GrayAreas Magazine: Issue 01
__________________________________________________ \.------------------------------------------------'. | | ...
Inuyasha - Episodi Italiani
[INU-YASHA - TITOLI EPISODI] PRIMA SERIE 01. La ragazza e il demone 02. I predatori della sfera 03. La via del ritorno attraverso il pozzo 04. Yura, il demone dei ca...
Hackers Issue 08
* * * * * * * * * * * * * * * * * * * * -= H A C K E R S =- Issue #8, October, 1996: Mischief Night! Edited by...
Hackers Issue 07
Hackers Issue 06
* * * * * * * * * * * * * * * * * * * * -= H A C K E R S =- Issue #6, February, 1996 Edited by: Revolution ...
Hackers Issue 05
* * * * * * * * * * * * * * * * * * * * -= H A C K E R S =- Issue #5, January, 1996 Edited by: Revolution ...
Hackers Issue 04
* * * * * * * * * * * * * * * * * * * * -= H A C K E R S =- Issue #4, November, 1995 Edited by: Revolution ...
Hackers Issue 03
* * * * * * * * * * * * * * * * * * * * -= H A C K E R S =- Issue #3, October, 1995 Edited by: Revolution ...
Hackers Issue 02
* * * * * * * * * * * * * * * * * * * * -= H A C K E R S =- Issue #2, September 1995 Edited by: Revolution "Hacking is life...
KOMBUCHA con tè di ibisco
KOMBUCHA con tè di ibisco Come molti di voi sapranno, è possibile fare Kombucha con quel che viene definito tè di ibisco o Karkadè. L'ibisco sabdariffa, o tè acido, è un genere della famiglia...
guestдля забора профнастил https://kuprnn.ru заборы сетка
AniphaeSMizzonaaaaaaaa 😍😍😍😍😍😍😍😍😍 la mia duchessa miciona 😍 ormai è indelebile
AniphaeSQuesto quadro l'adoro :)
AniphaeSAhhhh l' hai finito! bravissima :)
AniphaeSMolto delicato :)
FrancescoMa questa è Mizzi :) Molto bello. Purtroppo le foto risultano ruotate! Sistemerò presto il codice ...
PS_2here is another original review of a Playstation game from 1995 I just got Twisted Metal at Babbages for $59.95. Although you may consi ...
AniphaeSThey aleays have so mich fantasy :)
FrancescoThe rice kittens are very cute :)
Phone Punx Magazine Issue 01
| 26 Apr 2019
The Phone Punx Network Presents
--Phone Punx Magazine--
"Carjackers of the Information Super Highway"
April 26, 1999
Last Updated: May 04, 1999
~Intro by Mohawk
-Better Homes and Telephone Surveillance
-NOKIA 2160 NAM PROGRAMMING INFO by Maniac
~Scamming by Nothing
~Beating the Caller ID by the Fixer
- LMOS/MLT CODES AND MEANINGS
- Field Techs and Wiretaps
~Controlled Environmental Vaults by Tom Farely
- The impact of the flag burning amendment by Mr. X2
- Cyber McCarthyism by Mohawk
.....The Staff of Phone Punx Magazine.....
Mohawk..................Editor in chief
Seuss ......................FAQ editor/Head tech. writer
Black Axe...............Staff writer
Maniac....................Staff writer/Head writer of Security Breach
All information is protected by the 1st ammendment. However, this
information should not be used in any other way except education.
Our purpose is to provoke thought and we might even entertain you,
if you're good. Nothing in this issue has been tested and we do not
garuntee that it will work. We cannot assure your safety both
legally and phsically and what the hell, mentally if you try anything
in this issue.
Phone Punx Magazine is released about every 4 months, however there is
no set release date. Issues can come out a day or a year after the last
one but we will try to stick to around 3 to 4 months.
We are always looking for more writers. If you want an article published
or if you would like to become a regular writers, send us an email. We would
really like to concentrate on phreaking and large phreaking projects. That is
why the release date for new issues is 3 to 4 months, instead of 2 months
like the OCPP. However, not all articles have to be related to phreaking.
We are experimenting with some new sections that will cater to our audience
with topics other then phreaking. If you feel that you have an article
that would be of interest to phreaks but it is about hacking, cyberculture,
etc, let us know and we will evaluate each article on an individual basis.
We are also looking for ways to compensate our writers for thier time and
effort in writing articles. We will add a link to your webpage but
we may also start a page where we will post a banner or two of your choice.
Any other suggestions are also welcome.
Help us spread the magazine to a wider audience by becoming a
distro site. All you have to do is keep the issues on your website
with a link to them somewhere. Not only will this help us reach more
people, but our readers will have another place to get the zine if
something happens to the site. Email us before you set it up because we
need people to distribute the zine, past issues of the OCPP, and the
FAQ too. If you would like to distribute all 3, you will revcieve a special
link on our page because your just such a nice person.
The Phone Punx Network is more than just one webpage. We hope to span
several webpages that will encompass member websites and distro sites.
To get a network link you must be a staff writer or be involved with the
PPN in another way and have a website that is related to phreaking in some
way or another. If you can't do that, become a distro site and provide
a link back to us. A Phone Punx Network link graphic will be made soon
and must appear on the main page of the site (it won't be that big).
Issue updates will occur when the warrant. To make sure you always have
the freshest issue of PPM, check the "last updated" date on the top of the issue.
It is important that you always have the latest issue because we do screw up
often and we are always fixing our mistakes. To be notified of updates of the
issues, join the mailing list.
To stay up to date with the latest in the Phone Punx Network sign up for the
mailing list. You will be notified of the release of new issues, updates to past
issues and other PPN news. All email address are kept confidential. Just send
an email to email@example.com letting us know you'd like to subscribe.
Please update your OCPP links. Change the name to Phone Punx Network and the
URL to http://fly.to/ppn, if you have a link to us on your page, let us know and we'll
link you back.
We will print your letters. If you would like to make a comment, ask a question, or
whatever, send them in and we will publish them. If you don't want your letter
published, just let us know.
Our email address is firstname.lastname@example.org
To subscribe to the mailing list send an email to email@example.com
Copyright info is located at the end of the issue.
Two years since the release of the first issue of OCPP, we are back with a
new name, look, purpose, writers, etc. Change is good. Where did we go, why the
change, what the hell is the PPN/PPM????? . Well let's start from the begining.
You might want to skip this whole paragraph if you don't want to read this
boring stuff but I do owe the readers an explanation. I warn you, it's nothing
exicting. Around the time of the release of OCPP 10, I was thinking about changing
the zine and the page to suit the ever changing needs and goals of our staff and our
readers. The zine grew into something I never thought posible. It was just a
little hobby thing by a couple of people but it wound up being a zine that had a pretty
big readership (with no outside help) which many people look toward as a sign of
authority, reference, help, etc. I still can't believe it that people refered to us
when they we're having problems with something or some people saying that we we're the
best zine. While some may or may not dispute that, it isn't our goal. Those we're just
people's opinions but it was still amazing to see that stuff. So I wanted to change
the format of the zine and the webpage. Between changing the zine and the webpage,
maintaining the FAQ, releasing a new issue, and all my real life activites I just
couldn't handle it all and I didn't want to release a half-done issue. Around
that time, most of the page went down due to someone canceling thier account where we
had most of our stuff. Now on top of that all those other things I had to do, I had
to put the page back up. A few months after that, ml.org went out of business so
almost all of our links were dead so we had almost no traffic coming to the site.
Life just kept swamping me with things I had to do but a couple people reminded me
around the same time about the zine and I decided I had to get to work on it any
chance I get.
As I said before, we changed everything to keep up with the changing needs
and goals with the zine and the readers. This zine will be forever changing and
we will be experimenting with new things. Your input will greatly affect what does
and does not go in the zine. Let us know what you like, don't like, or would like to
see in the zine. This will still be a phreaking zine but we will also cover other
topics such as cyber-culture, hacking, technology, and anything else that we feel
our readers might enjoy. We hope to focus on big phreaking projects so that is why
the projected release date has been made every 3 to 4 months instead of every 2.
The Phone Punx Network, or PPN is made of former OCPP members and other people
that help us out in one way or another. Some people are involved with writing the
zine, distributing it, writing the FAQ, or anything else that helps us out. By
dividing up the work, we are able to bring you a better product. The Phone Punx
Magazine is the zine put out by the some of the members of the PPN. Not all PPN
members are involved in the zine. All of this is still in it's early stages so this
is all subject to change. We are looking for people to get involved in the PPN, email
us for more info. Of course, we will always need articles and staff writers.
We hope that you enjoy the new format. Things will be changing constantly.
We also need people to update thier OCPP links. Change the name to Phone Punx
Network and the URL to http://fly.to/ppn, if you have a link to us on your page,
let us know and we'll link you back. Send us your comments, questions, and
suggestions. Also, this issue is a compilation of articles from the 10th issue of
OCPP that never came out and new articles. As we get established the quality and
quanitity of the articles will increase.
Suess maintains the Alt.Phreaking FAQ, visit the webpage at:
Better Homes and Telephone Surveillance
Tapping Phones is old (and black) hat to many phone phreaks. Keeping
your tap undetected for a long period is another matter however. Some
taps are so poorly made or implemented that spy-shop 'tap detectors'
will pick them up. Below are a few suggestions on how to keep your
surveillance on the down-low a little longer by using techniques and
tools somewhat more advanced than a beigebox.
* Physical hiding
No matter how well designed or installed, if the person you're
monitoring sees your device, you're screwed. Hiding your tap might seem
obvious, but remember to be creative. If possible, don't hide the tap
on or anywhere near their property. Tracing their line down to a little
used wiring cabinet far away is an option. Secreting away your tap in a
pedestal terminal or wiring enclosure is easier, but runs the risk of a
telco employee finding it. A common solution among 'pros' is to set up
a dummy demarc box or other official looking cover for their tap
(Foraging in the back of company cherrypicker trucks or the Graybar
catalog are the best sources for these things). If you're setting up a
fake demarc or have enough time and privacy to mess with a real
enclosure, find the connection point for the pair you want to tap and
draw traces from them to the back of the circuit board or connector
block with metallic paint. Paint over your traces and no one is likely
to be the wiser. Large wiring cabinets have fat bundles of wire at the
bottom of the blocks, why not secret your device away in the middle of
it or split the monitored pair here? The Phone Book by M.L. Shannon has
some excellent ideas on hiding phone taps and bugs.
* Defeating sweep procedures
Resistive balance tests are a standard step in phone sweeps.
Effectively a technician measures the resistance from each side of the
pair to an earth ground and looks for discrepancies, as series taps
generate a large imbalance. (Yes, I know that a proper tech would
likely run a more accurate stress balance test) After installing a
series device, run a balance test yourself and add a potentiometer or
a few resistors so the line is more or less perfectly balanced (within
10 ohms should do it). Make sure the total resistance doesn't go up too
far, and remember that the line needs to be disconnected at the CO to
Is anyone still using harmonica bugs? I hope not, as these are some of
the easiest things for a TSCM tech (or for that matter anyone who can
dial a tone sweep) to defeat. *DO NOT* use cheap tone activated taps or
bugs. For those of you with a DIY bent, using a series of DTMF tones to
trigger a device would be a much better option. You'll want to make a
note that wardialers might set one of these off. To overcome the
possibility of someone activating the tap by dialing the phone, use A B
C D tones or start the code with something a customer usually doesn't
dial (like X11 codes that are out of use in your area).
Resistance and Capacitance checks:
The most obvious way to check for phone taps is to measure the
resistance of the line under the correct conditions. If the resistance
is much higher than it should be, there's likely something there.
Logical. BUT if the line contains a bridged tap or the cable is
(physically) wet, the resistance of the loop is altered. If your tap
resides on a line with such a flaw, anyone checking the line will
likely chalk the resistance discrepancies up to the bridged tap after
checking for AC faults. For those of you lacking the several thousand
dollars for a line analyzer to determine bridged taps etc. yourself,
call the phone company and ask about having 'your' line tested for ISDN
or DSL readiness. In order to qualify for high speed services a line
must have minimal amounts of bridged taps and no loading coils.
Time Domain Reflectometers:
These things are stock tools of the TSCM trade and the phone company. A
TDR can map out almost anything on a line (like your tap) if used
properly. It's unlikely that you'll have to worry about a TDR being
used to find a tap unless you attempt to surveil a big company or
government agency. Hooking up your tap up behind a loading coil and/or
behind a bridge tap will help obfuscate it, but it can still be found
through near end/far end crosstalk analysis (its an even bigger pain in
the ass than it sounds).
* Tricks for sneakier taps
Coils and Hall-Effect transistors:
Using an induction coil (or electric guitar pickups...) around the pair
will make for a VERY hard to detect tap. Theres a debate about the
ability of even a good waveform TDR to find such connections. Hall
effect transistors give the same result, but with better audio.
Split the pairs and make a sweeper miserable. Find a dead pair in the
same binder group as the pair that you want to monitor, and connect it
to the pair you want to tap tip to tip and ring to ring and put your
tap on that. Anyone finding it will likely chalk it up to an old
Install series taps as close as possible to the target telephone.
Putting a series imbalance (like the one caused by a tap or dropout
relay) in an area of high current (near the CO) creates a hum on the
line. This is an important point if you're intercepting data. Modem
users tend to notice when several kbps are chopped off their connect
speed overnight due to line noise.
Install parallel taps as far as possible from the subject phone.
Methods of sweeping using o-scopes in conjunction with a tone sweep are
less and less effective the farther away the device is.
Using the audio monitor of a DATU would be the greatest way to monitor
a phone, but to the best of my knowledge no one has done it yet. Due to
the problem of how the signal is inverted, its quite possible that it
can't just be reinverted into clear speech. If someone finds out,
please drop me a line.
I've noticed most phone phreaks are rather disorganized. I, quite
frankly, don't give a damn about the state of other people's living
spaces; until someone loses a manual or document of MINE in their
tide of crap. If the idea of pissing off your compatriots doesn't
bother you terribly, what about rooting through your stuff struggling
to burn credit card receipts after you're tipped off that the feds
are preparing to come a'knocking.
Before you start overhauling all your paperwork it's important to
distinguish between notes and archives. Your notes should be in a
small, unobtrusive notebook. In here you should have the dialups,
passwords, et. al that you use on a constant basis. Archives are
your reference library; things that you don't need at your side
24/7. Archives can be squirreled away with minimum
Keep your archives together. A filing box is ideal if you have a slew
of loose stuff. Accordion folders are great for smaller collections.
If you go trashing a lot get a heavy cardboard box too so you can throw
your unsorted papers somewhere. Make an effort to empty and sort it
regularly. Locking up your documents might be a good idea if you have
nosy siblings/roommates/parents. Remember to keep a spare key somewhere
in case your first is lost, or you want someone else to open your files
in an emergency. Note: cover plates for light switches make ideal
places to hide keys.
Be picky about what you keep in your archives. Credit card receipts,
cellphone contracts and other incriminating documents should have the
important parts transcribed and the originals be disposed of ASAP.
If you want to get rid of something do it right and destroy it. I
don't care what claims pen companies make about "indelible" ink,
lighter fluid or WD-40 has dissolved every ink I've ever run
across. Most phone phreaks are broke, so buying a shredder is
usually out of the question. For those of you with greater resources
try to spring for a cross shredder, as it reduces paper to
confetti. Burning docs is cheap, effective as anything, and can
usually be done quickly. Having a special furnace or burn box for
emergency burning is the best idea. Remember that grinding ash to
powder also helps, and that many plastics generate toxic fumes.
Digital documents require different handling, but allow you to show
off more of your cleverness more in hiding them. No matter what, you
must ENCRYPT YOUR FILES!!! From here you can interlace your docs
into .gif or .jpg files, insert them into program as comments in
the code (I have a copy of my phone directory in a copy of PGP I
compiled myself), or post them on webservers as undisplayed files
(especially handy in case of formats, crashes, beer spills,
etc). Remember not to hide files on your k-rad phreaking page, put up
an innocuous front.
I've accumulated ALOT of stuff in my time, and a lot of it I keep
on tape. After a minute of so of music have recordings of you
reading off dialups, passwords, notes, or whatever else you might
have. If you have a passion for older computers, many of them held
data on audio tape.....
Read back issues of Security Breach on the PPN zine archive.
NOKIA 2160 NAM PROGRAMMING INFO
1. NOKIA 2160 NAM PROGRAMMING INFO
(Maniac note: this is verbatim from the the original sheet. I can probably scan the
original sheet for those who are interested. It has some display pictures on it,
which I can't include in text.)
NOKIA MOBILE PHONES, INC.
FOR AUTHORIZED DEALER USE ONLY
NOKIA 2160 SERIES CELLULAR TELEPHONE
NAM PROGRAMMING INSTRUCTIONS
All Nokia 2160 cellular telephones are capable of supporting authentication. The
programmer must decide which form of A-Key is desired for use. The two options are
either RANDOM or DEFAULT A-Key. If the RANDOM key is desired for use, use the quick
NAM programming sequence. If a DEFAULT A-Key is desired, then the complete NAM
programming method is used to program NAM location number 2. The clear key can be
used to correct mistakes.
MENU DRIVEN EASY NAM PROGRAMMING FOR THE NOKIA 2160 P2/EFR HANDPORTABLES
USE FOR A RANDOM A-KEY
1. Turn on the phone and enter programming access code (*#639#)
2. Enter the 10 digit area code and phone number and press the 'send' key (or the 'OK'
soft key in display)
3. Enter system ID code (SID) supplied by cellular service provider (1-5 digit SID) and
press the 'send' (or 'OK' ) key.
*Optional settings are language and lock code (see below)
*Programming is completed
*Phone automatically powers off then back on NOTE: Change the lock code by adding a
pound sign and a new lock code after the SID. (Example: 175#7788 ; Lock code = 7788).
Change the language by adding a pound sign and a new language code after the code
(Example: 175#0 ; Language = English). Language code: 0 (default) = English, 1 =
French, 2 = Spanish, 3 = Portuguese Change the lock code and language code by
separating each set of numbers by a pound sign (Example: 175#7788#2 ; where the
SID = 00175, Lock code = 7788,Language = Spanish).
COMPLETE NAM PROGRAMMING INSTRUCTIONS
USE FOR DEFAULT A-KEY
ACCESS NAM PROGRAMMING MODE:
1.Turn the phone on.
2.Enter the NAM access code. Factory default is: *3001#12345[MENU]
3.If the screen to the right appears, you have entered the access code correctly.
(Maniac note: screen to the right looks like this: see below
If it does this you're in luck)
If after several attempts you cannot access NAM programming, it is possible that the
access code has been changed, or the phone is in need of service.
MAIN MENU SELECTION
4. Press the [Scroll-Key] up or down until the indicator points at the desired menu
option. Select from the following:
NAM 1 NAM 2 NAM 3 Security Emergency
SW version Serial No. Programmed Field Test
5.Press the [Select] soft key to access the Sub-Menu from and of the above Main
PROGRAMMING NAM's 1 THROUGH 3
6. Press the [Scroll-Key] to scroll through the selected NAM parameter list. An
optional personalized wake-up message can be programmed during the "Own Number"
sequence by pressing the [ABC] key and entering the text.
7. If the value is incorrect, press the [Select] soft key and use the numeric keypad to make
HOME SYSTEM ID HOME SOC OWN NUMBER
PSID/RSID LISTS(Note 1) DEFAULT SETTINGS
NAM STATUS (Enable/Dis) ACCESS METHOD
LOCAL OPTION PRIMARY PAGING CH
DEDICATED A CCH DEDICATED A NUMBER
DEDICATED B CCH DEDICATED B NBR
OVERLAOAD CLASS GROUP ID
SID ALPHA TAG CNTRL A-KEY CODE
PUBLIC SYSTEMS PRIVATE SYSTEMS
8. Use the [OK] soft key to store the new information that has been entered.
9. Repeat steps 6 through 8 for the remaining NAM parameter options to be viewed and/or
10. To program other NAMs, press [Quit] to return to the Main Menu. Select NAM 2 or NAM 3.
Once the Home System ID and Own Number are programmed, the phone will automatically set
the NAM Status to enabled.
PROGRAMMING THE SECURITY CODE:
11. From the Main Menu, use the scroll keys to select the "Security" Sub-Menu, then press
[Select] and the current 5-digit security code will be displayed. The default value is 12345.
12. To change the Security Code at this time, use the numeric keys to enter the new value.
13. Press the soft key [OK] to store changes. Note: The Lock Code will be automatically
changed to the last 4 digits of the new security code.
PROGRAMMING EMERGENCY NUMBERS:
14. From the Main Menu use the scroll key to select the "Emergency" Sub-Menu, press the
[Select] soft key to access the emergency numbers.
EMERGENCY NUMBER 1 (911)
EMERGENCY NUMBER 2 (*911)
EMERGENCY NUMBER 3 (None)
15. To change the current value, use the scroll key to select the desired field and
press [Select]. Use numeric keys to enter new values.
16. To save the value, press the soft key [OK]. Press [Quit] to exit the menu.
SERIAL NUMBER (ESN):
17. From the Main Menu, use the scroll key to display the "Serial No." or ESN of the phone.
Press [Quit] to exit the menu
PROGRAMMED: (DATE THE PHONE IS FIRST PROGRAMMED)
18. From the Main Menu, use the scroll key to display the "Programmed" menu
19. Press [Select] and enter a four-digit number that corresponds to the month and year the
phone is sold. Example (mmyy) 0197 = January 1997, 0996 = September 1996.
NOTE: This menu location can be programmed only one time. Once the date has been
entered it cannot be changed. Any attempt to enter the menu once it has been programmed
will receive a short beep and the message "DATE ALREADY STORED". EXITING NAM
20. To exit the NAM programming mode, turn the phone off and leave it off for five seconds.
Lock Code = 1234, Security Code = 12345
System Acquisition; Public/PSID/RSID Access Code = 123456.
The FIELD TEST MODE is used to investigate how the phone is reacting to the cellular
system. The FIELD TEST information covers signal strength, battery charging status,
cellular state and encryption status. The information is designed to display information
relating to Analog Control Channels, Digital Control Channels, Analog Voice Channels,
and Digital Voice Channels. All the information provided in the FIELD TEST display is in
accordance with IS-136.
To activate the FIELD TEST mode you must be in NAM programming. Instructions for
entering NAM programming are on the opposite side of this page.
(Maniac note: In this case, opposite side means see above).
Use the following steps to enable the FIELD TEST mode.
From the Main Menu use the scroll key to display the "FIELD TEST" menu and press the
[Select] soft key. Use the scroll key to select Enable and press the soft key [OK]. A second
option is available to enable the field test display with back lighting constantly illuminated
while connected to a car kit.
Turn the 2160 off then back on. Once the power up self-test is complete, the FIELD TEST
display will begin automatically. Scroll through the different displays using the scroll key.
To disable the FIELD TEST mode, return to NAM programming and disable the function
under the FIELD TEST menu.
PROGRAMMING PSIDS AND RSIDS:
The Nokia 2160 provides the option to program Private (PSIDs) and Residential (RSIDs)
System ID's as prescribed by IS-136. The PSID/RSID list is programmed to support
system selection/re-selection processes and SID display functions. The Nokia 2160 P2
product will support up to 15 different Private or Residential Systems. These instructions
allow a person to program 5 of the 15available locations. The other 10 locations are
reserved to ensure available locations for automatic programming. Using the NAM
programming menu to program the PSID/RSID is just one of the several ways that this
information can be programmed. The phone also supports automatic programming of the
PSID/RSID values via registration accept message from a Public & Private system, manually
prompting with System Scan Sub-Menu option New Search, or via Over the Air
Programming. Follow these instructions to program the PSID/RSID lists
1. Enter the NAM programming menu and select NAM 1 (or desired NAM).
(Note: PSID/RSID is currently only available in the NAM 1 location. PSID is included in
NAM 2 and 3 for future use.)
2. Use the scroll key to display "PSID/RSID LISTS" and press [Select].
3. Use the scroll key to select the P/RSID 1 or the desired P/RSID (1 through5).
Press the [Select] soft key.
4. Each list contains:
Select Private or Residential system type.
PSID/RSID: System ID of the Private or Residential system. Indicates which
PSID/RSID the mobile will respond to.
CONECTED SYSTEM ID: Connected System ID. The SID that the PSID/RSID is
ALPHA TAG: The name of the Private or Residential SID that will be displayed
when the phone uses the PSID/RSID.
OPERATOR CODE: (SOC) This is the System Operator Code.
Bell South Cellular=003,
Southwestern Bell Mobile Systems=004,
Vanguard=007, Century Cellunet=008,
Pacific Telecom Cellular=009,
Midwest Wireless Communications=010,
Rural Cellular Corporation=011,
Cellular Mobile Systems of St. Cloud=012,
Palmer Wireless Inc.=014
COUNTRY CODE: Enter the Country Code of the PSID/RSID.
PUBLIC SERVICE PROFILES: Contains up to 4-channel and color code values for
each private or residential system. This information is necessary to initiate scanning
for the Private or Residential System.
PRIVATE OPER. FREQUENCIES: Enter the actual channel number(s) that the private
system uses. Up to 4channels per PSID/RSID are allowed.
Unfortunately, I don't own this model of phone, so I couldn't test any of this information.
But it's straight off the manufacturer's sheet, so it should all be correct. I did have to fix
a few typos though...Maniac
Six Flags Great Adventure:
Well now right away don't be distracted by the fact that I put
Great Adventure. For all I know these could work at ANY theme park,
but I FOR SURE know they will work at Six Flags Parks, and I have
experience at Great Adventure.
1. Employee Notice
2. Ok, so how do I get in?! I'm broke!!!
3. Whew! It's hot! I need a drink, but I'm still broke!!!
4. Ai-ite, it's night, but now I'm hungry, and still broke!!!
5. Hey check out this laser tag game, however, I'm broke!!!
6. How would I go about changing my monetary status?
7. I need to go home, but my redbox's all wet and I have no change!!!
1. Well, if you work there, like I no longer do (I quit) DON'T BE A
FOOL! Don't even attempt to steal money and watch it while sneaking
a pretzel or churro or funnel cake, They're watching. By they I mean
the Loss Prevention Department. They're high tech bastards. Ok, ever
see on TV those tiny pencil point type cameras? Oh yeah, they use
those, ALOT of them, and they don't just monitor, they RECORD. I've
seen too many friends go down like this. Stealing money WILL get you
caught. By the way, don't pull ANY of these Six Flags scams
if you work there or plan to work there, many employees will
recognize you and report you. This is a precaution, do what you
want, but as a FINAL warning, PLEASE be careful, and ALWAYS remember,
you leave footprints wherever you walk, COVER THEM GOOD!
2. On to the goods. You're standing outside the gate. You do
NOT have a ticket. How the hell are you going to get in?! Well,
ALAS, there is only one way I know of. Great adventure uses a stamp
that can barely be seen as a yellow stamp, but glows in the black
light. Now many of us have this stupid SpyTech inkpad which can
only be seen in the dark. If you have that you're so set, smear
some on your left hand and walk into the re-enter gate. If they ask
questions get REALLY bitchy and say you aren't a slob and you wash
your hands, it seems to be smeared, anyhow, bitch until you get in,
whatever you do DON'T GIVE UP. That's how you get caught. Well, in
the case that you have NO IDEA what SpyTech is cuz you weren't an
eleet little kiddo like I was, you're not out of luck! As long as
someone in your party, preferably a clean someone, has a season pass
or a ticket. In this case, let them go in, then they should come
out and get their hand stamped. Next they should find a secluded
place to meet you. Now comes the cool part, Lick your hand, get it
really wet (you could always use the water fountain, but saliva
ALWAYS seems to work better). Smack your left hands' together
until the saliva/water forms an airtight seal, and PRESTO! you
are both stamped! Now, don't be an idiot and come in at the same
time as your friend, people may get suspicious.
3. Ok, so now you're hot, thirsty, and broke, right? Get over it,
go to the water fountain! Haha, just kidding. Now the only choice
is do you want soda or water? Water is the easy one, go up to a stand
with a soda fountain and say, can I have some icewater, but none of
that expensive poland spring shit. Now, soda's a little trickier.
You'll have to be with another person for best results. Go up to a
stand with a fountain and say, my friend and I both want
some water, can we have it in a big cup so we can share it? Now cups
aren't counted so they'll usually be happy to oblige, and if they
aren't...BITCH! The customer is #1 all the time, they'll give it to
you. Now, I know what you're thinking, now I just have a big water
idiot! Well, spill it out, or drink it if you so desire. Go up to
another stand that has a fountain (out of sight from the first> and
say that you spilled your soda/juice. They'll give you a new
one, company policy, and even if they don't believe you, just act
cool and don't worry, they'll do it, it's company policy.
4. Hungry eh? Well you have a few options here. You can get
anything for free, no problem. Lets start small: fries. Make
sure you know exactly what you want. Lets say you want fries and a
burger. Go to a place that has MANY ordering windows. Go up to one
and say you dropped your burger and fries, but make sure you remember
EXACTLY what you told them you dropped. They should give it to you
no problem, and if they don't, you guessed it, BITCH. Now if they
ask you WHERE you dropped it, just say oh, over by the (insert ride
name here), some asshole bumped into me, he didn't even apologize
(go on until they're sick of you're little spontaneous story) and
they'll give it to you. Now, if you want to risk getting thrown out
of the park, go for the biggs. There are two big places in the park
to go to: the grill and the pizza place. Now, lets say you want a
4 person order of ribs, which comes to like $40. Now that's a scam,
so take your time and stalk the restaurant. Wait until you see one
of the cashiers get replaced and when the supervisor who
accompanied them leaves, and get on their line. If for
some reason you get on the line of a cashier who's been around, abort.
Now once you get in this person's line and remember your order good
<ie. 4 orders of ribs and 4 cokes> and come up with an exact place
where you "dropped it" and a BIG story, and STAY calm while keeping
in mind, it IS company policy to replace dropped food. Tell the
cashier what you dropped where you dropped it and your sob story.
Now, first thing they'll ask you is, do you have you're receipt? Of
course you don't so search your pockets and after pulling out no
receipt say that it must have been on one of the trays. Now the
next question they'll ask is where you dropped it so they can get
someone to (wink)(wink) clean it up. A.K.A. check out if you really
dropped it. Your response must be immediate and sound something
like: well when I dropped it these grounds guys wearing green
clothes said they'd clean it up for me and told me that I could get a
replacement. This should get you either food or a manager. If
you get a manager, retell the SAME story and they'll probably
ask you to sign something which you should proceed to do with
a false name. If none of this works walk away cursing under your
breath loud enough for them to hear you and loudly say,
I am going to complain, and I'm never coming back to great
adventure again (loud enough to get everyone in the
restaurant's attention). If this STILL doesn't work, then you're
out of luck, keep walking.
5. Well, if you've never played laser tag, definitely pull this
one off. All you have to do is pay for a game, play it, and there's
a big timer at the top, when it gets down to the last minute, scream
for the attendant and act VERY frustrated with your laser. Tell him
it doesn't work and it hasn't worked since the game started, act really
bitchy and shake the laser. When he tries it say "See, see!!!" He'll
say that it's working perfectly. But you must claim that it isn't.
By now the game should be over, and you've had your 14 minutes. Now
bitch to the attendant at the desk and he'll either give you a
refund or a free game, and if you don't want the free game, bitch
until you get a refund!
6. No money? Need money to play Area 51 at the arcade and try to
beat me but I am #1 (NIN) anyhow, perhaps you want to win a souvenir
for you're girlfriend. These are too risky to scam, so here's what
you do. Walk around the park, find 2 arcades and 2 soda machines,
the expensive bottle ones. Now tell the attendant you stuck a dollar
in the change machine and no change came out, tell them you stuck 2
dollars into the soda machine but the light blinked and NO soda came
out, and you pushed ALL of the buttons, you should come out with
around 6 bucks, more than you had before. This is a fairly well
known trick, but whatever you do, do not claim to have put a $5 in
because they open the machine and look at the last 3 bills, and if
none of them are $5's, they warn the park about a possible scammer
and you're screwed out of ANY type of scamming.
7. Now this one is kind-of Great Adventure specific. There is a
giant chair that morons pay like $10 to get their picture taken in.
At night the chair is closed due to lack of light. BEHIND the chair
is a phone. Since you're a Phreakish Punk, pick it up dial 9, your
area code and your number. And nobody will notice, because you are
behind a GIANT chair! Anywhere else, just look for
a phone with nobody around and use it, be careful though.
Thanks for putting up with my typos and I hope this has taught
you a bit about scamming Six Flags to death, but wait! There's
more, non-six flags scams!
Ok, here's the generic scam section.
1. I'm at the movies, but drinks are $3, help me!
2. Mall + Broke + Hungry = scam!
3. Final Note (Springer)
1. Well here's the deal, go over to a garbage can and pull out a cup.
Most movie theaters offer free refills. Take a key or any sharp object
and poke a tiny hole in the bottom of the cup. Now splash some water
on your shirt in the bathroom or at the water fountain. Bring the cup
to the attendant and say I'd like a refill of (insert beverage here)
but my cup has a leak man, can I get a new one? They'll give you a
new one, with unlimited refills of course.
2. Ok, so you have the situation set up what are you going to do?
Well, all these Chinese places are willing to give out samples and
so is roli boli. Pass by those places and pick up some samples.
Now put a hat on and get some more. Next it's time for desert. Go
over to McDonalds and say can I have a free sample of ice cream.
They'll give it to you, in a nifty little cone too.
3. Well as my final note, I'd like to say that neither nothingg (me)
or the PPN or the Twisted Nickel endorse using any of these methods
to rip off evil domineering companies nor to we encourage using these
methods. I am merely pointing out the many flaws in a system thought
to be perfect.
Please send any questions to firstname.lastname@example.org
Beating Caller ID
by The Fixer
(C) 1998 The Fixer's Tech Room
For free distribution - you may freely repost & distribute this but not
for profit without permission of the author. See further restrictions
at the end of this file.
To start off with - 12 Ways to beat Caller ID
(0) This doesn't count as a way to beat CID, but there's a general
principle to consider when contemplating ways to beat CID.
Generally, the CID signal your target sees corresponds to the owner
of the dial tone you call him from. If you call direct, you dial
from your own dial tone and your line is identified. If you call a
third party, and by whatever means manage to acquire his dial tone,
and from there dial out, it is the number associated with that
second dial tone that your target sees. Some of the ideas following
this were developed with this basic idea in mind.
(0.5) This also doesn't count, but remember that beating Caller ID as
such is only the first layer of your protection. If your calling is
sufficiently annoying or criminal, there is *always* a paper trail
(ANI data, billing data, trouble reports, *57 traces, etc) leading
back to the phone you first called from. That trail is not always
easy or worthwhile to track you down with. Whether or not the trail
is followed depends entirely upon how pissed off your target is and
how much co-operation he can get from the phone company, law
(1) Use *67. It will cause the called party's Caller ID unit to
display "Private" or "Blocked" or "Unavailable" depending on the
manufacturer. It is probably already available on your line, and if
it isn't, your local phone company will (most likely - please ask
them) set it up for free. This is the simplest method, it's 100
percent legal, and it works.
(2) Use a pay phone. Not very convenient, costs 25 or 35 cents
depending, but it cannot be traced back to your house in any way,
not even by *57. Not even if the person who you call has Mulder and
Scully hanging over your shoulder trying to get an FBI trace (sic).
Janet Reno himself couldn't subpoena your identity. It's not your
phone, not your problem, AND it will get past "block the blocker"
services. So it's not a totally useless suggestion, even if you
have already thought of it.
(3) Go through an operator. This is a more expensive way of doing it
($1.25-$2.00 per call), you can still be traced, and the person
you're calling WILL be suspicious when the operator first asks for
them, if you have already tried other Caller ID suppression methods
(4) Use a prepaid calling card. This costs whatever the per-minute
charge on the card is, as they don't recognize local calls. A lot
of private investigators use these. A *57 trace will fail but you
could still be tracked down with an intensive investigation (read:
subpoena the card company). The Caller ID will show the outdial
number of the Card issuer.
(5) Go through a PBX or WATS extender. Getting a dial tone on a PBX is
fairly easy to social engineer, but beyond the scope of this file.
This is a well-known and well-loved way of charging phone calls to
someone else but it can also be used to hide your identity from a
Caller ID box, since the PBX's number is what appears. You can even
appear to be in a different city if the PBX you are using is! This
isn't very legal at all. But, if you have the talent, use it!
(6) I don't have proof of this, but I *think* that a teleconference
(Alliance teleconferencing, etc.) that lets you call out to the
participants will not send your number in Caller ID. In other
words, I am pretty sure the dial tone is not your own.
(7) Speaking of dial tones which aren't yours, if you are lucky enough
to live in an area with the GTD5 diverter bug, you can use that to
get someone else's dial tone and from thence their identity.
(8) Still on the subject of dial tones that aren't your own, you can
get the same protection as with a payphone, but at greater risk,
if you use someone else's line - either by just asking to use the
phone (if they'll co-operate after they hear what you're calling
about) or by the use of a Beige Box, a hardware diverter or bridge
such as a Gold Box, or some other technical marvel.
(9) This won't work with an intelligent human on the other end, it
leaves you exposed if the called party has a regular Caller ID box
with memory, and has many other technical problems which make it
tricky at best and unworkable for all but experts. A second Caller
ID data stream, transmitted from your line after the audio circuit
is complete, will overwrite the true data stream sent by the telco
during the ringing. If the line you are calling is a BBS, a VMB, or
some other automated system using a serial port Caller ID and
software, then you can place your call using *67 first, and then
immediately after the other end picks up, send the fake stream. The
second stream is what the Caller ID software processes, and you are
allowed in. See the technical FAQs below for an idea of the
problems behind this method; many can be solved.
(10) Someone in alt.2600 (using a stolen AOL account, so I can't credit
him or her properly) suggested going through 10321 (now 10-10-321)
or 10288. Apparently using a 10xxx even for a local call causes
"Out of Area" to show up on the Caller ID display. I live in Canada
where we don't have 10xxx dialing so I can't verify nor disprove
(11) There are 1-900 lines you can call that are designed to circumvent
Caller ID, ANI, traces, everything. These services are *very*
expensive, some as high as $5.00 a minute, but they include long
distance charges. This was first published in 1990 in 2600
magazine, and in 1993 the IIRG reported that 1-900-STOPPER still
works. Beware - even if you get a busy signal or no answer, you
will get charged at 1-900 rates! Another one published in 2600 in
1990: 1-900-RUN-WELL. That one supposedly allows international
calls. I'm not about to call either one to find out. Note that you
could still be caught if the operators of these services were to be
(12) Use an analog cellular phone. Most providers of plain old analog
service show up on Caller ID as "Private" or "Out of Area" or a main
switchboard number for the cell network. This is becoming less and
less true as cellular providers move to digital cellular and PCS,
which pass the phone's number on Caller ID. Corollary: Rent a
cellphone by the day. This might even be cheaper than using a
prepaid phone card.
How Caller ID Works
Caller ID is a data stream sent by the Phone Company to your line
between the first and second ring. The data stream conforms to Bell
202, which is a 1200 baud half-duplex FSK modulation. That is why
serial Caller ID boxes run at 1200 baud.
The data stream itself is pretty straightforward. Here's an example:
The first thing of note is the 30 U's. Those are actually sync pulses.
A "U" is 55 hex, or 01010101 binary. This is called the "Channel
After that comes 130 milliseconds of 1200 Hz (the Bell 202 "mark"
frequency) which usually shows up in the datastream as a character or
two of garbage.
That is followed by the "message type word", which is 04 hex for
standard Caller ID, 07 hex for Name & Number. A word, by the way, is 8
bits for our purposes.
That is followed by the "message length word" which tells us how many
The next four bytes are the date, in ASCII. In the example above, the
date is 0324, or March 24th.
The next four bytes after the date are the time, also in ASCII. In the
example, the time is 1512, or 3:12pm.
The next 10 digits is the phone number that is calling. In the
example, the phone number is 250-380-6467. The number is also in ASCII
and doesn't contain the hyphens. Some phone companies will leave out
the area code and only transmit 7 digits for a local call, others will
always send the area code as well.
If this were a name-and-number Caller ID data stream, the number would
be followed by a delimiter (01h) and another message length byte to
indicate the number of bytes in the name. This would be followed by the
name itself, in ASCII.
If this call originated from an area that doesn't support Caller ID,
then instead of the phone number, a capital "O" is transmitted (4F hex).
If the call was marked "private" as a result of the caller using *67 or
having a permanent call blocking service, then instead of the phone
number, a capital "P" (50 hex) would be sent.
The very last byte of the data stream is a checksum. This is calculated
by adding the value of all the other bytes in the data message (the
message type, length, number and name data, and any delimiters) and
taking the two's complement of the low byte of the result (in other
words, the two's complement of the modulo-256 simple checksum of the CID
Some Technical FAQ's
Q: When I block Caller ID with *67, does it send my number anyway and
just set a "private bit" so that the other person's Caller ID Display
unit won't display it?
A: No. The person you're calling doesn't get your phone number anywhere
in his data stream if you block your call that way. All he/she gets
is "P" and the date/time of the call.
I would like to refer to an experiment I performed in March, 1998
with a Serial Port Caller ID, which delivers the raw data stream to a
PC for software interpretation. The following Usenet message (edited
for this file) is the report I published on that experiment:
From: The Fixer <email@example.com>
Date: Tue, 24 Mar 98 16:12:58 -0800
Subject: Caller ID and *67 - The Facts
OK, it's time to shovel the bullshit that is piling up in this
newsgroup about Caller ID.
A few people are saying that when you block your Caller ID with
*67, the switch sends your number anyway along with a so-called
"private bit" that tells the Caller ID display unit to suppress
display of the number.
In order to squelch those who'd rather flame back with "show me
proof" than just read a FAQ, here is the proof. These are
actual raw data captures from a Bell 202 demodulator (better
known as a serial port Caller ID) which I captured myself today.
They prove conclusively that the "Private Bit" is a myth.
Here is what I got in my raw data stream when I called my voice
line from one of my BBS lines (which is unlisted, hence the
PRIVATE string in the name field):
This is what I got when I did the same thing with *67:
The number I was calling from was 250-380-6467. That string is
clearly displayed in the first (non *67) call. In the number
field of the second call, only the letter "O" is transmitted.
In the name field, only the letter "P" is transmitted.
In both calls, the date and time (03/24, 15:12) is transmitted,
but transmission of the calling telephone number is suppressed
in the second call. There is no "private flag" suppressing
display of the number by the display unit; the calling number is
not transmitted at all!
For those of you unfamiliar with the CID raw data stream, the
U's are actually sync pulses (an ASCII "U" is 01010101 binary).
The control characters are field delimiters. The first 8-digit
number is the date and time in MMDDHHSS format. The second
number in the first call is the phone number, in NPANXXXXXX
format. That is followed by the name (for those of us with name
& number CID). The ^O (0Fh) just before the name indicates how
many characters are in the name - in this case "PRIVATE" is
padded out with 8 spaces (20h) to make 15 characters. At the
very end is an 8-bit checksum.
Believe me, if I were wrong about this, there would be a huge
marketing frenzy to sell "*67 proof Caller ID boxes" and I would be
making a fortune selling my Serial Caller ID software, which works
directly with the data streams illustrated above!
Q: Can't I just send noise down the line to scramble the Caller ID
signal between the rings?
A: No. Your phone line doesn't generate the Caller ID signal. It is
made by the switch on your calling party's line, and the audio
circuit between your line and his is not completed until after he
picks up the phone.
Q: Do 1-800 numbers have Caller ID? Can I hide my identity from them?
A: Some do have Caller ID, and the *67 block will work, but many more
have real-time ANI - Automatic Number Identification. This is an
older technology which uses a separate line to deliver your number,
and cannot be blocked. And all 800 subscribers get a list of
everyone who called them on their monthly bill, blocked or not.
Q: Can I hide my identity by sending a fake Caller ID signal down the
line before they answer?
A: *Generally*, no. The audio circuit between your phone line and their
line is not completed until the other party picks up. Once they do,
they would hear your fake signal and know what you were doing...
unless the person you're calling is very poorly informed or
untrained. Even so, most Caller ID devices have memory and so the
person you're calling could just as easily scroll back through the
box's memory and find your true number.
Once upon a time, the phone system worked differently, and the audio
circuit WAS connected even before the called party picked up. A
device called a "mute" or a "black box" was used to take advantage of
this fact and allow anyone calling a line with a black box to do so
toll-free. If the system still worked that way (and there's no
technical reason why it couldn't in these days of digital switching)
then yes, it would be very feasible to send a fake Bell 202 data
stream down the line; in fact you'd hear the real one every time you
called someone with Caller ID and you'd get a really good feel for
the timing involved. But if it worked that way, then black boxes
would also still work, and they don't.
Q: How about *69? If I protect my call using *67, can they still call
A: Not in 604/250 anyway, and probably not most places.
Some interesting notes about this: When *69 was first introduced
here in 250, if you tried to *69 a blocked call, you would get a
recording telling you that the number could not be announced. And it
would then offer to connect you anyway! I guess it was business who
asked for the change because that meant a telemarketer using *67
would have people call back and their switchboard answer "Sleazebag
Marketing, how can I help you?". At that point the number was a
white pages lookup away. So BC Tel, and I would venture to guess its
parent company GTE and many others, changed it so that *69 won't even
If you find in your area that you CAN call back with *69 to a *67
protected number, you're a lucky sonofabitch! Why is that? Well,
with the "old" working of *69, you may still be able to get the
number of a blocked caller if you are (a) lucky and (b) patient. Take
your phone off the hook until midnight (if it's a business) or early
afternoon (if it's a person). THEN activate *69. No incoming calls
will have come into your line since it was off-hook, so your line's
*69 last-call register will still have their phone number in it, and
at those times you are far more likely to get an answering machine
which may spill the beans as to who called you... clever huh?
Caller ID can be worked around in so many ways that it really offers no
value to its subscribers. I am not against the existence of Caller ID,
as I have been on the receiving end of harassing phone calls and slimy
telemarketers, all of whom I've been able to put in their place thanks
to this technology. There's no doubt that Caller ID can help bring
those who deserve it to justice. But at the same time, we all have the
right to privacy, and the option to not share your identity with someone
you're calling is, and always should be, available.
For this reason, I think that Caller ID should be available free on
every line as part of the basic service. It's worth nothing anyway!
That's it. This file may be updated as I receive more information.
Look for updates on my web site at
or if that doesn't work,
This file is a freely-distributable copyrighted work. You may repost
this file free of charge without modifications, but no for-profit
distribution is allowed without prior arrangement with the author.
Two individuals who have stolen my work in the past are hereby
prohibited and enjoined from possessing or distributing this file:
Pinhead the Cenobite and Jolly Roger. If you are either of these
individuals, you must delete this file from your system now. If you are
not, you may not knowingly allow either of these individuals to receive
this file if it is in your power to prevent such reception. Retention
of this file on your system or on any backup constitutes acceptance of
(C) Copyright 1998 The Fixer's Tech Room, a division of Whirlwind
Software (British Columbia). All rights reserved.
LMOS/MLT CODES AND MEANINGS
assembled by Lineside
If you didn't know, LMOS stands for Loop Maintenance Operating
system, and MLT is the mechanized Loop Test. The following are codes and
their meanings for the BellSouth LMOS. They may however be similar, the same
or totally different in other areas. Hopefully someone out there will put
these to good use.
OUTSIDE PLANT (04xx)
0400 Trouble not cleared
0401 Pair change
0402 Pair cut dead ahead
0403 Pair transposed
0407 Pair reconstructed
0409 Wrong pair assigned
0412 Cable damage (non-telco)
0420 Non-accessible plant
0430 Accessible plant
0431 Accessible cross box/SAC etc
0450 Lightwave/ fiber cable
0461 Repeater plug-in
0462 Apparatus case
0463 RT-common equipment circuit pack
0464 RT-POTS channel unit
0470 (DLC) Lockups and precaution measures
0480 Multi-channel and other loop electronics
0490 Air pressure systems
PUBLIC COMMUNICATION (02xx)
0200 Other station equipment standard
0210 Full money box
0220 Enclosure/support equipment
0230 Portable phone cart
0240 Coin and card set
0250 1F2 coin telephone
0260 RACTS/OMNI phone
0270 Collect call timing device (CCTD)
0280 AUGAT monitoring equipment
0290 SMART coin telephone
0300 Corporate com./ public wire
0340 Network interface
0350 Network terminating wire
0381 Service drop wire buried/ permanent
0382 Service drop wire buried/ temporary
0383 Service drop wire buried/ cutover
0384 Service drop aerial
FOUND OK- IN (08xx)
0800 Found ok- in
0890 FOK- in for data base driven services
0891 FOK- in calling card service
0892 FOK- in automatic intercept system
0893 FOK- in Expanded 911 service (E911)
0895 FOK- in watch alert
0897 FOK- in 700 service
0898 FOK- in expanded 800 service
0899 FOK- in dial it
100 Telephone company employee
210 Customer action
220 Other utility
222 Foreign worker
230 Motor vehicle
270 Telco master contractor
280 Petroleum/ chemical
300 Plant or equipment
Central Office (05xx)
0501 Dial up port
0502 Data port
0503 Packet switch
0504 Data link
0510 CO equipment
0511 Common equipment
0514 Billing equipment
0516 Public service trunk
0517 Office conversation
0521 Generic/par. work error
0522 Generic/par. document error
0525 Line work error
0526 Line document error
0527 Network work error
0528 Network document error
0529 Line work error CCSR
0530 Distribution frame
0531 MDF cross connection missing
0532 MDF cross connection broken
0533 MDF cross-connection work error
0540 Frame other
0541 MDF cable protector
0544 Terminal wire clipping/conn.
0551 DC power equipment
0552 AC power equipment
0553 Ringing plant
0554 Standby emergency power
0560 Misc. equipment
0562 Line testing equipment
0564 Range extender
0565 Carrier system
0567 ISDN service
0568 SLC channel unit
0569 SLC common circuit pack
0570 Special services equipment
0572 Wiring option
0573 Carrier channel
0581 Mechanized system failure
0582 Line translations unknown
0586 Signal transfer point (stp)
0587 Tandem office
0588 Switching system design
0590 Data base for data base driven services
0591 Calling card services (ccs)
0592 Automatic callback calling
0593 Enhanced 911 service
0594 Equal access
0595 Watch alert other
0597 700 series services
0598 Expanded 800 service
0599 Dial-it service
Field Techs and Wiretaps
2......Wiretap check request
3......Field tech inspection
4......Wiretaps discovered during routine field inspections
5......Other unlawful use of the companies service
The purpose of this section is to specify the terms and
conditions of assistance of the telephone company to law enforcement
agencies engaged in, or about to be engaged in, wiretapping activities.
Also the procedure for handling reports of the use of telephone
facilities for bookmaking and dissemination of wagering information.
This practice is being revised to remove the Customer
Service Center and the Annoyance Call Center from the trouble report
flow. Any call to the CSC reporting a wiretap or suspected wiretap
should be transferred to the Centralized Repair Service Attendant
The security organization ha
s the exclusive responsibility
for acceptance of Federal or State Court orders written emergency
certifications, which is required for a lawful wiretap. Any
request received for information or assistance in this regard shall
be referred to immediately to the security organization.
The security organization has complete responsibility for
the direction of the company actions following the discovery of an
actual or suspected wiretap. A follow-up procedure will be followed
by security to ensure that all assistance provided by the company is
terminated when the court order or emergency certification expires.
Protection of the privacy of telephone communication is
fundamental to the telephone business. It is Bell policy to
investigate and resolve any actual or suspected threat to the customers
privacy. In line with this policy, every reasonable effort will be
made to resolve all customer complaints. However, it is unlawful for
Bell personnel to disclose the existence of a lawful wiretap to the
customer. Therefore, the following procedures must be observed
strictly in processing customer requests for wiretap inspection or
in reporting any wiretap device that may be found.
All company personnel who discover an actual or suspected
wiretap device shall report the discovery through the lines of
organization to security, without taking further action. In those
instances where a trouble is caused by the wiretap device, it may
be disconnected only after the security organization has been notified.
2...Wiretap Check Request
The centralized repair service attendant bureau (CRSAB)
shall have the responsibility for handling initial customer
complaints concerning wiretaps or other illicit activities. The
RSA will take the report on any call received at the CRSAB
concerning wiretaps or other illicit activities. This report will
be taken as a Category 1. Customer Direct (CD). The CRSAB shall
transmit all requests of this nature to the installation maintenance
center (IMC). The handling code "WIRETAP" will be used to transmit
The IMC should input additional auto screen rules to direct
these type reports for manual screening. All personnel handling this
type report will document findings utilizing the EST transaction
in LMOS. This means, MA's will document the test and referral
information. SCC will document their findings, I&M will document
their findings etc. Each action taken on this report must be
The maintenance administration (MA) will perform trouble
verification tests. If a wiretap exists, it may be indicated by the
test results. It no trouble is indicated or a CO fault is indicated,
the MA will refer the report to the switching control center (SCC)
for further analysis. The SCC will assign the appropriate CO the
task of inspecting the office equipment for the suspected wiretap.
The CO will inform the SCC of its findings during the inspection.
The SCC will close the report to the IMC. In those instances where
the CO may locate wiretap, it must not be disturbed. The technician
must inform the manager who in turn will notify the security
department. If after analysis has been completed by the SCC and
the IMC a wiretap has not been found, it may be necessary to
dispatch a field technician for a complete inspection.
3...Field Technician Inspection
Reports involving suspected wiretaps should be dispatched on
the same day on which they were received, when practicable. It is
strongly recommended that a field manager accompany the technician
during the inspection.
The technician will inspect only equipment/wiring that
is owned/provided by Bell. Equipment/wiring that is provided by the
customer or agent of the customer, will not be inspected. The
customer will not be billed for the inspection of equipment/wiring
provided by Bell. If the customer subscribes to a wire maintenance
plan, the technician will inspect through the customers connection
block. If the customer does not subscribe to a wire maintenance plan,
the technician offer to inspect the wiring for time and material.
If the inspection does not uncover an unlawful wiretap, the
technician may advise the customer that no wiretap was found. When
a wiretap, or what appears to be a wiretap is found, security
must be notified immediately. Under no circumstances will any Bell
personnel disclose or verify the existence of an actual or
suspected wiretap to a customer.
If a wiretap is trouble inducing, security may direct the
technician to correct the trouble or disconnect the device from the
line. The security department shall notify the appropriate
law enforcement agency and shall determine if further action is
After the trouble is cleared, the technician will close
the report using established procedures. The customer must be
advised that the trouble is cleared, but the only statement that
may be made about a wiretap device is "NO UNLAWFUL WIRETAP DEVICE
4...Wiretaps Discovered During Routine Field Operations
If a wiretap, or what appears to be a wiretap, is discovered as a
result of routine field operations, where there has been no customer
complaint or request for a wiretap inspection, security shall be
notified immediately. Under no circumstances will Bell personnel, other
than security or individuals acting under the express direction of
security, disclose the existence of the actual or suspected wiretap
to a customer.
-If security determines that a wiretap discovered in this fashion
is lawful, no report shall be made to the customer.
-If security determines that a wiretap discovered in this fashion
is unlawful, law enforcement and the customer shall be notified.
5...Other Unlawful Use of the Companies Service
If in the course of one's work an employee overhears a conversation
or otherwise obtains information indicating that any services
provided by Bell are being used for bookmaking or for the
dissemination of wagering information or other unlawful
purposes, all facts will be reported to the employee's immediate
supervisor, or will notify security.
**** THERE IS NO VIOLATION OF SECRECY OF COMMUNICATIONS WHEN
DURING THE NORMAL COURSE OF BUSINESS WITHOUT INTENT TO MONITOR
FOR THE PURPOSE OF OBTAINING SUCH INFORMATION, AN EMPLOYEE
OVERHEARS A COVERSATION WHICH INDICATES UNLAWFUL USE OF
TELEPHONE COMPANY FACILITIES AND REPORTS THE CONVERSATION TO
HIS/HER SUPERVISOR. ****
Controlled Environmental Vaults
by Tom Farley
Visit Tom Farley's website for more articles and past issues of Private Line
I wrote about controlled environmental vaults in "private
line" Number 7 (Volume 2, Number 4, July/August 1995). A C.E.V. is
an underground structure that often houses telephone equipment .
The one I went into and took pictures of for that issue's Outside
Plant article housed a 5ESS. In effect, it is a small central office
underground. These inconspicuous, buried buildings allow companies
like RTC to distribute its switching capacity more equally around its
serving area. Your only clue to a C.E.V.'s location is its top -- a four
by four foot flat steel panel two or three feet off the ground, rising
out of the earth like a green, squarish mushroom.
It turns out that Roseville Telephone Company installed the
first C.E.V. in California back in 1986. Here's a history of that vault,
reprinted with permission, from Steve Chanecka's book, _The History
of The Roseville Telephone Company_:
"'The company is looking at the serving area west of Antelope
Road by using a controlled environmental vault which meets the
concerns of nearby residents since it is aesthetically appealing. We
will use it to house a remote switching unit which will serve this
area. Plant from our central office to the 'CEV' will be fiber optics
and from the remote location to the subscribers will use normal
copper wire. Basically, this unit will serve the same function as a
mini-substation, but will be underground and therefore does not
detract from homes in the neighborhood.'
"Ned Kindelt explained the CEV in more detail in a late 1985
article in _Line Chatter_. 'A CEV is a central office located
underneath the ground. The equipment vault is 10 feet, six inches
wide and 24 feet long, and will contain a remote unit in Citrus
Heights for control. The remote switch unit will be wired for 4,608
lines.' In addition, the CEV had air conditioning, a dehumidifier, an
automatic sump pump and an alarm system.
"The use of CEVs was pioneered by Roseville Telephone in
California. The state's first one was placed on Lichen Drive in Citrus
Heights in late 1986. The engineering, splicing and installation was
a long, arduous process, according to project director, splicer Jim
Hood. He reported in the October 1986 _Line Chatter_
'Our first CEV is almost past history. This has been a very
difficult project for many departments. This vault is powered from
the Citrus Heights central office by our first fiber optic cable. Our
second vault, already a work-day reality for some departments will
be located on Antelope Road near the Foothill Christian Center. To
say that this has been a learning experience is being tactful.'
"That first CEV may have been challenging but the concept was
a lifesaver for Roseville Telephone. Faced with an aggressive
expansion of residential housing in the Antelope area of Citrus
Heights, the company's conduit capacity to run copper cable from its
Citrus Heights central office under Interstate 80 was insufficient
for the long term. Had there been no other option, the company would
have faced costly construction to increase its underground conduit
"The CEV approach solved this. Rather than making the conduit
system larger, the use of fiber optics resulted in the cable bundle
running through the conduits being smaller in diameter. Thin, very
high capacity fiber optics connected the central office and the CEV.
The far thicker copper cable ran from the CEV to the customer. Fiber
optics enabled much more information to be transmitted through a
much smaller bundle of wires. Leon Bower, director of outside plant
engineering, explained to fellow employees why CEVs and fiber
optics made sense in the fall of 1985:
'If you read local papers, you are aware that the area roughly
north of Antelope Road, between the railroad and Watt Avenue in
Sacramento County, is about to be developed. They are projecting
between 13,000 and 14,000 new homes in the Antelope Urban
Reserve in the next 20 years. For the area west of the freeway we
are projecting a requirement of 16,000 lines for that 20 year
'To serve this area with conventional copper cables would
require an investment of some $3.5 million at today's cost in outside
plant alone. Underground conduit systems would have to be
reinforced, at a very high cost, to accommodate the fourteen 1500-
pair, 24 gage feeder cables needed. A fiber cable will cost us about
$102,000. . .'
"Since 1986, 12 more CEVs scattered evenly throughout the
company's service have placed impressive digital switching
power and data transmission capacity close to the users at
an economical price. Moreover, all but one of the company's 13
operating CEVs at the end of 1994 were located inside utility right-
of-ways. The company did not have to buy the site of the CEV or
obtain permits to put them in the ground. Most people are not even
aware of where the CEVs are placed."
It is my understanding that each vault is backed up with
alternative routing, that is, a separate fiber comes in from two
directions to the vault. A single accident will not cause any vault to
go down. The _History of the Roseville Telephone Co._, by the way, is
a fascinating read and an important contribution to independent
telephony. RTC is the 23d largest telephone company in America and
one of the most progressive. The book is over four hundred pages in
hardback. $20 in the U.S. plus $3.50 shipping. Call (916) 786-1117.
There's a discount for orders of five or more. Or order by mailing
from the following: Telephone Book, Roseville Telephone, P.O. Box
969, Roseville, CA 95678. And make sure to visit their telephone
museum at 106 Vernon Street in Roseville from 10:00 to 4:00 p.m. on
In this section, issues in the cyber world that will effect the H/P scene in
one way or another will be discussed. Submissions for this section are
The impact of the flag burning amendment
by Mr. X2
There has been a lot of talk lately about the proposed amendment that
would make flag burning illegal. Now I have never burned a flag and
I don't have any intentions of doing so. However, burning a flag is
part protected under free speech. Anyone who studies constitutional law
learns that our freedoms are not a 100% guaranteed. If that was the case
there would be anarchy. We give up some freedoms in certain situations
to protect our other rights and the rights of other people. For example,
you cannot yell fire in a movie theater or call in a bomb threat. As
long as your expressions does not infringe on the rights of others, than
it is basically OK. With all that out of the way, how the hell does
burning a flag infringe someone else's rights? Unless you catch someone
on fire in the process than I just don's see it. Well this bill is being sent
to the government to be kicked around for a while and if it passes it will
be put up for vote to become law. In that case, 2/3 of the states have to
ratify it in order for it to become law. While it may be a ways off, it
is important for everyone reading this zine to keep in the back of your
mind. I know your wondering where this is all going in a phreak zine. Well,
I'm sure that most of you reading this support free speech and especially
free speech on the net. When you support such issues, it is important to
look at the big picture and support all related issues. If flag burning is
made illegal, then what else isn't protected under free speech? Previous
court cases and other laws are taken into account when deciding issues
that are new and confusing. If the flag burning amendment passes and then
some time down the road, a bill comes up restricting speech on the net,
people will look at other free speech issues such as the flag burning
amendment. It is also important to support any reasonable free speech issue
not just flag burning. When you support something, you have to support
other's related beliefs as well.
I'm not gonna go into the Colorado shooting but it is important to focus
on one event related to the shooting. Shortly after the media first
reported about the shooting, people went on their computers and made
fake profiles claiming they were in the Trench Coat Mafia, made jokes
about it, and even made a couple of TCM webpages. Once the FBI started
it's investigation, there was a broad search conducted on the Internet
for any clues about the shooting. This was because Eric Harris had various
webpages that gave some signs as to what would happen on april 20th. They
also wanted to see if anyone else was involved. All of Eric Harris'
accounts and webpages were shut down so that no one could tamper with
evidence. Even while I am writing this, there is still a shroud of
mystery as to what exactly happened, why, and if anyone else was
involved or knew about it. During this Internet investigation, anyone
who had anything mentioned about the trench coat mafia on line got
their accounts cancelled, webpages removed, and anything else they had
on the net deleted. Some people on AOL lucked out and just got
warnings although they got all thier files deleted. I've talked to people
that go their accounts cancelled for just posting somewhere that the
trench coat mafia sucks. While this wasn't a wide spread epidemic
it has the implications of someday becoming one. What if a hacker did
some major damage. I mean kill a lot of people. Then the hacker
is painted as this evil person who just wants to cause havoc for
other people and he is just one out of a whole subculture full of
these evil hackers. The media has a field day. They do profiles on
hackers, ya know pimples face nerds who no one likes, plays doom all
day and listens to manson. Can you imagine what would happen to
hackers? No one would want anything to do with hackers on their
service. Thousands of accounts would be canceled, webpages
would be removed, and we would have more than just a crackdown
on our hands. Pretty disturbing huh? How do we prevent this?
That's a good question. Be responsible and try to keep a good
image of hackers would be my best guess. It would be a lot easier
to get people to think that most hackers are nice people before this
happens than afterwards. This has already happened in spurts but to
no major extent. Even if there was a large hackers are nice guys
campaign it probably won't even do that much good. I would like to hear
from you on this topic of Cyber McCarthyism. Is it something to
think about? Is it a problem now? Will it be a problem in the future?
What can we do to prevent it? It's not just hackers that have to
worry about this, any cyber-community may be vulnerable to this.
Copyright 1999 Phone Punx Network. Feel free to distirbute this issue however,
do not modify this file in any way. All issues are free and are not allowed to
be sold in any form. If you are sellling issues you can only charge what it cost
to reproduce them. Keep the information free. All works are owned by the PPN
and/or the authors of the article. If you feel that you own the copyright to a
work printed in this issue and have not given the permission of the author to
republish it, please email us.