2600: the hacker quarterly (volume 2, number 6, june 1985)

Upload: ranko-kohime

Post on 29-May-2018

222 views

Category:

Documents


1 download

TRANSCRIPT

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 6, June 1985)

    1/8

    2600 [. ..- -- _._-_._-- - - - - - ~ BBS BUST, TRACKING DEVICES, IBOO DIRECTORY, REMOTE METERREADING, INTRO TO HACKING,ISRAEU PHONES, WIRETAPPING ilEWS, IRS VS. TELCO,I AND MUCH MOREl I_If)lJ(J i!\ puhli!\hl't! .;(,1)0 I n lnp l l ! \ l .. 1111: . l I 1 l ' 1 \ " I . l l h ) ' ~ I I ; I ! I l r ~ a n l l i l l u U l

    JUNE, 1985I Dl . l 'MCnfD, Xl "I/U.N SIX

    (1I1hllllh . , SI JllT had . 1" l I l ' (her",',.",: I year. I i l l - I lml ' ,"h",'ripIIOII. ':!1I0. ( orpural\.' ' I "UI l 'UI . Hp ~ . ~ ( " ) U '10th, dll 'd , p;I\,.h!.- '10 ,"(IINI I Ilkll'l ,'I'"Wllll' I,,, !fJiNI. I ~ I \ 7 ~ ~ . Middle 1,lmkl. ,y 1 1 ~ ~ . 1 ~ 1 7 5 ~ . ili,,1. ~ 1 ( , 7 ~ 1 ~ I ~ M I 1111" :!Hl.l(lI>14.11 " 'S ' . 1 1 7 4 ' 1 - 1 X ~ 1 a guide to the israeli phone systemThe Israeli phone system l ike their AC their telcQ takes any m o ~ e y In at a.1 I. Th"current (220 volts) and their television e x ~ l a n ~ t i o n l ies in thETlr rate struct un:.!,standard (PAL) i < a European system. Euro-- WhICh IS rather reasonabJ.e. There. are. on.1 ypean tdephonf'_ differ froll the American three mileage rates: local, WhICh 1S onestanr!urd in several interesting ways. First message unit ( ~ r one ~ e l e p h o n e token from It

    0 1 ' al l , dialing is by shorting out the phone pay phone) , IntermedIate (say, froll! t ht'line rather than opening it. up. One of the cent.er of town to, the r e m o t E ~ suburbs . ~ f . that.drawbacks of this method is that an exten- town). and long dIstance (froll one CIty tosion phone ona l ine b e i n ~ dialed will have ~ o t h e r ) . That's i t . So to call from onei t s bell capacitors contInually discharged Clty.tO a n ~ t h e r . whether they are s e p a r a t ~ d and r e c h a r ~ e d during the dialing, making a bY,fIfty kIlometers or a few hundred, .I Sl i t t le "pIng" for each dialing pulse. Good s t l l l th e same rate. So even phone callsi f you want to know about acliv.ily on th e between remote. corners of the country don'tl ine bad i f you don't want someone else ' s add up that qUIckly. And O ~ l a one tokendialing to bother you. Another difference ~ o c a l call , you, can talk aU you want. Sois th e "off hook" voltage - - a mere 3.5 In general, there s no t that much a needvolts. compared to the heft ier 7-9 volts in to steal call!? from p ~ y phones, s l ~ c e t.hean American system., , t oken supply IS plentlful and 1 ? W ~ p ~ l c e d . Their pay telephones are orgumzed on a Of course, those p e r h ~ p s arl l fIclaUy lowtoken system. You throw in one token for a rates don t apply to InternatIonal calls;local cal l . and for longer distances the pay The Israel i solution is rather simple: youphone eats th e tokens at a certain rate per can only make collect international ca11sminute. There's a l i t t le chute in th e phone from a pay phone. Not only that, you haw'which will stack up four or five of th e to spend a couple of tokens in the process,tokens so t.hat you don't have to pour them You're forced to cal l a Tel Aviv n u m b ~ r in all the time... ASEMONIM ~ w h i c h is just where an operator will take your number andth e Hebrew word for "tokensl} can be bought ( h o ~ e f u l l y ) cal l you back. . DurinJ;{ peakat any 'post office. . The going rate is perIods, it becomes almost impossIble tnaround a nickel each. reach this operator. Even i f YOll f ~ ( ! : This system has various advantages and through th e busy signal, ther don't a l w a y ~ drawbacks. The ~ a y t.elephone doesn't have answer inunediately (and the ca l ing e X d l U n $ ~ " to be very complIcated. All it does is automatically disconnects the cal l a f t f ~ r adisable the dial unti l you've dropped at minute and a half i f no billing signa] isleast one token in, and cut you off when the received, so you can ' t ring their phone fortokens run out. Whether or not the tokens any decent length of time. This also takesdrop into i t s coin box (unused tokens can be most of the fun out of calling a black bo:...:r(!trieved when the cal l is over) is deter- in another country, sinee you invariably gelmined by the exchange. S i ~ a l s are sent cut off within two minutes. Black boxesover one of the three WIres of the pay don't seem to work locally, as the e x c h a n ~ e phone's l ine whenever the exchange decides doesn't switch the audio in until someone lSthat it wants another token. Just discon - paying for the .call --- this often results innecting th e ~ r o p e r wire (which can happen br th e f i r s t "Hello?" getting cu t off) . Youi t se l f at tImes when the phone breaks down) can usually dial international cal ls directwill le t the phone run forever on one token. from a home phone, but i f you need an interWorse yet, i f you can access the two other national operator then the service is almost.wires of the payphone's l ine, you can clip as bad.on your own telephone and dial away with no Just getting a home phone in th e firstrestrict ions. Various other schemes exis t place can be a long hassle. When you f i rs tthat. mechanically jam the tokens in one way get your own phone, you must pay around $350or another so that they just don't drop down for an ini t iat ion fee. But after that, nointo the coin box and the cal l is never cut matter how manI times you move or need th eoff. Not only that , but i f you're good with phone reinsta led, there aren't any moreth e hookswitch, you can dial th e number connection charges. But i f you live in I Iyourself w i t h o u t _ d r o p ~ i n g tokens in at all! newly bui l t area where the phone l inesThe p a y p ~ o n e dial won t d ~ a l until you ~ h u c k haven't been laid yet, you can w a i ~ severala token In, but hand-pulslng the hookswitch, years (!) to have your service lnstalled.though a tedious process, can get you Even i f you move into an apartment thatconnected. It only makes sense for local already has a l ine installed the wait can bE'cal ls , thoughl since on any other kind the as long as several months. This situationpayphone wil cut you off when th e exchange is supposed to be improving, thoufh, espeasks for another token. And i t makes a lo t cially with the installation of e ectronic:of noise and looks suspicious, and with the switching exchanges that have largeclumsy hookswitches provided, is not very capacities. In areas with overburdenedaccurate. exchanges, party l ines are also very common,With making free cal ls (or almost free, and are often the only service available.for one token) so easy, one wonders how Part}- l ines there are nowhere near as much

    2-33 (conti lJUed OJl page 2-SB)

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 6, June 1985)

    2/8

    Sherwood Forest Shut Down by Secret ServiceAn All Too Familiar StoryYes i t ' s happened yet again. This time, the case.two f th e most prestigious computer hacker Bioc Afent 003, a co--ssop on Sherwoodle t in boards around, Sherwood Forest II Forest I , claims that warnIngs were ~ o s t e d and III , were raided by the government. The a l lo v e r the board concerning the postIng ofby now familiar scene of law enforcement credit card numbers. "The management didn'ttypes shutting down a bulletin board system have enough time to constantly look afterbecause somebody didn't l ike what they'd th e system," he said. He attributes thebeen saying is no lonter even newsworthy, raids to "schmucks that posted numbersjudging from the ca.p ete lack of media an}'Way". He also believes that postedcoverage. That is probably the most information on credit firms (CBI and TRW)worrisome ingredient here. led to the seizures.On this occasion, i t wasn't the FBI that As an example of the kind of materialcarried out th e raids, bu t the Secret Sherwood Forest had available, we areService. Why? According to William Corbett reprinting one of t.heir art icles below. Wei.n t.he Washington public affairs office, the feel this one is particularly timely andSecret Service became authorized to conduct ironic. In addition, we are running one ofthese investigations after October 1984 their many hacker guides on page 2-40. Weunder United States Codes 1030 (fraud by will run others in the future. If you'dwire) and 1092 (credit card fraud). }iecause like to send us a copy of a Sherwood Foresti t ' s s t i l l an "active inve3tigation", art icle that we may no t have please do. WeCorbett declined to give ou t any detai ls on must not allow them to be silenced forever.SOME WORDS ON HACKER MORALITYA lesson In phreaking and . hacking computers or newspaper computers. TRWmorality: creai t information services claims hackersI find i t truly discouraging when people l used three stolen accounts to aid ~ h e m inintel l igent people seeking intel lectua abusing stolen credit cards. The thrI l l ofr . h ~ l ~ e n g e s , must revert to becoming common enterinf and looking around has shifted tocrlmlnals. The fine arts of hacking and crimina practicality--how can I make my. boxing have all but died out. Though you bank account fatter--how may I use thisnewcomers, you who have appeared on the stolen credit card to i t s fullest--how couldscene in th e last year or two, may not I take revenge upon my enemies.realize i t , we had i t mUch bet ter . People And then there is th e world of Phonedidn't recognize ou r potential for destruc- Phreaking. The number of phreaks has growntion and damage because we never flaunted from an el i te few, perhaps ten or twenty, toi t , nor did we exercise i t . well over a thousand. St i l l , there remainFor h a c k i n ~ , i t was the intellectual only about 10 or 20 good, longlastingchallenge WhICh drove us Lo do i t . The phreaks. The rest receive information andthri l l of bypassing or breaking through abuse i ts uses unti l the information is nosomeone's computer security was tremendous. lonfer valid. Even worse, they seekIt wasn't a case of getting a password from pub icity! They WANT to be caught! Manya friend, logging on, and destroying an even use their real names on bulletin hoardentire database. We broke in for the systems to promote publicity. Meanwhile,chal1 enge of getting in and snooping around th e REAL phone phreaks have been resting inWITHOUT detection. We loved the potential the shadow of th e rest , waiting forfor destruction that we gave ourselves, but phreaking to become so dangerous as tonever used. become a challenge once again. OnceToday, after so much publicity. the fun security tightens and only the stronghas turned to true criminality. Publicity survive (phreak Darwinism?), phreaking willW( ' have received is abhorring. From be restored as a way to beat the system'WarGames to the headlined October Raids, to without costing anyone anything.Lhe 414'5, the Inner Circle, Fargo 4a l and Hacking may soon be dead, but may phonethe N A ~ A .breakins--not to mention a 1 t ~ e p h r ~ a k i n g live on!local :mcldents that never made the b ~ f BIg Brother rCourtesy of Sherwood Forestnewspapers, like break-ins at schoo JL -- (914) 359-1517]

    . ( ) ~ t _ .gf . t h ~ I f } ! ' ~ 9 _ g ~ - t J { t ~ ~ a ! ~ ? ~ r g u ~ ! ~ ~ ! ~ - ; ; ; t i ! ~ Y ! ~ ~ c a l - for tl)e benefit ofto computer' securlty, o y The Cracker" Bill his readers, those who are m a k I n ~ many ofl.andret.h, The teenage computer wizard the decisions that affect secunty, and soapprehended by the FBI. $9.95, Microsoft he can present his guide to ~ o m p u t e r Press. security without having to d e t a ~ l a llpossible procedures for the many dIfferent

    Out Q L t t ~ ~ . J f ! n e _ r : f . i r ~ . ! . ~ i s one of the many systems that e x i s ~ today. ._I.woKs . wrnten o y Tormer criminals, bu t In it he descnbes th e begInnIng of Theprobably the f i r s t written by a former Inner Circle, which was a group of hackershacker or should i t be reformed hacker. I t who were dedicated to peaceful andis writt.en for middle level managers and for non-destructive hacking and were s u b ~ e -those who want to hear Bill Landreth quently decimated with other groups, l1ked e s e r ~ b e how a hacker thinks. I t only PHALSE, by the Telenet busts of 1983. Hedescnbes so called hacker computer crime as surveys the history of hacking and th e evol01)Posed to hard core white col lar crime, ution of the home computer in order toWlere people schemt> to steal secrets or present his profile of a hacker and ll)e1m-Poe sums of money. l.andr(!th t r ies to motivating forces behind the hacker. ThlS2-. (continued on pBlfe 2-38)

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 6, June 1985)

    3/8

    Bell Didn't Invent Phone?I he " ~ " o C l a t e d Pre",A iJtonio Meucci is credited by some as the true inventor ofthe t :Iephone. Meucci, who reportedly could not afford the $10for a temporary patent back in 1873, was honored by ItalianAmericans in Meucci Square. Th e I77th anniversary ofMeucci's birth was heralded by John laCorte. who said "Ifhe'dhad the $250 (for" permanent patent) then, the world wouldcall it MeucC= . l e p ~ o n e today, not Bell Telephone.". lie of si' I.wentors racing to invent the telephone, Meuccipublicly shLrNed sketches of his designs used in the temporarypatent in hopes of attracting investors, but to no avail,LaCourte said. LaCourte added that Bell patented thetelephone based entirely on Meucci's electrical designs.The only remaining tributes to Meucci are the square offAvenue U and 86th Street in Brooklyn and the little-knownGaribaldi-Meucci Museum on Staten Island. The square,incidentally, is across from the Bell Telephone Co. Building.The Italian Historical Society of America unsuccessfullysued in 1976 to enjoin the Postal Service from issuing the Bellc o m m e m o r a t i ~ e stamp on the ground that Meucci was the trueinventor of the telephone. LaCourte said he intends to keepalive his drive to have Meucci similarly honored by a pos t officecommemorative stamp, and that he harbors no ill will towardBell. "I can prove Meucci was the inventor-plain and simple.Bell just became a millionaire with Meucci's invention."Porno Phone Service Busted

    In the first federal prosecution of its kind, a 23-countindictment has been returned charging a New York corporation(Culin Communications Inc.) an d four individuals withrunning a pornographic telephone service that allegedly wasdialed by some Utah children. The official charge was interstatetransportation of obscene matter."Convictions in this case would challenge the phone-sexindustry, which has spread across the country dur ing the pasttwo years," U.S. Attorney Brent Ward said.The Federal Communications Commission ruled in June of1984 t h a ~ commercial operators of "dial-a-porn"phone 5 rvicesmust restrict children's access by limiting hours of opc -ationand the method of paying for the service.IRS Drives Telco To DrinkPhiladelphia I m ~ U l r t ' r An enormous volume of calls from taxpayers sel{inginformation from the Internal Revenue Service on their late taxrefunds threatened to knock out telephone service to much ofCenter City Philadelphia in April, according to Bell ofPennsylvania officials.To prevent the massive number of inquiries to the IRS fromoverloading the 40,000 telephone access lines serving half ofCenter City, Bell technicians had for a number of weeks beenelectronically diverting millions of calls. "The traffic had beencoming in at such a rapid rate th at it virtually ripped our systemapart. If we didn't [divert pho ne calls], it would have put theoffice in real jeopardy--the ability of people to make calls orreceive them,"said James Killeen, an engineer in the company'selectronic-switching division.During one 15-minute period, Bell was able to count at least6,000 calls made to two IRS numbers. But officials say theactual volume of additional calls being made to the IRSnumbers at the same time was so heavy that it was beyond the

    - - ---- - - - - -- ---- - ----- - - -= - - - - ------ - - -- --- ------ -------- - - - - - -- ----- ....... ---------- - - - - - -- - - - --capabil'ties of their computeriz.ed monitormg equipment

    Tht., rush of telephone calls was spurred by the IRS\ dda\ Inprocessing millions of ta x returns filed at the agenc., \Roosevelt Boulevard service center. As of Idte ApriL

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 6, June 1985)

    4/8

    LEITERS AND QUESTIONSI l ive in the 215 (Phi ladelphia area) area beeping KP + 160 + ocean code + ST. Thesecode an d made clded Lot orgoU e ll t.o pC\y the bI l l . I have no bI l l the 1 r ca l l s to the loca 1 CO. 0 fdispute with the bi l l ing} however, my course, we a l l know that 2600 r ~ a d e r s wouLdquestion is : My Pue'rel b i! wa s around $15. not do th is .We had paid o f f $85 of our b i l l leaving abalance o f $82. Therefore, I would assume, I am w r i t i n ~ th is l e t t e r because I foundwe had paid our debt to PacTel an d only owed some humor In an old tv commercial that Tmoney t.o AT&T. Now a t the bot tom of my saw several months ago. The commercial wasmonthly long distance statement , i t says one bI AT&T. It was t i t l ed "AT&T i s inthat the n il l ing i s only provided as a Cerea ". The commercial was about theservice to AT&T, with whom Pacif ic Telephone to l l - f ree number that call be reached to findhm:; no CO l U l ( 'C t l on. I f t h i s i s the case, the t r easure from a map .i ncl uded ina box ofunder" what author' i ty did they cut o ff my cereal . Bi g deal yo u say! The catch i s ,telephone ser-v i ce . I f I fa i I to pay my MCI the name brand of the cerea l was Captai nh i l l , would PaeTel cut me off? Shouldn' t I Crunch. I f ind that in teres t ing because, i fjus t be cut o ff from AT&T's l ines , an d you remember, Captain Crunch i s the ceres.!col lect ing is their ' problem? Jus t a l I t t l e that contained the l i t t l e blue whist le thatmore confusion resul t ing from the break-up. i s now known as a blue box. And everyoneknows how much t rouble that l i t t l e deviceN o b o ( ~ F should rea l l y be surprised when tw, caused AT&T. It j u s t goes to show tha t evencompal/ics t imt were once one do eac.h othe the big guys can do something against t he i rfavors. It'e'l'e heard zUi te a fe w silllila wil l for the r igh t price!t/lles ill1

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 6, June 1985)

    5/8

    The 2600 Information Bureau-------------------------------------------------------------THIS IS A LIST OF 800 PREFIXESIN OIillER BY STATE.ALABAMA . . . . . . . . . . . . . . 633ALASKA . . . . . . . . . . . . . . . 544ARIZONA . . . . . . . . . . . . . . 528ARKANSAS . . . . . . . . . . . . . 643CALIFORNIA . . . . . . . . . . . 227

    421423854824538235344358COLORADO . . . . . . . . . . . . . 525255CONNECTICUT . . . . . . . . . . 243DELAWARE . . . . . . . . . . . . . 441DISTRICT OF C O L U M B I A ' ~ S a FLORIDA . . . . . . . . . . . . . . 327237874GEORGIA . . . . . . . . . . . . . . 841241554HAWAII. . . . . . . . . . . . . . . 367IDAHO . . . . . . . . . . . . . . . . 635ILLINOIS . . . . . . . . . . . . . 621323637435447851INDIANA . . . . . . . . . . . . . .457348IOWA . . . . . . . . . . . . . . . . . 553247831KANSAS . . . . . . . . . . . . . . . 835255KENTUCKY . . . . . . . . . . . . . 626:i54LOUISIANA . . . . . . . . . . . . 535551MAINE . . . . . . . . . . . . . . . . 341MARYLAND . . . . . . . . . . . . . 368MASSACHUSETTS . . . . . . . . 343225628MICHIGAN . . . . . . . . . . . . . 253521338517MINNESOTA. . . . . . . . . . . . 328533346MISSISSIPPI . . . . . . . . . . 647

    205907602501415213213714916408805209707 .3033032033022022023058139049124044048082083123122178J5309618812219319515712316913502606504318207301617617413616313906248612507218601

    MISSOURI . . . . . . . . . . . . . 821325641MONTANA . . . . . . . . . . . . . . 548NEBRASKA . . . . . . . . . . . . 228445NEVADA . . . . . . . . . . . . . . . 634648NEW HAMPSHIRE . . . . . . . . 258NEW JERSEY . . . . . . . . . . . 257NEW MEXICO . . . . . . . . . . . 545NEW yORK . . . . . . . . . . . . . 223847221431828645448833NORTH CAROLINA . . . . . . . 334438NORTH DAKOTA . . . . . . . . . 437OHIO . . . . . . . . . . . . . . . . . 321543537848OKLAHOMA . . . . . . . . . . . . . 654331OREGON . . . . . . . . . . . . . . . 547PENNSYLVANIA . . . . . . . . . 523345458245233PUERTO RICO . . . . . . . . . . 468RHODE ISLAND . . . . . . . . . 556SOUTH CAROLINA . . . . . . . 845SOUTH DAKOTA . . . . . . . . . 843TENNESSEE . . . . . . . . . . . . 251238TEXAS . . . . . . . . . . . . . . . . 527433531231351858.UTAH . . . . . . . . . . . . . . . . . 453VERMONT . . . . . . . . . . . . . . 451VIRGINIA . . . . . . . . . . . . 446368336VIRGIN ISLANDS . . . . . . 524WASHINGTON. . . . . . . . . . . 426541WEST VIRGINIA . . . . . . . . 624WISCONSIN . . . . . . . . . . . . 356558WYOMING . . . . . . . . . . . . . . 443

    (816'~ j g ~ 4 0 6 ~ 402308~ g ~ i 609505212)6072 1 2 ~ ) 9147165 1 6 ~ 315518919i704)701)2 1 6 ~ 5134196 1 4 ~ 405918503)215)215814412717809401803)6 0 5 ~ 615901214817512713713806801802804703809206509304608414307

    The list above was pos ted on The Pr iva te Sec tor by AX MURJJERER.I t sllould be noted that wi th modern methods o f phone rou t ing an.db i l l i n g th i s l i s t cannot be depended on as complete and accura te .These exchanges are now only genera l ly found in the areas or areacodes l i s t e d , because with the JJewer technology there arer e l a t i v e l y fe w r e s t r i c t i o n s as to the ac tua l phone numberassignments for t o l l f ree serv ice . In some o f these exchanges .i ti s poss ib le to dia l the exchange and then "0000", and theloca t ion wi l l be read o f f by some recorded clow]1 somewhere.2-37

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 6, June 1985)

    6/8

    Out of the Innr Circle-A REVIEW (continued f ro . page 2-34)is an important element of the book where nould scare the b u s i n e s s ~ e o p l e of America -Landreth describes the psrchology and escriptions of the activities of crashersthought processes of t e c h n o l o ~ s foe, the ho t ry to erase f i les or hal t systems andhacker. He t r ies to classify them, so he f hackers reading personal documents andcan refer to them later : the novice' the ntering corporate computers.student, which Landreth considers himseif to Landreth often makes mention of a systembe; the tourist ; the crasher; and th e thief. y i ts value. "Someone is trying to breakHe describes various methods of hacking in into your million dollar computer . . . " he"How a Hacker Hacks" such as guessing ight say. This is the language thatdefaults, using help f i les and demos. He orporate America speaks. Landreth is no tthen goes on to discuss different general ery worried that someone may be looking a ttypes of computers and peripherals as well our credit information, and even lessas operating srstems, what account orried that there exist companies that ownprivileges are, wha security is , th e role d sel l i t .of the sysop, and various hacker scenarios. But, basically, Landreth fu l f i l l s th eThe book is full of dramatic digressions urpose of the book in two chapters: "Makeinto th e activi ty of a hard core hacker, who he Most of What You've Got"! and "Tell talemay spend as much as a year to break into a i ~ s " . Together they wou d make a goodsystem, may return to enter a system with id e of simple suggestions that could prove100 or more "friends", or may even pretend invaluable to sysops, system designers, andto poll employees outside the target ~ o m p a n y omputer security consultants. In theas they go to work in order to find nut user a t te r chapter, Landreth discusses how onenames and any personal i n f o r m a t i o ~ ~ h a t ould reduce accessibil i ty to spare ormight be used as passwords. attended terminals how to reauce th eOut of th e Inner Circle is written for iabil i ty of dial-ups, change logonthese---management- types;- who will read and rocedures assign complex passwords, andread, get ne vous, and then lean on the everal other inexpensive procedures thatsystem operator's to beef up se,:urity. Lan- an beef up security and keep ou t mostdreth also refers to sysops who do no t mind ackers. In the former, he l i s ts some tell-chatting with hackers, as well .as system ale signs for one to suspect that andesigners who may build trap doors into the 'ntruder has been on the system, such assystem that they set up for you. Then one xcessive use of help f i les, movement ofday they may cal l up your computer, enter tller fi les, activity in normally dormantrour system through the trap door ~ h a t they ccounts, etc. I t is these two chapterslnstalled and do whatever they wish. Now, lone that make the book useful. Theythese m a n a ~ e m e n t types may s tar t keeping an ontain a l l that information that hackerseye on thzl r computer . experts as well as now and about which they sometimes remark:company security. Out of th e Inner Circle ' I f I was running that system, this is whatis also full of vignettes which may sound would do... . . These chapters te l l of thecommonplace to the average hacker but that asic steps to follow to greatly reduceomputer intrusion by hackers. I f theseuggestions are followed, the total amountf i l l e ~ a l entry may decrease by aubstantial percentage. Leaving only th e

    ery clever and persistent hackers toxamine corporate America from the inside.his in turn would f inally give some credii l i ty to the myth of th e computer wiz-kid.

    israeli phone systemfrom page 2-33)

    fun as hpre ._- when one party picks up: t.he phonl', t.he other is lockedout, and (dflnot wlerterp or use t.he lIne.Getting your phone service fixed can also be a trying task.Flakinl'So; is aboot the best word that desrr ibes their telco's repairbranch. Mlrr onp or two cOIIPlaints, if you're lucky, the problE'lllRi!Jlt get fixed, and not recur the next day. It is j u ~ t abootuseless to complain about repair probleas to a sUPl'rvisor, Since !besupefVlsor's Phones are always busy or never answered. Soqalengineer ing (such as pretending to be a reporter or other person Wlthclout,) is about the only reliable way of getting your cQlPlaintsresolvE'd.nil' (,hone systelll is also the source of one of the tDany nationalp.lranoid::.. I can't talk about that over the phone" is heardincrPdibjy oftl'n. Perhaps iI's beeause Israel is a SGall countrywith Iclny noticeable security precautions (for exaaple, you lUst openyour bag in front of a security guard whenever walking into any larr.establishlefll so tlll'y (an check you for a.mition or explosives .

    Sole people almost routinely assulP that their conversations arelIOIli tored, just like a 101 of phone phreaks over here always think.

    ( iJA --- - - - - - -.---_ . .-.-_ ....._-:ti iAR PANE T D : I A LU P S

    41532752203019483850

    Then again, this book can be taken inanother ways: Only a few weeks ago,according to 2600 reporter Hunter Alexander,. Michael Nugent of the Electronic DataSystems Corporation fumed about Out of t h ~ Inner Circle before the crime subcommitteeo e ouse call ing ita "how to do it[computer crimel ' How do I handle that?" heasked Rep. Wi liam Hughes (D. N.J.) . Mr.Nugent ought to read th e book before thehackers do, i f he is so worried.

    2-38

    SOME C O R P O R A T EMODEMS800526371480034309998003431360800821120080032541S48003438B49B0032115708003211646B003256397

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 6, June 1985)

    7/8

    S Y S T t ~ ~ T ~ [ ~ l l Y S P t ~ K ~ I';i(jSay Goodbye to Meter ReadersThe New York Telephone Company has asked the StatePublic SelVice Commission to approve a plan to read utilitymeters by telephone, a selVice that could make the door-todoor rr:eter reader a figure of the past.A statement issued by the company said regular telephoneselVice would be unaffected by the meter-reading selVice. TheselVice would make readings only on telephone lines that werenot in use, and would automatically disconnect if a call came in

    during a reading. E? II reading would take about two seconds,a New York Tek lone spokesperson said, and would probablyt: ...e place at night.Bob Loftus, a spokesman fo r Brooklyn Union GasCompany, said, "We'd be able to reduce opemting costs, wethink. And, of course, our customers would have convenience,since they would not need to be at home. And it would eliminateestimated billing."Officials for the union representing Brooklyn Union Gasmeter readers could not be reached for comment.Thai Phone Books a Hot IssueWan Sireci JournalAn AT&T unit filed a $95.6 million lawsuit against a GTEunit, escalating a battle over the right to publish Thailand'stelephone directories. .The suit, filed by AT&T International Inc. in Bangkok,Thailand, alleges that actions by GTE Directories Corp. andother defendants have caused "severe damage to thereputation" of AT&T International in Thailand and othercountries.In February, AT&T International won fierce bidding for theright to publish Thailand's directories for the next five years.The loser was GTE Directories Corp., whose Thai unit hadpublished Thailand's phone books for the past 17 years.In March, GTE Directories filed a $31.4 million suit againstAT&T International, alleging it had committed "wrongfulacts" in connection with the bidding.

    New Tracking Device For CarsThe New York. TimesSeven years ago, William R. Reagan wrote out an inventiondisclosure, the first step toward a patent. With all the policecruisers and communications networks and computers in H iscountry, he thought, there should be some way to equip, 1automobile with a transmitting device that the police couldhome in on should the car be stolen.

    descriptio" to the officer in the cruiser, and so, as the cruiserhomes in en the signal, the officer knows what car to look for.Massachusetts governor Michael D. Dukakis commented.''(My ulti'nate goal is] eleven million cars a year coming out ofDetroit equipped with this." .Problems for New Pay Phones

    Since the FCC approved the sale of pay phones in thesummer of 1 9 ~ 4 , new competitors have sold or installed morethan 10,000 p :ivately owned coin-opemted phones. Many inthe industry expect upwards of one million to be in use by 1990.replacing at least some of the 1.8 million phone companyquarter-eaters currently in operation.A technological hurdle is still to be cleared, though. Untilrecently none of the sO

  • 8/9/2019 2600: The Hacker Quarterly (Volume 2, Number 6, June 1985)

    8/8

    SHERWOOD FOREST: I N T RO TO HACK I NGThis article, 'The In trOlilctilJ'l f' l the World of Hacking' is leantto help you by telling you hOll not to get cau!tlt, ~ a t not to do 00 acOIPUter systee, ~ a t type of eJJiPlellt should I knOll about nON, andjust a little 00 the history, past present future, of the hacker.*"ei COle to the ~ r l d of Hacking! We, the people live o u t s i ~ of the norlal rules, and have been scorned and even arrested by thosefrOlll HII' 'civilized IIOI"Jd', are becllling scarcer every day. This istile to Hie greater fear of ~ a t a!J)Od hacker (skill wise, no ualJudgeeents here) can do I"IOIIadays, thus causing anti-hacker sentilellt

    In the laSses. 11150, few hackers seetI to actually knOll about thecOlPUter systees they hack, or ~ a t equiPlellt they will run into 00the froot end, or they could do wong 00 a systee to alert the'higher' a u t h o r i t i e s l ~ " I O oitor the systee.This article is intended to tell you about SOle things not to do,even before you get on the systee. We will tell you about the newwave of froot end securi ty ~ i c e s that are beginning to be used 00rOlPUters. We will a t t ~ t to instill in you a secood identity, tobe brought up at tile of great need, to pull you out of trouble.And, by the way, we take no, repeat! no, respoosibility for ~ a t wein t h i ~ iIld thg fortOClIing artIclllS. Ero9i of th@ oollshit, 00to the fun: ***fter logging 00 your favorite bbs, you see 00 the high accesstoOiird a ptllJ'le nu.r I It says it's a great systee to 'fud arOUll(iwi th ,. This IliiY be true, but hOIilallI other people are ~ i l l 9 tu callthE' sale nulliter? So: try to avoid ca ling a nURr gIven to thepublic. This is b.ecause there are at least every other user calling,and how IIiIfI\' other boards will that nuliler spread to?If YOU rall a nullber far, far away, and you plan 00 going thru ant ' d e n ~ r or if re-seJif'r, don't keep callin9 the sale access n . r(i.f>. as you would if you had a hacker runnIng), this looks very',u5pic ious and (an lllake life liserable htlen tile phooe bill COles inthe Ioli l. (i ties have a Vdr iety of access nURrs and services,so use il5 lany as you can. Neve( trust a change in the syst.el.. .Thl' 414'5, the assholes, were caught for this reason: ~ e n me ofthe! coonerted to the systee, therl' was nothing !J)Od there. The nexttile, there was a trek gale stuck right in their way! Th!?'( proceededto play said gale for tw, say two and a half hours, 141111' TEillTwas tracing thPl! Nice job,