by businessmen, and the chances of these
businessmen not knowing that what they are doing is illegal are slim to none.
"Any businessman who's using a service and not paying for it knows it's
illegal. Th only free cheese is in a mousetrap," said Yarbrough.
Some crooks barter with the stolen numbers. One such entrepre-
neurial sort talked a jewelry store into giving him discounts on the
merchandise. In return, he would take care of the store's long-distance
service, Chris Davis, an attorney with the Washington D.C.-based law firm
Surrey & Morse, told us. The jewelry store was delighted with the arrangement
until the long-distance company whose service was used, came calling for bill
payment. The hacker who provided the number was long gone, along with his
discounted jewelry.
Ironically, long-distance companies themselves have contributed to the
problem. "Part of the problem is that the industry has been doing it to
itself, through the drive for market share. In their desire to sign up
customers, checks are not made on the names and addresses of people signing up
for the service," noted Davis. And as with credit cards, people sign for the
service with the express intent of defrauding the company. Other groups that
contribute greatly to fraud are schools, college campuses and military bases.

HOW CAN FRAUD BE THWARTED?

Sometimes, it takes a thief to catch a thief. Execulines' Peter Sawn
suggests that several companies sponser an electronic bulletin board
anonymously, to obtain the codes passed around. Sawn warns that if a bulletin
board is set up, the system must not contain a lot of other data, because a
hacker can zap it quite easily out of existence.
TelTec Saving had some success with posting a $10,000.00 reward for
information leading to conviction of abusers on computer bulletin boards. In
the bulletin board message, TelTec also informed possible abusers that the
company had automatic number identification (ANI) capability--to trace calls to
the abusers. Just telling them of ANI, even if you don't have it, may work for
a while.
TelTec Saving had experienced abuse costing up to $250,000.00 a month, but
with a stringent plan reduced losses to $30,000-$70,000 per month (TLDL, March,
p. 3).
Software can also thwart fraud--at least for a while. American
Telemangement Corp. markets a software product that detects hackers trying to
steal authorization codes, President William O'Reilly told us. O'Reilly
founded Lexitel Corp. and was one of the founders of the Association of
Long-Distance Telephone Companies (ALTEL), now the Competitive
Telecommunications Association.
The Network Security Monitor software has been available on a limited
basis for about 90 days. Carriers using the program are Satellite Business
Systems, TelTec Saving, Communications Co. and Microtel Inc. Cost of the
software is based on the size of the company and the extent of the problem.
O'Reilly admits the product won't stop fraud, but says it will keep losses
down to a minimum. Although no industry wide statistics
have been gathered, O'Reilly estimates that companies lose 1/2 of 1% of revenue
per month, on the low side, to 3% per month on the high side. (American
Telemanagement Corp., 26899 N.W. Highway, Suite 420, Southfield, MI. 48034,
313/358-1414.)
Software is indeed seen as a major solution to the problem-but after the
fact. MCI spokesman Gary Tobin says that with software the company developed,
MCI can detect and then stop incidences of fraud on a real-time basis.
"Fraud is now down to less that 3/10 of 1% per month with the new
software; before fraud was much higher, although still "single-digit,"
Tobin said.
For all its attendent maladies, the equal access conversion effort may
help to reduce fraud. Since authorization codes won't be used as much, with
networks accessed from phones, rather than just through code numbers, Tobin
says that fraud will continue to be diminished.
While many industry members acknowledge that equal access helps in
fighting fraud, that will be true only for those companies entered in the
presubscription process, such as larger companies, both facilities-based
carriers and resellers.
Regional carriers that in many cases do not join the equal access process
will still make use of the authorization codes, and of course, travel cards,
calling codes and any type of service that uses access codes will remain at a
high level of risk.

DETERRENTS TO FRAUD: PROSECUTION, THE PRESS AND PUBLIC AWARENESS

While many long-distance companies expressed a reluctance to discuss the
problem, fearing that mention of fraud in a trade periodical would incite
further instances, Advanced Telecommunications' Jim Yarbrough noted that when
the company prosecuted, the press coverage of the prosecution as well as the
prosecution acted as a deterrent.
"The biggest deterrent is punishment. When we caught some teenagers
commiting fraud, the publicity generated by the prosecution resulted in
bulletin boards passing the word to 'stay away from this company--it
prosecutes,'" said Yarbrough.
"I don't expect fraud to stop--it can't ever be stopped totally. But as
people realize there are laws on both the state and federal level--once people
realize that it's not a game, that people do go to jail, the type of fraud
commited by phone freaks will dry up. But the people who are selling codes and
are crooks to begin with will continue to do so," predicated Yarbrough.
Prosecution may include both criminal and civil action, noted SBS' James
S. Minogue. "In civil actions, judges can award punitive damages also. Civil
action is not as effective as criminal--law enforcement is preferable. But if
enforced, civil actions may also act as deterrents. But criminal charges are a
far more serious deterrent," noted Minogue.
Another deterrent is public awarness. AT&T has embarked on a
fraud-awareness program developed by Bell Atlantic for AT&T.
The program focuses on computer and credit card fraud and is aimed at
junior and senior high school students, college students and military
personnel.
Four videotapes have been filmed, each one geared to a specific group. The
tapes will be shown to schools, colleges and military bases as cornerstones of
sessions dealing with fraud in a pilot program in New Jersey. The tapes are
based on an actual case of fraud showing a junior high school student selling a
software progam for $5 to a friend, saying that with the program he can contact
bulletin boards across the country without being charged for the calls. The
kid buys the program, goes to town with it and wham, is caught by telephone
company investigators.
The kid is hauled to juvenile court, found guilty and required to pay for
the long-distance calls anbd is sentenced to community work.
After showing the tape, a security representative discusses what
constitues an illegal call and the penealties for making them. Literature about
telephone fraud is also distributed.
"The program shows that AT&T is determined not only to investigate and
prosecute fraud cases, but also to educate potential abusers about the possible
consequences of their actions," said Charles Schnitzelein, general security
manager for AT&T Communications
Security representatives of Bell Atlantic, acting as agents for AT&T, are
approaching schools, colleges, school boards, parent-teacher associations and
military bases to schedule the sessions. AT&T is also working with other BOCs
that are investigating fraud cases, so AT&T can extend the program nationwide.
AT&T declines to say how much money the company lost to fraud last year,
but before divestiture, the total Bell System, AT&T and the Bell operating
companies lost $150 million annually as a result of all types of fraud, calling
card, coin, third-party billing, etc., Neal Norman, AT&T-C district manager of
corporate security, told us.
AT&T has had problems with fraud not only domestically but internationally
as well. In March 1984, AT&T-C was permitted by the
FCC to restrict international card usage from those countries or international
area codes where the company experienced a high incidence of fraud.
Software has also enabled AT&T to diminish fraud, but the end is not yet
in sight. Norman concurs that reducing dependency on codes would help the
industry with fraud, but notes that fraudulent users will always find a way.
Making the customers aware of the Truth in Lending Act, under which
cardholders are liable for the first $50 on fraudulent phone bills--as long as
there is no intention to defraud the companyu--is another way to increase
public security consciousness.
Customers must be made aware that fraud is a problem, so they will
exercise more control over their codes and numbers, and BOCs must join the
effort to reduce fraud, said Norman,
"BOCs must participate too. They have problems of their own, although
slightly different in nature," noted Norman.

FRAUD FIGHTERS GROUP FORMED

Fraud fighters now have an association to aid their efforts. The
Communications Frauds Control Association, a nonprofit group incorporated in
May, works to increase cooperation within as well as beyond the industry to
promote fraud control, President Everick Bowens told us.
Specificially, the association was formed to:
*Establish and maintain closer communications regarding security matters.
*Promote the mutual interests of telecommunications carriers to the extent
of protection and efficiency of security operations.
*Provide a forum where information can be collected, classified and then
distributed to members for security purposes.
The association resulted from meetings hosted by Network 1 in Florida last
winter. Members include local telephone companies as well as long-distance
providers--both resale and facilities-based carriers. Companies that provide
computer services are also members.
The association is working to collect statistics on the extent of fraud
experienced by the industry, and even within the association, the company
representatives are loathe to reveal losses due to fraud, Bowens said.
To protect themselves from fraud, OCCs must build a better mousetrap, and
first realize just how "un" secure their operations are, said Bowens. "We have
to produce better, safer, more secure
products. The hardware and software for seitches must be more
security-conscious," said Bowens.
Sharing information is a necesity. "The population of fraudulent users
although great, is pretty static. One may abuse AT&T for a while and then go
on to an OCC. Information on abusers must be shared," said Bowens.
Local exchange companies and long-distance companies must cooperte more
fully. "Both segments must be allowed to communicate their needs to arrive at
solutions. We must identify and isolate given fraudulent situations. The
interexchange carrier has some information; the exchange carrier has
some--they must work jointly with law enforcement," said Bowens.
"All long-distance companies should also keep in mind that fraud control
is a serious project in terms of dollars and in terms of how secure the
national telecommunications security systems really are. It behooves anyone in
the industryu to band together to ensure tha security. The ultimate victims
are the general public. No company will be able to exist if fraud is not taken
care of," stated Bowens. (The Communications Fraud Control Association, PO Box
23891, Washington, DC 20026, 703/560-4069.)


This little tidbit of info for all you Phackers, has been brought to you from
the VAULTS OF THE SWISS BANKER.

For an analysis of all of this please read "THE BALANCE SHEET."

raud Control Association, PO Box 23891, Washington, DC 20026,












WANT A 30 DAY FREE SUBSCRIPTION AND
$24 CREDIT ONLINE TO A NEWS COMPUTER
SERVICE? JUST CALL 800-345-1301

NUFF SAID-
BOOTLEG



IBM 370 MODEL 69 FEATURES AND DEVICES
(Downward Compatible With IBM 360/69)*

This document appeared out of thin air--we kindly thank A. Nonyous for
contributing it for our edification.

INPUT-OUTPUT

Early Card Lace Feed Card and Jam Backspace Disk
Read Card and Scramble Data Backward Space Card Reader Eat Card
Rewind Card Reader Read Print and Blush Punch Disk
Update In Place On Card Read Invalid Data Fruit Punch
Write Invalid Data Erase Card Punch Punch Operator
Read Unhappy Macnam Forms Skip and Run Away Read Chaos
Stacker Upset Print and Smear Scatter Print
Print and Break Chain Print and Cut Ribbon Stretch Tape
Stacker Select Disk Rewind and Break Tape Slip Disk
Write Wrong Record Length Change Tape Density in Mid-Record
Make Tape Invalid Switch to Zero Density Change Channels
Write Past End of Tape Read and Write While Ripping Tape
Write New Hit Record Write Noise Record Hide and Seek
Read Inter-Record Gap Update and Erase Record Eject Disk
Seek Record and Scar Disk Read Count Key and Garbage Scramble Channels
Write To Protected File Write Count Key and Garbage Snare Drum
Garbage Count Key and Read Scatter Multiplexor Channel
Burst Selector Channel Skip To Random Channel
Reverse Drum Immediate Sharpen Light Pen
Random Access Card I/O

ARITHMETIC

Accumulate Trivia Triple Pack Decimal Add Improper
Subtract and Reset To Zero Add and Reset To Zero
Multiply and Lose Precision Divide and Overflow
Divide and Conquer Abnormalized Floating Point
Sinking Floating Point Sliding Floating Point
Vanishing Floating Point

DATA MANIPULATION

Move and Lose Record Move and Wrap Core Move Continous
Gulp and Store Bytes Burp and Clear Bytes Move Devious
Move and Drop Bits Memory Bank Holdup Move Bowels
Circualte Memory Convert To Garbage
Load and Clear Core









SPECIAL AND CUSTOM FEATURES

1401 Incompatibility 407 Emulation 370 Emulation
Read-In Only Storage Erase Read-In Only Storage 370 Immolation
Chinese Character Set Execute Invalid Op-Code Concoct Data
Pessimising Software Random Bug Generator Memory Prosthesis
Uncouple CPUs and Branch (Factory Installation Only) Virtueless Memory
Memory Left Shift and Branch Convert To Roman Numerals Reduce Throughput
(Italian Market Only)
Alfred E. von Neuman Architecture
Shiftless Registers
CMIL Memory
Chocolate Chips
Trivalent Bits

LOGIC AND CONTROL

Vary Immediate Illogical Or Ilogical AND
Branch and Loop Continous Branch On Programmer Debugging
Branch On Missing Index Lose Message and Branch Branch On Bug
Develop Ineffective Address Transfer and Lose Return Bug On Branch
Branch On Power Off Branch On Burned-Out Indicator
Branch On Blinking Indicator Swipe "Emergency Pull" Knob Load Operator
Branch on CE Ground Halt and Catch Fire Byte Operator
Branch On Chip Box Full (Privileged OP) Execute Operator
Branch On Phase Of Moon Branch On Donder On Blitzen Byte and Run
Reinitialize Meter Ignore Supervisor Call
Trap Secretary and Halt Call Supervisor Names
Destroy Storage Protect Key Scramble Program Status Word
Pack Program Status Word Electrocute DP Manager and Branch
Inquire and Ignore Reverse Parity and Branch
Branch On Operator Sleepy Branch On Operator Desperate
Branch and Disconnect Memory Invert Record and Branch
Evacuate Memory Generate Machine Check
Generate Machine and Cash Generate Machine Check and Bounce
Byte Baudy Bit and Branch Phone Home
Burst Bubble Memory Random Lamp Test and Panic Operator



*Upward compatible with other 370 models
Crossword compatible with other 360's
Awkward compatible with earlier systems
Machine Check and Bounce
Byte Baudy Bit and Branch Phone Home
Burst Bubble Memory










YEP-WEVE BEEN A LITTLE LATE WITH THIS
ISSUE DUE TO MOVING.
STILL HAVE THE SAME PHONE NUMBERS,
BUT OUR CURRENT ADDRESS TIS-

THE BOOTLEGGER/HACKER MAGAZINE

1080 HAYS CUT-OFF ROAD
CAVE JUCTION,OR.97523





AVAST YE DOGS

A TOTALLY NEW TYPE OF BOARD FOR
YE WITH COURAGE ENOUGH TO ADVENTURE
HERE LIES AWAITING THEE AT-

1-414-527-4779

TELL HIM YA SAW IT IN THE BOOTLEGGER.









ALSO,WHILE PLAYIN ROUND WITH 414 PEOPLE, IT SEEMS LIKE YE OLE SYSOP OF CRYTON,
THE 414 WIZARD TWAS SENTENCED RECENTLY
IN FEDERAL COURT TO $2500 FINE,2 YEARS
PROBATION,AND THE MONTH OF JUNE IN JAIL.

NUFF SAID-
BOOTLEG





OK-TO ALL OF YOU FOOLISH ENOUGH TO
ASK

NO-NO-NO FREE SAMPLE ISSUES!

BUT BACK ISSUES ARE AVAILABLE FOR
$10 EACH.

IF YOU HAVE PROBLEMS WITH ANY DISK
NOT WORKING-MAIL IT BACK WITH AN
EXPLANATION OF THE PROBLEM.
ILL REMAIL A FRESH COPY UPON GETTING
THE OLD ONE.

AND TELL YOUR FRIENDS-NO FREE SAMPLES
(UNLESS THEY FEEL LIKE MAILING FREE
SAMPLES OF 10 DOLLAR BILLS FIRST!)

NUFF SAID-
BOOTLEG



DUE TO POPULAR DEMAND AND THE HUGE
AMOUNT OF INFORMATION NOW AVAILABLE
TO ME,I HAVE DECIDED TO PUBLISH A
SISTER MAGAZINE TO THE BOOTLEGGER
CALLED-

"THE HACKER"

SAME SUBSCRIPTION PRICE AS THE
BOOTLEGGER.SAME ADDRESS ALSO,BUT
THE HACKER WILL BE PUBLISHED IN
BETWEEN BOOTLEGGER ISSUES SO THAT
YOU CAN GET INFO A LOT QUICKER!
NATURALLY THE HACKER WILL PUBLISH
A LOT OF GREAT INFO PERTAINING TO
THE UNDERGROUND HACKING WORLD-
SUBSCRIBE NOW-DON'T MISS ISSUE #1.

(SOME OF THE HACKERS INFO WILL
INCLUDE FILES TAKEN RIGHT OUT OF
THE LATEST ESS MANUALS!)

NUFF SAID-
BOOTLEG







FRIDAY MORNING I ARRIVE AT THE DAYS
INN HOTEL IN MANHATTEN WITH MY OLE
LADY.WE CHECK IN AT 11 AM UNDER
THE NAME OF MR.AND MRS BROOKS.
BUT LO AND BEHOLD THE DESK CLERK
ASKS FOR MY I.D. AND THERE I STAND
RED FACED AND EMBARRASSED CAUGHT
DIRTY RIGHT OFF THE GIT GO TRYIN
TO USE AN ALIAS.OH WELL-AFTER
FILLING OUT ANOTHER REGISTRATION
CARD WITH MY RIGHT NAME THIS TIME,ITS
UP TO OUR ROOM FOR A QUICK CHANGE AND
SOME AFTERNOON SHOPPING UNTIL 6 PM
ARRIVES.AT 6 TAP HOLDS ITS MONTHLY
MEETING AT A SECRET PLACE ON THE
OUTSKIRTS OF GREENWICH VILLAGE EVERY
MONTH.ARRIVING AT THE TAP MEETING
ON TIME INTRODUCTIONS WERE QUICKLY
MADE AND STORIES ABOUT THE PAST
STARTED FLYING.CHESIRE STATED THAT
TAP ORIGINALLY WAS STARTED BACK IN
1971 BY ABBEY HOFFMAN(OF CHICAGO 7
FAME) AS A POLITICAL ANARCHIST
NEWSLETTER CALLED YPPL (YOUNG PEOPLES
POLITICAL LOBBY).A FEW YEARS LATER
THE NAME WAS CHANGED TO TAP AND AL
BELL TOOK OVER.AS WE ALL KNOW CHESIRE
CATALYST RAN TAP FOR AWHILE WHILE THE
INFAMOUS ISSUE #91 WHICH WAS PRINTED
BUT NEVER MAILED,WAS DONE BY TUC AND
BIOC 003. (ISSUE #91 WAS GIVEN TO ALL
THOSE THAT ATTENDED SATURDAY NIGHTS
TAP CONVENTION)

ANYHOW,I HAD HEARD A LOT OF RUMORS
ABOUT WHO OWNED TAP AND OTHER SULTRY
COMMENTS BY THE TIME I ARRIVED IN NYC.
SO I DEFINATELY WANTED TO BE AT FRIDAY
NIGHTS TAP MEETING BEFORE EVERYONE
ARRIVED FOR THE BIG TAP CONVENTION ON
SATURDAY NIGHT.(INCLUDING ALL THE FEDS
THAT WERE EXPECTED TO BE SNEAKING
AROUND)
WE HAD A GREAT TIME FRIDAY NIGHT,MET
A LOT OF COOL PEOPLE,AND FOUND OUT
WHAT A LOT OF SHIT WAS TRUE AND WHAT
WAS GOSSIP & BULLSHIT.
AFTER ABOUT 4 HOURS,I GAVE THE OLD
TAP CREW A BOX OF MANUALS TO COPY,
AND WE DEPARTED BACK TO OUR HOTEL SO
WE COULD GET AN EARLY START ON THINGS.

S-T-R-R-A-A-N-N-G-G-E-E

UPON ARRIVAL AT OUR ROOM,I FIND MY
DOOR UNLOCKED BUT NOTHING MISSING.
THEN 5 MINUTES LATER THE OLE LADY
HEARS VOICES OUTSIDE OUR DOOR SAYING
"YA-THEYRE FROM OREGON"
THEN LATER MORE FOOTSTEPS OUTSIDE
OUR DOOR.(OUR ROOM WAS THE LAST ONE
AT THE END OF THE HALLWAY)

COULD THE FEDS HAVE OUR ROOM BUGGED??
THE FACT THAT WE WERE ARRIVING WAS
NOT A WELL KEPT SECRET.NOR WAS THE
TAP CONVENTION TO BE HELD SATURDAY.
SINCE THE CRACKER ALSO MET THE TAP
CREW AND LEFT FOR HIS ROOM THE SAME
TIME AS US,I CALLED HIM TO SEE IF
ANYTHING UNUSUAL TWAS GOING ON AT
HIS ROOM.BUT HE REPORTED ALL WAS WELL
AT HIS END.BUT EVEN CHESIRE COMMENTATED
THAT IT WAS UNUSUAL THAT THERE WAS SO
MANY PEOPLE AT THAT HOTEL THAT WEEKEND!



CALLED TIM UP-HE SAID HIS MOM WAS
GIVING HIM STATIC BOUT FLYING TO
NYC,AND THAT IM NOW PROMOTED TO
MANAGING EDITOR WITH TUC AS EAST
COAST EDITOR AND SUSAN THUNDER AS
WEST COAST EDITOR AND SCAN MAN AS
MIDWEST EDITOR.
HE ASKED ME TO CARRY ON FOR HIM IN
CASE HE COULDNT MAKE IT.

(NOW YE GOTTA REMEMBER THAT IVE NEVER
EVEN HEARD OF TIM OR THE WHACKO BROTHERS UNTIL 2 WEEKS PREVIOUS TO THIS.BUT THE
PROSPECT OF $3500 PER DAY IN SUBSCRIPTIONS AND BILL STARTING UP AN UNIX SYSTEM
FOR PHREAKS/HACKERS TIS WHAT ENTICED
BOTH BILL AND I. ALSO, IVE BEEN
PROMISSING THE NINJA NYC FOR YEARS THAT
SOMEDAY ID MAKE IT TO NYC FOR ONE OF
THEIR MONTHLY TAP MEETINGS.
SO,I FIGURED IF WORSE CAME TO WORSE AND TAP DISSOLVED,I STILL HAD ONE GREAT
VACATION AND FINALLY GOT TO MEET ALL
THE GREAT PEOPLE THAT ATTEND THE MONTHLY TAP MEETINGS THAT IVE TALKED TO OVER
THE YEARS.)

THE STAGE TIS NOW SET FOR TOMMORROW-
BUT A LOT OF VARIABLES STILL UNKNOWN.


CONTINUED IN NEXT FILE-





SATURDAY 10 AM
DAYS INN
MANHATTEN NY
COLLESIUM ROOM

OFFICIAL 1986 NATIONAL TAP CONVENTION

SPEAKER- CHESIRE CATALYST

PRESENT- VARIOUS HACKERS/CRACKERS/AND
REPORTERS FROM ALL OVER THE
U.S.A. INCLUDING DISTINGUISHED
PHREAKS AND VARIOUS AGENTS OF
LAW ENFORCEMENT AGENCYS TRYING
BE SNEAKY.

TOPICS - CCIS AND THE FUTURE OF TAP

NO-SHOW- TUC-WHACKO BROTHERS-JOHN DRAPER -LEX LUTHOR-SUSAN THUNDER



CABLE TV ASKED FOR PERMISSION TO FILM
FROM THE REAR SO AS NOT TO GET ANYONES
FACE ON FILM EXCEPT THE SPEAKERS (CHES
IRES),AND EVERYONE PRESENT APPROVED OR
STAYED BEHIND THE CAMERAS.

WHILE CHESIRE WAS IN FRON OF THE ROOM
EXPLAINING THE VIRTUES OF CCIS,MOST
OF US OLE FARTS WERE IN BACK BEHIND
THE CAMERAS HASHING OVER THE REAL
TECH STUFF CONFRONTING OUR FUTURE.
TOPIC TOUCHED UPON WERE BIT-MILE,
CLASS,AND OF COURSE TAPS FUTURE.

UPON CHESIRES COMPLETION OF HIS
TUTORIAL OF CCIS,HE THEN PROCEEDED
INTO THE QUESTION AND ANSWER SESSION
REGARDING TAPS FUTURE AND IF INDEED
TAP SHOULD BE RESTARTED AT ALL.

(NOW YOU SHOULD BE AWARE OF THE FACT
THAT SINCE CHESIRE HAS BEEN CASHING
TAPS SUBSCRIPTION CHECKS FOR THE
LAST 2 YEARS AND BLOWING THE MONEY
ON HIMSELF,HE COULD NEVER AGAIN BE
TRUSTED TO PUBLISH TAP.ALSO WITH
OVER A THOUSAND OUTSTANDING CHECKS
THAT HE CASHED,IM SUPRISED THAT
NO-ONE HAS YET COMPLAINED ABOUT
FRAUD TO POSTAL INSPECTORS.)

TO MAKE A LONG STORY SHORT,SCAN MAN
CONFRONTED HIM ABOUT THOSE CHECKS
AND HIS RIPPING EVERYONE OFF,BUT ALL
CHESIRE COULD SAY WAS HE WAS SORRY
AND SPENT THE MONEY ON HIS BILLS.
WHEN ASKED BY SCAN MAN ABOUT REFUNDS
HE ASKED 2600 IF THEY WOULD LIKE TAP.
THEY SAID THEY SURE WOULD LIKE TAPS
MAILING LIST BUT WOULDNT WANT ANYTHING
TO DO WITH TAPS LIABILITIES.
I OFFERED ON BEHALF OF OUR GROUP
TO ACCEPT BOTH ASSETS AND LIABILITIES
OF TAP,BUT THAT HE HAS TO SIGN OVER
OWNERSHIP IN WRITING.
OBVIOUSLY,CHESIRE WAS IN THE HOT SEAT.
HE HAD ADMITTED TO A FEDERAL FELONY OF
MAIL FRAUD IN FRONT OF TV AND WITNESSES. OBVIOUSLY HE NEEDED TIME TO THINK
ABOUT THE RAMIFICATIONS OF HIS STATEMENTS
AND LOOKED FOR THE QUICKEST WAY OUT OF
THE LIMELIGHT WHICH WAS TO DECLARE THAT
TAP MAGAZINE WAS DEAD FOREVER.
OBVIOUSLY,THAT ANSWER PACIFIED THE
PRESS,FEDS,AND FOOLS.BUT TO SOME OF US
,NO WAS NOT YET ACCEPTABLE.SO AFTER THE
MAIN CONVENTION WAS OVER,CHESIRE,MYSELF,SCAN MAN,THE CRACKER,AND OTHERS
DECENDED DOWN THE STAIRS INTO THE HOTEL BAR.

AFTER A FEW DRINKS,I ASKED CHESIRE WHY
HE WAS DETERMINED TO KILL TAP.
HE FIRST SAID THAT HE DIDNT FEEL IT
COULD BE CONTINUED IN THE SAME IDEOLOGY
AS IT WAS ORIGINALLY INTENDED.I BLEW THAT FLIMSY EXCUSE AWAY BY STATING THAT
TAPS ORIGIN WAS ABBEY HOFFMAN AND TAP WAS
ORIGINALLY INTENDED AS AN ANARCHY TYPE
NEWSLETTER OF THE OLE VIETNAM PROTEST
DAYS,AND IF INDEED IT WAS CHANGE HE WAS
WORRIED ABOUT,THEN HE HIMSELF HAD ALREADY DONE THAT.
NEXT EXCUSE WAS THAT HE DIDNT WANT TO
SEE TAP PUBLISHED USING LAZAR WRITERS
AND NEW HIGH TECH METHODS INSTEAD OF
THE OLE GLUE POT AND PASTEBOARD METHODS. THIS ONE ANSWER RAISED EVERYONES EYE-
BROWS HALF AN INCH.OBVIOUSLY EITHER
HIS EGO IS SUCH THAT HE WANTS HIS NAME
AND TAP TO DIE TOGETHER,OR POSSIBLY
SOMEONE IS PAYING CHESIRE NOT TO GIVE
UP TAP,AND LET IT DIE.(I.E.BELL SECURITY,FBI,SECRET SERVICE.) THE LATTER MAKES
MORE SENSE,AS THAT TIS THE ONLY WAY HE
CAN AVOID A FEDERAL MAIL FRAUD BUST.





SEEING THAT IT WAS USELESS TO CONTINUE
ALONG THOSE LINES,ME,SCAN MAN & MY OLE
LADY WENT ON TO THE RED PARROT DISCO
UNTILL 4 AM HAVING ONE GOOD TIME,AND
GETTING WASTED.

IS TAP REALLY DEAD YOU ASK?

NOT ON YOUR LIFE-SEEMS LIKE A GOOD POSSIBILITY EXISTS THAT ABBEY HOFFMAN NEVER
SIGNED OVER THE RIGHTS TO TAP TO ANYONE! AND ALL THESE YEARS THE REAL OWNERSHIP
STILL LIES IN HIS HANDS!

AND THE WHACKO BROTHERS JUST FINISHED
A 2 HOUR CONFERANCE WITH ABBEY HOFFMAN
IN WHICH HE SAID NOT ONLY WILL HE GIVE
THEM YPPL AND TAP RIGHTS,BUT WILL ALSO
HELP WRITE FOR THEM AND USE HIS EXPERTISE TO HELP THEM AQUIRE MILLIONS OF
NEW SUBSCRIBERS.SEEING AS HOW CHESIRE
WOULD HAVE TO FILE SUIT AND EXPLAIN
HIS ACTIVITIES WITH TAPS SUBSCRIPTION
FUNDS BEING DIVERTED INTO HIS OWN
POCKET,I FIND IT VERY UNLIKELY CHESIRE
WILL DO NOTHING MORE THAN HUMBLY STEP
ASIDE.

THERE IS NO GUARANTEE TAP WILL RE-START.
BUT EVEN IF THE WACKO BROTHERS DONT USE
TAPS NAME,THEY STILL MAY BE PUTTING OUT
A PHREAK/HACKING MAGAZINE THAT CERTAINLY HAS STIRRED THE INTEREST OF ALL THE
GREATS BOTH PRESENT AND PAST.(PROVIDING
THE WACKO BROTHERS STAY OUT OF JAIL
LONG ENOUGH)

FOR THOSE OF YOU INTERESTED IN TAKING
A CHANCE SUBSCRIBING TO THE NEW TAP-

SEND $35 TO

TAP MAGAZINE
611 PAINTED VISTA DR.
ST.LOUIS MO. 63021

314-527-8922


NUFF SAID-
BOOTLEG

$25 PER YEAR
THE BOOTLEGGER MAGAZINE
1080 HAYS RD.
CAVE JCT.OR 97523

ALSO

$25 PER YEAR

THE HACKER MAGAZINE
1080 HAYS CUT-OFF RD.
CAVE JCT. OR. 97523









BET YA BEEN HEARING A LOT OF RUMORS
ABOUT TAP STARTING UP AGAIN!
WELL,SO HAVE I.
SO-O-O,YE OLE BOOTLEG DECIDES TO
CALL ROUND YE U.S. TO SEE JUST
WHAT TIS HAPPENING,AND LO AND
BEHOLD,A STORY OF INTRIGUE,MYSTERY,
AND SPY VS SPY IN THE PHREAKING/HACKING
UNFOLDS AS NEVER BEFORE IN OUR HISTORY.
ALTHOUGH I LIKE EVERYONE PERSONALLY
THAT IM GONNA TELL YA ABOUT,A FEW OF
THEM DEFINATELY HAVE BEEN BURNING AND
FUCKING PEOPLE IN SPADES.
NOW LET YE STORY UNFOLD.



R-R-R-I-I-I-N-N-N-G-G-G

HELLO

BOOTLEG,THIS IS TIM OF THE WACKO/CRACKO
BROTHERS.DO YOU WANNA JOIN A CONFERANCE.
SURE SAYS I.

BEEP

HEY BOOTLEG,SAYS TIM,IVE BEEN TALKING TOCHESIRE CATALYST AND HE'S GONNA GIVE
ME THE RIGHTS,MAILING LIST,BACK ISSUES,
AND NAME OF TAP MAGAZINE TO ME SO I CAN
RESTART TAP.

WHOA-A SAYS I-HOW YOU GONNA GET PEOPLE
TO SUBSCRIBE SINCE TAP BURNED LOTS OF
PEOPLE 2 YEARS AGO OUT OF A BUNCH OF
SUBSCRIPTION MONEY.

WELL,SINCE MY MOM OWNS A PRINTING
COMPANY AND MY DAD OWNS 2 AD AGENCYS
AND 2 RADIO STATIONS AND IVE ALREADY
INTERVIEWED 50 OF THE GREATEST PHREAKS
AND HACKERS IN HISTORY AND IVE GOT A
53 PAGE 1ST ISSUE ALL LAID OUT AND
READY TO GO,IVE BEEN ADVERTISING ON
ALL THE BOARDS FOR SUBSCRIBERS,AND
IVE BEEN GETTING ABOUT A HUNDRED
SUBSCRIBERS PER DAY AT $35 EACH.

WOW-SAYS I!! THAT SOUNDS GREAT SO
FAR.IF INDEED YOU CAN RE-START
TAP,YOU CAN COUNT ON ANY HELP I
CAN GIVE YOU.

WELL BOOT,I WAS WONDERING IF YOU WOULD
BE TAPS WEST COAST EDITOR.

SURE SAYS I,IF INDEED YOU CAN REALLY
PUT WHAT YOU SAY TOGETHER ILL EVEN
SEND YOU A BOX OF TELCO MANUALS AND
INTRODUCE YOU TO A GREAT HACKER THAT
ALREADY HAS PUBLISHING EXPERIENCE.
(BILL LANDRETH AKA THE CRACKER THAT
WROTE "OUT OF THE INNER CIRCLE")
AS A MATTER OF FACT,ILL CALL BILL
AND SEE IF HE WANTS TO GET INVOLVED,
IF SO HE WILL CALL YOU SOON.

BUT THERE IS ONE PROBLEM SAYS TIM.
SEEMS LIKE AS SOON AS A LOT OF
PEOPLE HEARD I WAS GETTING TAP,THEY
ALSO HAVE STARTED CALLING CHESIRE
TRYING TO GET HIM TO GIVE THEM THE
MAGAZINE OR STOP ITS PUBLICATION
BECAUSE THEY DONT WANT THE COMPET
ITION.

WHAT AND WHOM ARE THESE PEOPLE SAYS
I? AND WHY ARE THEY DOING THIS?

ONE GROUP IS LEX LUTHOR AND L.O.D.
MEMBERS BECAUSE THEY WERE THINKING
OF STARTING THEIR OWN MAGAZINE CALLED
PROJECT AWARE,AND WERE AFRAID THAT
TAPS REBIRTH WOULD KILL ANY CHANCES
OF THEIR PUBLICATION SUCCEEDING.

HELL,SAYS I-LOD TIS BUT A VERY SMALL
GROUP IN THE HACKING/PHREAKING
COMMUNITY.ALTHOUGH I KNOW A LOT OF
THEM OVER THE YEARS,I WOULD THINK
THEY HAVE MATURED BEYOND PLAYING
KID TYPE GAMES AND PETTY JEOLOUSLY.
AFTER ALL,THERE IS ROOM FOR ANOTHER
10 GOOD MAGAZINES,AND I MYSELF HAVE
MORE INFO,MANUALS,ETC. THAT CAN
EVER BE PUBLISHED BY EVEN 10 MAGAZINES.
NOT ONLY THAT-BUT NEW STUFF TIS AVAILABLE AT AN ASTOUNDING RATE NOWADAYS.

NO TIM,YOU JUST TELL ANYONE THAT TRYS
TO INTIMIDATE YOU TO FUCK OFF AND DIE!
EVERYONE COULD HAVE CALLED CHESIRE
AND DONE THE SAME THING YOU DID OVER
THESE LAST 2 YEARS.NOW THAT SOMEONE
FINALLY HAS THE BALLS TO DO IT,I FOR
ONE WILL HELP THEM OUT.AND IM SURE
THAT EVERYONE I KNOW WILL STAND BEHIND
WHOMEVER HAS THE GUTS TO PUBLISH TAP
AGAIN.

THANX BOOTLEG,BUT ANOTHER PROBLEM
THAT HAS ARISED IS THE RUMOR THAT
CHESIRE DOESNT OWN TAP ANYMORE.

TIM-THE ONLY PEOPLE THAT ARE FEEDING
YOU ALL THIS BULL ARE THE ONES PRETEND
ING TO BE YOUR FRIENDS SO THAT THEY
CAN TALK YOU INTO NOT PUBLISHING TAP.
THESE PEOPLE(NAMES WITH-HELD) HAVE
THEIR OWN GREEDY PLANS FOR GETTING
TAPS NAME AND WILL TRY ANYTHING TO
CON OR SCARE YOU INTO GIVING UP.
YOUVE DONE A GREAT JOB ON YOUR
OWN SO FAR,AND YOU DONT NEED ANY OF
THEM,THEY NEED YOU,OR OTHERWISE THEY
WOULDNT BE GIVING YOU THE TYPE OF
ATTENTION YOUVE BEEN GETTING.
DONT PAY ATTENTION TO THE 1 % OF
OUR COMMUNITY THAT ARE ARROGANT
SUPPOSED KNOW IT ALLS.OVER THE YEARS
IVE FOUND THAT THE BEST HACKERS AND
PHREAKS HELP OTHERS,AND COULDNT CARE
LESS ABOUT JOINING GROUPS WITH FUNNY
NAMES.99% OF THE COMMUNITY WILL
SUPPORT TAPS NEW PUBLISHERS 100%.
AND THATS WHAT THE OTHER 1% IS
DEATHLY AFRAID OF!!!!!!!!!

OK BOOT-IM GONNA GO AHEAD WITH TAP
EVEN IF CHESIRE DOESNT WANT IT
REVIVED!BUT FIRST IM GONNA ASK
FOR A MEETING IN NEW YORK WITH
CHESIRE,YOU,ME,THE CRACKER,TUC,
SUSAN THUNDER,2600 MAGAZINE,HIGH
TIMES MAGAZINE,SCAN MAN,LEX LUTHOR,
AND CAP'N CRUNCH AKA JOHN DRAPER.
IF YOU AND BILL CAN GO,ILL PAY
FOR THE PLANE TICKETS AND HOTEL.



(AFTER SEVERAL MORE DAYS OF CONFERANCES, PEOPLE CHANGING SIDES,AND MORE
FIGHTING FOR TAPS CONTROL,A DECISION WAS REACHED TO MEET IN NYC MARCH 8TH FOR A
GENERAL
TAP CONVENTION TO DECIDE BETWEEN ALL
INVOLVED WHAT YE FATE OF TAP IS TO BE.)

READ THE NEXT FILE TO LEARN ABOUT YE
GREAT 1986 TAP CONVENTION!!!!!!!!!!!










WANT CATALOGS AND WHOLESALE PRICE
LISTS OF ALL KINDS OF TELCO EQUIPMENT?
JUST CALL THESE PHONE EQUIPMENT
DISTRIBUTORS FOR GREAT DEALS.

CENTRAL SUPPLY 800-2284598
NORTH SUPPLY 913-7917090
7000
ATI SUPPLY 818-8899236
GRAYBAR ELECTRIC 314-7273900
LINCOLN SUPPLY 800-2280062
ANIXTER 312-6772600
ALLTEL SUPPLY 404-4478410

YA CAN GET TELCO HANDSETS TO CENTRAL
OFFICE SWITCHES USED BY CALLIN YE
BELOW # FOR A FREE SUBSCRIPTION TO
THIS MONTHLY SHEET.

TELECOM GEAR 800-542-7279
212-691-8215
MODEM 212-989-4675

CALL WITH CARE-BUT CALL ANYWHERE!

NUFF SAID-
BOOTLEG
TRANSMISSION TEST LINE AND TEST-LINE TERMINATIONS DIRECTORY

1. GENERAL

1.01 The purpose of this practice if to provide a list of working NNX
Codes, The Common Language Location Identification (CLLI) Codes for the
associated Central Office Building, the principal geographical location served,
and related test-line terminations.

1.02 Since the test numbers have been standardized, this practice will
also indicate the type of test line provided for each NNX Code.

1.03 Test line or test termination are terms sometimes used
interchangeably to name a testing equipment, facility, circuit, or test
communication channel. These include simple static terminations and relatively
complex testing circuits capable of applying marginal tests and recognizing and
replying to specific signals received.

1.04 Test lines for intertoll trunks are known as National Code Test Lines
(or test terminations) and are a part of the basic maintenance pattern in the
intertoll dialing plan. These National Code Test Lines provide assistance in
connection with maintenance tests at Testboards and automatic testing
equipment. These test lines and details of operation are shown in Section 2 of
this practice.

1.05 Bell System Practice 660-450--301 contains information on testing at
Testboards and locations other than Testboards.

1.06 Local Test Lines (or terminations) are located in the end offices
(local central offices) and complement the manual and automatic test facilities
at the outgoing end of the trunk under test. These test lines and details of
operation are shown in Section 3 of this practice.

1.07 This practice is organized in sections to simplify the proceures for
additions and corrections:

Section No. 1 - General Information
Section No. 2 - National Code Test Lines
Section No. 3 - Local Office Test Lines
Appendix 1 - Numerical list of NNX Codes and Associated Test
Numbers


2. NATIONAL CODE TEST LINES

2.01 National Code Test Lines (or test terminations) are part of the basic
maintenance pattern in the distance dialing plan for the maintenance of
intertoll trunks. These test lines provide assistance in connection with
maintnence tests at testboards and automatic testing equipment.

2.02 National Code Test Lines 100, 101, 102, 103, and 104 will return a
steady "Off-Hook" signal which removes the single frequency signaling tone that
would otherwise interfere with certain measurements.

2.03 It is important that the equipment associated with the test line
codes be well maintained. Regular checks should be made of their performance
as covered in the Bell System Practice.

2.04 National Code Test Lines include fixed terminations and relatively
complex testing circuits. Some are capable of recognizing, testing, and
replying to specific signals. The more complicated test lines can be used to
make two-way net loss measurements and noise test without assistance from the
far-end office.

2.05 Each test line circuit is connected automatically by the far-end
switching equipment upon receipt of the proper code number. It is disconnected
either on a time interval basis or when released at the originating end.

2.06 Reference:
Code 100 - Bell System Practice 660-440-100
Code 101 - Bell System Practice 660-440-101
Code 102 - Bell System Practice 660-440-102
Code 103 - Bell System Practice 660-440-103
Code 970 - Bell System Practice 660-440-113

2.07 Code 100 - Noise and Balance Terminations
Provides a connection to a test line termination at the terminals of
intertoll trunks for noise and balance testing. The features of this test line
termination are:
a) Returns "Off-Hook" supervision to the calling end as
long as the trunk is held by the calling end.
b) Provides a "Pad Control" feature at offices having
pad control arrangements. Tests are normally made
in the "Pad Out" condition.
c) Provides a 600 or 900 Ohm impedance termination. This
impedance simulates the impedance at 1000 hertz
presented by the intertoll trunk at the point at
which the termination is connected.
NOTE: There is a program underway to convert all
Code 100 test lines to Combination Milliwatt
and Balance test lines. The new test line
enables both far-near loss and noise
measurements to be made on one connection.
The features of the new termination are:
off-hook followed by 5.5 seconds of 1000
hertz, then 5.5 seconds of 600 or 900 Ohm
impedance termination followed by one second
of on-hook, then 600 or 900 Ohm termination
until the calling end disconnects.

2.08 Code 101 - Toll Testboard Communication and Test Trunk
Provides a dial communication line into the testboard that maintains
the intertoll trunks. The features of this test line are:
a) Returns "Off-Hook" supervision to the originating point
when the trunk is answered at the testboard position
and "On-Hook" supervision when the testboard
disconnects.
b) A recall signal from the originating point is indicated
on the testboard position cord lamp. A recall signal
may be returned to the originating point by operating
the proper testboard position key.
c) Provides a "Pad-In" condition during connection at
offices having pad control arrangement. A pad control
key is provided at testboards to check operation of
switching pads.

2.09 Code 102 - One Milliwatt, 1000-hertz Testing Power
Provides access to 1000-hertz test power in various switching systems
for one-way transmission measurements of intertoll trunks. The features of
this test line are:
a) Sends test power for approximately 10 seconds. The
power is then removed to assure that the test line
will be disconnected from the intertoll trunks
single frequency signaling.
b) Returns "Off-Hook" supervision when testing power
is connected and "On-Hook" signal when it is
disconnected.
c) Provides idle circuit termination in the on-hook
condition.

2.10 Code 103 - Supervisory and Signaling Test Termination
Provides a connection to a test circuit for overall test of
supervisory and signaling path features of intertoll trunks. The features of
this test line are:
a) Returns "Off-Hook" supervision to the originating
point on seizure of test trunk.
b) Returns "On-Hook" supervision on receipt of a ring
forward signal.
c) Provides a flashing "On-Off-Hook" signal of 120 IPM
(recorder flashes) on reciept of a second ring forward
signal.

2.11 Code 104 - Far-End Transmission Measuring and Noise Checking
Circuit
Provides a test termination for two-way transmission testing and
one-way noise checking on calls originated by a Distant Automatic Transmission
Test and Control Circuit (ATTC) or by a distant testboard. The features of
this test line are:
a) Provides for normal pad arrangement under measuring
condition.
b) Receives and measures 1000 hertz, one milliwatt minus
the circuit loss.
c) Arranges a network to simulate the loss indicated
above.
d) Sends 100-hertz, one milliwatt tone toward testing pad.

2.12 Code 105 - Automatic Transmission Measuring System (ATMS)
Circuit
Provides access to an ATMS responder used for automatic transmission
measuring programs, such as ATMS and CAROT (Centralized Automatic Reporting on
Trunks). For more information on 105 test lines, see Bell System Practice
103-250-101.

2.13 Code 970 - Used for Office Balance
Provides a connection through the crossbar switches to a spare office
link terminal and the associated appearance at the manual outgoing trunk test
frame.

3. LOCAL OFFICE TEST LINES

3.01 Local office test lines (or test terminations) are provided for the
maintenance of interoffice and toll switching trunks with the test

  
originated
either on a manual or automatic basis.

3.02 These test lines are reached by dialing or keying a customer-type
telephone number.

3.03 Combination One Milliwatt (102-Type Test Line) and Loop
Around
Two terminations are provided for transmission testing of trunks.
Test calls directed to the first termination are connected to a one-milliwatt,
1000-hertz source for far-to-near end termination loss measurment.

Two-way transmission loss measurements may be made by one person
utilizing both terminations. After having measured the far-
to-near end loss of all trunks in the group using this reference trunk, a test
call is originated to the first termination. Taking each of the remaining
trunks in turn, originate a call to the second termination and connecting test
power to this trunk at the near end, then measure power received at the near
end on the reference trunk. By knowing the far-to-near loss of the reference
trunk and the overall measurement of the two trunks, the near-to-far loss is
calculated by subtraction. The requirements for these terminations are as
follows:
a) Trips machine ringing.
b) Connects one-milliwatt, 1000-hertz testing power to the
first termination at 10-second intervals as long as the
connection is held at the calling end and no connection
made to the second termination. This interval consists
of 9 seconds test power with off-hook supervision and 1
second no power with on-hook supervision and idle
circuit termination.
c) With a connection to the first termination with the
second termination selected, test power is removed from
the the first termination and the transmission path of
both terminations are directly connected, forming a
loop. Off-hook supervision (9 seconds), followed by
on-hook supervision (1 second), is returned on both
terminations. Release of the second termination
returns test power to the first termination.
d) When the second termination is selected without a
connection to the first termination, ringing will
be tripped and an idle circuit termination connected
to the transmission path with on-hook supervision.
(No.1 and No. 5 Crossbar only. Panel and step-by-
step ringing will not trip.)
Caution: In general, a call to the second
termination should not be made without
first establishing a call to the first
termination, otherwise you may interfere
with other testing.

3.04 Nonsynchronous-Type Test Line
The nonsynchronous-type test line provides an operation test which is
not as complete as the synchronous test but can be made rapidly. the test may
be originated on either a manual or automatic basis.

a) For those offices where marginal-type tests cannot be
applied directly to the incoming trunk circuit, as is
frequently the case in connection with step-by-step
systems, the synchronous test line (See 3.05) is not
required and only the nonsynchronous test line is
required. In this case, the minimum requirements for
this termination are as follows:
1) Starts to function under control of ringing
signal.
2) returns audible ringing for a minimum of 5
seconds.
3) Trips machine ringing.
4) Returns 60-IPM busy signal which consists of
low tone applied during alternate .5 second
intervals until disconnection. Alternate .5
second off-hook and on-hook suppervisory
signals may or may not be returned in
addition to low tone.
b) For those offices where marginal-type test can be
applied directly to the incoming trunk cicuit, as in
the case of Bell System Panel and Crossbar-type
Offices, both the synchronous (See 3.05) and the
nonsynchronous-type test lines are required. In
this case, the minimum requirements for this termina-
tion are as follows:
1) Returns 60=IPM busy signal which consists of
low tone applied during alternate .5 second
intervals until disconnection. Alternate .5
second off-hook and on-hook supervisory
signals may or may not be returned in
addition to low tone.

3.05 Synchronous-Type Test Line
The synchronous-type test lines provide marginal test of the
supervisory and tripping functions. Tests may be originated on either a manual
or automatic basis.

This type of test line is required for offices, such as Bell System
Panel and Crossbar-type Offices where ringing, tripping and supervisory
features are in the incoming trunk relay equipment and may be tested directly.
The requirements for this termination are as follows:
a) Test for application of the ringing signal.
b) Test for pretripping of machine ringing during the
silent interval.
c) Provide interrupted audible ringing tone during one
two-second interval.
d) Test for tripping machine ringing during three-second
silent interval.
e) Provide the following supervisory tests:
1) An off-hook signal of approximately 1.3 seconds
duration for synchronizing with automatic
progression test equipment in the originating
office. During this period, soak current is
applied to the supervisory relays.
2) The synchronizing signal is followed by two
seperate off-hook signals of .3 second duration
during which time soak current is applied to the
supervisory relays.
3) Next, an on-hook signal of approximately .2 second
duration is returned during which time the release
current is applied to the supervisory relays.
4) A second series of off-hook signals consisting of
a synchronizing signal and two flashes are
returned. During each off-hook interval of this
series, operate current is applied to the super-
visory relays. During each on-hook interval, an
open circuit condition is presented to the
supervisory relays.
f) Send tone signals to the originating office as follows:
1) Continued regular audible machine ringing tone
indicates a failure to trip ringing.
2) Audible ringing tone for .3 second intervals
interrupted for .2 second indicates that the
trunk circuit tripping feature operated on the
pretripping test.
3) A "tick-tock" tone at the rate of 120 IPM without
flash indicates that all tests have been completed
and are awaiting disconnect.

3.06 Office Identification
An office identificaton test termination is provided so that manually
originated test calls, directed to this termination from other offices within
the system, will receive an indication that the proper termination was reached.
To insure that the proper office is reached, a different telephone number
(four digits excluding office prefix) is required for each series of telephone
numbers comprising a terminating local office unit in a Numbering Plan Area.
a) Electro-mechanical Offices
The requirements for electro-mechanical office termina-
tions are as follows:
1) Trip machine ringing.
2) Return high tone to the calling end as identifica-
tion tone.
3) Return on-hook supervision to the calling end to
prevent charge in case a subscriber inadvertently
dials this termination.
Note: The present Panel and Crossbar-Type Offices
use a call-through test line circuit for
this termination which returns interrupted
high tone for approximately seven seconds
before it returns off-hook supervision.
b) Electronic Switching Offices
The requirements for No. 1 and No. 2 ESS Office Termi-
nations are as follows:
1) Busy tone for seven seconds with on-hook super-
vision.
2) Busy tone for seven seconds with off-hook super-
vision.
3) Following the period of busy tone, the connection
to the busy tone is abandoned and the ICT is
connected to a steady high tone trunk. A continous
alternating sequence of on-hook (500 - 600 ms) and
off-hook (1500 - 1700 ms) signals is sent until
disconnect.

3.07 Noise and Balance Termination-900 Ohms (100-Type Test Line)
A termination for noise and balance (return loss and sing- ing) test
is provided for all trunks. The requirements for this termination are as
follows:
a) Trips machine ringing.
b) Provides a 900-Ohm termination across the transmission
path simulating the nominal impedance of a subscriber's
loop.
c) Provides supervision at 10 second intervals as long as
connection is held by calling end. This consists of 9
seconds off-hook followed by 1 second on-hook. (Panel
and step-by-step only. No. 1 and No. 5 Crossbar steady
off-hook.) (Note - See paragraph 3.13).

3.08 Noise and Balance termination - Short Circuit
A short circuit termination for noise and balance (return loss and
singing) test reached by calling a subscriber's telephone number is required
for trunks with E-type repeaters. The require- ments for this termination are
as follows:
a) Trips machine ringing.
b) Provides essentially an AC short circuit across the
termination.
c) Provides supervision at 10 second intervals, as long
as connection is held by calling end. This consists
of 9 seconds off-hook followed by 1 second on-hook.
(Panel and step-by-step only. No. 1 and No. 5 Cross-
bar steady off-hook.

3.09 Noise and Balance Termination - Open Circuit
An open circuit termination for noise and balance (return loss and
singing) test on trunks with E-type repeaters. The requirements for this
termination are as follows:
a) Trips machine ringing.
b) Provides an impedance termination which at 1000
hertz simulates an open termination.
c) Provides supervision at 10-second intervals, as long
as connection is held by calling end. This consists
of 9 seconds off-hook followed by 1 second on-hook.
(Panel and step-by-step only. No. 1 and No. 5 Cross-
bar steady off-hook.

3.10 Office Balance Termination - OB
Code used for reaching outgoing trunk test frame in crossbar tandem
swtiching office and operates as follows:
a) This code provides a connection through the crossbar
tandem swtiched to a spare office link terminal and the
associated jack apperance at the manual outgoing test
frame.
b) Reference: Bell System Practice 660-440-113

3.11 Far-End Transmission Measuring and Noise Checking Circuit -
104-Type Test Line
Provides a test termination for two-way transmission testing and
one-way noise checking on calls originating by a distant automatic transmission
test and control circuit (ATTC) or by an automatic transmission measuring
system (ATMS), together with an appropriate test frame.

Manual test may be made to this circuit from the following locations:
a) Toll Testboard
b) Manual outgoing trunk test frame.
c) Master test frame (MTF).
d) Other manual transmission testing arrangements at the
orignating office.

Reference: Bell System Practice 103-235-100

3.12 "99" Test Terminal
In some stp-bystep offices the tens and units digits, 99, is a
reverse battery test number.

3.13 Combination Milliwatt and Balance Test Line (New 100-Type
Line)
This is a new test termination that will be installed in all central
offices to replace existing Noise and Balance - 900 Ohm or "quiet line"
terminations (See 3.07). Although all codes will eventually be equipped, a c
following the 900 Ohm balance number in the appendixes indicates that the
100-type test line is the old type (i.e., termination only, no tone). The
advantages of the Combination Test Line are:
a) Gives a positive indication that a properly terminated
Balance test line has been reached.
b) Allows both far-near loss and noise measurements to be
made on one dial-up connection.

The features of the Combination Milliwatt and Balance
test line are as follows:
a) Trip machine ringing and return off-hook super-
vision.
b) Send 1000 hertz, one milliwatt test tone for 5.5
seconds.
c) Provide on-hook supervision for one second.
d) Return off-hook supervision and 900 Ohm
impedance termination until calling end
disconnects.

3.14 ATMS 105 - Automatic Transmission Measuring System (ATMS)
Circuit (105-Type Test Line)
Provides access to an ATMS responder used for automatic transmission
measuring programs, such as ATMS and CAROT (Centralized Automatic Reporting on
Trunks). Information on Central Office responsibilities for CAROT can be found
in Addendum 010-410-300 OB.



ides access to an ATMS responder used for automatic


Here is another description of the various test numbers in use around the area
codes phrequently phreaked by phine phoney phellows and phelines.

----------------------------------------------------------------------

1. General

1.01 This directory provides test line numbers used for operational and
transmission trunk testing in class 5 offices that are equipped with test
lines.

2. Acronyms and Abbreviations

2.01 Following are the acronyms and abbreviations used in this
instruction:
ATMS -- Automatic Transmission Measuring System
BAL -- Balance
CLLI -- Common Language Location Identification
HZ -- Hertz
MW -- Milliwatt
NPA -- Numbering Plan Area
RSB -- Repair Service Bureau
STC -- Serving Test Center
SUPV -- Supervisor or Supervision
SNYC -- Synchronous
TND -- Test Number Directory
TP0 -- Test Pad, Value 0
TP2 -- Test Pad, Value 2 dB
TP9 -- Test Pad, Value 9 dB

Designation Equipment Type
----------- --------------
AES Automatic Electric System
DMS Digital Multiplex Switcher
DV Digital Vidar
4AT No. 4A Toll Crossbar
1EAX Automatic Electric System (Electronic)
1ES No. 1 Electronic Switching System
2ES No. 2 Electronic Switching System
3ES No. 3 Electronic Switching Sysem
4ES No. 4 Electronic Switching System
4MT No. 4 Toll Crossbar
KEL Kellogg
NE North Electric
NEC Nippon Electric Corporation
PAN Panel
RSS Remote Switching System
SXS Step-By-Step(use SXS for 355 and 355A type)
TSPS Traffic Service Positions System
1XB No. 1 Crossbar
3XB No. 3 Crossbar
25X No. 5 Crossbar, 2-wire
45X No. 5 Crossbar, 4-wire
XBT Crossbar Tandem
XY Stromberg Carlson

3. Description of Test Lines

3.01 "Test Line" and "Test Termination" are terms sometimes used
interchangebly to designate a testing equipment, facility, circuit or testing
communicaiton channel. These include simple passive terminations and
relatively complex testing circuits capable of applying marginal signaling
tests, transmission tests, and recognizing and replying to specific signals
received.

3.02 Trunk test lines return off-hook (answered) supervision. This permits
measurements to be made in the normal "in-service" (talk) condition.

3.03 Test lines are adjusted to provide correct level and impedance as
measured at their actual switch appearance.

3.04 Test lines are reached by dialing a customer-type telephone number
when testing toward a class 5 office.

3.05 Class 5 office test lines are arranged to trip machine ringing and
may furnish timed disconnect features when joint-holding and/or in-band
signaling is used. Line equipment is arranged for terminating service only.

3.06 Following is a description of the various test lines:
A) 100-types L or T - provide a termination equivalent to the
office switching impedance and is used for balance and noise
test. A typical sequence after seizure is:
-- Off-hook supervision
-- 175 millisecond delay
-- 5.5 second burst of 1000 Hz tone
-- 5.5 second termination
-- 1 second interval of on-hook supervision
-- termination with off-hook supervision until
released by calling end.
Earlier versions are not equipped with timed test tone and
may return repetitive 1 second intervals of on-hook every
10 seconds until released.

B) AC short and AC open termination - used to test the
stability of trunks with negative impedance repeaters.
These test lines:
-- Trip ringing
-- Return off-hook supervision
-- Provide essentially an AC short circuit and an
AC open circuit respectively. They may be equipped
with repetitive disconnect features.

C) 102-type - provides connection to a 1004 Hz power source
(milliwatt) required for one-way transmission testing.
Typical features are:
-- Off-hook supervision
-- 175 millisecond delay
-- 1004 Hz at reference level
-- 1 second interval of on-hook supervision, without
tone. Every 10 seconds until released.
-- Idle circuit termination during on-hook


Fixed pads (TP2, TP9) and pad switching signals are included
in the test line, when required, to furnish proper reference
level at the switch.

D) Synchronous type - enable automatic and manual testing of
the signaling and supervisor features of trunks not equipped
to recognize ring forward signals.
1) After ringing signal and pretripping test, a 1.3
second synchronizing pulse (off-hook signal) is sent.
This synchronizes the automatic progression test equip-
ment in the originating office with the test line.
2) The synchronizing pulse is followed by three 0.2
second intervals of off-hook. During the off-hook
periods, soak current is applied; during the on-hook
periods an open circuit is presented to the supervisory
relays.
3) A third series of signals may be provided to test
transfer features of centrex offices.
4) Results of tests are as follows:
-- 0.3 second bursts of audible ringing at 0.2
second intervals indicate that the trunk
tripping feature operated on the pretripping
test, or
-- a tick-tone at 120 IPM, without flash,indicates
that all tests are completed.
E) Nonsynchronous type - after ringing signal and tripping of
ringing tests are made, flashing supervisory signals are
sent. A typical sequence is:
-- 1.0 or 1.5 seconds off-hook
-- 0.5 second on-hook
-- 1.0 or 1.5 second off-hook
-- 0.2 second on-hook
-- 0.3 second off-hook
-- Repeats of 0.2 second on-hook and 0.3 second
off-hook until released. Low tone is generally
applied during off-hook periods.
In offices also equipped with a synchronous test line, the
nonsynchronous test line may:
-- Trip ringing, and
-- Return alternate 0.5 second off-hook and on-hook
signals with low tone applied during the off-hook
periods, until released.
F) 105-types L or T - provide access to a far end automatic
transmission measuring system (ATMS) responder. Two-way
transmission, noise and gain-slope measurements may be made
between the far end responder and a near end responder under
control of automatically or manually directed test equip-
ment. Gain-slope measurements are made at 404, 1004 and
2804 Hz at a transmitting level of -16dBM. Early type
responders may not be equipped with this feature.

G) 106-type - Loop-Around test lines permit manual two way
transmission measurements without far end assistance.
Two test line numbers are required for access in class
5 offices.
-- Port A, seized alone, provides the functions of a
102-type test line.
-- Port B, seized alone, provides the functions of a
100-type test line.
-- Ports A and B, seized sequentially, enables the
loop-around feature.
1) Trunk A is directed to Port A and a far-near
measurement is made and recorded. With port A held,
trunk B is directed to port B. This loops the far end
transmission paths of ports A and B.
2) A reference tone is transmitted near-far over
trunk B and measured as far-near over trunk A. The
first recorded measurement subtracted from the second
measurement indicates the near-far loss of trunk B.
3) Early versions may not be equipped with reference
tone, and the initial far-near measurement must first
be ascertained from a 102-type test line. Also, some
early versions do not trip ringing on Port A until Port
B is seized.
NOTE: All loop-around test lines should be equipped with
60A control units.

H) 107-type - provides an automatically generated progression
of test signals. The durations and sequence is as follows:
1) P/AR (Peak to Average Ratio) signal: 15 seconds
2) 1004 Hz at -16dBM: 10 seconds
3) 404 Hz at -16dBM: 10 seconds
4) 2804 Hz at -16dBM: 10 seconds
5) Termination (balance): 20 seconds
6) 1004 Hz at -16dBM: 7.5 minutes
7) Terminations: 3 seconds
8) Repeats steps (6) and (7) until released by
calling end.


---------------------END----------------------------------------

This description contained a little additional information about the
subject of Test Numbers. The main items were the acronyms and abbreviations
plus the switching equpiment designations. The
equipment type ID is very useful because with different types of switches, you
can do different things--IF YOU KNOW HOW!!!!!!

However, not all test number lists include equipment IDS, but most of them do.
Hope you phreaky phellows and phelines phind this info of use. Phreak it up,
but be careful-it's getting nasty out there!!!
u can do different things--IF YOU KNOW HOW!!!!!!

However, not all test number lists include equipment IDS, but most of them do.
Hope you phreaky phellows and phelines phi
The following is an article from the January issue of MCI World, a monthly
newsletter published by MCI for it's employees.

THE MANY FACES OF FRAUD

The new year will see a stepped up MCI attack on telephone fraud--illegal use
of the long distance network through access by stolen authorization codes or
electronic devices. The offensive is led by Everick Bowens, senior manager of
MCI's security investigations department and president of the industry-wide
Communications Fraud Control Association (CFCA). Success in curbing this theft
of service has earned MCI security investigators a reputation as super sleuths
at headquarters and in the divisions.

New teeth were added to the attack on telephone fraud when the U.S. Scret
Service was assigned to augment continuing investigative efforts by the FBI and
other law enforcement agencies.

Because telephone fraud is outright theft from the company, MCI is determined
to prevent, detect, investigate and prosecute any illicit use of its network.
To learn more about how MCI conducts its antifraud campaign, MCI World talked
with Bowens.

MCI World: Is it true that MCI has systems that can detect fradulent activity
while it is occuring?

Bowens: Yes: Our fraud systems detect abnormal usage and hacking. The
systems also help us to track down offenders even when we have only the
authorization code he or she is abusing. Because we can profile abusers and
trace phone calls, it is easier for us to prepare cases for prosecution.

MCI World: Abuses involving computer "hacking" to get authorization codes seem
to attract public attention. But there are other types of fraud equally
damaging to the telecommunications industry. Would you identify some of these?

Bowens: The primary form of abuse is by "hackers," who use computer
programs to derive customers' authorization codes. These codes can be widely
disseminated via electronic bulletin boards. Because many of these boards are
public, the codes fall into the hands of anyone with access to the boards. We
also encounter electronic toll fraud, wich involves tone-generating devices
that allow offenders to place fraudulent calls.

MCI World: Is one type of fraudulent activity more prevalent than another?

Bowens: Natonwide, fraud most frequently originates from military posts,
college campuses and prison--places where there are numbers of people far from
home, or who have little else to do but manipulate the telephone. This type of
abuse prompts the bulk of our investigations.

MCI World: Who is most likely to commit fraud? Is there a general profile of
the common offender?

Bowens: Computer crime typically occurs in affluent, metropolitan suburbs
and involves juveniles. Electronic fraud also occurs in major metropolitan
areas. Other abusers, such as high-pressure telemarket-
eers, usually follow the coast lines. California and Florida, for "boiler
room" operations in which phone service is used illegally to sell merchandise.
However, fraud can't be totally attributed to any specific group at any
particular time.

MCI World: How can you keep up withh code abuse and fraud? Don't offenders
change frequently?

Bowens: Interestingly enough, the patterns don't change much. Those who
commit fraud form a finite community that doesn't expand a great a great deal
over time. Casual offenders, individuals who may take advantage of a "hot"
toll free number, will use the number only when it's hot. Once the number no
longer works, they'er not likely to repeat the offense. On the other hand,
repeat offenders are dedicated to getting something for nothing. They're
somewhat easier to identify because they commit the same offense over and over.

MCI World: How does MCI know when it is the target of fradulent activity?

Bowens: Our systems generally alert us, or an employee or a customer
informs us. People know the MCI name. When they recognize something happening
illegally with an authorization code, they'll get in touch with us. People
generally feel that a cheat is a cheat, a crook is a crook, and if they have to
pay full value for a phone call they see no reason why someone else shouldn't.
There also ar professional tipsters who go from one company to another offering
information for a price. However, we rarely deal with them.

MCI World: Which MCI people, by the nature of their jobs, are most likely to
detect or at least suspect, fraudulent activity?

Bowens: Our switch technicians have been very instrumental indetecting
abuse. They're in a position to identify extensive busy signals on circuits,
abnormal calling patterns and code use. They've identified many hackers just
by reviewing their daily call statistics. Employees in our billing department
are also good at spotting unusually large bills and abnormal patterns. Though
most fraud is detected by the systems we ahve in place, the human eye continues
to be extermely helpful.

MCI World: In addition to working with internal people to help detect
fraudulent activity, you also rely on the expertise of external agencies. Which
outside agencies assist you with investigations.

Bowens: When fraudulent activity involves the theft or illicit use of
authorizatin codes or credit calling cards, MCI and the Secret Service work
together to investigate the case. If other activity is involved, such as the
use of our service in furtherance of other crime, MCI works with the FBI. When
the U.S. Postal Service is manipulated in a fraud case, MCI anb postal
inspectors investigate together. Additionally, Bell operating companies often
provide hard evidence in cases that MCI prosecutes.

MCI World: When you are alerted to suspected fraudulent activiy, what steps do
you take to open and pursue the case?

Bowens: Security investigators contact the customer whose code is being
abused, advise them of MCI's suspicions, and attempt to confirm them. If the
response confirms their suspicion of fraud, they open
the case. Normally, an investigation entails much research into toll records
to identify abusers, unusual call patterns and the parties who might be
involved in illicit activity. We also interview parties receiving the calls
and document their statements. Once we collect sufficient evidence, we decide
whether a case should be pursued as a criminal or civil action.

MCI World: How long does it normally take MCI's investigators to "crack" a
case?

Bowens: Typically, investigators can crack a case within hours. identifying
fraud suspects is the easy part. Amassing the evidence--dotting all of the
legal i's and crossing the t's--is tougher. Gathering evidence may take weeks
and large cases involving many parties can take months to solve.

MCI World: With fraudulent activity knowing no geographical restricitons, how
do you segment the problem divisionally?

Bowens: The security investigations department acts primarily in an
advisory capacity, helping investigators in the divisions with procedural
matters. The divisons generally take responsibility for investigating
fraudulent activity within their jurisdicitons and corporate investigators
pursue cases that are large in scope or require specific expertise. Coporate
also takes on cases invovling ofenders operating in more than one division.

MCI World: Cna you elaborte on MIC's goals for reducing the level of
fraudulent activity?

Bowens: we want to reduce fraud to the lowest possible level. One of MCI's
goals is to cut fraud by more than half in 1986. We want to be the industry
leader in curbing this illegal activity.

-------------------END--------------------------

Duh......which way did they go George, which way did they go??????

el. One of MCI's goals is to cut fraud by more than half in 1986. We want to
be the industry leader in curbing this illegal activity.

-------------------END--------------------------

Duh......which way did they go George




A LOT OF YOU HAVE BEEN ASKING FOR
PROGRAMS THAT WILL HACK OUT VARIOUS
CODES,NUMBERS,PSWDS,ETC.

OK-IVE COMPILED THE MOST POPULAR
AND EFFICIENT HACKING PROGRAMS
EVER ASSEMBLED!THESE INCLUDE SUCH
INFAMOUS PROGRAMS AS THE OUTLAWED
"TSPS" AND THE NOTORIOUS "JOSHUA".
ALONG WITH THESE FAVORATES,INCLUDED
ARE THE 600 CODE PER NIGHT HACKING
PROGRAM BY THE PROFESSOR.ALSO,ALL THE
OTHER UNDERGROUND HACKING PROGRAMS
THAT HAVE EARNED THEIR FAME IN THE
SPIRIT OF WARGAMES!!!

TO ORDER "THE HACKER" SEND $100
TO-

THE HACKER

1080 HAYS CUT-OFF ROAD
CAVE JCT.OR.97523


NUFF SAID-
BOOTLEG

P.S. THIS COLLECTION OF HACKING
PROGRAMS WILL DEFINATELY TAKE
UP SEVERAL DISKS OF SPACE!
THE BOOTLEGGER HAS A FOOLPROOF METHOD
OF SAFELY TRADING DISKS WITHOUT BEING
RIPPED OFF!
SIMPLY SEND 10 OR MORE DISKS TO ME
WITH $2 TO COVER POSTAGE,AND I WILL
HOLD THEM UNTILL THE PERSON YOU ARE TRADING WITH ALSO SENDS THE DISKS YOU
WANTED! WHEN BOTH PARCELS ARE RECEIVED-I'LL
MAIL THEM OUT.IF ONLY ONE PARCEL IS RECEIVED- AFTER 2 WEEKS ILL MAIL IT BACK,OR
FILL YOUR DISKS WITH NEW PROGRAMS!
I RESERVE THE RIGHT TO COPY ANY PROGRAMS WHILE WAITING! HEE-HEE

NUFF SAID-
BOOTLEG

P.S. AT LEAST ONE PARTY TO THE TRADE
MUST BE A CURRENT SUBSCRIBER!
ALSO-FILL BOTH SIDES OF YOUR DISKS.
I'VE BEEN GETTING SOME OLD STUFF
IN THE TRADE CLUB LATELY,SO WHAT IM
DOING IS EXCHANGING OLD FOR OLD,NEW
FOR NEW! (GET THE HINT?)





IF YE FOLLOW THE TELCO TRADE MAGAZINES
YOU WILL RECOGNIZE THAT THE CURRENT
TREND IS TOWARD "ISDN" CAPABILITIES.
ISDN STANDS FOR INTEGRATED SERVICES
DIGITAL NETWORK.AT&T TIS MAKING ISDN
AVAILABLE COMMERCIALLY WITH THE 5E4
GENERIC OF THE 5ESS SWITCH.
WHAT ISDN DOES IS TO PROVIDE VOICE/
DATA AND LAN CAPABILITIES EVERYWHERE
WHILE INTERFACING WITH AT&T
UNIVERSAL OPERATIONS SYSTEMS.(USO)
FINE AND DANDY YE SAY-WE'VE BEEN
USING VOICE/DATA FER YEARS NOW
OVER BELL LINES WITH NO PROBLEM.

BUT UNDER ISDN/USO ARE INTEGRATED
SUCH NICETIES AS REMOTE MEASUREMENT
SYSTEMS THAT MONITOR AND MEASURE
YOUR CALLS AT FIRST LEVEL!

USO IS DESIGNED TO PROTECT THE
BELL SYSTEM FROM MIS-USE WITH
LAYERS OF INTEGRATED SYSTEMS THAT
CONTROL COSTS AND MONITOR CALLS
FROM BEGINNING TO END!

NOW THE BELL COMPANIES WILL ENTICE
ITS CUSTOMERS WITH THE FACT ISDN
CAN SEND VOICE/DATA/AND FASIMILE
MESSAGES SIMULTANEOUSLY OVER A
SINGLE LINE AND ALSO USO WILL
GIVE CUSTOMERS GREATER CAPABILITIES
WITH THEIR PHONES,THEY FAIL TO TELL
YA BOUT YE ALLMIGHTY REASON FOR
THEM BEIN SO-O-O NICE TO YOU,BUT
ILL TELL YA!!!!!!!!!!!!!

ITS CALLED--

BIT-MILE

YEP-ALL THIS NICE SOFTWARE AND
EQUIPMENT TIS DESIGNED TO ALSO
MEASURE DATA USING A UNIT OF
1 MILE PER BIT CALLED THE BIT-MILE!
THEY HOPE TO SLIDE THIS MONSTER
THROUGH PUC AND PAST OUR NOSES BEFORE
ANYONE CAN RECOGNIZE ITS IMPLICATIONS.

SOON,A LARGE PERCENT OF COMMUNICATIONS
WILL REPLACE VOICE AT TREMENDOUSLY
EXPANDED BAUD RATES.(1.7 BILLION BITS
PER SECOND ARE NOW BEING USED OVER
FIBRE OPTICS LINES WHICH ARE FAST
REPLACING OUR OLD CABLE PAIRS.DO YA
THINK BELL WILL APPRECIATE 3 SECOND
CALLS USING THOSE BAUD RATES???
NOT ON YOUR LIFE! THUS ENTER THE
BIT-MILE UNIT DESIGNED TO CHARGE
THE SHIT OUT OF YOU NO MATTER IF
YOUR CALL TIS 3 SECONDS OR 3 HOURS,
DEPENDING ON YOUR BAUD RATE!

IF YA THOUGHT EQUAL ACCESS TIS BAD,
WAIT TILL YE BIT-MILE IS IMPLEMENTED.

OF COURSE IF ENOUGH PEOPLE BECAME
AWARE OF BELLS PLAN,WE COULD EASILY
STOP BIT-MILE MEASUREMENT BY COMPLAIN
ING TO PUC AND OUR LEGISLATORS EARLY.

STRIKE THE WAR MACHINE

NUFF SAID-
BOOTLEG

P.S. ALCATEL CITCOM SYSTEMS,INC.
ADVERTISES IN TELCO TRADE PUBLICA
TIONS THAT IT HAS ALREADY DELIVERED
2,500,000,000,000 (2.5 TRILLION)
BIT-MILES OF DIGITAL CIRCUITS UPDAT
ING THE OLD FASIONED CIRCUIT MILE
FOR LONG DISTANCE NETWORKS ALONE.
THEY SAY THEY WON'T STOP UNTIL ALL
OF AMERICA IS DIGITALIZED UNDER
BIT-MILE CIRCUITRY!!!!!!!!!!!!!!

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT