home *** CD-ROM | disk | FTP | other *** search
Text File | 1990-09-07 | 208.5 KB | 4,280 lines |
-
-
- The LOD/H Technical Journal: File #1 of 12
- Volume 1, Issue 1 Released: Jan. 1, 1987
-
-
- THE
-
- LOD/H TECHNICAL JOURNAL
- -----------------------
-
-
- INTRODUCTION:
-
-
- Welcome to the premiere issue of the LOD/H TJ!
-
- The LOD/H TJ is a soft-copy free newsletter whose primary purpose is to
- further the knowledge of those who are interested in topics such as:
- Telecommunications, Datacommunications, Computer & Physical Security/Insecurity
- and the various technical aspects of the phone system.
-
- The articles contained herein, are totally original unless otherwise
- stated. All sources of information for a specific article is listed in the
- introduction or conclusion of the atricle. We will not accept any articles that
- are unoriginal, plagiarized, or contain invalid or false information. Articles
- will be accepted from anyone who meets those criteria. We are not dependant
- upon readers for articles, since members of LOD/H and a select group of others
- will be the primary contributers, but anyone can submit articles.
-
- Readers are encouraged to download all files for each issue, not just the
- ones they are interested in. The reason for this is twofold: The newsletter
- was designed to be a group effort, and the files herein were not intended for
- individual distribution, and secondly, keeping the issue intact allows you to
- distribute it to other BBS's and phriends who are interested in it.
-
- There is no set date for releasing issues, as we have no monetary or legal
- obligation to the readers, but we predict subsequent issues will be released
- between 2 and 3 months from the previous one. Thus, expect 4 to 6 issues a year
- assuming we continue to produce them, which we intend to do.
-
- Newsletter sponsors are boards which will get the newsletter directly from
- the staff as soon as it is released, and has added our 'staff account' to the
- userlist in order for the readers to respond directly to us about the content
- of the newsletter. If your board would like to become a sponsor, leave us mail
- on any of the following sponsors boards:
-
- Atlantis
- Metal Shop Private
- Digital Logic
- Hell Phrozen Over
-
- An LOD/H TJ staff account is on all our sponsor BBS's. This allows readers
- to get in contact with us for the following reasons:
-
- * If you have questions about any article, or question the validity of the
- material, you are welcome to contact us through the staff account and leave
- a way for the author to contact you. This insures a better understanding from
- the readers of the topic and also, insures the integrity of the author as far
- as knowledge and originality of the topic is concerned.
-
- * You may leave questions for the staff which will be answered in our 'Ask the
- Staff' section of the newsletter. The questions selected will be of general
- interest to others. Any questions not published will try to be answered via
- E-Mail. We don't know everything, but anything we do know will be shared
- with those who ask.
-
- Various features of the newsletter include:
-
- Editorials: These will feature short articles on topics which affect the
- telecom world in general.
-
- Network News & Notes: News articles and other things of interest pertaining to
- the things this newsletter specializes in.
-
- Reader Mail: Questions and comments about previous issues from readers who
- contact us through our staff account on sponsor boards.
-
- Special Features: These will pop up from time to time and can be anything which
- does not fit in the general format of the newsletter.
-
- -------------------------------------------------------------------------------
-
- TABLE OF CONTENTS:
-
- 01 Introduction to the LOD/H Technical Journal Staff 05 K
- and Table Of Contents for Volume 1, Issue 1
-
- 02 Custom Local Area Signalling Services (CLASS) The Videosmith 17 K
-
- 03 Identifying and Defeating Physical Security and Lex Luthor 23 K
- Intrusion Detection Systems Part I: The Perimeter
-
- 04 The Traffic Service Position System (TSPS) The Marauder 23 K
-
- 05 Hacking DEC's TOPS-20: Intro Blue Archer 19 K
-
- 06 Building your own Blue Box (Includes Schematic) Jester Sluggo 16 K
-
- 07 Intelligence and Interrogation Processes Master Of Impact 18 K
-
- 08 The Outside Loop Distribution Plant: Part A Phucked Agent 04 25 K
-
- 09 The Outside Loop Distribution Plant: Part B Phucked Agent 04 23 K
-
- 10 LOH Telenet Directory: Update #4 (1-1-87) Part A LOH 25 K
-
- 11 LOH Telenet Directory: Update #4 (1-1-87) Part B LOH 18 K
-
- 12 Network News & Notes Staff 10 K
-
-
- Total: 12 files 223 K
-
- -------------------------------------------------------------------------------
-
- That wraps it up for the introduction, hope you like it and we will look
- forward to hearing from you.
-
- The LOD/H Technical Journal: File #2 of 13
-
-
- Custom Local Area Signalling Services
-
- Written by: The Videosmith
-
- Version - 1.1
-
- ----------------------------(c) Copyright 1994---------------------------
-
- This article will explain the newly developed LASS system (AT&T Bell Labs),
- and how it may affect us in the near future. Note that the service as it
- appears for customers is called "CLASS", the C standing for Custom. I
- assume this is just for looks.
-
- LASS
- ----
-
- The telephone was destined to become a well used and powerful tool for
- otherwise tedious tasks. Gas meters and other metered services would be
- surveyed through the use of automatic data retrieval employing telephone
- communications. All in all, some have big plans for the uses one could put
- the telephone system up to, and CLASS is one plan that is going to drop
- an innovative bombshell on the telecommunicating world.
-
- At this moment, a local CCIS network feature is being developed by
- Bell Laboratories. This feature will change the way people use fones, and
- will also change the attitude in which they use them. It will give far
- more control of the telephone to the user than ever before. This feature
- is called CLASS (Custom Local Area Signalling Services).
-
- Everyone will find something useful in this newly developed telephone
- feature. Pizza parlours will no longer have to worry about fraudulent italian
- food mongers, and little old ladies won't have to worry about prank calls
- by certain dubious characters.
-
- What are all these fantastic features? These features will
- include call back of the last caller, regardless of whether you have their
- telephone number or not. Another will be distinct call waiting tones, and
- preselected call forwarding (only those people whom you wish to speak to
- will be forwarded). This is a rudimentary list of CLASS features to come.
- It is a very powerful system, and it all relys on LCCIS (Local Common
- Channel Interoffice Signalling), an intra-LATA version of the ever-popular
- CCIS.
-
- CCIS Background
- ---------------
-
- CCIS was originally introduced in 1976 as, basically, the signalling
- system to end all signalling systems. Instead of using the voice grade
- trunks to carry signalling information on, a data network would be used. This
- network is comprised of data links from each TO [involved with CCIS] to
- the appropriate STP (signal transfer point). Signalling information is sent
- through these links at 4800 bps to the STPs (Note that baud rates may increase
- due to the economic availability of faster data communications hardware),
- where stored program control routes the signalling information to the needed
- offices in order to open and complete the call path. SPC checks automatically
- for on-hook/off-hook status before opening the path, and if the status is
- off-hook (in this case the customer does not have the call waiting custom
- calling feature), returns information to the originating CO to apply a busy
- signal to the customer. This is but one of many features toll CCIS provides
- the network with.
-
- Since this text is not centered on the topic of toll CCIS, technical
- aspects aren't as important (except for the comparison between the local
- and toll networks for observational purposes): yet it is important to
- notice how automated and flexible this type of signalling method is, as well
- as its speed and efficiency. All the software control involved with local
- and toll networks is called, fittingly, the "stored program control network."
- or ISDN (Integrated Services Digital Network). LCCIS will be addressed in a
- future article.
-
- CLASS/LCCIS Features
- --------------------
-
- LCCIS would look like this:
-
-
-
- /--X
- CO-2
- ESS#
- /----I-T-G-----1A-----I-T-G----X
- | X--/ |
- | | |
- | LCCIS |
- | | |
- | ---------- |
- /--X--LCCIS--|CCIS/SPC|--LCCIS--/--X
- CO-1 ---------- CO-3
- ESS# ESS#
- -1A----interoffice trunk group---1A-
- NPA - Dial 1223 213 NPA (GTE) - Dial 114
-
- SPC = Stored Program Control (Network control and Signal Transfer Point)
- ITG = Interoffice Trunk Group
-
- Using a high-speed data link between local offices creates a much more
- flexible and more effecient way for intra-LATA central offices to communi-
- cate. Instead of using per-trunk signalling (using the same trunk used for
- voice transmission to send routing and billing information), such data would
- be sent thru a 2400 bps dedicated data link, which interacts with a local
- signal processing and transfer point. From that point, signalling information
- is distributed to appropriate central offices or tandem switches.
-
- At the during which this article was being initially researched, CLASS was
- only being developed for the #1A ESS switch due to the flexibility of it's
- memory handling, it's speed and what Bell Labs called 'cost efficiency'. At
- the end of the research involved with this article, CLASS was already
- implemented in data stage on ESS#5.
-
- LCCIS will work with the local switches using stored program con-
- trol, keeping track of call data. The 1A switches will use what
- is called "scratch pad" memory (also known as call store), in conjuction
- with LCCIS's database, to accomplish all the features that LASS provides.
- This memory will hold such data as "line history", and a "screening list".
- That information will make it possible for autoredial, selective call
- forwarding, nuisance call rejection, and distinctive call waiting tones.
-
- Selective CF
- ------------
-
- Selective call forwarding is defined by the subscriber (the sub-
- scriber must have conventional call forwarding to request this service).
- Using call store, or more specifically the screening list, one will
- be able to selectively forward a call to another directory number by
- executing a few simple commands on the friendly home-bound telephone
- (unlike migrating telephones most frequently found in hotel rooms). An
- access code (a list will appear at the end of the file) will be entered,
- and a special tone will be issued from the subscriber's CO. The cus-
- tomer will then dial in the numbers he wants forwarded to the particular
- number. After each number, a tone will sound indicating the acceptance
- of the number. Individual BOC's (Bell Operating Companies) will be
- able to define the amount of numbers which may be screened. Once this is
- done, the cusomter hangs up and the ESS takes over. Now, whenever some
- one calls this particular customer, the customer's switch will compare
- the calling line's directory number with those stored in scratch pad
- memory. If the CLID matches one of the numbers in 1A memory associated with
- the called directory number, the number is forwarded. If not, the phone will
- ring at the original destination. This in particular could make it very
- difficult on system hackers, as you could probably imagine. A company can
- subscribe to this CLASS feature, and enter only the numbers of authorized
- users to be forwarded to a computer. Bureaus inside the various telephone
- companies and other sensitive operations can screen calls to particular
- numbers by using this service.
-
- This is a security that's hard to beat, but of course there is a way
- (simple law of nature: nothing is fail-safe). There will always be the
- obvious way of finding numbers which are being forwarded to, like auto-
- dialing entire exchanges (one after the other). Unfortunetly, CLASS will
- be providing other services which might make "scanning" seem less
- attractive.
-
- Distinctive Ringing
- -------------------
-
- Distinctive ringing is handled in the same fashion as selective call
- forwarding is: the screen list in scratch pad memory. The customer may
- enter numbers which the ESS should give special precedence to, and when-
- ever a call is placed to this particular customer's number, ESS checks
- to see whether the CLID matches a directory number listed in the
- switch's memory. If a match is made, the subscriber's CO gives the off-hook
- line a special call waiting tone, or the on-hook phone a distinctive ring
- (possibly using abnormally timed ringing voltage... some readers may picture
- a British Telecom ring as an example, although many foreign audible rings
- tend to be different).
-
- Call Rejection
- --------------
-
- Nuisance call rejection, a feature making it possible to block certain
- idiots from ringing your fone (a feature we can all benefit from at
- one time or another... or all the time), uses the information retrieved
- from LCCIS (CLID). Let's say customer A calls customer B:
-
- ----LCCIS----
- A ---> CO< >CO ---> B
- ----trunk----
-
- Customer B happens to despise customer A, and keys in a special *##
- code. ESS again takes over and looks at the CLID information, and stores
- the calling line directory number in a special screen list associated with
- with customer B. The next time customer A tries calling customer B, the
- terminating office will reroute the call to a local (the originating CO)
- digitized recording telling customer A that the call he made cannot be
- completed due to customer B's request ("I'm sorry, but the customer you
- have tried to reach wishes you were eaten by a rabid canibal on drugs").
-
- Dial Back
- ---------
-
- To create such a feature as "dial back" (for called or calling party),
- the ESS scratch pad memory is used again. The same principles are
- used as are employed in the already established custom calling feature,
- auto-redial. CLID will be used in this way:
-
- (received from CLID)
- last-called-mem last-caller-mem
- ---------- ----------
- |###-####| |###-####|
- ---------- ----------
-
- Your ESS switch will keep track of who you called last, and who called
- you last, thru the retrieval of calling line information provided by
- LCCIS in conjunction with your switch (Your switch will know what number
- you called last by directly storing the digits you dialed previously. Local
- signalling will provide calling line information via LCCIS call
- information forwarding using the data link mentioned). This way, with your
- access code (*##), you will have total re-dial service.
-
- Customer Trace
- --------------
-
- This type of memory handling and signalling method will also allow the
- feature that everyone was afraid would abolish "phreaking". Subscriber
- initiated tracing, using the last caller directory number stored at your CO,
- will be available as far as Bell Laboratories is concerned. There seems to be
- two types of "customer originated trace". One will forward the number to local
- authorities, at which it will be handled through the police. The other
- feature AT&T/Bell Labs is working on will be a display module that will sit by
- your fone, and will display calling directory numbers. All other CLASS
- features that use the calling line information are used at the descretion of
- the caller. The customer originated trace, however, using the individual or
- bulk calling line identification features ("trace") allow the customer to view
- the calling number. The world is not ending... yet, in any case. Individual
- customers will be able to employ a special "privacy code", which when dialed,
- tells the far-end switch not to forward the calling number to a desk display.
- Whether there will be a way to override this or not is obvious: of course.
- The police, the military and government agencies are all likely to have a
- higher priority level than your privacy. It seems that long distance
- carriers could benefit greatly from CLASS. Why Bell/AT&T should give any type
- of special services to OCCs not given to other non-telephone companies,
- especially after equal access is fully implemented, I don't know (but then
- again, it is EQUAL access). It's always possible. It is also possible that
- there will be no desk display. There are those phone phreaks who feel that
- BOC's will never give the end party the priviledge of retrieving the calling
- party's number directly, if not due to plain old Bell policy on the issue of
- privacy. We'll have to wait and see about that point: the desk display is, in
- fact, operational and is being used in test stage. Whether Bell Labs feels
- that this feature can and will be used in a full scale non-beta stage BOC
- situation is a different story. The economic feasability is questionable.
-
- End Notes
- ---------
-
- CLASS, using local CCIS, will not function on inter-LATA calls. The
- local CCIS network is exactly that: local, and does not extend into the
- realm of "toll network". This will eventually be corrected (allowing toll
- CCIS to interact with LCCIS as far as CLID information is concerned). How
- the various long distance networks will exchange information with the local
- BOC network has not been determined [by the writer of this article]. It
- would seem like a monumental task to try to integrate the emerging long
- distance companies into the AT&T/BOC ISDN, be it because of equipment
- inconsistancies or lack of cooperation on the part of the OCC, etc. This
- will be discussed in an upcoming article dealing with toll CCIS.
- Although CLASS has been built around the ESS #1A switch, it has, as has been
- mentioned, been co-developed for use with the ESS #5 switching machine.
-
- CLASS is going to cause problems, as well as create a new environment
- for telephone users. Of course, those problems are only problems to people
- who will generally be reading this article, but the more you know about CLASS
- the more comfortable you'll feel about the service. It can be used to
- one's advantage, even as a telecommunications hobbyist. Just as a
- corporation will be able to set up a complete history of who is calling their
- system, and eventually keep people off the system using the screen list in
- memory, the same features can be applied to bulletin board systems and the
- like. Imagine being able to keep all the local bozos off your board, or
- being able to screen all but your private local users (making your system
- completely inaccessible through the PSTN network from any telephone but
- that of one of your users). It would seem to be a useful feature, if nothing
- else but an easy feature, to implement.
-
- It is a little difficult, if not plain awkward, to write an article about
- a topic which is subject to change at the researcher's ignorance. I think
- that CLASS is enough of a momentous issue that at least some text by a
- hobbyist should be released for public knowledge purposes. Yet my awareness
- of the fact that some of this text may be outdated, or inaccurate, by the
- time CLASS is released as a BOC service, is in itself the explanation of why
- there is a version number at the head of this article. Most likely, when CLASS
- becomes public, the second version will be released with update notes
- (if need be...most probably so). I hope you enjoyed it,
-
- The Videosmith.
- LOD/LOH!
-
- ---------------------------------------
- Test stage defaults for some features:
- NPA - Dial 760 914 NPA - Dial 990
- DTMF ! Pulse ! Description of Service
- ---------------------------------------
- *66 ! 1166 ! Reconnect last caller
- ---------------------------------------
- *63 ! 1163 ! Selective Call Forward
- ---------------------------------------
- *60 ! 1160 ! Nuisance Call Blocking
- ---------------------------------------
- *57 ! 1157 ! Customer "Trace"
- ---------------------------------------
-
- Note: These command codes may vary from BOC to BOC. The codes listed above
- were found in a general description of CLASS and did not specify a particular
- implementation of these services.
-
-
- Acknowledgements:
-
- Mark Tabas for his views on various included topics... for example, subscriber
- tracing ("FUCK NO").
- Doctor <413> Who
- Mr. DNA
-
-
- The LOD/H Technical Journal: File #3 of 12
-
-
- Lex Luthor and The Legion Of Doom/Hackers Present:
-
- Identifying, Attacking, Defeating, and Bypassing
- Physical Security and Intrusion Detection Systems
-
- PART I: THE PERIMETER
-
-
- The reasons for writing this article are twofold:
-
- 1) To prevent the detection and/or capture of various phreaks, hackers and
- others, who attempt to gain access to: phone company central offices, phone
- closets, corporate offices, trash dumpsters, and the like.
-
- 2) To create an awareness and prove to various security managers, guards, and
- consultants how easy it is to defeat their security systems due to their
- lack of planning, ignorance, and just plain stupidity.
-
-
- In the past, I have written articles on "Attacking, Defeating, and Bypassing"
- Computer Security. Now I take those techniques and apply them to Physical
- Security. The information contained herein, has been obtained from research
- on the different devices used in physical security, and in practical "tests"
- which I and others have performed on these devices.
-
-
- INTRODUCTION:
- -------------
-
- Physical Security relies on the following ideas to protect a facility:
- Deterrence, Prevention, Detection, and Response. Deterrents are used to 'scare'
- the intruder out of trying to gain access. Prevention tries to stop the
- intruder from gaining access. Detection 'sees' the intruder while attempting to
- gain access. Response tries to stop and/or prevent as much damage or access to
- a facility as possible after detection. There are 3 security levels used in
- this article and in industry to designate a facility's need. They are: Low,
- Medium, and High. The amount, and types of security devices used by a facility
- are directly proportional to the level of security the facility 'thinks' it
- needs. When I use 'facility' I am refering to the people in charge of
- security, and the actual building and assets they are trying to protect. This
- article will be primarily concerned with the protection of the perimeter. I
- have 2 other articles planned in this series. The second is the security
- concerning the exterior of a facility: cipher locks, window breakage detectors,
- magnetic contact switches, etc. The third part will deal with security systems
- inside a facility: Passive Infra-Red detectors, ultrasonic detectors, interior
- microwave systems, and the various card access control systems.
-
- THE PERIMETER:
- --------------
-
- A facility's first line of defense against intrusion is its' perimeter. The
- perimeter may have any or all of the following:
-
- * A single fence
-
- * An interior fence coupled with an exterior fence
-
- * Regular barbed wire
-
- * Rolled barbed wire
-
- * Various fence mounted noise or vibration sensors
-
- * Security lighting and CCTV
-
- * Buried seismic sensors and different photoelectric and microwave systems
-
-
- Fences:
- -------
-
- Fences are commonly used to protect the perimeter. The most common fence in use
- today is the cyclone fence, better known as the chain link fence. Fences are
- used as a deterrent and to prevent passage through the perimeter. Common ways
- of defeating fences are by cutting, climbing, and lifting. Cutting is not
- usually recommended for surreptitious entry, since it is easily noticeable. In
- this article, we will be taking the 'Stealth' approach. Climbing is most
- commonly done, but if the fence is in plain view, it may not be advisable since
- you can be seen easily. The higher the fence, the longer it takes to climb. The
- longer it takes to climb, the longer security has to detect and respond to your
- actions. Lifting is better since you are closer to the ground, and not as
- easily spotted, but the fence must be very flexible, or the sand very soft so
- you can get under the fence quickly and easily. Whenever you see a somewhat
- 'unclimbable' fence (or one that you just don't want to climb) you should check
- the perimeter for large trees with uncut branches hanging over the fence or
- other objects which will enable you to bypass the fence without ever touching
- it. You could use a ladder but you don't want to leave anything behind,
- especially with your fingerprints on it, not that you plan on doing anything
- illegal of course.
-
- Electric fences are not used for security purposes as much as they were in the
- past. Today, its main use if to keep cattle or other animals away from the
- perimeter (either from the inside or outside). There are devices which send
- a low voltage current through a fence and can detect a drop in the voltage when
- someone grabs onto the fence. Again, not too common so I will not go into it.
-
- For high security installations, there may be 2 fences. An outer fence, and an
- inner fence which are 5-10 yards apart. It isn't often that you see this type
- of setup, it is mainly used by government agencies and the military. You can
- be very sure that there are various intrusion detection devices mounted on the
- fence, buried underground between them, and/or line-of-sight microwave or
- photoelectric devices used. These will be mentioned later. If you insist on
- penetrating the perimeter, then you should try to measure how far it is between
- fences. Now find a 2 foot by X foot board where X is the distance between the 2
- fences. Very slowly place the board on top of both fences. If there are no
- fence vibration sensors you can just climb the fence and step onto the board to
- walk across the top. If there are fence sensors, you will need a ladder which
- cannot touch the fence to get you on top of the board. You can then walk on the
- board, over the ground in between, and jump down, being careful not to disturb
- the fences. This will work if there are no sensors after the 2 fences. Identi-
- fying sensors will be mentioned later. Obviously the method of using a long
- board to put on top of the two fences will not work if the fences are spaced
- too far apart. Also, you and the board can be seen very easily.
-
- Barbed Wire:
- ------------
-
- There are two common types of barbed wire in use today. The more common and
- less secure is the type that is strung horizontally across the fence with three
- or more rows. The 'barbs' are spaced about 6" apart, enough for you to put your
- hand in between while climbing over. Also, it is thin enough to be cut very
- easily. If you think you will need to leave in a hurry or plan on problem free
- surreptitious entry and the only way out will be to climb over the fence again
- you can cut the wire from one post to another, assuming the wire is tied or
- soldered to each post, and replace it with a plastic wire which looks like the
- wire you just cut. Tie it to each post, and come back anytime after that. You
- can then climb over it without being cut. The other type of wire, which is more
- secure or harmful, depending on how you look at it, is a rolled, circular wire
- commonly called Razor Ribbon. One manufacturer of this is the American Fence
- Co. which calls it 'the mean stuff'. And it is. The barbs are as sharp as
- razors. Of course this can be cut, but you will need very long bolt cutters and
- once you cut it, jump as far back as you can to avoid the wire from springing
- into your face. As mentioned earlier, cutting is irreparable, and obvious. If
- the wire is loosely looped, there may be sufficient room in between to get
- through without getting stitches and losing lots of blood. If the wire is more
- tightly looped you may be able to cover the the wire with some tough material
- such as a leather sheet so you can climb over without getting hurt. This method
- is not easy to accomplish however. You may want to see if you can get under the
- fence or jump over rather than climb it.
-
-
- Fence mounted noise or vibration sensors:
- -----------------------------------------
-
- Let's assume you have found a way to get past the fence. Of course you have not
- tried this yet, since you should always plan before you act. OK, you have
- planned how you would theoretically get over or past the fence. You are now
- past the deterrent and prevention stages. Before you put the plan into action
- you had better check for the things mentioned earlier. If a fence is the first
- step in security defense, then fence mounted sensors are the second step.
- The types of detection equipment that can be mounted on the fence are:
-
- Fence shock sensors: These mount on fence posts at intervals of 10 to 20 feet,
- or on every post. They are small boxes clamped about 2/3 up from ground level.
- There is a cable, either twisted pair or coax running horizontally across the
- fence connecting these boxes. The cable can be concealed in conduits or inside
- the fence itself, thus, making it hard to visually detect. Each fence sensor
- consists of a seismic shock sensor that detects climbing over, lifting up or
- cutting through the fence. So if the fence is climbable, it would not be wise
- to do so since you may be detected. Of course it doesn't matter if your
- detected if there is no security force to respond and deter you.
-
- Another type, is called the E-Flex cable. It's simply a coax cable running
- horizontally across the fence. This cable can not only be used on chain link
- fences, but can also be used on concrete block, brick, or other solid barriers.
- It may be on the outside, or mounted inside the fence, thus, making detection
- of the device harder. Of course detection of this and other similar devices
- which cannot be seen, doesn't make it impossible. A way to detect this, is by
- simply repeatedly hitting the wall with a blunt object or by throwing rocks at
- it. If nothing out of the ordinary happens, then you can be reasonably sure it
- is not in place. This is basically a vibration sensor.
-
- Low frequency microphones: This is essentially a coax cable that responds to
- noise transmitted within the fence itself.
-
- Vibration sensors: These are based on mercury switches, a ring or ball on a
- pin, or a ball on a rail. Movement of the fence disturbs the switches and
- signals alarms. A hint that this is in use is that it can only be used on a
- securely constructed and tightly mounted fence, with no play or movement in it.
- Otherwise, they will be getting false alarms like crazy.
-
- OK, you know all about these types, how the hell do you get around it? Well,
- don't touch the fence. But if there is no alternative, and you must climb it,
- then climb the fence where it makes a 90 degree turn (the corner) or at the
- gate. Climb it very slowly and carefully, and you should be able to get over
- without being detected by these sensors! Make sure you climb on the largest
- pipe and don't fall.
-
- Security lighting and CCTV:
- ---------------------------
-
- Sometimes, fences may be backed up by Closed Circuit TV (CCTV) systems to make
- visual monitoring of the perimeter easier and quicker. By installing an
- adequate lighting system and conventional CCTV cameras, or by using special
- low light sensitive cameras, the perimeter can be monitored from a central
- point. Security personnel can then be dispatched when an intruder is detected
- on the monitors.
-
- Some systems are stationary, and others can be moved to view different areas of
- the perimeter from within the central station. It would be in your best
- interest to determine if the camera is stationary or not. If so, you may be
- able to plan a path which will be out of the view range of the camera. If it is
- movable, you will have to take your chances.
-
- Light control sensor: This utilizes a Passive InfraRed (PIR) sensor to detect
- the body heat emitted from someone entering the detection area, and can
- activate a light or other alarm. PIR's will be discussed in Part II of this
- series. The sensor has an option called: 'night only mode' in which a light
- will flash when a person enters the area, but only during night hours. It can
- tell if its dark by either a photoelectric sensor, or by a clock. Of course if
- its daylight savings time, the clock may not be totally accurate, which can be
- used to your advantage. If it is photoelectric, you can simply place a
- flashlight pointing directly into the sensor during daylight hours. When it
- gets dark, the photoelectric sensor will still 'think' its day since there is
- sufficient light, thus, not activating the unit to detect alarm conditions.
- This should enable you to move within the area at will.
-
- Buried Seismic Sensors:
- -----------------------
-
- Seismic detectors are designed to identify an intruder by picking up the sound
- of your footsteps or other noises related to passing through the protected
- area. These sensors have a range of about 20 feet and are buried underground
- and linked by a cable, which carries their signals to a processor. There, the
- signals are amplified and equalized to eliminate frequencies that are unrelated
- to intruder motion. The signals are converted to pulses that are compared with
- a standard signal threshold. Each pulse that crosses this threshold is tested
- on count and frequency. If it meets all the criteria for a footstep, an alarm
- is triggered. These sensors can even be installed under asphalt or concrete by
- cutting a trench through the hard surface. It is also immune to weather and can
- follow any type of terrain. The only restriction is that the area of detection
- must be free of any type of obstruction such as a tree or a bush.
-
- Electronic field sensor:
- ------------------------
-
- These detect an intruder by measuring a change in an electric field. The field
- sensors use a set of two cables, one with holes cut into the cable shielding to
- allow the electromagnetic field to 'leak' into the surrounding area. The other
- cable is a receiver to detect the field and any changes in it. Objects passing
- through the field distort it, triggering an alarm. This sensor can either be
- buried or free standing, and can follow any type of terrain. But its very
- sensitive to animals, birds, or wind blown debris, thus, if it is very windy
- out, and you know this is being used, you can get some paper and throw it so
- the wind takes it and sets off the alarm repeatedly. If it is done enough, they
- may temporarily turn it off, or ignore it due to excessive false alarms.
-
- It is not hard to tell if these devices are in use. You cannot see them, but
- you don't have to. Simply get 3-4 medium sized stones. Throw them into the
- place where you think the protected area is. Repeat this several times. This
- works on the lesser advanced systems that have trouble distinguishing this type
- of seismic activity from human walking/running. If nothing happens, you can be
- reasonably sure this is not in use. Now that you can detect it, how do you
- defeat it? Well as far as the electronic field sensor is concerned, you should
- wait for a windy night and cause excessive false alarms and hope they will turn
- it off. As far as the seismic sensors, you can take it one step at a time, very
- softly, maybe one step every 30-60 seconds. These sensors have a threshold,
- say, two or more consecutive footsteps in a 30 second time interval will
- trigger the alarm. Simply take in one step at a time, slowly, and wait, then
- take another step, wait, until you reach your destination. These detectors work
- on the assumption that the intruder has no knowledge of the device, and will
- walk/run across the protected area normally, thus, causing considerable seismic
- vibrations. The problem with this method is that it will take you some time to
- pass through the protected area. This means there is more of a chance that you
- will be seen. If there are a lot of people going in and out of the facility,
- you may not want to use this method. Another way would be to run across the
- protected area, right next to the door, (assuming that is where the response
- team will come out) and drop a large cat or a dog there. When they come out,
- they will hopefully blame the alarm on the animal. The sensor shouldn't really
- pick up a smaller animal, but odds are the security force are contract guards
- who wouldn't know the capabilities of the device and the blame would fall on
- the animal and not you, assuming there were no cameras watching...
-
-
- Microwave systems:
- ------------------
-
- In an outdoor microwave system, a beam of microwave energy is sent from a
- transmitter to a receiver in a conical pattern. Unlike indoor microwave
- detectors, which detect an intruders' movement in the microwave field, the
- outdoor system reacts to an intruders' presence by detecting the decrease in
- energy in the beam. The beams can protect an area up to 1500 feet long and 40
- feet wide. All transmission is line-of-sight and the area between transmitter
- and receiver should be kept clear of trees and other objects that can block the
- beam. Microwave systems can operate in bad weather, and won't signal an alarm
- due to birds or flying debris.
-
- These systems work on the Doppler effect, in which they detect motion that
- changes the energy, and sets off an alarm. These devices will usually be placed
- inside a fence to avoid false alarms. These devices are very easy to visually
- detect. They are posts from 1-2 yards high, about 6 inches by 6 inches and
- there are 2 of them, one receiver and one transmitter. In some cases there will
- be more, which enables them to protect a larger area.
-
- To defeat this, you can enter the field, very slowly, taking one step at a time
- but each step should be like you are in slow motion. It doesn't matter how hard
- you hit the ground, since it doesn't detect seismic activity, only how fast
- you approach the field. If you take it very slowly you may be able to get past.
- Detectors of this type get more and more sensitive as you approach the posts.
- Ergo, choose a path which will lead you furthest away from the posts.
-
-
- Photoelectric systems:
- ----------------------
-
- These systems rely on an invisible barrier created by beams of infrared light
- sent from a light source to a receiver. When the beam is interrupted, the alarm
- sounds. The beam can have an effective range of up to 500 feet. Multiple beams
- can be used to increase the effectiveness of the system, making it harder for
- you to climb over or crawl under the beams. Photoelectric systems can be prone
- to false alarms as a result of birds or wind-blown debris passing through the
- beam. The problem can be corrected by the installation of a circuit that
- requires the beam to be broken for a specified amount of time before an alarm
- is sounded. Weather conditions like heavy fog, can also interrupt the beam and
- cause an alarm. This can also be corrected by a circuit that reacts to gradual
- signal loss. These systems should not face directly into the rising or setting
- sun since this also cuts off the signal beam.
-
- As you can see this system has many problems which you can take advantage of to
- bypass this system. As with any system and method, surveillance of the facility
- should be accomplished in various weather conditions to help verify the
- existence of a particular detection device, and to see how they react to false
- alarms. Many times, you will be able to take advantage of various conditions
- to accomplish your mission. If there is only one set of devices (transmitter
- and receiver), try to estimate the distance of the sensors from the ground. You
- can then either crawl under or jump over the beam. This also works on the
- assumption that the intruder will not recognize that the device is in use.
-
-
- MISCELLANEOUS:
- --------------
-
- Guards: There are two types, in-house or company paid guards and contract
- guards. Contract guards are less secure since they do not work for the facility
- and if they make a mistake they simply get transferred to another facility no
- big deal. In-house guards know the facility better and have more to lose, thus,
- they are probably more security conscious. Be aware of any paths around the
- perimeter in which guards can/will walk/ride to visually inspect the exterior
- of the facility.
-
- Central monitoring: Monitoring of the devices mentioned in this article is
- usually accomplished at a 'Central Station' within the facility. Usually,
- guards *SHOULD* be monitoring these. If you have planned well enough, you may
- find that the guard leaves his/her post to do various things at the same time
- every night. This would be an ideal time to do anything that may be seen by
- cameras. Unfortunately, there will probably be more than one guard making this
- nearly impossible.
-
- Gates: Probably the easiest way to pass through the perimeter is to go through
- the gate. Whether in a car, or by walking. This may not be too easy if it is
- guarded, or if there is a card reading device used for entry.
-
- Exterior card readers: An in-depth look at the types of cards used will be in
- part 3 of this series. But for now, if the card used is magnetic (not Weigand)
- it is quite possible to attack this. If you have an ATM card, Visa, or other
- magnetic card, slide the card thru, jiggle & wiggle it, etc. and quite possibly
- the gate will open. Reasons for this are that since it is outside, the reader
- is subjected to extreme weather conditions day in and day out, thus, the
- detecting heads may not be in the best of shape, or since it is outside it may
- be a cheap reader. In either case, it may not work as good as it should and
- can make 'mistakes' to allow you access.
-
- Combinations: The devices listed in this article do not have to be used alone.
- They can and are used in conjunction with each other for greater security.
-
- Diversions: In some cases, a diversion could better insure your passage through
- the perimeter. Keep this in mind.
-
- Extreme weather conditions: All devices have an effective operating range of
- temperatures. On the low end of the scale, most devices will not operate if it
- is -30 degrees Fahrenheit or lower. Though, quite a few will not operate
- effectively under the following temperatures: -13 f, -4 f, +10 f, +32 f. On
- the other side of the scale, they will not operate in excess of: +120 f, +130 f
- and +150 f. It is unlikely that the outside temperature will be above 120
- degrees, but in many places, it may be below freezing. Take this into
- consideration if a facility has these devices, and you cannot bypass them any
- other way.
-
- I could not have possibly mentioned everything used in perimeter protection in
- this article. I have tried to inform you of the more common devices used. Some
- things were intentionally left out, some were not. I welcome any corrections,
- suggestions, and methods, for this article and the future articles planned. I
- can be contacted on a few boards or through the LOD/H TJ Staff Account.
-
-
- CONCLUSION:
- -----------
-
- This article primarily dealt with the identification of various 'tools' used in
- physical security for the deterrence, prevention, detection, and response to an
- intruder. There also were some methods which have been used to attack, defeat,
- and bypass these 'tools'. None of the methods mentioned in this article work
- 100% of the time in all circumstances, but ALL have worked, some were under
- controlled circumstances, some were not. But all have worked. Some methods are
- somewhat crude, but they get the job done. Some methods were intentionally left
- out for obvious reasons. Even though this article was written in a tutorial
- fashion, in no way am I advising you to go out and break the law. I am merely
- showing you how to identify devices that you may not have known were in place
- to keep you from making a stupid mistake and getting caught. The Establishment
- doesn't always play fair, so why should we?
-
-
- ACKNOWLEDGEMENTS:
- -----------------
-
- Gary Seven (LOH)
-
-
- The LOD/H Technical Journal: File #4 of 12
-
-
- Understanding the Traffic Services Position System (TSPS)
-
- Part I - The Console
-
- By The Marauder
- &
- The Legion of Doom!
-
-
- / Revision 1.0-02 X
-
- Written Sometime in 1986...
-
-
- * Special thanks to Bill from RNOC, Phucked Agent 04, and The (602) Scorpion
- for their help in acquiring & compiling this information.
-
- In this article I will discuss the basic layout description, and use of
- the keys, found on the standard AT&T 100-B TSPS Console. Possible uses for the
- information contained herein (besides for just wanting to know about the TSPS
- Console) are primarily for social engineering purposes. The more you know about
- operators and their jobs, the more you can get them to do things for you...
-
-
- I. Basic Console layout
- ====================
-
- +---------------------------------------------------------------------------+
- ! +---------------------+ +-------------------------------------+ !
- ! ! (Ticket Box) ! ! ( Display ) ! !
- ! +---------------------+ +-------------------------------------+ !
- ! !
- ! (NonCoin) (--- Coin 1-----) (-- Hotel --) !
- ! VFY OVR SCN INW EMR Sta 0+ 0- Sta 0+ 0- Pst Tne Sta 0+ 0- Gst !
- ! SES INT Pay !
- ! !
- ! (Outgoing trunk) (--- Ring Designation --- ) (Release) !
- ! DA R&R SWB OGT BAK FWD CAL T&C Nfy Chg Key BAK FWD SR MB Mt PT !
- ! BAK due clg !
- ! !
- ! +-----+ Cw (Station) PA CL SP SP AT DDD !
- ! ! M B ! CG CD CT !
- ! ! u u ! !
- ! ! l l ! (Person ) PA CL SP SP NO !
- ! ! t l ! CG CD AMA !
- ! ! i e ! !
- ! ! t ! (Coin 2) (AMA Timing) (Loop Ctl) !
- ! ! L i ! COL RET CA ST Cg Cg Cg !
- ! ! e n ! TMG TMG (Kpls key) (Num pad) !
- ! ! a ! Cd Cd Cd KP KP KP 1 2 3 !
- ! ! f T ! CA REC TB RT HO !
- ! ! r ! CAL MSG HD HD HD 4 5 6 ST !
- ! ! a ! KP KP !
- out - 54"H x 40"W x12"D), with some newer size F, H, and some 3M series-
- ! ! ! RLS !
- ! ! ! (Display Ctrl) KP KP 0 !
- ! +-----+ tim chg CLG CLD SPL BK FD +--------!
- ! min NUM NUM NUM ! Number !
- ! ! Plate !
- +---------------------------------------------------------------------------+
- Figure 1. 100-B TSPS Console layout
-
- (Due to 80 col width, picture is a little distorted vertically)
- Legend:
- o Abbreviations in all capital letters are ILLUMINATED KEYS
- o Abbreviations in all lower case letters are NON-ILLUMINATED KEYS
- o Abbreviations in upper & lower case letters are LAMPS ONLY
-
- ie: VFY = Lighted VERIFY key, tim = Unlighted TIME key, Cg = CALLING Lamp
-
- -- Above is the standard AT&T 100-B console layout, while there may be
- additional or different keys on the various consoles, they will generally
- resemble the above layout closely. In the lower right hand corner you will
- notice the numbers 0-9 laid out into what resembles a keypad, this is exactly
- what it appears to be. The TSPS Operator uses this keypad for keying in not
- only routing information (Phone numbers, Inward routings, etc..) but as a multi
- purpose tool for entering various numeric codes recognized by the TSPS software
- itself. Routing information applied onto the trunks from the TSPS position is
- of course in MF (Multi-Frequency). When a TSO keys in a number or routing, the
- console buffers the KP+INFORMATION DIGITS until the ST key is pressed, at which
- time it plays the buffered KP+INFO DIGITS+ST onto the trunk in a uniformly
- spaced sequence. So if you were somehow able to listen in on a TSO actually
- routing a call, it would not sound like someone placing a call on a standard
- Touch-Tone telephone (or homemade blue box), but more like someone pressing a
- "Redial key" on a Touch-Tone (TT) phone. The duration of the tone and space
- between the tones are a network-wide standard, although the network in most
- cases is quite tolerant to deviations of this standard. (This "loose" tolerance
- is what allows us to simulate In-band signalling with our blue boxes).
-
- -- At the upper left hand side of the diagram you will see the Ticket box,
- This box has 4 slots marked New, Cancel, Scratch and Completed. I believe this
- is used for manually filled out trouble and/or time tickets. As far as I know
- manually filled time tickets are a thing of the past, however in case of
- equipment failure the tickets are available I assume. TSO would manually fill
- out a trouble ticket to report trouble reaching a number out of her LAN (Local
- Area Network - or, The area directly served by her particular TSPS position),
- whereas to report trouble with a number in her LAN she would simply key in a
- trouble code (utilizing the KP-TRBL (Trouble) key). to automatically place a
- trouble report.
-
- -- To the right of the Ticket box you will see the DISPLAY. The display works
- in conjunction with certain keys on the console, and is used to display timing
- information (hours, mins, sec's), Cost per minute, Calling number
- identification (what most people refer to as TSPS ANI), numbers called, and
- various special codes. The console display can be in one of two states, either
- 1) displaying digits, or 2) displaying nothing (dark). Both of which have
- different meanings when resulting from certain procedures attempted by a TSO.
- LIGHTED KEYS, and LAMPS on the console can be in one of three states either 1)
- NOT ILLUMINATED (dark), 2) ILLUMINATED, or 3) FLASHING. Again the state of a
- lamp/lamp-key meaning different things under different conditions.
-
-
- II. KEY DESCRIPTIONS & USES
- =======================
-
- -- Below the Ticket box you will see a row of 5 keys starting with the key
- labeled "VFY" (Verify), these are various special purpose keys used by TSPS
- that have no real "grouping" unlike the other "Key groups". These are:
-
- (VFY) - Verify, Illuminated key. Used in conjunction with the keypad, allows
- the TSO to verify (listen in) on a telephone call that is in progress, although
- any conversation taking place on that call is scrambled to the TSO, and despite
- popular belief THE SCRAMBLING PROCESS IS DONE AT THE CONSOLE LEVEL, AND NOT ON
- THE TRUNK LEVEL, SO FOR THOSE OF YOU WHO SEEN REFERENCE TO THE "BLV SCRAMBLING
- SHUT OFF TONE" PLEASE IGNORE IT, IF YOU WERE TO SOMEHOW GAIN ACCESS TO A
- VERIFICATION TRUNK FROM A NON-TSPS POSITION, THE CONVERSATION WOULD NOT BE
- SCRAMBLED.
-
-
- (OVR SES) - Over Seas, Illuminated key. Used in overseas call completion
- through an Overseas Toll Completion Center/Server (IOCC). I believe it also
- allows the TSO to key in more than 10 digits (standard POTS) for IDDD call
- completion.
-
- (SCN) - Screen, Illuminated key - Lights to notify TSO that incoming call has
- an associated screening code, (ie: 74=collect calls only, 93=special billing).
- Depressing this key causes the code to show on display, and it's up to the TSO
- to decipher the code and explain its meaning to the customer if he/she is
- attempting something forbidden by his associated screening code. (ie: Prison
- phones have a screening code of 74, allowing them to place collect calls only.)
-
- (INW) - Inward, Illuminated key - Lights to notify the TSO that the incoming
- call is "Operator to Operator", therefore she answers by pressing the key and
- answering "Inward!". In most cases Inward Operators are actually TSPS, with
- their INWARD lamps lit.
-
- (EMR INT) - Emergency Interrupt, Illuminated key. Used in conjunction with
- the VFY key, to interrupt a call in progress while a line Verification is being
- done, pressing this key causes an audible "beep" to be applied to the line, and
- de-activates the console scrambling (for roughly 30 seconds) , allowing the TSO
- to talk to the parties being verified/interrupted. Use of this key & the VFY
- key, is constantly kept track of via various security & maintenance TTY's and
- any abuse/misuse will set off alarms.
-
- -- To the right of the above set of keys you will see three groups of
- LAMPS/Keys labled "Non-coin", "Coin 1", and "Hotel". The TSO utilizes the
- condition of these lamps to identify the status of incoming calls. There are
- three lamps that are common to each of the three groups, these are: "Sta",
- "0+", and "0-" their meaning is identical in each case as you will see below.
-
- (Sta) - Lamp, NON-COIN STA lamp lights when a non-coin caller requires TSPS
- assistance in placing an otherwise direct-dialable call (in some rural areas
- that have limited DDD features). COIN STA lamp lights on direct dialed coin
- calls that are sent to TSPS for payment collection. HOTEL STA lights on Hotel
- originated DDD calls, TSPS also receives room number call is being originated
- from.
-
- (0+) - Lamp, Lights to signify that the incoming call was originated by a
- customer dialing a "0+telephone number" for an operator assisted call in each
- of the three groups (coin, non-coin, hotel/motel). (ie. if a customer were to
- place a "person to person (op assisted) call from a payphone, this would cause
- the "0+" lamp in the "coin" group to light, one placed from a residential phone
- would cause the "0+" lamp in the "non-coin" group to light, etc..)
-
- (0-) - aka "Dial Zero", Lamp. Lights to signify that the incoming call was
- originated by a customer simply dialing 0 (zero), in each of the three
- categories (non-coin, coin, hotel/motel).
-
- (PST PAY) - Post Pay, Illuminated key. Coin group only, Depressed by TSPS when
- a customer requests a "post pay" call from a payphone, allowing him to deposit
- the full charge at the completion of the call.
-
- (Tne) - Tone, Lamp. I believe this lamp lights to inform the TSO that a coin
- customer has flashed his/her switchook during a call in progress, requesting
- operator assistance, although I'm not positive of this.
-
- (GST) - Guest, Illuminated key lights on all hotel originated calls.
-
- -- Below the above rows of keys and to the far left you will see a row of
- keys labled "Outgoing Trunks". TSPS utilizes this group of keys to select
- various outgoing trunk groups the keys are used as follows:
-
- (DA) - Directory Assistance, Illuminated key. Used by TSO to place calls to the
- directory assistance group.
-
- (R&R) - Rate & Route, Illuminated key. Used to place calls to rate and route, I
- believe TSPS now goes to the Universal Rate and Route position known to all you
- boxers to be found at KP+800+141+1212+ST.
-
- (SWB) - Switchboard, Illuminated key. I believe this key is used to reach a
- cord-board position, although I have no evidence of this.
-
- (OGT) - Outgoing Trunk, Illuminated key. Depressed by TSO to select an outgoing
- trunk to be used to place operator assisted calls, special purpose calls (ie.
- Inward), etc..
-
- -- To the right of this row of keys you will find the group labled "Ring",
- these keys are utilized by TSPS to activate special purpose ring features and
- line handling.
-
- (BAK) - Ring Back, Illuminated key. Used by TSO to ring the originating party's
- line while holding the forward line in the event that the originating party
- looses his connection
-
- (FWD) - Ring Forward, Illuminated Key. Exactly the opposite of ring back.
-
- (CAL BAK) - Call Back, Illuminated key. Used in special operator call back
- situations on person to person calls where the called party is not available
- but a message is left anyway, I really don't understand it's full potential and
- most positions I have spoken with don't either.
-
- (T&C) - Time and Charges, Illuminated key.
-
- (Nfy) - Lamp. Used in Non-ACTS (Automatic Coin Toll Service) originated calls,
- lights to inform TSPS to notify caller of expiration if initial n minute period
- (n = number of minutes entered via the KP NFY key at the origination of the
- call).
-
- (Chg Due) - Lamp. Lights to inform TSO that more money is needed at the
- completion of a TSO assisted coin call, the usual procedure is to ring the coin
- station back and attempt to frighten the customer into making the proper
- deposit ("If you don't pay we'll bill the called party...").
-
- (Key Clg) - Key Calling, Lamp. This lamp is used by TSPS to determine the
- status of an incoming "Operator Number Identification" (ONI) marked caller or
- an incoming caller that was routed to TSPS due to an "ANI Failure" (ANIF) Both
- call conditions come to as a "0+" call (hotel, non-coin, coin - see above), if
- the calling party is marked as "ONI Required" the appropriate "0+" lamp will
- light, and the "Key Calling" lamp will be LIT STEADY. If the incoming call was
- due to an ANIF, the "0+" lamp will be lit, and the "Key Calling" lamp will be
- LIT & FLASHING.
-
- -- Directly to the right of the "Ring" group of key's you will find the
- RELEASE set of key's, these two Illuminated key's allow the TSO to selectively
- release (disconnect from) either the calling, or called parties by pressing
- either the "Release Back" (BAK), or "Release Forward" (FWD) key respectively.
-
- -- To the right of the release set, you will see a group of four key's with
- no particular "group designation", these again are various multi-purpose key's
- that serve the following:
-
- (SR) - Service (assistance) Required, Illuminated Key. Pressed by TSO to
- Forward calling party to a supervisory console (ie. Irate Customers demanding
- supervisor), can also be used if she is confused and needs assistance.
-
- (MB) - Make Busy, Illuminated key. Used to "Busy out" her console, lights when
- pressed, console will not take any incoming calls until it is pressed again.
- (ie: Useful when gabbing, doing nails, or filling out time/trouble tickets).
-
- (Mt) - Maintenance, Lamp. This lamp Illuminates to warn the TSO that her
- console has been placed into remote maintenance/testing mode. A flashing MTNC
- lamp indicates a faulty console.
-
- (PT) - Position Transfer, Illuminated Key. A TSO depresses this key to transfer
- the call in progress from her console (position) to another console.
-
- -- Below the "Outgoing Trunk" keygroup, you will see a Lamp marked "Cw" Call
- Waiting - This lamp lights on every active console to inform a TSO that there
- are incoming calls waiting.
-
- -- To the far right of the "Cw" lamp, you will find the AMA group of keys,
- broken into two sub-groups, which are "Station" and "Person", a complete
- description of each key in this group would require more room than I have
- available here, so if there's sufficient interest I will devote another article
- to the use of these key's. Basically these key's are used in conjunction with
- the "KP" and "AMA Timing" groups of key's (see below), for attaching the
- appropriate class of charge to the call being originated. The keys in the
- "Station" sub-class from left to right are "Paid" (PA), which is used to attach
- a "Station to Station" originating caller paid class of charge, "Collect" (COL)
- to attach "Station to Station" Collect Call. "Special Calling" (SP CG), and
- "Special Called" (SC CD) which are both used in "Special" Station to Station
- billing procedures, such as third party, or credit card calls. "Auto Collect"
- (AT CT), used in coin billing procedures and "Direct Distance Dialing" (DDD),
- Attaches a DDD class of charge in cases where you have trouble dialing a number
- and require operator assistance in completing a call. Below this row of keys
- you will find the "Person" sub-group of AMA keys, their uses are identical to
- those in the "Station to Station" group only they attach a "Person to Person"
- rate of charge. The "No AMA" (NO AMA), key is pressed to eliminate a charge for
- a person to person call where the called party is unavailable. Although all
- the key's in this group can take on different meanings under different
- conditions, the above definitions are suitable for the sake of this article.
- All key's in this group are Illuminated keys.
-
- -- Below the "Cw" lamp you will find two keys under the heading "Coin 2",
- their uses on "Coin originated (payphone)" calls are: "Coin Collect" (COL) -
- which causes the payphone to collect coin, and the "Coin Return" (RET), causes
- it to return a coin. Both are Illuminated Key's.
-
- -- To the right of the "Coin 2" group, you will find the "AMA Timing" group.
- These key's are used in conjunction with the "AMA", and "KP" groups for:
-
- (CA TMG) - Cancel Timing, Illuminated Key. Cancels AMA timing charges and also
- allows TSO to change the class of charge on a call.
-
- (ST TMG) - Start Timing, Illuminated Key. Used to start AMA timing after
- appropriate class of charge has been entered, and the calling party has reached
- the called party in person to person calls (or in station to station DDD calls,
- destination ring has been established).
-
- (CA CAL) - Cancel Call, Illuminated Key. Used in conjunction with the Cancel
- Timing key to Cancel a call and mark a "NON-COMPLETED" call on the AMA tapes
- (ie. A person to person call where the called party is not available).
-
- (REC MSG) - Record (AMA) Message, Illuminated Key. Used at the completion of
- (completion meaning calling & called party are done talking), to record the
- time of the call and the appropriate class of charge onto the AMA tapes and
- releases their forward connection. -- To the right of the AMA timing group
- you will see three columns of four buttons under the heading of Loop Control.
- These allow the TSO to access any of the three loops available to her for
- placing calls. The keys have identical meaning in each set they are used in the
- following manner:
-
-
- (CLG) - Calling Party, Lamp. Lights to signify person on said loop is a calling
- party.
-
- (CLD) - Called Party, Lamp. Lights to signify that person on loop is a called
- party.
-
- (HLD) - Hold, Illuminated key. Places a loop into a hold state, the calling and
- called party can talk to each other, and AMA timing can be started. The call is
- held at the console.
-
- (ACS) - Access, Illuminated key. Used by TSO to initially access a loop.
- Pressing this key selects an outgoing loop, and readies the console for placing
- a call onto it. It is also used to allow TSO back into a loop(s) in a HOLD
- state.
-
- -- To the right of the loop control group you will see the "Keypulse Key"
- group, these key's are pressed by the TSO to initialize the keypad parser into
- the proper mode for entering information, which is completed/entered by
- pressing the ST (START) key (to right of keypad). Their uses are as follows:
-
- (KP TB) - KP Trouble, Illuminated key. Used to enter various TSO encountered
- trouble codes such as noisy line, customer(s) were cut off, couldn't complete
- call, etc. I believe the format for entering a trouble code is as follows: "KP
- TBL + TC + NTE + CN + ST" where KP TBL = KP Trouble Key, TC = 2 Digit Trouble
- code, NTE = Number of times Trouble was encountered (1 Digit), CN = Callers
- (phone) Number, and ST = the START key. a record of the trouble is made on the
- AMA tapes and the calling party is usually given credit.
-
- (KP RT) - KP Rate, Illuminated. Used to enter and display Rate (Charge)
- information. Can also be used to display rate information at a customer
- request.
-
- (KP HO) - KP Hotel, Illuminated Key. Used for manually entering a verbally
- requested room number on Hotel/Motel originated calls.
-
- (KP NY) - KP Notify, Illuminated key. Used for entering time in Minutes on a
- NON-ACTS originated Coin call, when entered time duration is up, it causes the
- NFY Lamp (See above) to Flash.
-
- (KP SP) - KP Special, Illuminated Key. Used for entering Special numbers such
- as credit card id's and third party billing numbers, causes TSPS software to
- automatically query the BVA (Billing Validation) database to check validity of
- number/CC, will flash if billing to an illegal card or number is attempted.
-
- (KP BK) - KP Back, Illuminated Key. Used in entering the calling number in ANI
- failures (ANIF), and ONI (Operator Number Identification) required situations.
-
- (KP FD) - KP Forward, Illuminated. Most commonly used KP Key. Used to enter
- called party's number on all TSO assisted calls. Pressing the ST (START) key
- causes the entered number to be applied onto the accessed trunks in MF.
-
- (ST) - Start, Illuminated Key (Found to the right of the keypad). Used in
- completing all KP+number sequences listed above.
-
- -- Below the "Coin 2" set of key's you will see the (POS RLS) - Position
- Release key, this key is used by the TSO to release her position from the call.
- She would hit POS RLS after completing a call, and also to release a person
- calling to ask her questions and not actually requesting a call be placed (ie.
- Name/place requests, etc..)
-
- -- Below the Position Release key you will see a set of 5 key's labeled
- "Display Control", these key's are used to make the console display show
- various information. Their use is as follows:
-
-
- (TIM) - Time, Unlighted Key. Displays time of day in Military format.
-
- (CHG MIN) - Charge per Minute, Unlighted Key. Displays the $ charge per minute
- on a call in progress.
-
- (CLG NUM) - Calling Number, Illuminated Key. Displays the number of the calling
- party.
-
- (CLD NUM) - Called number, Illuminated Key. Displays the number of the called
- party.
-
- (SPL NUM) - Special Number, Illuminated Key. Display's various special numbers
- such as Calling Card numbers, and third party billed numbers. Use of this key
- in displaying Calling Card numbers is as follows: Press it once you get first
- 10 digits of 16 digit Calling Card, press it a second time and get the second 6
- digits of the Calling Card, press it again and it darkens the display.
-
- -- That's it for the key's on the console, on the left hand side of the diagram
- you will see the "Multi Leaf Bulletin Tray", this is an all purpose holder for
- information leaflets that contain information on special numbers, Rate & Route
- information, special non-standard assistance routes, and various other TSPS
- related information. At the lower right hand side of the console is the "Number
- Plate", this is simply the console's Position number and ID number. It is a
- stamped metal plate, I haven't figured out any way to abuse it yet, other than
- scaring a TSO by knowing of it's existence.
-
- ** That's about it for this article, if there is sufficient interest in TSPS I
- will write further articles with more detail on the actual procedures used by
- the TSPS operator in call handling and such, I will also be writing an article
- on the BOC TOPS (Toll Operator Position Service) operators that have begun to
- pop up since the divestiture when I get some better information on the position
- itself. It seems that AT&T inwards no longer handle only long distance
- assistance in TOPS services areas and the TOPS op's handle all local area
- assistance.
-
- Until then, Dial with Care.
-
-
- The
- Marauder
- Legion of Doom!
-
- ------------------------------------------------------------------------------
-
- Any questions, comments or clarifications can be made directly to me, or via
- the TJ's Staff account.
-
-
- The LOD/H Technical Journal: File #5 of 12
-
-
- An Introduction to Hacking TOPS-20s
- by
- The Blue Archer
-
- To begin with, I would like introduce this article and clarify a few things.
- Firstly, this article was written to familiarize interested hackers in DEC's
- TOPS-20 (Total OPerating System-20) and give them knowledge of how to
- properly utilize its resources. This article will generally be limited to the
- basics, with an advanced article forthcoming. Secondly, you may have seen
- other articles I have written on the Tops-20 a while back. Well this is simply
- a better organized and updated article with primarily the same information.
- And finally, I would like to say that I welcome any and all questions about
- the article or the operating system and would be glad to help out with any
- problems. I may be reached on certain boards or through the LOD/H TJ Staff
- Account on sponsor BBS's. Anyway, have a good time hacking your local TOPS!
-
- Starting Notes
- --------------
- o Capital letters in the beginning of a command indicate that those letters
- alone may be typed for the whole command.
- o <>: Brackets around any element(s) are required.
- o (): Parenthesis are not required unless otherwise stated.
- o D: This symbol refers to control (ex: DA= Control-A).
- o @: Is the general system prompt and is not considered to be typed by the
- user when shown in examples.
- o $: This is the enabled state system prompt (explained hereafter).
-
- ----------------
- /EXTERNAL USAGE/
- ----------------
-
- SECTION I: ACCESS
-
- The commands for entering and leaving a Tops-20 are LOGin and LOGOut
- respectively. The correct usage of these command are as follows:
- @LOGin USERNAME
- @LOGOut USERNAME
- Where username is a variable for the account name. Account names may be
- virtually anything, depending upon the system. I employ two methods for
- attaining usernames. The first, and most commonly known and used is checking
- the system status. This is done thusly:
- @SYstat
- This will cause the computer to list out various information about the
- assorted users logged in and their status and the status of the system as a
- whole. This command does not work on all Tops-20 computers from a non-logged in
- state, namely versions 6.1 and higher. A second and immensely more effective
- method is superior use of the escape character. The complete use of this
- character will be discussed later. For use in logging, one types LOGin and
- then a letter or series of letters and then the escape key. Depending on the
- number of usernames beginning with the same letter(s), the computer will fill
- in the rest of the username. Once the letters are in such a way that if one
- continued typing, only one valid username could be gotten, the escape key
- will fill in the rest if pressed. Here is an example:
- @LOGin S(escape)
- (the computer responds with a beep because there is more than one username
- starting with the letter S, so I type another letter)
- @LOGin SM(escape)
- (beep once more)
- @LOGin SMI(escape)
- @LOGin SMIth (PASSWORD)
- ^^
- (The computer fills in the 'th' part of the username for me and asks for the
- password with the parenthesis and all).
- One note: If the computer fills in an account name and then when a password is
- tried it responds with a 'not valid account' message, it simply means that it
- is a non-loginable files-only account which will be discussed later.
- While trying to gain access to a system, it is wise to use all the pre-login
- resources avaiable. On versions 6.x these resources are virtualy nil but on the
- older versions, one may sometimes find an incredible amount of help. To
- see what actual help is available, type:
- @HELP ?
- Look for certain things like SECURITY and LOGINHELP. If the system in use is
- on a net, or for some reason the dialup number is not known but wanted, it can
- sometimes be found in help files most commonly named DIAL, DIALUP(S), and
- PHONES. So, to view them, simply type:
- @HELP DIALUPS
- Or the name of whatever help file that is desired to be seen.
- The Information command is also a useful command, more fully discussed
- later. The most useful Information commands are as follows:
- @Information VERSion
- This will display the banner. If the computer, for security reasons, did
- not display the banner upon connection, then this may prove useful in
- identifying the target computer
- @Information DEC
- lists the various Decnet nodes available. On 6.x versions
- @I DEC NODENAME
- will tell if a path is open to the node or is the object node is currently
- up and running.
- @I ARPA
- will tell the status of ARPANET with respect to this particular computer.
- Meaning whether or not the software is up and running and the status of
- connections.
- Networking will be explained in the advanced Tops hacking file.
-
- ----------------
- /INTERNAL USAGE/
- ----------------
-
- SECTION II: SYSTEM FUNCTIONS
-
- Under normal circumstances, with the exception of currently running programs,
- the exec level (command level) prompt will be either @' or $' depending on
- certain options, which will be discussed later. For now we will assume the
- prompt is @. This is the place where commands given are executed immediately.
- Certain characters are also available for use here (and other places) which
- make life on a TOPS-20 easier. Here is a list of those characters:
-
- 1) DC: This gets the system's attention. It will break out of most programs and
- processes. It may be necessary to type 2 for it to work, though.
- 3) DO: Halts terminal output without interrupting the program. A second DO
- restarts output to terminal. Note: under this condition output is still being
- sent by the computer, it is just not printed on the terminal, as opposed to
- an actual ceasing of output by DS.
- 4) DS: Temporarily pauses current output.
- 5) DQ: Resumes output currently suspended by DS.
- 6) DR: Retypes current line discarding old line.
- 7) DT: Prints information including what the program in use is doing, CPU
- information, and load average (amount of users on system.)
- 8) (Escape): The Escape key causes a form of recognition for virtually anything
- being done on the TOPS. It will complete commands, filenames, and just about
- anything else being typed to the computer. For example I(escape) would result
- in the command INFORMATION. For further information on this command refer to
- the logging in procedure utilizing this feature.
- 9) ?: This is used to obtain information regarding what the system is expecting
- as input or what the current command options are. It may be used almost
- anywhere, including after single or multiple letters, filenames, etc.
- example: @C?
- would print a list of available exec level commands starting with the letter C.
-
- Here is a list of commands used to obtain system information:
-
- 1) DAYtime: Prints current data and time of day.
- 2) HELP: Gives help on a wide variety of topics, depending on the system.
- For a complete list, type: HELP ?
- 3) Information: Provides information on a wide variety of topics. For a
- complete list, type: I ?
- 4) SYstat: Outputs a summary of system users and available computer resources.
-
- SECTION III: ACCOUNT STRUCTURE
-
- The TOPS-20 users login and use the system via accounts which are variable
- with different privilege levels and access rights. Accounts are specified by
- usernames and most of the time the directory names are the same as the account
- names as is also common for VMS. So, logging in under the SMITH means that one
- is under the account (username) SMITH. To find out the privileges of an
- account, type:
- @I DIR <USERNAME>
- This can always be done to the account logged in under, and sometimes to other
- accounts depending on access rights and the security of the other account. This
- command prints out information regarding the account specified. It will even
- show passwords on pre-6.x versions of TOPS if one has sufficient privs. In
- general the two major levels of privs are full and normal. Full privs are
- denoted by OPERATOR or WHEEL in the privilege information printed. This level
- gives the user complete authority over the system. The normal level of privs
- means anything else but OPERATOR or WHEEL. These forms of accounts have limited
- access with respect to system operations and other accounts. Access to certain
- programs, files, and information is restricted to whatever extent the system
- owners choose. Other minor privilege abilities enable the user to perform
- slightly more than completely normal users, and sometimes may be of importance
- depending on the circumstances.
- Creation and modification of accounts is done through the BUIld command.
- Example:
- @BUILD <USERNAME>
- Where <USERNAME> is the account to be modified (already exists) or an account
- to be created (non-existant). Depending on the privs of the account attempting
- to build and system restrictions, one may have a great deal or virtually no
- power to create and modify. On most systems, only wheels and operators can
- create top level accounts (loginable non-subdirectory accounts). File storage
- sub-accounts can be created almost anywhere. These are simply accounts in which
- files are put, and these accounts cannot be logged into. To see what options
- have been chosen for the account being built, simply type:
- @@LIST
- Other options for the account being built are as follows:
- 1) WHEEL: This gives the account wheel (complete) privileges. If this option is
- chosen, then others may be excluded for it is all-encompassing, it overrides
- any and all protection.
- 2) OPERATOR: Same as wheel.
- 3) DECNET-ACCESS: This allows the account to use the decnet, assuming there is
- one available. DECNET and other nets will be explained in the advanced article.
- 4) ARPANET-ACCESS: Allows user to use the Arpanet.
- 5) ARPANET-WIZARD: This command allows the user ARPANET ACCESS and more. This
- account has the ability to turn the Arpanet software of the system on and off.
- The commands are as follows:
- $DESET ARPA ON
- $DESET ARPA OFF
- Use of DE will be discussed in the next article. The dollar sign for the
- system prompt is explained later.
- 6) IPCF: Allows Inter-Process Communication Facility capabilities.
- 7) DEFAULT-FILE-PROTECTION: Sets the protection of the files in the user's
- directory. The lower, the more secure.
- 8) PROTECTION-OF-DIRECTORY: Sets protection of the actual account itself. This
- means who can connect to it, modify it, etc. Once again, the lower the
- protection, the more secure it is against others.
- 9) PASSWORD: Sets the password for the account. Type PASSword with the actual
- password after it.
- 10) KILL: This destroys the account. This command removes the account from the
- system.
- To complete the creation/modification, type two carriage returns.
-
- The system will not recognize the user as having its various privileges
- unless it is told that they are there. This is done thusly:
- @ENAble
- This enables all the user's privileges and changes the prompt to a '$'. All
- accounts, even wheels, are considered normal until enabled, so this must always
- be done before an action requiring privileges is performed. It is fine to do
- this immediately after logging in and leaving it like that, for it does not
- save any adverse effects. At all places in this article where there is a '@',
- if enabled would be a '$'.
-
- SECTION IV: DIRECTORY USAGE
-
- Directories are storage places for files. Each account has a directory in its
- own name, and possibly one or more subdirectories. To see what files are in the
- directory connected to at the moment, type the command DIRectory:
- @DIR
- This will list what files, if any, are accesable in this directory. At the time
- of login the computer sets the account's own directory as the one to be
- connected to unless otherwise specified by such things as login adjustment
- files (to be discussed at a later date.) Subdirectories of an account are
- denoted by a period between the account name and directory name. Example:
- <ACCOUNTNAME.SUBDIRECTORYNAME>
- Subdirectories are dealt with as normal directories for purposes of usage.
- Dealings with directories other than the current default directory require the
- use of brackets. For example, if one wanted to look in a directory titled
- <SMITH>, he would have to type:
- @DIR <SMITH>
- And assuming his directory is not protected, a list of files in the <SMITH>
- directory will be produced. The current default directory (the one connected
- to) does not require brackets for usage. Most directory commands may be used on
- other directories by simply placing the object directory (one to be commanded)
- in brackets after the command.
- Here is a list of some of the more important directory related commands:
-
- 1) ACCESS: This command requires the password of the target directory and, if
- correctly given, transfers rights to that directory including creation/deletion
- of files, etc. The format for usage is:
- @ACCESS <DIRECTORY>
- 2) CONNECT: This changes the current default directory to the specified one. It
- may be countered, though, by protection. If ACCESS to the object directory is
- on then connection may be established regardless of protection. The command is
- used like this:
- @CONNECT <DIRECTORY>
- 3) COPY: This duplicates an already existing file in another directory to the
- current default directory or another specified directory. The format is:
- @COPY <OBJECTDIRECTORY>FILENAME.FILETYPE
- to copy it to the default directory, or:
- @COPY <OBJECTDIRECTORY>FILENAME.FILETYPE <OTHERDIRECTORY>FILENAME.FILETYPE
- to copy it to another directory.
- 4) DELete: Deletes the file from the directory. It still exists and may be
- retrieved until it is completely removed.
- 5) EXPunge: Completely removes deleted files from the system forever.
- 6) FDIRectory: Lists all information about all files in directory.
- 7) RENAme: Rename a specified file. The format is:
- @RENAme FILENAME.FILETYPE NEWFILENAME.FILETYPE
- 8) UNDELete: Restores deleted files which have not been expunged yet.
- 9) VDIRectory: List all information about all files in directory specified,
- including protection, size, and date and time when they were last written.
-
- Files in directories are in the form of:
- FILENAME.FILETYPE.#
- where filename is the name of the file, filetype is the kind of file, and #
- is the number of the file. If there is more than one file with the same name,
- multiple numbers will be shown. If a number is left out when a command dealing
- with a file is typed, then the file with the highest number will be used.
- Here is a list of filetypes and how to properly use them:
-
- 1) .BAS: These are files written in basic. To use these, type BASIC or BASIC20
- and LOAD them in and RUN, LIST, or modify them in the basic language and SAVE.
- 2) .BIN: These are binary files containing program data and are generaly not
- directly used.
- 3) .CMD: These are command files. They are files of a series of commands to be
- executed. Commands will be carried out as if typed by the user from the exec
- level. To use them, type:
- @TAKE FILENAME.CMD
- They are very useful for performing long processes which must be done often.
- 4) .CTL: This is a control file for batch jobs. It tells the batch job what to
- do when it logs in. Batch jobs are jobs logged into the account which created
- it to carry out commands. Further discussion of batch jobs is in the next
- TOPS article. The format for usage of these files are:
- @SUBmit FILENAME.CTL
- 5) .EXE: Files of this sort are executable from the exec level. They are
- assembled programs in machine language and the fastest sort of program on the
- TOPS. To use them, type:
- @<DIRECTORY>FILENAME.EXE
- 6) .HLP: This is basically just a text file. Use the same command as the .TXT
- forms of files. If a file of this sort is placed within the actual <HELP>
- directory, it becomes available to the whole system by simply typing:
- @HELP FILENAME
- All information obtained through the HELP command is actually in the form of
- files in the <HELP> directory.
- 7) .INIT: These are initialization routines for various programs. They are not
- used directly.
- 8) .LOG: This is the output of batch jobs. It details the actions of the job
- and the responses of the computer. To view, do this:
- @TYpe FILENAME.LOG
- 9) .MEM: This is a memorandum. Often times being inter-office memos and the
- like. Use them as any normal text file.
- 10) .TEXT: This is the uncommon filetype name for a text file. See .TXT for
- proper usage.
- 11) .TXT: These are text files. They contain written information and data to be
- read. The command for using them is as follows:
- @TYpe FILENAME.TXT
-
- To use files in other directories, type the directory name in brackets before
- the filename. Ex:
- @TYpe <SMITH>SECRET.TXT
- This applies for all filetypes and commands. Once again restrictions may apply
- with regard to protection.
-
- SECTION V: SYSTEM-WIDE COMMUNICATIONS
-
- Communication to other system users is done primarily two ways: direct and
- indirect. Direct includes chatting with another online user and such, while
- indirect is generally done through electronic mail and the like.
- Here are the common commands of direct communication:
-
- 1) ADVISE: When this is done, whatever is typed at one terminal is executed at
- another. For example:
- @ADVISE USERNAME
- Then, whatever is typed will be carried out as if typed from that terminal
- until the link is broken.
- 2) BReak: This breaks all links to the terminal typing BReak.
- 3) RECEIVE: This allows the terminal to receive either LINKS or ADVICE, as
- specified by the command. Ex:
- @RECEIVE ADVICE
- 4) REFUSE: This puts up a barrier keeping links or advice from reaching the
- terminal. REFUSE ADVICE is default when logging in, so in order receive advice,
- one would have to type the proper command.
- 5) REMark: Goes into a chat state in which textual information is sent to the
- computer and not interpreted as commands.
- 6) TALK: Establishes a link between two terminals. Ex:
- @TALK SMITH
- would establish a link with SMITH. Whatever is typed is seen by both parties.
- REMark is useful here if a conversation is to ensue.
-
- Electronic mail can be sent and read through various programs. The most
- common ones being MM, MAIL, MS, and RDMAIL. Users are informed when they have a
- message waiting upon logging in. Mail is stored in the file MAIL.TXT in the
- user's directory. MM and MS are the best mail programs and should be the ones
- used, so here is a very brief explanation of the major commands they both
- use (they are very similar).
- 1) SEND: This is the command used to send mail to another user. At the prompt
- of the respective mail program, type SEND and a carriage return, the
- computer will prompt for information such as the user for the message to be
- sent to, other users to receive a copy of the message, and the title of the
- piece of mail.
- 2) READ: This command, if typed with no argument, will start reading all
- currently unread mail. If used with the number of a piece of mail, it will
- read that one alone.
- 3) HEADERS ALL: This will give a list of all the titles of the various pieces
- of mail in the user's mailbox and the corresponding number of that mail.
- Sending mail over networks will be discussed in the next article. Look for it
- in the next issue of the Technical Journal.
-
- Blue Archer (LOH)
-
- The LOD/H Technical Journal: File #6 of 12
-
-
- +--------------------------------+
- | Building Your Own Blue Box |
- +--------------------------------+
- | By |
- | Jester Sluggo |
- | Released: Nov. 27, 1986 |
- +--------------------------------+
-
-
-
- This Blue Box is based on the Exar 2207 Voltage Controlled Oscillator.
- There are other ways to build Blue Boxes, some being better and some not as
- good, but I chose to do it this way. My reason for doing so: because at the
- time I started this project, about the only schematic available on BBS's was
- the one written by Mr. America and Nickie Halflinger. Those plans soon (in
- about 90 seconds) became very vague in their context with a couple in-
- consistencies, but I decided to "rough it out" using those plans (based on the
- Exar 2207 VCO) and build the Blue Box using that as my guide. During the
- construction of the Blue Box, I decided to type-up a "more complete and clear"
- set of Blue Box schematics than the file that I based mine on, in order to help
- others who may be trying/thinking of building a Blue Box. I hope these help.
-
- Note: You should get a copy of the Mr. America/Nickie Halflinger Blue Box
- plans. Those plans may be of help to anyone who may have difficulty
- understanding these plans. Also, these plans currently do not support CCITT.
-
- +---------------------------------+
- | Why should I build a Blue Box ? |
- +---------------------------------+
-
- Many of you may have that question, and here's my answer. Blue Boxing was
- the origin of phreaking (excluding whistling). Without the advent of Blue
- Boxes, I feel that some of the advances in the telecommunications industry
- would've taken longer to develop (The need to stop the phone phreaks forced
- AT+T Bell Laboratories to "step up" their development to stop those thieves!).
- There is no harm in building a Blue Box (except the knowledge you will
- gain in the field of electronics). Although there are software programs (Soft
- Blue Boxes) available for many micro's that will produce the Blue Box
- Multi-Frequency (MF) tones, they are not as portable as an actual Blue Box (you
- can't carry your computer to a telephone, so you must use it from home which
- could possibly lead to danger).
- Many phreaks are announcing the end of the Blue Box Era, but due to
- discoveries I have made (even on ESS 1A and possibly ESS 5), I do not believe
- this to be true. Although many people consider Blue Boxing "a pain in the
- ass", I consider Blue Boxing to be "phreaking in its' purest form". There is
- much to learn on the current fone network that has not been written about, and
- Blue Boxes are necessary for some of these discoveries. The gift of free fone
- calls tends to be a bonus.
-
- Note: Blue Boxes also make great Christmas gifts!
-
- +---------------------------------------+
- | Items needed to construct a Blue Box. |
- +---------------------------------------+
- Here is the list of items you will need and where you can get them. It
- may be a good idea to gather some of the key parts (the chips, and especially
- the potentiometers, they took about 6 months to back order through Digi-key. A
- whole 6 fucking months!) before you start this project. Also, basic
- electronics tools will be necessary, and you might want to test the circuit on
- a bread board, then wire-wrap the final project. Also, you will need a box of
- some sort to put it in (like the blue plastic kind at Radio Shack that cost
- around $5.00).
-
- Note: An oscilliscope should be used when tuning in the
- potentiometers because the Bell system allows
- only a 7-10% tolerance in the precision of the
- frequencies.
-
- Qty. Item Part No. Place
- ---------------------------------------------------
- 1 | 4 x 4 Keypad | | Digi-Key
- 6 | Inverter Chip | 74C04 |
- 32 | Potentiometer | |
- 1 | 4-16 Converter Chip| 74LS154 |
- 1 | 16 Key Decoder | 74C922 |
- 2 | 2207 VCO | XR2207CP | Exar Corp.
- 3 | .01 uf Capacitor | 272-1051 | Radio Shack
- 5 | .1 uf Capacitor | 272-135 | Radio Shack
- 2 | 1.5K Ohn Resistor | | Radio Shack
- 2 | 1.0K Ohm Resistor | | Radio Shack
- 1 | Speaker | | From an old Autovon fone.
- 1 | 9 Volt Battery | | Anywhere
-
- The resistors should be a +/- 5% tolerance.
- The speaker can be from a regular telephone (mine just happened to be from
- an old Autovon phone). But make sure that you remove the diode.
- The Potentiometers should have a 100K Ohm range (but you may want to make
- the calculations yourself to double check).
- The 9-volt battery can be obtained for free if you use your Radio Shack
- Free Battery Club card.
- The Exar 2207 VCO can be found if you call the Exar Corp. located in
- Sunnyvale, California. Call them, and tell them the state you live in, and
- they'll give the name and phone number to the distributor that is located
- closest to you. The 2207 will vary from about $3.00 for the silicon-grade
- (which is the one you'll want to use) to about $12.00 for the high-grade
- Military chip.
- Note: When you call Exar, you may want to ask them to send you the
- spec-sheets that gives greater detail as to the operation and construction of
- the chip.
-
- +-------------------+
- | Schematic Diagram |
- +-------------------+
-
- +--------------+ +-------------+
- | 1 2 3 A | | Figure #1 |
- | 4 5 6 B | +-------------+
- | 7 8 9 C | | Logic Side |
- | * 0 # D | +-------------+
- ++-+-+-+-+-+-+-+
- 1 | 3 | 5 | 7 | (VCC)
- | 2 | 4 | 6 | 8 (+5 Volts) +----+
- | | | | | | | | [+] | _|_
- | | | | | | | | | | X_/GND
- +--+-+-+-+-+-+-+-+----+ +--+----------+---+
- | 2 | 11| 10| 7 | | | 14 7 |
- (.01C) | | 3 | 4 | 8 | 1 12+------+1 |
- +--||---+5 13+------+2 (*74C04*) |
- _|_ | | | |
- X_/GND | (*74C922*) | +-----------------+
- +--||-+6 |
- |(.1C)| |
- _|_ | |
- X_/GND | 9 17 16 15 14 18|
- +--+--+--+--+--+---+--+
- | | | | | |
- _|_ A B C D |
- GNDX_/ | | | | [+] (VCC) [+] (VCC)
- | | | | (+5 volts) | (+5 volts)
- | | | | |
- -------+--+--+--+------------------+-----------------
- | 23 22 21 20 24 18+-+
- +-----+12 | +--+
- | | (*74LS154*) 19+-+ _|_
- _|_ | | X_/
- X_/GND | 1 2 3 4 5 6 7 8 9 10 11 13 14 15 16 17 | GND
- +--+--+--+--+--+--+--+--+--+-+--+--+--+--+--+--+----+
- 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
- | | | | | | | | | | | | | | | |
- | (Connects)
- | +---------->
- +------------------------+ | (Figure 2)
- | +--+ +-------+
- | | | |
- +--+-------+--+-------+---+
- | 3--|>o--4 5--|>o--6 |
- | (Invtr.) (Invtr.) |
- +---------------+7 |
- _|_ | (*74C04*) |
- GNDX_/ (VCC) [+]--+14 |
- (+5 volts) | |
- +-------------------------+
-
-
-
- +-------------+ _
- | Figure #2 | / |
- +---+-------------+----+ +----------------+ |
- | Tone Generation Side | _|_ | | SPKR
- +----------------------+ GNDX_/ +---+--+---+ |
- | | X_|
- | |
- | | +---------------+
- +-------+ | | | |
- | _|_ | +--+14 |
- | X_/GND | | (Repeat of) |
- | | | (First) |
- ----- (.1C) | | (Circuit) |
- ----- | | |
- | | | (*XR2207CP*) |
- | +-----------------+ | +--+6 |
- | | | | | | |
- [+]-----+-------+1 14+--+ | +---------------+
- (VCC) | | +--------------------+
- (+9 Volts) +----+2 | |
- | | 12+---------------------+ |
- (.01C) ----- | | _|_ |
- ----- | (*XR2207CP*) | X_/GND |
- | | | 1.5K Ohms |
- +----+3 11+---+---X/XRx/X/---+--+ |
- | | | | _|_ |
- | | +---X/XRx/X/---+ X_/GND |
- | | 1.0K Ohms |
- | 10+----+ |
- +-------------+6 9+----+---+ |
- | | 8+----+ | |
- | | | ----- (.1C) |
- | +-----------------+ ----- |
- +---------+ _|_ +----------+
- | | Pot. GNDX_/ Pot. | |
- | X/X/X/X/--+-----------------------X/X/X/X/ |
- | 1400 Hz. | 1600 Hz. |
- +---------+ | +----------+
- | | Pot. | Pot. | |
- | X/X/X/X/--+----------------+------X/X/X/X/ |
- | 1500 Hz. | | 900 Hz. |
- | | | |
- | 14 more | | 14 More |
- | Potentiometers | | Potentiometers |
- | in this | | in this |
- | area left out | | area left out |
- | for simplicity | | for simplicity |
- | | | |
- | | | |
- |
- (Connects) |
- <-------------+
- (Figure 1)
-
-
- +-------------------------+
- | Multiplex Keypad System |
- +-------------------------+
-
- First, the multiplex pattern used in the 4x4 keypad layout. I suggest that
- keys 0-9 be used as the Blue Box's 0-9 keys, and then you can assign A-D, *, #
- keys to your comfort (ie. * = Kp, # = St, D = 2600, and A-C as Kp1, Kp2 or
- however you want).
-
- Note: On your 2600 Hz. key (The D key in example above)
- it may be a good idea to tune in a second
- potentiometer to 3700 Hz. (Pink Noise).
-
- Keypad Key Assignments Multiplex Pattern
- +---------+ +-------------+ +------------+
- | 1 2 3 A | | 1 2 3 4 | | 1 2 3 A |----Y1=8 X1=3
- | 4 5 6 B | | 5 6 7 8 | | 4 5 6 B |----Y2=1 X2=5
- | 7 8 9 C | | 9 10 11 12 | | 7 8 9 C |----Y3=2 X3=6
- | * 0 # D | | 13 14 15 16 | | * 0 # D |----Y4=4 X4=7
- +---------+ +-------------+ +------------+
- | | | |
- X1 X2 X3 X4
-
- +----------------------+
- | Blue Box Frequencies |
- +----------------------+
-
- This section is taken directly from Mark Tabas's "Better Homes and Blue
- Boxing" file Part 1.
-
- Frequenies (Hz) Domestic Int'l
- ----------------------------------
- 700+900 1 1
- 700+1100 2 2
- 900+1100 3 3
- 700+1300 4 4
- 900+1300 5 5
- 1100+1300 6 6
- 700+1500 7 7
- 900+1500 8 8
- 1100+1500 9 9
- 1300+1500 0 0
-
- 700+1700 ST3p Code 11
- 900+1700 STp Code 12
- 1100+1700 KP KP1
- 1300+1700 ST2p KP2
- 1500+1700 ST ST
- 2600+3700 *Trunking Frequency*
-
- Note: For any further information about the uses or duration of the
- frequencies, read the Mark Tabas files.
-
- +----------------+
- | Schematic Help |
- +----------------+
-
- This is the Key to the diagrams in the schematic. I hope that they help
- more then they might hurt.
-
- _|_
- X_/GND is the Ground symbol
-
- | |
- ---| |-- is the Capacitor symbol
- | | (.1C) stands for a .1 uf Capacitor
- (.01C) stands for a .01 uf Capacitor
- |
- -----
- ----- is another Capacitor symbol
- |
-
- --X/XRx/X/-- is the Resistor symbol (The 1.5K Ohm and 1.0K Ohm
- Resistors are at +/- 5% )
- ---+
- |
- X/X/X/X/-- is the Potentiometer symbol (The frequncies I supplied
- above are just examples.)
- --|>o-- is the Inverter symbol
-
- +------------+
- | Conclusion |
- +------------+
-
- This is just one way to build a Blue Box. If you choose this way, then I
- hope this file is adequate enough to aid you in the construction. Although
- these are not the best plans, they do work. This file does not tell you how to
- use it or what to do once it's built. For that information I mention that you
- read Mark Tabas's "Better Homes and Blue Boxing" files, or any other files/BBS
- subboards that deal with that realm.
- If you need help, I sluggest (thanks for that one Taran) that you ask a
- close friend, possibly an electronics teacher, or a phreak friend to help you.
- Also, if you need help or have questions or comments about this file, you can
- address them to me. I can be contacted through the LOD/H Technical Journal
- Staff account on the boards listed in the Intro, or on the few boards I call.
-
- +-------------+
- ! Credentials !
- +-------------+
-
- At last, this article would not be possible without the help of the
- following people/places whom contributed to it in one way or another (it may
- not be apparent to them, but every minute bit helps).
-
- Deserted Surfer (Who helped immensly from Day 1 of this project.)
- (Without his help this file would not be.)
- Mark Tabas (For the BHBB files which inspired my interests.)
- Nickie Halflinger (For the original Blue Box plans I used.)
- Mr. America (For the original Blue Box plans I used.)
- Lex Luthor
- Cheap Shades
- Exar Corp.
-
- Lastly, I would like to thank the United States government for furnishing
- federal grants to this project. Without their financial help, I would have had
- to dish out the money from my own pocket (Approximately $80.00. Egads!)
-
-
-
- Jester Sluggo
-
- The LOD/H Technical Journal: File #7 of 12
-
-
- Intelligence and Interrogation Processes
- By: Master Of Impact and the Legion Of Hackers
-
-
- INTRODUCTION:
- =============
-
- Doing what we do best always carries the risk of someone, somewhere, wanting
- to hold you for questioning. In this article I hope to give those persons who
- that are in use (and are in no ways happen to be all new), that can give you
- the edge you need to come away "sin faulta". In fact, these interrogation
- practicies are used a lot by teachers, local police, the FBI and Secret Service
- girlfriends, wives, parents, etc. to obtain information from you that you
- probably don't want to give out.
-
- Interrogation is the art of questioning and examining a source in order to
- obtain the maximum amount of useful information. The goal of any interrogation
- is to obtain useful and reliable information in a lawful manner and in a
- minimum amount of time. The goal of any source is to deceive or hinder any
- attempts of the interrogator to get information out of him.
-
- This article will deal primarily with the principles, techniques, and
- procedures of intelligence interrogation. By reading this article, one
- who runs the risk of being interrogated can build countermeasures for common
- interrogation techniques. This article has some paraphrased material from a
- government interrogation manual but the majority of the information was from
- personal experience and prior knowledge of the subject.
-
- You cannot hope to defeat interrogation techniques unless you first know
- what they are. The ones listed herein are the most commonly used. After reading
- this article, you should be able to tell when you are being interrogated by
- people, and what technique(s) they are using when you probably would not have
- known before. Once you know what they are up to and how they are going to TRY
- to accomplish it, YOU have the initiative!
-
-
- INITIATIVE:
- ===========
-
- Achieving and maintaining the initiative is essential to a successful
- interrogation just as offense is the key to success in combat operations. The
- initiative in any interrogation must rest with the interrogator throughout the
- entire interrogation. He will have certain advantages at the beginning of an
- interrogation which will enable him to grasp the initiative and assist in
- maintaining the initiative throughout the interrogation.
-
- The interrogator has a position of authority over you. You realize this
- fact, and in some cases, believe that your future might well depend upon your
- association with the interrogator. As in the case of police questioning,
- "cooperate and we will go easy on you". Like hell they will.
-
- The interrogator knows the purpose of the interrogation; the source does
- not necessarily know the exact reason, but can generally assume (especially
- in the case of a computer hacker or phone phreak, which is what the term
- "source" will be referring to during this article) because he or she is most
- usually conscious of horrible and nasty wrong-doings he or she may have been
- responsible for. Unfortunately for the source, he is generally very much in
- the dark about what's happening to his life while it is, in fact, crumbling
- around him (temporarily, anyway). This gives the source a not-so-illusionary
- behavior pattern of the proverbial chicken who's had its head chopped off.
-
- Having gained the initial advantage which is quite an understatement,
- seeing that, although the risks to the source during the perpetration of
- a crime are quite obvious, the possible realistic results of being caught
- aren't quite as impressive while one is getting away with a crime than when
- one's home is invaded by the JC Penny-suit men wearing mirrored sunglasses,
- the interrogator must strive to maintain the initiative applying appropriate
- interrogation techniques through the exercise of self-control; by taking
- advantage of the source's weaknesses as they become apparent; and by
- continuously displaying an attitude of confidence and self-assurance. The
- interrogator, however, is 'supposed' to never take advantage of your weaknesses
- to the extent that the interrogation involves threats, insults, torture
- or exposure to unpleasant or inhumane treatment of any kind. Remember, the
- keyword is supposed.
-
- It is possible for the interrogator to lose the initiative during the
- interrogation of a source. If this should occur, he will probably postpone the
- interrogation and reassess the situation. If the interrogation is resumed, a
- different interrogator will probably be introduced. Following are some examples
- of loss of initiative:
-
- * The interrogator becomes angry and completely loses his self-control because
- of the arrogant actions of the source (such as the unbuttoning of a jacket
- to reveal "Secret Service Sucks" spray painted onto the source's T-shirt.)
- As a result, the interrogator loses sight of his objective and concentrates
- his efforts on humbling the source.
-
- * During the interrogation the interrogator fails to note significant
- discrepancies in the source's story. The interrogator may lose his initiative
- as the source gains confidence from his success and resorts to further
- deception, leading the interrogator away from his objective.
-
- * The interrogator becomes overly friendly with the source and allows him to
- lead the interrogation. The source reports only what he believes to be
- important and neglects several significant items of info which could have
- been obtained had the interrogator maintained the initiative.
-
-
- PHASES OF INTERROGATION:
- ========================
-
- Approach Phase:
- ---------------
-
- Regardless of the type of source you are and your outward personality, you
- do possess weaknesses which, if recognized by the interrogator, can be
- exploited. A human being is likely to:
-
- o Talk, especially after harrowing experiences
- o Show deference when confronted by superior authority
- o Rationalize acts about which he feels guilty
- o Lack the ability to apply or to remember lessons he may have been
- taught regarding security if confronted with a disorganized or a
- strange situation.
- o Cooperate with those who have control over him
- o Attach less importance to a topic which the interrogator demonstrates
- identical or related experiences and knowledge
- o Appreciate flattery and exoneration from guilt
- o Cooperate readily when given material rewards
- o Cooperate readily when treated as an equal
-
-
- TECHNIQUES:
- ===========
-
- "File and Dossier"
- ----------------
-
- The interrogator prepares a dossier containing all available info obtained
- from records and docs concerning you. Careful arrangement of the material with-
- in the file may give the illusion that it contains more data than is actually
- there. The file may be "padded" with extra paper, if necessary. Index tabs with
- titles such as "education", "employment", "criminal record", "bulletin boards",
- "violated computer systems", and others are particularly effective for this
- purpose. The interrogtor will confront you with the dossier at the beginning of
- the interrogation and explain that "intelligence" has provided a complete
- record of every significant happening in your life; therefore, it would
- be useless to resist interrogation. The interrogator may read a few selected
- bits of known data to further impress you. If the technique is successful, you
- will be impressed with and more importantly, terrified by the "voluminous"
- file, conclude that everything is known, and resign to complete cooperation.
-
-
- "We know ALL"
- -----------
-
- This technique may be employed in conjunction with the above or by itself.
- The interrogator must first become thoroughly familiar with the available data
- concerning you. To begin the interrogation, the interrogator asks questions
- based on his known data. When you hesitate, refuse to answer, or provide an
- incomplete or incorrect reply, the interrogator himself provides the detailed
- answer. Through the careful use of the limited number of known details, the
- interrogator may convince you that all the info is already known; therefore,
- your answers to the questions are of no consequence. When you begin to give
- accurate and complete information, the interrogator interjects questions
- designed to gain the needed info. Questions to which answers are already known
- are also asked to test you and to maintain the deception that all the info is
- already known. A VERY effective technique I might add.
-
-
- "Rapid Fire"
- ----------
-
- This approach technique involves a psychological ploy based on the principles
- that:
-
- * Everyone likes to be heard when they speak; and
-
- * It is confusing to be interrupted in mid-sentence with an unrelated
- question.
-
- This technique may be used with one, or simultaneously by two or more
- interrogators in questioning the same source. In employing this technique the
- interrogator asks a series of questions in such a manner that you do not have
- time to answer a question completely before the next question is asked. This
- tends to confuse you and you are apt to contradict yourself, as you have little
- time to prepare your answers. The interrogator then confronts you with the
- inconsistencies, causing further contradictions. In many instances you
- will begin to talk freely in an attempt to explain yourself and deny the
- inconsistencies pointed out by the interrogator. In attempting to explain your
- answers, you are likely to reveal more than you intend, thus creating
- additional leads for the interrogator.
-
-
- "Mutt and Jeff"
- -------------
-
- This technique involves a psychological ploy which takes advantage of the
- natural uncertainty and guilt which a source has as a result of being detained
- and questioned. Use of this technique necessitates the employment of two
- experienced interrogators who are convincing as actors. Basically, the two
- interrogators will display opposing personalities and attitudes towards you.
- For example the first interrogator is very formal and displays an unsympathetic
- attitude. This is to make you feel cut off from your friends. At the time when
- you act hopeless and alone, the second interrogator appears (having received
- his cue by a signal, and is hidden from you), scolds the first interrogator for
- his harsh behavior and orders him from the room. He then apologizes to soothe
- you, perhaps offering coffee and a cigarette. He explains that the actions of
- the first interrogator were largely the result of an inferior intellect and
- lack of human sensitivity. The inference is created that the other interrogator
- and you have in common a high degree of intelligence and an awareness of human
- sensitivity, above and beyond that of the first interrogator. You are normally
- inclined to have a feeling of gratitude towards the second interrogator, who
- continues to show a sympathetic attitude in an effort to increase the rapport
- and control for the questioning which will follow. Should your cooperativeness
- begin to fade, the second interrogator can hint that since he is of high rank,
- having many other duties, he cannot afford to waste time on an uncooperative
- source. He may broadly infer that the first interrogator might return to
- continue the questioning. When used against the proper source, this trick will
- normally gain complete cooperation for the interrogation.
-
-
- "Repetition"
- ----------
-
- Repetition is used to induce cooperation from a hostile source. The inter-
- rogator listens carefully to your answer to a question, and then repeats both
- the question and answer several times. He does this with each succeeding
- question until you become so bored with the procedure that you answer the
- question fully and truthfully to satisfy the interrogator and to gain relief
- from the monotony of this method of questioning. The repetition technique will
- generally not work when employed against introverted sources or those having
- great self control.
-
-
- "Pride and Ego"
- -------------
-
- This technique works effectively on many phreaks and hackers due to the fact
- that many are so damn egotistical. The strategy is to trick you into revealing
- desired information by flattering you. It is effective with sources who have
- displayed weaknesses or feelings of inferiority. The interrogator accuses you
- of weakness or implies that you are unable to do a certain thing. The proud or
- egotistical source will jump to the defensive. An example of an opening
- question for this technique may be: "Why would you own a blue box when you
- have absolutely no idea how to use one?" or, "Why do you hack VMS systems if
- you can't do a damn thing once you're inside of one?" It provides you with the
- opportunity to show someone that you have "brains" and in doing so, you give
- the interrogator more information than you should have.
-
-
- "Silent"
- ------
-
- The Silent technique may be successful when used against either the nervous,
- or the confident-type source. When employing this technique, the interrogator
- says nothing to you, but looks you squarely in the eye, probably with a slight
- smile on his face. It is important for the interrogator not to look away from
- you, but force you to break eye contact first. You will become nervous, begin
- to shift around in your chair, and look away. If you ask questions the
- interrogator probably will not answer them until he is ready to break the
- silence. A source may blurt out questions such as, "What the hell do you want
- with me". When the interrogator is ready to break the silence, he may do so
- with some quite nonchalant questions such as, "You've been logging on to our
- system for a long time now, haven't you? Did you hack the passwords yourself?".
-
- In some cases the interrogator will use several approach techniques
- concurrently, or in succession.
-
-
- QUESTIONS:
- ==========
-
- There are various questions that the interrogator may ask you:
-
- * Prepared questions: When the topic under inquiry is very technical or when
- legal aspects of the interrogation require preciseness, the interrogator will
- have a list of prepared questions to follow during the interrogation.
-
- * Control questions: To maintain control and to check on the truthfulness of
- a source, the normal questions will be mixed with control questions-those
- with known answers. If you fail to answer these questions, or answer wrong,
- it will indicate that you are either not knowledgeable in the topic or that
- you are lying.
-
- * Nonpertinent questions: Sometimes it is necessary for the interrogator to
- keep the true objective of the interrogation from you. By carefully blending
- pertinent questions with nonpertinent questions, the interrogator can conceal
- the true purpose of the inquiry.
-
- * Direct and leading questions: The manner in which the questions are worded
- has a direct bearing on your response. A question may be posed in a number
- of ways:
-
- o "What system did you hack into on 11/11/86?"
-
- o "Did you break into General Dynamics' computer on 11/11/86?"
-
- o "You did break into GD's computer on 11/11/86?"
-
- o "You didn't break into GD'S computer on 11/11/86, did you?"
-
-
-
- PSYCHOLOGY IN INTERROGATION:
- ============================
-
- The interrogator will watch for various psychological responses from you during
- an interrogation. Some of these are:
-
- * Rationalization: Creating plausible excuses or explanations for one's acts
- without being aware that these excuses or explanations are way off the
- [obvious] reality.
-
- * Identification: To identify with and mimic a mental image of some one
- important to you.
-
- * Compensation: Trying to make up for a psychological weakness by building
- up or exaggerating a psychological strength.
-
- * Exhibitionism: Showing off, bragging, etc.
-
- * Fear, Anger, Frustration, etc.
-
- Of course when being interrogated, you should remain as emotionless as possible
- and never show anger, or get upset (NEVER inflict physical abuse upon the
- unsuspecting interrogator. This only creates tension between both the inter-
- rogator and yourself). Your every move, every response, every action is noted
- and used by the interrogator to get you to screw up and give him what he wants.
-
- There can be two main objectives that you can obtain when being interrogated.
- The first is to find ways to force the interrogator to lose his initiative. You
- can do this in many ways. A few that come to mind are: Repeat everything the
- interrogator says. Mimic the interrogator. Laugh at the interrogator. Basically
- piss the interrogator off and make him so mad that he loses sight of his
- objective. This may however, get you in deeper trouble, but it may give you
- extra time while another interrogator is found.
-
- Lie like hell to the interrogator and piss him off. Such as the pathological
- liar gimmick: "I broke into the NSA's computer, yeah, and then used their
- network to get into the presidents private computer yeah that's it, the
- password was uh...Bonzo, yeah, and then used it to take control of a satellite
- used for Star Wars, and made it land right on top of the Kremlin, yeah that's
- the ticket!"
-
- You can also change the subject over and over again to totally unrelated things
- such as: its a nice day out today, hows the wife and kids, how about some food,
- who do you think is going to the superbowl, etc.
-
- The other and probably better objective is simply to pretend to fall for any of
- the various techniques used against you and feed the interrogator more and more
- bullshit, of course being very sincere. This way he gets totally bogus
- information while thinking you are cooperating fully.
-
- Well, I hope you never have to put this article to use in a legal manner, but
- you would be surprised how everyday you are interrogated without even
- realizing it by normal people who probably don't realize they are interrogating
- you!
-
- As stated in the other articles, you can reach me for comment via the staff
- account.
-
- MofI (LOH)
-
-
- The LOD/H Technical Journal: File #8 of 12
-
- *** NOTE ***
- BECAUSE OF THE LENGTH OF THIS GUIDE, IT HAS BEEN BROKEN INTO TWO PARTS FOR
- TRANSMISSION. HOWEVER, IT IS ONE VOLUME, AND IS INTENDED TO BE PRINTED AS
- A WHOLE FOR USE AS BOTH A TUTORIAL AND A REFERENCE GUIDE.
-
- *********************************
-
- The Legion of Doom!
- Presents:
-
- -------------
-
- LOD Reference Guide Vol. I
-
- Outside Loop Distribution Plant
-
- --------------
-
- Written 12/86 Phucked
- Revision III Agent
- 04
-
- *********************************
-
-
- ----------------------
- INTRODUCTION / OUTLINE
- ----------------------
-
- Basically, the outside local loop distribution plant consists of all
- of the facilities necessary to distribute telephone service from the central
- office (CO) out to the subscribers. These facilities include all wire, cable,
- and terminal points along the distribution path. In this article, we shall
- follow this path from the CO to the subscriber, examining in depth each major
- point along the route and how it is used. This is especially useful for
- checking if any 'unauthorized equipment' is attached to your line, which would
- not be attached at the Central Office. I suppose this article can also be
- interpreted to allow someone to do just the opposite of its intended purpose...
-
- Note that this article is intended as a reference guide for use by
- persons familiar with the basics of either LMOS/MLT or the operation of the
- ARSB/CRAS (or hopefully both), because several references will be made to
- information pertaining to the above systems/bureaus. I have no manuals on this
- topic, all information has been obtained through practical experience and
- social engineering.
-
- ********************
-
- --------------------------------
- Serving Area Concepts (SAC) plan
- --------------------------------
-
- In order to standardize the way loop distribution plants are set up in
- the Bell System of the U.S. (and to prevent chaos), a reference standard design
- was created. For urban and suburban areas, this plan was called the Serving
- Area Concepts (SAC) plan. Basically, in the SAC plan, each city is divided
- into one or more Wire Centers (WC) which are each handled by a local central
- office switch. A typical WC will handle 41,000 subscriber lines. Each WC is
- divided into about 10 or so Serving Areas (depending on the size and population
- of the city), with an average size of 12 square miles each (compare this to the
- RAND (Rural Area Network Design) plan where often a rural Serving Area may
- cover 130 square miles with only a fraction of the number of lines). Each
- Serving Area may handle around 500-1000 lines or more for maybe 200-400 hous-
- ing units (typically a tract of homes).
- From the CO, a feeder group goes out to each Serving Area. This con-
- sists of cable(s) which contain the wire pairs for each line in the SA, and
- it is almost always underground (unless it is physically impossible). These
- feeder cables surface at a point called the Serving Area Interface (SAI) in a
- pedestal cabinet (or "box"). From the SAI, the pairs (or individual phone
- lines) are crossed over into one or several distribution cables which handle
- different sections of the SA (ie. certain streets). These distribution cables
- are either of the aerial or underground type. The modern trend is to use
- buried distribution cables all the way to the subscriber premises, but there
- are still a very large number of existing loop plants using aerial distribu-
- tion cables (which we will concentrate mainly upon in this article). These
- distribution cables are then split up into residence aerial drop wires (one
- per phone line) at a pole closure (in aerial plant), or at a cable pair to
- service wire cross box (in buried plant). The cable pairs then end up at the
- station protector at the customer's premises, where they are spliced into the
- premise "inside wire" (IW) which services each phone in the customer's premi-
- ses (and is also the customer's responsibility).
- Although this is the "standard" design, it is by no means the only
- one! Every telco makes it's own modifications to this standard, depending
- on the geographic area or age of the network, so it's good to keep your eyes
- and your mind open.
-
- ********************
-
- At this point, we will detail each point along the Loop Distribution Plant.
-
- -----------------------------
- Cable Facility F1 - CO Feeder
- -----------------------------
-
- The F1 cable is the feeder cable which originates at the Main Distribu-
- tion Frame (MDF) and cable vault at the local CO and terminates at the SAI.
- This cable can contain from 600 to over 2000 pairs, and often more than one
- physical F1 cable is needed to service a single Serving Area (at an SAI).
- The F1 is almost always located underground, because the size, weight, and
- number of feeders leaving the CO makes it impossible to put them on normal
- telephone poles. Since is is also impractical to use one single piece of
- cable, the F1 usually consists of several pieces of large, pressurized or
- armored cable spliced together underground (this will be covered later) into
- a single cable.
-
- Cable Numbering
- ---------------
-
- In order to make locating cables and pairs easier (or possible, for
- that matter), all of the cables in the loop distribution plant are numbered,
- and these numbers are stored in databases such as LMOS at the ARSB or other
- records at the LAC (Loop Assignment Center) or maintenance center. When trying
- to locate someone's cable pair, it helps a great deal to know these numbers
- (although it can be done without them with experience and careful observa-
- tion). Probably the most common place to find these numbers is on a BOR,
- in the "Cable & Assignment Data" block. The F1 is usually assigned a number
- from 00 to 99 (although 000-999 is sometimes used in large offices). Cable
- >pair< numbering is different however, especially in older offices; typical F1
- pair numbers range from 0000 to 9999. Keep in mind that the pair number is not
- concrete -- it is merely nominal, it can change, and it doesn't necessarily
- have any special meaning (in some well organized offices, however, the cables
- and pairs may be arranged in a certain way where you can determine what area
- it serves by its number (such as in my area...heh heh); in any case, it's up
- to you to figure out your area's layout). Anyway, the cable-pair number is
- usually written in a format such as 02-1495, where 02 is the cable and 1495 is
- the pair (incidentally, since this is the CO Feeder cable pair that is connect-
- ed to the MDF, it is the one that will be listed in COSMOS).
-
- F1 Access Points
- ----------------
-
- Although the F1 is run underground, there is really not a standard
- access point down there where a certain pair in a cable can be singled out
- and accessed (as will be explained next). There is, however, a point above
- ground where all the pairs in the F1 can be accessed -- this point is known
- as the Serving Area Interface (SAI), and it will be detailed later. In LMOS
- or other assignment records, the address of the SAI will be listed as the
- TErminal Address (TEA) for the F1 cable handling a certain pair in question;
- therefore, it is where facility F1 stops.
-
-
- -----------------
- Underground Plant
- -----------------
-
- The term "Underground Plant" refers to any facilities located below
- the surface of the earth; this includes truly "buried" cables, which are
- located 6-or-so feet underground surrounded basically by a conduit and dirt,
- as well as cables placed in underground cement tunnels along with other
- "below-ground" equipment (such as seen in most urban areas). Whereas the
- first type is really impossible to access (unless, of course, you want
- to dig for a day or so and then hack into an armored, jelly-filled PIC cable--
- then you should take a bit of advice from our resident Icky-PIC "Goo" advisor,
- The Marauder), the latter type can be accessed through manholes which lead to
- the underground tunnel.
-
- Manholes
- --------
-
- Bell System manholes are usually found along a main street or area
- where a feeder cable group passes through. Using an underground cable
- location map is the best method for locating cable paths and manhole appear-
- ances, although it may not always be available. These maps can be acquired
- from the Underground Service Alert (USA) (at 800-422-4133), but often a
- "cable locator" will be dispatched instead (usually he will just mark off
- how far down or where you can dig without hitting a cable), so this is not
- a very practical method. Of course, you can always follow the warning signs
- on telephone poles ("call before you dig", etc) and the spans between SAI
- bridging heads until you find a manhole. The F1 for the SAI nearest the
- manhole should be found down there along with others en route to the areas
- they serve.
- There are several types of manhole covers, both round and rectangular.
- The rectangular ones are sometimes just hinged metal plates covering an under-
- ground terminal or cable closure, and these are easily opened by one person.
- A non-hinged one may require two people. Round manhole covers (which, by the
- way, are round so that a lineman can't accidentally drop the cover down the
- hole) are basically all the same, except for the types known as "C" and "D"
- type manhole covers which utilize locking bolts (these can be removed using a
- standard crescent or hex socket wrench). These covers are the same as the
- order. This is aided even further by the fact that since F1's usually last
- longer than F2 facilities, there are often more spare provisional F2 facili-
- ties in the loop plant (ie. 100 feeders in, 300 F2 out (200 aren't cross-
- connected to F1's)). So there is a good chance that you will find one that is
- distributed to your area. Other spare facilities include "floaters", which
- are like spare feeder pairs, except they are ACTIVE lines. Often, a telco will
- extend whole feeder groups to more than one SAI in provision for future expan-
- sion, including active cable pairs. If you find a working pair on a feeder
- panel which is not cross-connected to a distribution pair, that pair is a
- floater. This is by far the best way to covertly access a certain pair,
- because most linemen will probably not be aware of the pair's presence (it
- looks unused on the surface). Beware! If you think you can hook up to
- someone's floater and get free service, you're probably wrong (so many other
- people have been wrong, in fact, that Pacific Bell has a special "Form K-33"
- to report this type of fraud), because the telco is more aware of this than
- you may think. Obviously any toll call you make will show up on the bill for
- that line. A do-it-yourself spare pair activation can avoid this problem, if
- done correctly.
-
- ********************
-
- End of First half, attach second half here.
-
- The LOD/H Technical Journal: File #9 of 12
-
- *** Second half of The Outside Loop Distribution Plant starts here. ***
-
-
- --------------------------------
- Cable Facility F2 - Distribution
- --------------------------------
-
- The F2 distribution cable is the cable which originates from the F1
- feeder in the SAI and distributes individual cable pairs to each subscriber.
- This cable can be one of two types: aerial or buried. The most common is the
- aerial distribution cable, although buried cable is the modern trend. In the
- case of aerial F2, the cable or cables leave the SAI underground, and at the
- first telephone pole on the distribution span, the cable is routed up the pole.
- It then is suspended on the span, such as down a street, and at each group of
- houses there is a terminal on the span. This terminal is the aerial drop split-
- ter, and it's purpose is to break off several pairs from the distribution cable
- in order to distribute them (in the form of aerial drop wires) to each house or
- premise. The location or address of the premise nearest this aerial drop
- splitter is the TErminal Address of the F2 serving a certain pair (each group
- of pairs in the F2 will have it's own terminal address, unlike the one address
- for the F1 terminal (SAI)). The F2 cable is always the lowest cable on the
- telephone pole, and it is usually a great deal larger than the electric power
- distribution cables above it. Often more than one F2 can be seen on a single
- pole span. In this case, the top F2 will usually be the one which is being
- distributed to the subscribers on that street, and the lower (and most often
- larger) cables are other F2's coming from an SAI and going to the streets
- which they service: These cables consist of multiple spliced spans, and they
- will not have any drop wires coming off them (they are marked every few poles
- or so at a splicing point called a "bullet closure" which is fully enclosed
- and can be quite large (ie. 6" dia, 20" long) as compared to the normal drop
- splitters (ie. or similar 4"w x 5"h x 12"l) -- these closures are clamp press-
- urized and are not meant to be opened unless the cable is being replaced or
- splicing work is being done. They are not standard cable/pair access points).
- Buried F2 plant is similar to aerial, except that the cable is not
- visible because it is underground. Instead of going to a pole from the SAI,
- the cable continues underground. The drop wires are also underground, and the
- method of breaking them from the distribution cable is similar to that of the
- aerial drop splitter, except it is a small pedestal or box located on the
- ground near the houses it serves. This address closest to this pedestal is
- the TEA for the F2.
-
- F2 Cable Numbering
- ------------------
-
- The F2 distribution cable is usually given a 4 or 5 digit number,
- depending on the office. The first 2 or 3 digits should be the number of
- the F1 that the F2 was branched off of, and the last 2 or 3 digits identify
- the distribution cable. Example-
-
- F1 Cable F2 Cable
- 25 2531
- This F2 cable came from feeder #25^^
-
- The cable >pair< numbers may be set in a similar way, with the last 3
- or 4 digits identifying the pair, and the first digit (usually a 1) identifying
- the pair as a feeder or a distribution pair. Example -
-
- F1 Cable Pair F2 Cable Pair
- 25 1748 2531 748
- ^--signifies F1 (feeder) cable pair
-
- Generally, the F1 cable pairs are numbered higher than the F2 cable
- pairs, due to the fact that a feeder cable may contain several distribution
- cables' worth of cable pairs. Note once again that all of this numbering
- plan is the STANDARD, and it may be far from real life! As soon as one dist-
- ribution pair is replaced, crossed over to another feeder pair, or taken from
- service, the set order is interrupted. In real life, it is most always nece-
- ssary to get both F1 and F2 cable assignment data.
-
-
- ********************
-
- --------------------------------------------
- Facilities F3-F5, Rural Area Interface (RAI)
- --------------------------------------------
-
- Although cable facilities F3, F4, and F5 may be specified in any loop
- plant, they are rarely seen anywhere except in rural areas under the RAND
- plan (Rural Area Network Design). Basically, plants using these extra
- facilities are similar to F1/F2 plants, except there are extra cable spans
- and/or terminals in the path. When locating cables, the highest numbered
- facility will be at the end of the path, terminating near the subscriber's end
- (like a "normal" F2), and the lowest numbered facility will be the feeder from
- the CO (like a "normal" F1). The extra spans will be somewhere in between,
- like an intermediate feeder or extra distribution cable with separate cable
- access terminals. One such facility is the Rural Area Interface (RAI), which
- can be used in a "feeder-in, feeder-out" arrangement. This is usually seen on
- cable routes of 50 pairs or greater, with a length of longer than 30 kft
- (about 6 miles). In this case, there will be two terminal cabinets in the
- feeder path, labelled RAI-A and RAI-B. The RAI-A is special because it has a
- two-part terminal block: the top has switching panels with 108-type connectors
- which cross-connect feeder-in and feeder-out pairs using jumper plugs, and the
- bottom has standard 76-type binding posts which cross-connect feeders to
- distribution cables for subscribers in the local area of the RAI-A. The jumper
- plugs can only be connected in one way to the switching panels, so random
- cross-connection of feeder-in/feeder-out pairs is prevented. In this way, the
- cable and pair numbers stay the same as if the feeder cable was uninterrupted.
- This is used a lot in rural areas; it allows part of a feeder group to be split
- off at the RAI-A like a distribution cable near a town along the route, and
- the rest of the feeder group continues on to a town further away, to the RAI-B
- where it is terminated as in a "normal" SAI. In order to access a pair, just
- use the last RAI in the span (whichever it is) and treat it just like an SAI.
- If the pair terminates at RAI-B, you can also access it at RAI-A! (if you
- can locate the pair using color code, BP number, or (ughh) ANI, there should
- be test terminals on top of the jumper plugs connecting the 108's on the
- switching panel where you can hook your test set -- you can't hook onto a raw
- 108 connector very easily). Anyway, the RAI terminal is usually a ground
- pedestal with a cabinet such as a 40-type, but it can be aerial mounted on a
- pole (hard to access).
-
- Pair-Gain, Carried Derived Feeder
- ---------------------------------
-
- Another common facility in rural areas (and in cities or suburbs, es-
- pecially near large housing complexes, etc.) is the pair-gain system. It is
- basically a system which consists of a digital link which is distributed,
- almost like a normal cable pair, out to a terminal cabinet called a Remote
- Terminal (RT) which contains equipment which demultiplexes the digital line
- into many "normal" metallic analog telephone lines which go to each subscriber
- in the area. Because the digital line can transmit the audio from several
- separate lines and multiplex them onto one cable, only one special cable
- pair is needed to come from the CO as a feeder, instead of several separate
- ones; this is why it is called a "pair gain" system. The remote terminal (RT)
- contains both the demultiplexing electronics as well as a small "SAI" type
- terminal block for connecting the pairs to distribution cables on the side
- of the path toward the subscriber. Because the "feeder" is not a multipair
- cable but a digital link (ie. T-carrier), this arrangement is known as a
- "carrier-derived feeder." The SAI part of the RT is used just like a normal
- SAI on the distribution side (BLUE), but the feeder side will be slightly
- different. Carrier-derived feeders are always marked with YELLOW labels, and
- their pairs will be crossed over to distribution cables just like in an SAI.
- So, in order to access a pair in a system like this, you must do so on the
- DISTRIBUTION side, because you can't hook an analog test set to a 1.544 Mbps
- digital T-carrier line! (or worse yet, a fiber optic cable). This may be
- difficult, because these cabinets are always locked (with few exceptions), so
- you'll have to find a terminal closer to the subscriber -- also be aware that
- many RT's are equipped with silent intrusion alarms. Anyway, some common
- pair-gain systems are the Western Electric SLC-8, 40, 96, and GTE's MXU,
- ranging in size from 8 to over 96 lines. RT cabinets can often be identified
- by the ventillation grilles (with or without a fan inside) which are not
- present on SAI's or other non-RT cabinets.
-
- ********************
-
- -----------------------------------
- Aerial Distribution Splice Closure,
- Drop Wire Splitter
- -----------------------------------
-
- This terminal is the point where the individual cable pair for a
- certain subscriber is split from the F2 distribution cable and spliced onto
- an aerial drop or "messenger" wire which goes to the subscriber's premises.
- In an aerial distribution plant, 2 types of this terminal are common:
-
- 1> Western Electric 49-type Ready Access Closure / Cable Terminal
-
- 2> Western Electric 53A4, N-type Pole Mount Cable Terminals
-
- ----------
-
- Type 1> The 49-type, 1A1, 1B1, and 1C1 closures are all functionally similar.
- This terminal is a semi-rectangular closure, about 15"L x 3"W x 5"H,
- usually black, which is connected directly to the aerial cable itself;
- it is coaxial with the cable, so the cable passes straight through it.
- It splits up to 12 pairs from the distribution cable to a small bin-
- ding post terminal block inside the closure. Aerial drop wires are
- then connected to these binding posts, and the wires exit the term-
- inal through holes on the bottom. These wires are strung via strain
- relief clamps on the pole down to the subscriber's site. The terminal
- closure is opened by pulling out and lifting either the whole cover
- or the front panel after removing the cover fasteners on the bottom
- and/or the sides (the closure is a thick neoprene cover over an alum-
- inum frame). Inside the case, there is a terminal block and there
- may be some sort of loading coil as well. The cable and this coil are
- not openable, but the terminal block is. Since the F2 pair terminates
- in this closure, the F2 BP number (cable/assignment data) corresponds
- to a binding post on this terminal block. As mentioned earlier, this
- terminal will also contain spare pairs, in case a subscriber wants
- another line. In order to use one of these pairs, you must either get
- an F2 (and then F1) CP number from LAC using the BP, or you can put a
- trace tone on the pair at the aerial closure and then locate the pair
- at the SAI. Then a cross-connect would have to be made to an active
- F1 pair, and a drop wire (ughh) would have to be added back at the
- aerial closure. Anyway, both the binding posts as well as the holes
- (inside + out) are numbered left to right, so you may not even have
- to open the closure if you are just looking for an F2 BP number --
- just trace the drop wire from the house into the numbered hole on the
- closure. The TErminal Address for the F2 is the address of the house
- or premise closest to the pole near this closure. These terminals
- (esp. 1A1, etc) are also used for straight and branch splices for
- aerial cables, so you may see one cable in / two out; also, the
- closure can be used for splicing only, so there may not be drop wires
- (in this case, it wont be listed in LMOS because it is not a terminal
- point). There is generally one of these every pole near a quad of
- houses or so, mounted on the cable about an arm's length from the
- pole.
-
- Type 2> Both the 53A4 and the N-type terminals serve the same function as
- the 49-type just described, except they are used in situations where
- there are more than 4 houses (8 lines, including provisional pairs).
- This terminal is mounted directly on the pole, about a foot down from
- the aerial cable. It is not connected in line with the cable, so
- there is no F2 splicing area in the cabinet (rather, a cable stub
- comes from the terminal block and is spliced onto the span close to
- where it touches the pole). It is about 22"H x 9"W x 4"D, rectan-
- gular, and silver (unpainted). The door is similar to that of a 40-
- type cabinet, but it's much smaller; it is opened using a 7/16" tool
- in the same manner as before, except that the door must be lifted
- before it can be opened or closed. In this way, the door slides down
- on it's hinges when opened, so it locks in the open position and you
- wont have to worry about it (especially nice because hanging onto a
- pole is enough of a problem). The terminal block can handle from 25
- to 50 pairs, with 32 holes in the back for aerial drop wires. Just
- as in the Ready Access Closure, this is the F2 terminal, and the
- numbered binding posts and holes correspond to F2 BP numbers. The
- TEA will be the address nearest the terminal (just as before). This
- terminal is common at the first pole on a street, on cul-de-sacs,
- apartments, marinas & harbors, or anywhere there are many drop wires.
-
- Buried Distribution Cross Box and Other Pedestals
- -------------------------------------------------
-
- This terminal serves the same function as the aerial closures, except
- it is used in areas with a buried distribution plant. This cable assignment
- for this terminal will be the F2 terminal, and the BP numbers and TEA will
- be the same as for the aerial terminals. Probably the most common cross-boxes
- are the PC4,6, and 12; these are around 50" tall by 4, 6, or 12" square respec-
- tively, and they are painted gray-green like SAI cabinets. These are the
- smallest pedestals in the distribution plant, and they don't have doors (they
- look like waist-high square poles). In order to open one of these pedestals,
- the two bolts on either side half way down the pedestal must be loosened with
- a 7/16 hex wrench; then the front cover can be lifted up, out, and off the
- rest of the closure. These terminals are located generally near small groups
- of houses (up to about 12 lines usually) on the ground, often near other
- utility cabinets (such as electric power transformers, etc). These are
- becoming more common as the new housing tracts use buried distribution plant.
- The F2 cable will enter as a cable stub, and it is split into service wires
- which go back underground to the subscribers.
- All small pedestals are not necessarily the above type of terminal;
- these pedestal closures are often used for other purposes, such as splicing
- points in underground distribution, loading coil mounting, and even used as
- temporary wire storage containers. If the terminal contains a terminal
- block or it is a significant point on the line, however, it will be listed in
- LMOS. An example of this is a distribution path found by Mark Tabas in a
- Mountain Bell area -- there was a small PC12-type closure on the ground near
- a street in a remote suburb, and it was serving as a terminal point for a
- whole F1 cable. It was listed as the F1 terminal, and it was at the right
- TEA; however, there was no terminal block because it was a splicing point
- (just a bunch of pairs connected with Scotchlok plastic connectors which are
- hung on a bar in the pedestal closure), so LMOS had no BP number. Instead,
- a color code was listed (see appendix) for the pair in the splice. Anyway,
- the WHOLE F1 went up to an N-type closure on a pole and was split into drop
- wires.
-
- --------------------------------------
- Multi-Line Building Entrance Terminals
- --------------------------------------
-
- This terminal takes the aerial drop or service wires and cross-connects
- them over to the Inside Wire (IW) in the subscriber's building (hotels, busi-
- nesses, etc). There are many different types of terminal blocks for this
- terminal, although by far the most common is the Western Electric 66 block.
- The 66-type terminal uses a block of metal clips; the wire is pushed onto the
- clip with a punch-down tool which also strips the wire. The block is divided
- into horizontal rows which can have from 2 to over 6 clips each. Since each
- row group terminates one pair, two rows are needed for x-connect, one on top of
- the other. The service or drop wire usually enters on the left, and the
- inside wire is connected to the far right. In order to locate a pair, usually
- you can visually trace either the service wire or the inside wire to the
- block, and often the inside wire side wil be numbered or labelled with an
- address, phone number, etc. It is also possible for this terminal to serve
- as an F2 terminal point, if there are a lot of lines. In this case, LMOS will
- list the TEA usually with some physical direction as to where to find it. The
- left side will then be numbered as F2 BP's. This terminal is also the demarca-
- tion point which separates the customer's equipment from the telco's. The new
- terminals often have an RJ-21 connector on the service wire side, such as a
- 25-pair for PABX or a Bell 1A2 Key, etc. There are also "maintenance termina-
- ting units" (MTU) which are electronic units connected to the line(s) at the
- entrance protector; these are sometimes seen in some telcos. Basically, they
- provide functions such as party ANI on multi-party lines, remote disconnect
- (for testing or (click!) non-payment), or half ringers (the most common --
- they prevent ringing continuity failures on switches like ESS when there are
- no phones hooked to the line when it rings). MTU terminals are often locked.
-
- Single Pair Station Protector
- -----------------------------
-
- There's really not much to say about this terminal. Basically, it
- takes the service or drop wire and connects it to the inside wire in a single
- line residence (houses with 2 lines will have 2 of these). These are at every
- house on an outside wall or basement, and there are two main types: the Western
- Electric 123 (with a "150-type" rubber cover), and the old WE 305 and new AT&T
- 200 Network interface (metal and plastic, respectively). These terminals have
- one binding post pair and they will have either gas discharge tubes or carbon
- blocks to protect the line from lightning or excess current. Obviously, there
- is no BP number (you just have to visually trace the drop wire to find the
- protector). This is also the demarcation point marking the end of the telco's
- responsibility, as well as the end of our tour.
-
- ********************
-
- Bell System Standard Color Code Use:
- ----------------------------------- Take the #, and find it's closest
- Pair # Tip Ring multiple of 5. Use that number to find
- ----------------------------------- the Tip color, and the remainder to find
- 01-05 White Blue the Ring color (remainder 0 = Slate).
- 06-10 Red Orange (e.g. Pair #1 = White/Brown, Pair #14 =
- 11-15 Black Green Black/Brown, Pair #24 = Violet/Brown).
- 16-20 Yellow Brown
- 21-25 Violet Slate
-
- Usually if a color code is needed (such as in a splice case) you can get it
- from LAC or the testboard; if it's really essential, it will be in LMOS as
- well. This color code is also used a lot on cable ties (usually with white
- stripes and ring colors only), although these are often used randomly.
-
- ---------
- Test Sets
- ---------
- This is the "right hand" of both the professional and the amatuer
- lineman. Basically, it is a customized portable telephone which is designed
- to be hooked onto raw cable terminals in the field and used to monitor the
- line, talk, or dial out. The monitor function is usually the main difference
- between the "butt-in" test set and the normal phone. If you don't have a
- real test set already, the following circuit can convert a normal $4 made-in-
- taiwan phone into a working test set. The "all-in-one" handset units without
- bases are the best (I tend to like QUIK's and GTE Flip Phone II's). Anyway-
-
- OFFICIAL Agent 04 Generic Test Set Modification (tm)
-
- Ring >---------------------------------> to "test set" phone
- Tip >------! SPST Switch !-------->
- !-----/ ----------!
- >from !-------/!/!/!/!--! C = 0.22 uF 200 WVDC Mylar
- cable pair ! C R ! R = 10 kOhm 1/2 W
- (alligators) !--! (------------! SPST = Talk / Monitor
-
- When SPST is closed, you are in talk mode; when you lift the switch-
- hook on the "test set" phone, you will get a dial tone as if you were a
- standard extension of the line you are on. You will be able to dial out and
- receive calls. When the SPST is opened, the resistor and capacitor are no
- longer shunted, and they become part of the telephone circuit. When you lift
- the switchhook on the test set, you will not receive dial tone, due to the fact
- that the cap blocks DC, and the resistor passes less than 4 mA nominally (far
- below the amount necessary to saturate the supervisory ferrod on ESS or close
- the line relay on any other switch). However, you will be able to silently
- monitor all audio on the line. The cap reactance + the phone's impedance
- insure that you won't cut the signal too much on the phone line, which might
- cause a noticeable change (..expedite the shock force, SOMEONE'S ON MY LINE!!).
- It's also good to have a VOM handy when working outside to rapidly check for
- active lines or supervision states. Also, you can buy test equipment from
- these companies:
-
- Techni Tool - 5 Apollo Road, Box 368. Plymouth Meeting, PA. 19462.
- Specialized Products Company - 2117 W. Walnut Hill Lane, Irving, TX. 75229.
-
- ********************
-
- I am not going to include a disclaimer, because a true communications
- hobbyist does not abuse nor does he tamper with something he doesn't under-
- stand. This article is intended as a reference guide for responsible people.
-
- Also, this article was written mainly from first-hand experience and
- information gained from maintenance technicians, test boards, as well as
- technical literature, so it is as accurate as possible. Keep in mind that
- it is mainly centered upon the area served by Pacific Telephone, so there may
- be some differences in the loop plant of your area. I would be happy to
- answer the questions of anyone interested, so feel free to contact me c/o the
- Technical Journal regarding anything in this article or on related topics such
- as ESS, loop electronics, telephone surveillance / countersurveillance, etc.
- I hope the article was informative.
-
- --------------------------------
-
- Written by: Phucked
- Agent
- 04
-
- The Legion Of Doom!
-
- --------------------------------
-
- Please - Por Favor - Bitte - Veuillez!
- ** Do not edit, abridge, fold, spindle, or mutilate.
-
-
- The LOD/H Technical Journal: File #10 of 12
-
-
- The Legion Of Hackers Present:
- Updated: Telenet Directory
- Part A: Addresses 201XXX to 415XXX
- Revision #4 Last Updated: 1/1/87
- (Includes available Uninet hosts)
-
-
- +-------+------------+--------------------------------------------------------+
- |ADDRESS|OS/COMP TYPE| SYSNAME/OWNER/RESPONSE/COMMENTS/ETC. |
- +-------+------------+--------------------------------------------------------+
- |20101 $| |
- |20114 | | NJIT Electronic Information Exchange System (EIES)
- |20115 | | NJIT Electronic Information Exchange System (EIES)
- |20120 | IBM VM/370|
- |20125 | | NJIT Electronic Information Exchange System (EIES)
- |20128 | TOPS-10 | NDC - SYSTEM:
- |20130 | TOPS-10 | NDC - SYSTEM:
- |20131 $| VAX/VMS |
- |20132 | | Dunn & Bradstreet
- |20133 | Burroughs | Running CANDE Operating System
- |20134 $| 19.4.9 | Primenet MWH
- |20135 $| Prime | (Version 18.2)
- |20136 | IBM VTAM |
- |20140 | VM - TSO | CPC Corporate Data Center (Englewood Cliffs NJ)
- |20142 | | "RDS #12 USER#" Remote Data Switch NJ Bell
- |20151 $| 19.4.7 | Primenet USCG.B
- |20153 | | Colgate's IICS
- |20155 $| 19.4.7 | Primenet USCG.B
- |20159 | 19.4.10.R7| Primenet PBN31
- |20166 $| 19.3.7 | Primenet SYS001
- |20167 | | Warner Computer Systems
- |20168 | | Warner Computer Systems
- |20171 | | "RDS #6 USER#" Remote Data Switch NJ Bell
- |20180 | VAX/VMS | Agent Service Center
- |20182 | | Bankers Trust Customer Service
- |20183 | | Bankers Trust Customer Service
- |20188 | | Dunn & Bradstreet Systems
- |20189 | IBM VM/370| Prushare
- |201133 | |
- |201137 | HP-3000 |
- |201139 | | Chem Network DTSS Release 13
- |201169 | Unix 4.2 | thumper
- |201171 | IBM VTAM | NET001
- |201172 | IBM VTAM | NET002
- |201200 | | D & B Systems
- |201201 | | D & B Systems
- |201220 | VAX/VMS | Investment Technologies Computer Center
- |201230 | 20.2.0 | Primenet NYMCS
- |201242 | | D & B Systems
- |201243 | | D & B Systems
- |201244 | | D & B Systems
- |201245 | | D & B Systems
- |201246 | | D & B Systems
- |201252$| 19.4.6 | Primenet BOR
- |201255 | | Primecom network 18-4X System 48
- |201256 | | Primecom network 18-4Q System 49
- |201259 | VAX/VMS |
- |201334 | P-E | "Reliance sign on screen"
- |201346 | IBM |
- |201350 | Honeywell | "$$50 Device Type Identifier"
- |201431 | VAX/VMS | SYS 31
- |201436 | | Primecom Network System 36
- |437-448| | Primecom Network System 37 to 48 respectively
- |201449 | | Primecom Network System 49
- +-------+------------+--------------------------------------------------------+
- |20210 | Prime |
- |20230 | IBM | EDS Timesharing
- |20232 | IBM | EDS Timesharing
- |20234 | | "User Number-- Help-phone 313-556-1574"
- |20236 $| | "Network sign-on failed: sign-on command expected"
- |20243 $| DG AOS/VS |
- |20249 | IBM TCAM | "Enter system ID:"
- |20299 | TOPS-20 | The Information Service
- |202108 | Multics | "Channel c.h126000 Please login:"
- |202109 | TOPS-20 | The Information Service
- |202115$| |
- |202126 | |
- |202127 | IBM | EDS Timesharing
- |202129 | |
- |202131 | | USER#--
- |202138$| Port Sel. | Gallaudet Computer Services Network
- |202139$| TOPS-10 | TRI-SMP
- |202140$| TOPS-10 | TRI-SMP
- |202141 | VAX/VMS | Telenet International Info System
- |202142 | | Telemail
- |202144$| TOPS-20 | TRI-SMP
- |202156$| VAX/VMS | American Psychiatric Association
- |202201 | | Compuserve
- |202202 | | Compuserve
- |202205 | | GM Parts FPL
- |202206 | | GM Parts FPL
- |202214 | 19.4.5 | Primenet SPA
- |202218 | 19.4.11 | Primenet GEC
- |202224 | | Gm Parts FPC
- |202618 | | Compumark Search System
- +-------+------------+--------------------------------------------------------+
- |20321 $| Port Sel. | "Enter Class"
- |20322 | IBM VM/370| Midd 3081
- |20328 | IBM VM/370| Midd 3081
- |20334 $| |
- |20359 | Port Sel. | Perkin-Elmer Data Network
- |20364 $| |
- |20366 | | "Login Please:"
- |20373 | VAX/VMS | VCC C&P Occupational Health System
- |203155$| VAX/VMS |
- +-------+------------+--------------------------------------------------------+
- |20520 $| |
- |20530 $| DG AOS/VS |
- |20531 | DG AOS/VS |
- |20532 $| DG AOS/VS | R08F01D01A
- |20534 $| |
- |20536 $| |
- |20537 $| DG AOS/VS | R08F01D03A U.S. Forestry Service
- |20545 $| DG AOS/VS | R08F01D04A U.S. Forestry Service
- +-------+------------+--------------------------------------------------------+
- |20620 $| HP-3000 | Boeing
- |20630 $| HP-3000 | Boeing
- |20638 $| DG AOS/VS |
- |20640 $| 19.4.6.R9 | Primenet P850
- |20665 | 20.1.1D | Primenet OAD
- |20672 | Port Sel. | University of Washington
- |206112 | | DOE Online
- |206158 | Port Sel. | BCS Network
- +-------+------------+--------------------------------------------------------+
- |20820 $| DG AOS/VS |
- |20822 $| DG AOS/VS | R04F15D02A
- |20830 $| DG AOS/VS | R04F02A
- |20833 $| |
- |20837 $| DG AOS/VS |
- |20843 $| DG AOS/VS |
- +-------+------------+--------------------------------------------------------+
- |21221 | 19.4.9 | Primenet SYSA
- |21223 | 22-33 | CitiCash Manager (C/C/M)
- |21225 $| TOPS-20 | Landart Systems Inc.
- |21230 | Prime |
- |21232 | | "Service id="
- |21235 | LAN | IBISM Electronic Village
- |21240 | | Wilsonline
- |21241 | 30-03 | C/C/M
- |21243 | 05-35 | C/C/M Int'l 3
- |21244 | 10-29 | C/C/M Int'l 4
- |21250 $| | "Channel 09/041 IBFS?"
- |21252 $| 20.0.4 | Primenet SYSA
- |21255 | 03-39 | C/C/M Int'l 2
- |21256 | 22-33 | C/C/M
- |21258 | |
- |21259 | VMS 4.3 | Office Automation System
- |21260 | 17-41 | C/C/M
- |21261 | 25-13 | C/C/M
- |21262 | 25-25 | C/C/M
- |21264 | 28-37 | C/C/M Int'l 1
- |21265 | 03-39 | C/C/M Int'l 2
- |21266 | | "Welcome"
- |21267 | 05-37 | C/C/M Int'l 3
- |21268 | 10-29 | C/C/M
- |21269 | |
- |21270 | VM - TSO | Using the "Top Secret" Security Package
- |21278 | 26-37 | C/C/M Int'l 7
- |21279 | | "Enter ID:"
- |21282 | | Bankers Trust Customer Service
- |21286 $| TOPS-20 | BTSHARE
- |21287 | 04-38 | C/C/M Int'l 6
- |21289 | RSTS V7.08| IFI CITI
- |21290 | 26-40 | C/C/M Int'l 7
- |212112 | IBM VM/370|
- |212126$| Port Sel. | American Express Corporate Info Systems
- |212131 | IBM VM/370|
- |212133$| VAX/VMS | TOBAS New York System
- |212137 | 20.2.0 | Primenet NY60
- |212141 | | Telemail
- |212142 | | Telemail
- |212145 | VAX/VMS | Office Information Systems
- |212146 | VAX/VMS | Office Information Systems
- |212148 | | "Enter ID:"
- |212151 | 28-36 | C/C/M Int'l 1
- |212152 | VAX/VMS |
- |212167$| 20.1 | Primenet MPISBS
- |212169 | 04-39 | C/C/M Int'l 6
- |212170$| |
- |212173 | IBM TSO | Brown Brothers Harriman Communications System
- |212179$| Prime |
- |212191 | | "Welcome" (Citibank)
- |212197$| TOPS-20 | BTShare SYS B
- |212200 | |
- |212224$| | Global Electronic Mail Service (GEMS)
- |212262 | 19.4.0 | Primenet SAL.19 VNY
- |212269 | VAX/VMS |
- |212279$| |
- |212281 | | CitiCash Manager
- |212282 | | CitiCash Manager
- |212315$| |
- |212316$| |
- |212322$| IBM |
- |212328 | | "ENTER IDENTIFICATION:"
- |212338$| |
- |212340$| Prime |
- |212341$| Prime |
- |212344$| |
- |212350$| |
- |212371 | VAX/VMS |
- |212374 | VAX/VMS | Business Systems Node NY01
- |212446$| VAX/VMS | The Dais Group
- +-------+------------+--------------------------------------------------------+
- |21321 | 19.5 | Primenet Q8
- |21322 | Unix | Interactive System 3
- |21323 | Unix | Interactive System 3
- |21330 $| IBM TSO | L.E.B.
- |21333 | IBM TSO | (Running ACF2)
- |21335 | | Marketron Research And Sales
- |21339 $| Port Sel. | USC - ECL Port Selector
- |21344 | IBM TSO | SDC/ORBIT Database (Using "ACF2" Sec pkge)
- |21348 $| Port Sel. | USC - ECL Port Selector
- |21370 | | XCC-West System X2
- |21372 | | XCC-West System X3
- |21373 | | XCC-West System X1
- |21384 | Port Sel. | (MICOM 600)
- |21385 | Port Sel. | (MICOM 600)
- |21388 | 19.4.2.1CS| Primenet MSCOST
- |213102 | 20.0.3 | Primenet TRWE.A
- |213105 | 19.4.11 | Primenet MD.WSO
- |213130 | 19.3.7.R4 | Primenet P751
- |213143$| |
- |213146$| |
- |213150 | 19.4.3 | Primenet MD.IRV
- |213170 | | Dialog
- |213219$| VAX/VMS | California Tech. Physics Vax
- |213236 | | Dialog
- |213245 | Port Sel. | Litton Computer Services
- |213253 | | Xplex Cluster Controller
- |213255$| |
- |213668 | TOPS-20 |
- |213717 | | TransAmerica Financial Systems and Concepts
- |213765 | IBM TSO | Ralph M. Parsons Network
- +-------+------------+--------------------------------------------------------+
- |21442 | Prime | DNA Online
- |21444 | | Marathon
- |21456 | 20.1.1a | Primenet BOWSER
- |21460 | HP-3000 | Welecome to the 68B HP-3000 Computer System
- |21469 | |
- |21471 | FB.3.3 | Primenet FASBAC
- |21472 | IBM TSO | UCC (Running "ACF2" Security Package.)
- |21475 | Univac | UCC
- |21477 | Univac | UCCEL FASBAC
- |214110 | | FAST-TAX - MARATHON - The Long Distance Runner
- |214149 | | FAST-TAX - MARATHON - The Long Distance Runner
- |214156 | HP-3000 | Welcome to the 68B HP-3000 Computer System
- |214176 | 19.2 | Primenet UCCEL FASBAC
- |214607 | HP-3000 | Welcome to the 68B HP-3000 Computer System
- |214626 | RT-11 | CTSRTS-E1 (DIBOL)
- +-------+------------+--------------------------------------------------------+
- |21501 | Prime | Newsnet (Save as C NET)
- |21505 | |
- |21531 $| VAX/VMS | VAX V05
- |21532 $| DG AOS/VS |
- |21535 $| IBM TSO | IMS America
- |21536 | IBM TSO | IMS America
- |21537 | IBM TSO | IMS America
- |21540 | | VU/TEXT (Same as C VUTEXT)
- |21545 | IBM TSO | IMS America
- |21549 | | Easynet The Knowledge Gateway
- |21554 $| |
- |21556 | | GTE Telenet Async to 3270 Service
- |21566 | | Newsnet (Save as C NET)
- |21567 $| IBM | "Command Unrecognized"
- |215121 | IBM VM/370| TPF&C Online-Phila
- +-------+------------+--------------------------------------------------------+
- |21630 | | "DCS001 Please Signon"
- |21632 | | "DCS001 Please Signon"
- |21638 | VMS 4.3 | Timken Corp.
- |21651 $| HP-3000 |
- |21652 | HP-3000 |
- |21654 | 19.2.12 | Primenet TRWIAE
- |21665 | 18.3 | Primenet LIPA
- |21666 | 18.3 | Primenet LIPA
- |21679 | HP-3000 |
- |216140 | |
- +-------+------------+--------------------------------------------------------+
- |21725 | Cyber NOS | U of Illinois
- |21726 | Unix | U of I Computing Services
- |21732 | Cyber NOS | U of I - ALL ACCOUNTS (300 Baud only)
- |21735 | VAX/VMS | NCSAVMSB (VAX 11/785)
- |21736 | Cyber NOS | U of I - ALL ACCOUNTS (1200 Baud only)
- |21740 $| |
- |21741 $| 19.3.12.X8| Primenet SPRFLD
- |21742 $| |
- +-------+------------+--------------------------------------------------------+
- |21830 $| DG AOS/VS |
- |21831 $| DG AOS/VS |
- |21838 $| DG AOS/VS |
- |21841 $| DG AOS/VS |
- |21845 $| DG AOS/VS |
- |21853 $| DG AOS/VS |
- |21856 $| DG AOS/VS |
- |21868 $| DG AOS/VS |
- |21875 $| DG AOS/VS |
- +-------+------------+--------------------------------------------------------+
- |30120 | IBM TSO | National Library of Medicine
- |30121 $| | NASA Recon
- |30122 $| Multics | Dockmaster
- |30123 $| IBM | Cross System Communication
- |30124 | | Source System 10
- |30126 | Prime | DNA MD1 Online
- |30128 | | Source System 13
- |30131 | 19.1.6 | Primenet SYS750
- |30133 | SYS/32 VOS| United Communciations Computer Services Group
- |30135 | Unix 4.3 | nlm-vax
- |30136 | |
- |30138 | | Source System 11
- |30139 $| | CASE Communications
- |30145 | | General Electric
- |30147 | | Source System 12
- |30148 | | Source System 15
- |30149 | | Source System 14
- |30152 $| Prime |
- |30154 | LAN | GOULD Local Area Network
- |30157 | Burroughs | Gannet Publishing (USA Today)
- |30158 | Prime | CDA Online Services
- |30165 $| SYS/32 VOS| United Communications Computer Services Group
- |301150$| VAX/VMS |
- |301157$| VAX/VMS | VAX 780 ECRUOS Hose Co.
- |301170$| SYS/32 VOS| United Communications Computer Services Group
- |301635$| Port Sel. | University of Maryland
- +-------+------------+--------------------------------------------------------+
- |30323 | Prime |
- |30325 | RSTS V7.2 | C. R. C.
- |30334 | |
- |30338 | 20.0.4.R6 | Primenet SL
- |30344 | CDC Cyber |
- |30350 | DG AOS/VS |
- |30354 | DG AOS/VS |
- |30357 | 20.0.4.R2 | Primenet DENVER
- |30358 | | Interactive Systems PAD
- |30360 $| DG AOS/VS |
- |30361 $| DG AOS/VS |
- |30362 $| DG AOS/VS |
- |30364 $| DG AOS/VS |
- |30365 | Burroughs | Network Session (B7900 using Cande op/sys)
- |30366 $| DG AOS/VS |
- |30369 $| DG AOS/VS |
- |30375 $| | "Incorrect Locations ID"
- |30378 | DG AOS/VS |
- |303100 | IBM | "Enter SW Characters"
- |303114$| |
- |303115$| |
- |303116$| |
- |303130 | DG AOS/VS |
- |303131 | | Petroleum Information Network
- |303133 | VAX/VMS |
- |303134 | TOPS-20 | SoftSearch Network B
- |303135$| CDC Cyber | Colorado State University
- |303136 | HP-3000 |
- |303138 | DG AOS/VS |
- |303140 | | Watney Network Services Unit Colorado Springs
- |303145 | DG AOS/VS |
- |303146 | DG AOS/VS |
- |303148 | DG AOS/VS |
- |303149$| | "Incorrect Locations ID"
- |303151 | DG AOS/VS |
- |303164 | DG AOS/VS |
- |303201 | DG AOS/VS |
- |303250 | DG AOS/VS |
- |303260 | VAX/VMS |
- |303270 | 20.2.0 | Primenet MD.DEN
- |303271 | 19.4.5 | Primenet CS.BUS
- +-------+------------+--------------------------------------------------------+
- |30504 | IBM | Martin Marietta
- |30520 | HP-3000 | FDP ADV1 SYS#14
- |30522 | HP-3000 | FDP PEN2 SYS#7
- |30523 | |
- |30529 | HP-3000 | FDP PEN4 SYSY#9
- |30537 | VAX/VMS |
- |30556$ | |
- |30559 | | "LOGON"
- |30563 | HP-3000 | FDP
- |30573 | HP-3000 |
- |30578 | | Cybernet/system B Coral Gables, Florida
- |30579 | | Cybernet/system D Coral Gables, Florida
- |30584 | |
- |305129 | HP-3000 |
- |305136 | HP-3000 |
- |305137 | HP-3000 |
- |305138 | HP-3000 |
- |305139 | HP-3000 |
- |305140 | | "Invalid Command"
- |305148 | |
- |305149 | HP-3000 |
- |305159 | | VU/TEXT Please Sign On (Same as C VUTEXT)
- |305160 | | Cybernetics System C
- |305161 | | Cybernetics System A
- |305162 | | Cybernetics System D
- |305164 | | Cybernetics System D
- |305165 | | Cybernetics System B
- |305166 | | CSI Timesharing
- |305167 | | CSI Timesharing
- !305168 | | Cybernetics System B
- |305169 | | Cybernetics System C
- |305172 | | Cybernetics System B
- |305226 | | Cybernetics System D
- |305239 | IBM VM/370|
- |305248 | VAX/VMS |
- |305262$| |
- |305273 | | Viewtron
- |305276 | VAX/VMS |
- |305644 | | "305140H Connected"
- +-------+------------+--------------------------------------------------------+
- |31230 | | "Service ID="
- |31231 | TOPS-10 | C.I.C. Timesharing
- |31235 | IBM VTAM |
- |31236 | Port Sel. | U of Chicago computer center (Ganalf PACX 2000)
- |31241 | | C.I.C. Central Library Chicago
- |31242 $| RSTS V7.2 | Travenol SYSA
- |31243 $| RSTS V7.2 | Travenol SYSA
- |31244 $| RSTS V8.07| Travenol SYSA
- |31246 $| | "Request in violation of system security standards"
- |31249 | | American Hospital Supplies Corp.
- |31250 | | American Hospital Supplies Corp.
- |31265 | IBM TSO |
- |31270 | | People/Link
- |312120 | IBM | TIME Inc. Chicago Datacenter
- |312121 | | TIME Inc. "Command:"
- |312131 | IBM VM/370|
- |312142 | HP-3000 |
- |312150 | | "Enter Subscriber ID" OAG
- |312159 | | "Enter Subscriber ID" OAG
- |312160 | |
- |312161 | |
- |312162 | |
- |312163 | | "PORT = $X25F00 #VC01 USERID:?"
- |312170$| VAX/VMS | SKVAX2
- |312199 | |
- |312219 | | Collision estimating system (TWX)
- |312222 | | "PORT = $X25F00 #VC01 USERID:?"
- |312225 | Honeywell | "$$ 50 Device Type ID"
- |312227 | | "PORT = $X25F00 #VC01 USERID:?"
- |312230 | |
- |312231 | VM - TSO | Continental Can Company
- |312233 | | "PORT = $X25Y00 #VC01 USER ID?"
- |312235 | | "PORT = $X25Y00 #VC01 USER ID?"
- |312236 | | "Please re-enter logon proceedure"
- |312237 | IBM |
- |312239$| IBM TSO |
- |312257 | | "ID: Password"
- |312258 | 20.0.4 | Primenet SAM
- |312266 | RSX-11 |
- |312267 | HP-3000 |
- |312270 | |
- |312275 | 19.4.5 | Primenet MD.CHI
- |312276 | 19.4.2 | Primenet MD.LP1
- |312626 | | Keycom-A C00
- |312629 | | Keycom-B C00
- |312632 | IBM VM/370|
- |312633 | IBM VM/370|
- |312645 | VAX/VMS |
- +-------+------------+--------------------------------------------------------+
- |31325 | | Comshare
- |31340 | | ADP Network (Type "AID")
- |31341 | | ADP Network (Type "AID")
- |31350 | | Collision Estimating System
- |31370 | TOPS-20 | GM Timesharing
- |31374 | TOPS-20 | GM Timesharing
- |31382 | VM - TSO | FEP009 - Multi System
- |31383 | VM - TSO | FEP009 - Multi System
- |313119 | | "Port=$X25600 #VC09"
- |313120 | | "Port=$X25600 #VC09"
- |313131 | | "USER NUMBER-- Help Fone: 313-556-0216"
- |313133 | | "Enter Access Code"
- |313134 | 19.4.9 | Primenet SYSA
- |313160 | | "Port=$X25600 #VC09"
- |313161 | | "Port=$X25600 #VC09"
- |313162 | | "Port=$X25600 #VC09"
- |313163 | | "Port=$X25600 #VC09"
- |313164 | | VU/TEXT
- |313170 | | C.A.S.C. Network "Enter Signon"
- |313172 | | Ollie CPF1107 "Password required for workstation"
- |313202 | Port Sel. | %MERIT: X25 (DT88:TX00:TI700)
- |313255 | Multics | "Channel b.h12800"
- |313256 | Honeywell | "$$ 50 Device Type ID"
- |313257$| |
- |313365 | |
- |313366 | Port Sel. | Timeshare Network
- |313367 | Multics | "Channel b.h10800 Please login"
- |313370 | 20.0.3 | Primenet MD.DET
- |313371 | 20.2.1 | Primenet CS.DET
- |313372 | 19.4.9 | Primenet MD.DATA
- |313373 | 20.0.3 | Primenet PTCDET
- |313376 | 20.0.4 | Primenet MD.DAC
- +-------+------------+--------------------------------------------------------+
- |31435 $| DG AOS/VS |
- |314100 | | WU Medical Computing Dataswitch
- |314150$| |
- +-------+------------+--------------------------------------------------------+
- |31520 | | "Enter System ID" B=BRS T=VM/CMS
- |31550 $| IBM VTAM | Simware
- +-------+------------+--------------------------------------------------------+
- |31730 $| | "ID Incorrect Location ID"
- |31731 $| |
- |31735 | | purdue.arpa
- |31736 | VAX/VMS |
- |31738 $| |
- +-------+------------+--------------------------------------------------------+
- |40125 | 20.1 | Primenet LSIS
- |401612 | Unix | Modem City
- +-------+------------+--------------------------------------------------------+
- |40420 | | SITENET (Same as C SIT)
- |40427 | 20.0.3.R5 | Primenet EMA1
- |40433 $| DG AOS/VS |
- |40435 $| DG AOS/VS | R08F03D02A
- |40436 $| DG AOS/VS | S29L01A
- |40437 $| DG AOS/VS | R08F03A
- |40439 $| DG AOS/VS | S29L02A
- |40451 | Gateway | Schering Plough Corp.
- |40457 | |
- |40459 | |
- |40460 | RSTS V8.0 | Computone
- |40462 | Unix 4.3 | emoryu2
- |40463 | IBM | "Invalid sw characters"
- |40464 | | Martin Marietta Sim 3270
- |40477 | |
- |40479 | | "40455E Connected"
- |404130$| HP-3000 |
- |404153 | |
- |404161$| |
- |404162 | |
- |404166$| |
- |404174 | | "Welcome to Coin Support"
- |404193 | | ACRONET
- |404220 | 19.4.11 | Primenet MD.ATL
- |404221 | 19.4.10.R4| Primenet FNP.AT
- |404230$| |
- |404248 | |
- |404249 | |
- |404256 | |
- +-------+------------+--------------------------------------------------------+
- |40634 | DG AOS/VS |
- |40636 | DG AOS/VS |
- |40637 | DG AOS/VS |
- |40640 | DG AOS/VS |
- |40647 | DG AOS/VS |
- |406125$| |
- +-------+------------+--------------------------------------------------------+
- |40843 | | "Enter Destination sub-address (DN):"
- |40845 $| |
- |40848 $| |
- |40849 $| |
- |40850 | | ibm-sj.arpa San Jose
- |40858 | VAX/VMS | Welcome to SOMA
- |408100 | |
- |408121$| |
- |408125 | HP-3000 |
- |408133 | LAN | Sun Micro System's X.25 Gateway
- |408134$| |
- |408139$| CDC |
- |408146$| CDC |
- |408149$| |
- |408154 | 19.4.11 | Primenet IVAN
- |408157 | Unix | Pyramid Technology Dual Port osx
- |408159 | VAX/VMS |
- |408171$| |
- |408235 | DG AOS/VS | Global Weather Dynamics - MV2
- |408238$| |
- |408605 | HP-3000 | Office Automation
- |408629 | | "Welcome to the new data switch"
- +-------+------------+--------------------------------------------------------+
- |41220 | Port Sel. | MSA PGH Communications Network
- |41222 | IBM TSO | (Running ACF2)
- |41223 | IBM TSO | (Running ACF2)
- |41230 | Port Sel. | Channel 04 - connected - Enter Class
- |41247 | IBM TSO |
- | 48-52 | IBM TSO |
- |41255 | | "invalid command"
- |41268 $| DG AOS/VS | R09F21D01A
- |412172 | |
- |412173$| CDC Cyber | USX PGH Service Center
- |412262 | 20.0.4 | Primenet PITTCS
- |412264 | 19.4.9 | Primenet MD.PIT
- |412670 | Port Sel. | Carnegie-Mellon University Micom-A
- |412671 | Port Sel. | Carnegie-Mellon University Micom-B
- |412672 | Port Sel. | C.M.U. Multi-System Network A-Z
- |412703 | | The Meccon Network
- |412704 | IBM | (Running ACF2)
- |412706 | IBM | (Running ACF2)
- +-------+------------+--------------------------------------------------------+
- |41321 $| | (type TW81) DFH READY
- +-------+------------+--------------------------------------------------------+
- |41431 $| DG AOS/VS | R09F10A
- |41434 $| |
- |41435 $| |
- |41436 | DG AOS/VS | R09F10D05A
- |41438 $| |
- |41443 $| | "ID"
- |41444 | | Welcome Type Service Identifier
- |41450 | VAX/VMS | Allen-Bradley CTD1
- +-------+------------+--------------------------------------------------------+
- |41507 | HP-3000 | .admin .a
- |41520 | | Dialog
- |41527 | IBM 3033A | Stanford Data Center (SYS A)
- |41530 | |
- |41532 | IBM VM/370|
- |41533 | IBM VM/370|
- |41534 | DG AOS/VS |
- |41537 | HP-3000 | CASTOR
- |41538 | HP-3000 | POLLUX
- |41539 | RSX-11 |
- |41545 $| 19.2.17 | Primenet CESSF
- |41548 | | Dialog
- |41549 | | Dialog
- |41550 $| | "Network (BUR) terminal must sign-on"
- |41553 | VMS 3.5 |
- |41557 $| | "Network (BUR) terminal must sign-on"
- |41559 | 19.2.11 | Primenet MD.NWR
- |41560 | | Leasametric
- |41566 $| |
- |41567 $| | "Network (BUR) terminal must sign-on"
- |41574 $| DG AOS/VS |
- |41575 | 20.2.1 | Primenet MD.SCV
- |41577 | 20.2.0 | Primenet RS.WC
- |41578 | 19.2.11 | Primenet MD.SAC
- |41579 | 19.4.2.R11| Primenet MD.SFO
- |41580 $| Systar Elf| Harper Group Information Network
- |41585 | 19.1.1 | Primenet COUR
- |415111 | Burroughs | RCC Palo Alto B7800 (348)
- |415120$| IBM VTAM | USS-10 Please Sign On:
- |415124 | | "Enter Session Establishment Request:"
- |415125 | | "Enter Session Establishment Request:"
- |415130$| DG AOS/VS | R05A
- |415131$| DG AOS/VS | R05F14A
- |415133 | | hplabst.arpa San Jose
- |415138$| |
- |415140 | 19.3.4 | Primenet ROSCOA
- |415154$| |
- |415157 | VAX/VMS | VAX Node One
- |415158 | Systar Elf| ESPRIT DE CORP Info System
- |415164$| DG AOS/VS | S27A
- |415166 | IBM VM/370| "Enter System ID" (Type V for VM/370)
- |415167 | 19.4.3 | Primenet VESTEK
- |415168$| |
- |415169$| DG AOS/VS | R05F14D58A
- |415175 | HP-3000 |
- |415233 | DG AOS/VS | Berkely Solar Group
- |415234 | HP-3000 |
- |415242 | VAX/VMS |
- |415254 | IBM VM/370| "Enter System ID" (Type V for VM/370)
- |415257 | IBM TSO | (Running ACF2)
- |415258 | IBM TSO | (Running ACF2)
- |415260 | 19.3.6 | Primenet CORP1
- +-------+------------+--------------------------------------------------------+
-
-
-
- --- End of first half of directory. ---
-
-
- The LOD/H Technical Journal: File #11 of 12
-
-
- The Legion Of Hackers Present:
- Updated: Telenet Directory
- Part B: Addresses 503XXX to 919XXX
- Revision #4 Last Updated: 1/1/87
- (Including available Uninet hosts)
-
-
- +-------+------------+--------------------------------------------------------+
- |ADDRESS|OS/COMP TYPE| SYSNAME/OWNER/RESPONSE/COMMENTS/ETC. |
- +--------------------+--------------------------------------------------------+
- |50335 $| DG AOS/VS | R06F12D07A
- |50340 $| DG AOS/VS | R06F12D01A
- |50345 $| DG AOS/VS | R06F16D02A
- |50371 $| DG AOS/VS | R06F01A
- |50373 $| DG AOS/VS | R06F18D04A
- |50374 $| |
- |50375 | | "Please Sign On"
- |50376 | DG AOS/VS | R06F07A
- |50377 | DG AOS/VS | R06F18D03A
- |50378 | DG AOS/VS | R06F01D01A
- +-------+------------+--------------------------------------------------------+
- |50420 $| |
- |50431 $| | "ID Incorrect Location ID"
- |50433 $| DG AOS/VS | R008F07D14A
- |50436 $| |
- |50437 $| DG AOS/VS | R08F07D14A
- |50438 $| |
- |50444 $| |
- |50445 $| DG AOS/VS | R08F06D05A
- |50446 $| 20.0.4.R2 | Primenet BROUGE
- |50450 $| DG AOS/VS | R08F06D04A
- +-------+------------+--------------------------------------------------------+
- |50530 $| DG AOS/VS | R03A
- |50540 $| DG AOS/VS | R03F06A
- |50560 $| |
- |50570 $| |
- |50575 $| |
- +-------+------------+--------------------------------------------------------+
- |50921 | 19.1.1 | Primenet AIS
- |50926 $| DG AOS/VS | R06F17D07A
- |50927 $| |
- |50931 $| |
- |50932 $| |
- |50933 $| |
- |50934 $| |
- |50935 $| |
- +-------+------------+--------------------------------------------------------+
- |51250 $| | AHSC (American High School CXXX)
- +-------+------------+--------------------------------------------------------+
- |51330 | | Lexis/Nexis
- |51331 | Port Sel. | Meadnet
- |51337 $| 19.4.8.GE9| Primenet E03
- |51350 $| HP-3000 |
- |51351 $| HP-3000 |
- +-------+------------+--------------------------------------------------------+
- |51530 | | Lexis/Nexis
- +-------+------------+--------------------------------------------------------+
- |51630 | VAX/VMS | New York Institute of Technology Node Office::
- |51635 | | CCI Multilink Services
- |516140$| | TDK Electronics Corp.
- |516200 | VAX/VMS | "909 208 Connected" Telenet INFO System
- |516201 | VAX/VMS | "909 208 Connected" Telenet INFO System
- |516601$| TOPS-20 | Contel Business Networks, N.A.C.
- |516610 | 19.3.6 | Primenet P550
- |516620 | | S.W.I.F.T. GLOBAL
- |516622 | | VTI NYK
- |516623 | | VTI NYK
- |516624 | | VTI NYK VITEL SAV978447
- |516625 | VAX/VMS |
- +-------+------------+--------------------------------------------------------+
- |51729 | RSTS | Scientific CC
- |51730 | IBM TSO |
- |51731 | IBM TSO |
- |51740 $| |
- +-------+------------+-------------------------------------------------------+
- |51830 | | "USS MGG10 MHP201A UPK06X01 * Version 4 * Application
- |51831 | | "USS MGG10 MHP201A UPK06X01 * Version 4 * Application
- |51835 | | "USS MGG10 MHP201A UPK06X01 * Version 4 * Application
- |518601 | VAX/VMS | <SYSTEM PASSWORD INSTALLED>
- |518617 | | IAS Program Dev. Metcalf & Eddy Engineering Computing
- +-------+------------+--------------------------------------------------------+
- |60333 $| DG AOS/VS |
- |60336 $| |
- |60340 $| VAX/VMS |
- |60346 | | "User Number--"
- |60352 | Gateway | DEC Easynet X.29/DECnet Gateway
- |60353 | IBM VM/370| TELUS Proposal System - Chubb Securities
- |60354 | IBM VM/370| TELUS CMSSEG - System Name
- |60366 | | "User Number--"
- |603605 | VAX/VMS |
- +-------+------------+--------------------------------------------------------+
- |60733 | IBM VM/370|
- |60734 | IBM VM/370|
- |60744 | IBM VM/370| "Enter System ID" (Type B for VM/370)
- |60745 | IBM VM/370| "Enter System ID" (Type B for VM/370)
- |60767 | IBM VM/370| Cornell Computer Services
- +-------+------------+--------------------------------------------------------+
- |60921 | IBM VM/370| CIGMA Corporate Network (Type VM then LOGON)
- |60922 | | "!!SUYHK!!"
- |60923 $| Port Sel. | P.C.C. (1=TOPS-20)
- |60925 | | CIGMA Corporate Network
- |60938 | IBM VM/370| (Running ACF2)
- |60942 | | Dow Jones
- |60963 $| | "XXX"
- |60968 $| | "XXX"
- |60977 | IBM VM/370|
- |60978 | IBM VM/370|
- |609100 | Prime |
- |609138 | 19.4.11 | Primenet PRINCE
- |609230 | | "909 849 Connected"
- |609242 | | Dow Jones
- +-------+------------+--------------------------------------------------------+
- |61223 | | Westlaw
- |61236 | TOPS-10 | A.C. Nielson Information Center
- |61237 | | Westlaw
- |61239 | | Westlaw
- |61241 | TOPS-10 | A.C. Nielson Information Center
- |61246 $| Port Sel. |
- |61252 $| Prime |
- |61256 | | Westlaw
- |61257 | | Westlaw
- |61262 | | Westlaw
- |61276 | | Westlaw
- |612135 | VAX/VMS |
- +-------+------------+--------------------------------------------------------+
- |61421 | | STN INTL
- |61430 | | "ID Incorrect Location ID"
- |61431 | | STN INTL
- |61433 | 19.4.5.R7 | Primenet SYSC
- |61442 | DG AOS/VS |
- |61444 | Prime | "Good Evening"
- |61445 | Prime | "Good Evening"
- |61447 | Prime | "Good Evening"
- |61448 | Prime | "Good Evening"
- |61449 | HP-3000 |
- +-------+------------+--------------------------------------------------------+
- |61641 $| |
- |61642 | | Telenet Async to 3270 Service
- |61643A | | Telenet Async to 3270 Service
- |61650 | Port Sel. |
- |61660 | |
- |61661 | | "Incompatable Destination"
- +-------+------------+--------------------------------------------------------+
- |61720 | 19.4.11.A | Primenet PBN27
- |61722 | 19.4.11.A | Primenet BDSD
- |61723 $| RSX-11 |
- |61724 | Port Sel. | "ts=tso i=interact v=vm"
- |61730 $| LAN | GTE-LAN GS/1>
- |61737 | 19.4.11.A | Primenet BDSH
- |61738 $| | BBN-TC-TELNET
- |61746 $| 19.2.7F | Primenet BDSS
- |61747 $| Port Sel. | "HOST:"
- |61748 | Prime | IRI System 4
- |61749 | 19.4.11.A | Primenet OASD
- |61750 $| 19.4.11.A | Primenet BDSP
- |61751 $| VAX/VMS |
- |61761 | IBM TSO |
- |61763 | Prime | IRI System 3
- |61764 $| 19.4.11.A | Primenet ALLYN
- |61767 | Prime | IRI System 1
- |61772 | Prime | IRI System 2
- |61778 $| 20.2.0 | Primenet MD.D
- |61784 $| LAN | Marlboro HPS/C Software Engineering X28SRV
- |617114$| 20.2.0 | Primenet MD.B
- |617115 | 20.2.0 | Primenet TRNG.E
- |617119 | Port Sel. | "Enter i=irving t=test w=interact c=idmsdc"
- |617127$| RSX-11 |
- |617130 | Honeywell | "$$ 00 * Datanet8 DNS 2.6"
- |617133 | | Weather Services International (WSI)
- |617135$| VAX/VMS | Arthur D. Little Inc.
- |617137 | IBM VM/370|
- |617138 | Multics | Massachusetts Institute of Technology
- |617143 | IBM VM/370| IDC
- |617148 | 19.4.11.A | Primenet OASQ
- |617151$| IBM TSO | "Enter logon or )aplogon" (Running ACF2)
- |617152 | IBM TSO | (Running ACF2)
- |617153 | Unix 4.2 | (csnet-relay)
- |617158 | 19.4.11.A | Primenet BDSW
- |617160 | 19.4.8 | Primenet S38
- |617163$| 19.4.2.R3 | Primenet BARBIE
- |617164 | Gateway | Systar Corporation Gateway/GTE Sylvania Gateway
- |617169 | 19.4.11.A | Primenet PBN36
- |617191 | Prime | IRI System 5
- |617196 | Port Sel. | Yankee Data Communications Network
- |617200$| VAX/VMS | Joint Computer Facility Vax
- |617226 | IBM VM/SP | IRI System 6
- |617230 | IBM VM/370|
- |617239 | Prime |
- |617255 | 19.4.11.A | Primenet PBN43
- |617256 | | MGH Teaching Supervisor
- |617270 | VAX/VMS |
- |617272$| | "Incorrect Location ID"
- |617275$| LAN | BBN TC-TELNET Address 192.1.2.11
- |617315$| 19.2.7F | Primenet BDSP
- |617338$| DG AOS/VS | Shawmut Bank Of Boston MV10A
- |617343 | VAX/VMS | Sylvania Lighting Center Engineering Comp. & Math Dept.
- |617350 | 19.2.7F | Primenet PBN39
- |617351 | 19.4.11.A | Primenet BDSU
- |617352$| 19.4.11.A | Primenet OASB
- |617353 | 19.4.11.A | Primenet PBN34
- |617361$| VMS 4.3 | DECnet Node3 Information Services Cluster
- |617380 | 19.4.8 | Primenet L01
- |617381 | 19.3.7 | Primenet P01
- |617382 | 19.4.8 | Primenet Y01
- |617383 | 19.3.7 | Primenet H02
- |617384 | 19.4.8 | Primenet V01
- |617385 | 19.3.7 | Primenet R01
- |617387 | 19.3.7 | Primenet B01
- |617403 | Prime |
- |617443 | IDC/370 |
- |617446 | 19.4.10.R4| Primenet ENO
- |617510 | 20.2.0 | Primenet EN.C06
- |617512 | 19.4.11.A | Primenet EN.C19
- |617516 | 19.4.11.A | Primenet PBN38
- |617525 | Prime | IRI System 8
- |617551 | 19.4.10 | Primenet CSP-A
- |617552 | Prime |
- |617558 | 20.2.0 | Primenet CS9950
- |617559 | 19.4.5 | Primenet EN.C02
- |617560 | 19.4.11.A | Primenet BDSN
- |617562 | 19.4.11.A | Primenet BDSZ
- |617563 | Prime |
- |617564 | 20.0.4 | Primenet MD.NE
- |617566 | 20.2.0 | Primenet MF.NPL
- |617568 | 19.4.11.A | Primenet CASI
- |617572 | 19.4.10 | Primenet S59
- |617587 | 19.4.3 | Primenet TR.SCH
- |617592 | 19.4.5.E4 | Primenet CS
- |617605$| DG AOS/VS | Shawmut Bank of Boston
- |617609 | VAX/VMS | Xyplex CC8 Controller (Type Connect) Waltham Comp.
- |617611$| Unix 4.2 | (sh.cs.net)
- |617613$| TOPS-10 | NIH - Prophet Node DNA
- |617614$| |
- |617622 | Unix 4.3 | (media-lab.mit.edu)
- |617637 | IBM VM/370|
- |617638 | IBM VM/370| MIT-VM
- |617641 | DG AOS/VS | Timeplace, Inc.
- |617644$| DG AOS/VS | Shawmut Bank of Boston
- |617645 | |
- |617663 | IBM TSO | "PCI Please enter logon DFH2001"
- |617735 | | GTE Telenet Async 3270 Service Norton Corporate Network
- +-------+------------+--------------------------------------------------------+
- |61931 $| OS/32 | Terminal Monitor 08-02 Beta San Diego
- |61941 | IBM VM/370|
- |61943 $| HP-3000 |
- +-------+------------+--------------------------------------------------------+
- |70320 | DG AOS/VS | R09F21D04A
- |70321 | DG AOS/VS | R09F21D05A
- |70330 | DG AOS/VS | R08F08A
- |70333 | DG AOS/VS | R08F14A
- |70340 | VAX/VMS | Gannet News Media Services
- |70341 | VAX/VMS |
- |70343 | UNIX | DCA-EMS C70UNIX
- |70344 | DG AOS/VS | AOS Project HOPE - MV10 System
- |70346 | UNIX | DCA-EMS C70UNIX
- |70357 | Port Sel. | "Select Service" (Wylbur, PCI, CMS, TSO)
- |70368 $| DG AOS/VS | R08F08D02A
- |70370 $| DG AOS/VS | R08F08D03A
- |70371 $| DG AOS/VS | R08F08D05A
- |70372 $| DG AOS/VS | R08F14D05A
- |70374 | TOPS-20 | AAMSHARE Remote Computing Services
- |703101 | | "Please Login" ADNET
- |703102 | | "Please Login" ADNET
- +-------+------------+--------------------------------------------------------+
- |70430 | 19.4.7 | Primenet JONES
- |70460 $| DG AOS/VS |
- +-------+------------+--------------------------------------------------------+
- |71115 | Prime | GTCNET
- |71116 | |
- +-------+------------+--------------------------------------------------------+
- |71325 $| TOPS-20 |
- |71329 $| Port Sel. | M.E.I. Systems
- |71334 $| 18.3.175 | Primenet GVC
- |71347 | DG AOS/VS | Dresser Magcobar
- |71353 $| IBM TSO | Hou..D. Tenneco Inc. (ACF2)
- |71354 $| IBM TSO | Hou..D. Tenneco Inc. (ACF2)
- |71355 $| IBM VM/370| Tenneco Corporate VM Systems (ACF2)
- |71356 $| IBM VM/370| Tenneco Corporate VM Systems (ACF2)
- |71357 | IBM | (Running ACF2)
- |71359 $| DG AOS |
- |71365 | | "ERR-Invalid Action Code"
- |71369 | | "ERR-Invalid Action Code"
- |71386 $| IBM MVS/SP| Tenneco MVS/SP System (ACF2)
- |713170 | 20.2.1 | Primenet MD.HOU
- |713171 | 20.2.1 | Primenet CS.HOU
- |713172 | 19.4.5 | Primenet IR.HOU
- |713173 | 19.4.5 | Primenet MD.AUS
- |713176 | 20.2.0 | Primenet TRNG.D
- |713196 | 19.4.2.R | Primenet PREVS1
- +-------+------------+--------------------------------------------------------+
- |71430 $| HP-3000 |
- |71438 $| 19.4.2 | Primenet SYS1 PacTel Mobile Companies
- |71441 $| DG AOS/VS | R05F
- |71448 | 19.3.3 | Primenet TWCALF
- |71449 | Port Sel. | "Service ID:"
- |71455 $| HP-3000 |
- |71472 | 19.4.9 | Primenet FSCOPE
- |714123$| HP-3000 |
- |714142 | HP-3000 |
- |714143 | |
- |714606 | HP-3000 |
- |714608 | | "Select:"
- +-------+------------+--------------------------------------------------------+
- |71625 | Burroughs |
- |71641 | VAX/VMS |
- |716605 | IBM | Bausch & Lomb Data Center
- +-------+------------+--------------------------------------------------------+
- |71730 $| |
- |71731 $| |
- |71732 $| |
- |71733 $| |
- |71734 $| |
- +-------+------------+--------------------------------------------------------+
- |80125 | | Wasatch Security Services Timeshare
- |80126 | Unix 4.1 | Berkeley Wasatch System VAX/UNIX BSD 4.1
- |80144 $| DG AOS/VS |
- |80149 $| |
- |80150 $| DG AOS/VS | S22A
- |80154 $| VAX/VMS |
- |80160 $| DG AOS/VS |
- |80162 $| |
- |80165 $| DG AOS/VS |
- +-------+------------+--------------------------------------------------------+
- |80423 | Port sel. | Babcock and Wilcox Computer Center
- |80424 | Port sel. | Babcock and Wilcox Computer Center
- |80435 | VAX/VMS |
- |80460 $| | "ID Incorrect Location ID"
- |80461 $| |
- |80462 $| |
- +-------+------------+--------------------------------------------------------+
- |80530 $| DG AOS/VS | R05F07D55A
- |80550 | VAX/VMS |
- |80551 | VAX/VMS |
- |80558 $| HP-3000 |
- |80560 $| |
- |80561 $| |
- |80562 $| |
- |80563 $| |
- |80564 $| |
- |80565 $| |
- +-------+------------+--------------------------------------------------------+
- |80850 | | ">>"
- |80855 | | "ID ?"
- |80865 | | "ID ?"
- |80870 | | ">>"
- |80885 | | "ID ?"
- |80895 | | "ID ?"
- |808500 | HP-3000 |
- +-------+------------+--------------------------------------------------------+
- |81230 $| DG AOS/VS | R09F11A
- +-------+------------+--------------------------------------------------------+
- |81331 $| IBM VM/370|
- |81335 | 19.4.5 | Primenet S9750
- |81343 | Honeywell | "$$ Device Type Identifier:" (Type A1)
- |81352 $| TOPS-20 | Price Waterhouse Timesharing
- |81353 $| TOPS-20 | Price Waterhouse Timesharing
- |81355 $| | Price Waterhouse System
- |81359 $| |
- |81360 | |
- |81365 | |
- |81373 | IBM VM/370|
- |81374 | Honeywell | "$$ Device Type Identifier:" (Type A1)
- |81377 | | "MCS: Transaction "" is not recognized(205)
- |813132$| IBM VM/370|
- |813140 | | IBM Information Network (3270 Emulation only)
- |813143 | | IBM Information Network (ASCII Emulation)
- |813144 | Honeywell |
- |813160 | VAX/VMS |
- |813170 | | "Access Code:"
- |813172 | | IBM Information Network (ASCII)
- |813255$| | "Security Subsystem Please enter your security code"
- |813620 | IBM VM/370|
- +-------+------------+--------------------------------------------------------+
- |81450 | 19.4.8 | Primenet SYSA
- +-------+------------+--------------------------------------------------------+
- |81634 | |
- |81636 | |
- |81644 $| DG AOS/VS | R09F05D22A
- |81645 $| |
- |81657 $| |
- |81658 $| |
- |81659 $| |
- |81690 | TOPS-20 | AMCI - Kansas City (SAME AS C AMC)
- +-------+------------+--------------------------------------------------------+
- |90160 $| |
- |901651 | Gateway | Schering Plough Corporation Systar Corp. Gateway
- |901652 | Gateway | Schering Plough Corporation Systar Corp. Gateway
- +-------+------------+--------------------------------------------------------+
- |90445 $| DG AOS/VS |
- |90449 | VAX/VMS | Alliance Mortgage Automated Communication System
- |90450 $| DG AOS/VS |
- |90451 | IBM | "Command Uncrecognized"
- +-------+------------+--------------------------------------------------------+
- |90995 | | Telemail
- |909761 | | Telemail
- +-------+------------+--------------------------------------------------------+
- |91433 | IBM VM/370| (Running ACF2)
- |91438 $| IBM VM/370|
- |91441 $| IBM VM/370|
- |91442 $| | "ZAN0001 com-plete is active"
- |91456 | |
- |914247 | VAX/VMS | Pergamon Infoline
- +-------+------------+--------------------------------------------------------+
- |91655 | 19.4.10 | Primenet FIMSAC
- |916607 | Unix |
- +-------+------------+--------------------------------------------------------+
- |91830 $| | "ID Incorrect Location ID"
- |91831 $| DG AOS/VS | R08F09D06A
- |91870 $| DG AOS/VS |
- +-------+------------+--------------------------------------------------------+
- |91930 | IBM | "Please reenter logon line"
- |91931 | IBM | "Please reenter logon line"
- |91932 | IBM |
- |91933 $| |
- |91943 | IBM VM/370| "Enter System ID" (Type 'd')
- |91946 | IBM VM/370| "Enter System ID" (Type 'd' 'j' 'v' 'r' 'p')
- +-------+------------+--------------------------------------------------------+
-
- UNINET HOSTS AVAILABLE ON TELENET:
-
- ______________________________________________________________________________
- |C APPLE | Ultrix V1.2 | |
- |C BOEING | Unix |
- |C PRIME | 19.4.9 | Primenet SYS750
- |C AMC | TOPS-20 V5.1| AMCI - Kansas City
- |C SUMEX | TOPS-20 V6.1| Stanford University
- |C INFO | TOPS-20 |
- |C EIES | | NJIT Electronic Information Exchange System
- |C FSU | CDC Cyber | Florida State University Cyber Network
- |C ESC | SYS/32 VOS | United Computer Services Group
- |C ITS | SYS/32 VOS | United Computer Services Group
- |C SIS | | Scientific Information Services
- |C NETWORK | | AAMNET
- |C ADNET | | ADNET
- |C OLS | | OLS System 3
- |C CMS | | "Enter a for astra"
- |C COS | | "Enter a for astra"
- |C NSF | | "Access to this address not permitted"
- |C SPR | | UIS Supra
- |C VUTEXT | | VUTEXT Services
- |C MAIL | | Telemail
- |C TELEX | | Telemail
- |C NET | | Newsnet
- |C SIT | | Sitenet
- |C DOW | | Dow Jones
- |C CIS | TOPS-20 | The Information Service
- |C DELPHI | VAX/VMS | Delphi Computer services
- |C S10 - S19| Prime | Source System 10 to Source System 19 Respectively
- |C WELL | | The Well Mail Service
- |C BLUE | |
- |C K3C | |
- |C COM *| |
- |C OAG *| | Official Airlines Guide
- |C DIR *| |
- |C ABJ *| |
- |C AFS *| |
- |C CEN *| |
- |C KCI *| |
- |___________|_____________|___________________________________________________|
-
- '*' at end of UNINET host name signifies system temporarily out of service.
- '$' at end of address signifies 'will not accept collect connection' thus, you
- need a 'Telenet ID' or some other means to connect to the system.
- Any addresses responding with "Rejecting" or "Not Operating", are temporarily
- down. ALL above addresses were working as of the date of update.
-
-
- Definitions of abbreviations:
-
- DG - Data General
- P-E - Perkin-Elmer
- AOS - Advanced Operating System (DG)
- ACF2 - Access Control Facility 2, Software Security Package for IBM Mainframes.
- CICS - Customer Information Control System (IBM)
- TSO - Time Sharing Option (IBM)
- TOPS - Total OPerating System (DEC)
- RSTS/E - Resource System Time Sharing /Environment (DEC)
- Multics - O/S Made by Honeywell (no longer in production)
- CDC - Control Data Corporation (Makes CYBER Computers)
- LAN - Local Area Network
- Port Sel. - Port Selector - could be a MICOM, a PACX, or other which enables
- you to connect to various host systems.
-
- Legion Of Hackers
- Contributors:
-
- Lex Luthor / Gary Seven (LOH)
-
-
-
-
- The LOD/H Technical Journal: File #12 of 12
-
-
- Network News & Notes
-
- -------------------------------------------------------------------------------
-
- ISDN passes first real-world test (ComputerWorld, Nov. 24th, 1986)
-
- After at least five years development work and prototyping on vendors'
- premises, the first operational Integrated Services Digital Network involving
- customer premises equipment was successfully tested.
-
- In two initial tests, Arizona government officials transmitted both voice
- and data between their offices through a Northern Telecom, ISDN digital switch
- residing on Mountain Bell's Phoenix Central Office.
-
- The trial offers participating vendors the opportunity "to evaluate ISDN
- technology and determine customer benefits outside the research lab". Customer
- premises equipment used in the trial is still in the prototype phase, however.
- No time frames for introducing commercial offerings were discussed.
-
- In the first of two ISDN applications demonstrated at a news conference,
- Don Cline, Mountain Bell's Arizona VP and CEO, placed a five minute voice call
- at the Phoenix Civic Plaza to Arizona Secretary of State Rose Mofford and
- simultaneously transmitted a certificate commemorating the event. The
- transmissions were handled by Northern Telecom's Meridian digital telephone
- sets and workstations and passed through a Northern Telecom DMS-100 ISDN
- switch as Mountain Bell's Phoenix CO.
-
- In the second ISDN application an NCR PC was used to access and alter a
- driver's record residing on an Amdahl 5850 host in the Motor Vehicles Division
- from two blocks away.
-
- Sending both voice and data in digital form over the same twisted-pair
- telephone wiring is more reliable than analog communications and in the long
- run will save a lot of money. Workstations linked over an ISDN basic interface
- can be moved as easily as you can move telephones, as opposed to having to
- restring coaxial cable.
-
- -------------------------------------------------------------------------------
-
- Long-awaited McDonald's ISDN trial to start in two weeks (ComputerWorld 12-1)
-
- During the second user-site ISDN trial, scheduled to begin Dec. 16, at
- least four rival communications equipment vendors will test whether their
- terminal interfaces conform closely enough to the telecommunications standard
- to communicate.
-
- McDonalds's Corp, agreed more than two years ago to participate in the
- trial, which is sponsored by Ameritech divested BOC Illinois Bell, because
- the fast-food giant wanted the emerging technology for its own use.
-
- Slated to continue at least through early 1988, the trial ISDN network
- will link a variety of workstations and hosts at McDonalds headquarters located
- in Oak Brook, Ill., through a Northern Telecom DMS-100 ISDN switch residing at
- Illinois Bell's CO.
-
- The company will start with 50 basic-rate digital subscriber lines and
- gradually ramp up to a projected 300 to 400 lines by the end of 1987. The
- basic interface defines two 64K bit/sec B channels and a separate 16K bit/sec
- D channel to carry data packets and signaling information.
-
- All the products used in the trial are designed to communicate with AT&T's
- 5ESS switch. While the basic ISDN interface is sufficiently well defined to
- permit different vendor's implementations to communicate, different vendors'
- CO switch products still retain software incompatibilities.
-
- The way terminal adapters communicate via ISDN is still defined by the CO
- switch, terminals can be modified to communicate with either AT&T's or Northern
- Telecom's ISDN switch, but you can't just unplug a terminal and move it from
- one switch to the other.
-
- Originally slated to be the first ISDN trail to begin operations, the
- project was delayed for approximately a month while AT&T finished implementing
- software on the 5ESS ISDN switch at Illinois Bell's CO. While the hardware used
- in AT&T's ISDN switch is commercial, the software is coming slowly.
-
- -------------------------------------------------------------------------------
-
- Growth forces split in 305 area code
-
- Southern Bell announced that rapid growth will force them to split the 305
- area code in two, with Broward, Dade, and Monroe counties remaining 305 and
- Palm Beach County to Orlando becoming 407. "If we didn't make the split we'd
- literally run out of phone numbers".
-
- The split is slated to take place in April 1988, making 407 Florida's
- fourth area code and the first new one in 23 years.
-
- ------
-
- 617 currently with 533 exchanges will be splitting off into 508 in 1988.
- 303 will be split with Denver remaining 303 and 719 will cover Colorado
- Springs.
-
- This leaves the following NPA's open: 708, 903, 908, 909, 917
- not including X10 where X is 4,6,7,8, and 9.
-
- -------------------------------------------------------------------------------
-
- Secret Service Buys Telenet Network (Communications Week)
-
- US Sprint Communications Corp's Telenet Communications Corp subsidiary
- has signed a $35 million multiyear contract to build a private data network
- for the US Secret Service.
-
- The contract marks Telenet's first major private network coup in the
- highly competitive market of sensitive government communications. While
- telenet would not reveal the extensiveness of the network or its applications,
- the Secret Service acknowledges having 4,300 employees and about 100 locations
- in the United States.
-
- Data transmission plays a significant role in the Secret Service's
- mandate, which beyond guarding the president includes the investigation of
- counterfeiting, securities and electronic funds transfer violations and credit
- card fraud.
-
- Encryption or other security measures are expected to be employed in the
- new system, but telenet does not provide those functions.
-
- In addition to its public network, Telenet has sold about 70 private
- networks, about 100 hybrid networks using public and private capabilities, and
- many hundreds of virtual private networks.
-
- It will take more than a year to complete construction.
-
- -------------------------------------------------------------------------------
-
- New Social Security Net (Communications News)
-
- The US Social Security Administration will install new modems and
- diagnostic and control systems as part of a program to establish its Data
- Communications Utility Network, which covers 1500 offices in the US.
-
- The new network will handle interactive Social Security claims processing.
- Equipment for this phase is being provided by Racal-Milgo in an $11 million
- contract.
-
- -------------------------------------------------------------------------------
-
- Allnet extends southward with big capacity purchase (Communications News)
-
- Through the purchase of capacity from three providers, Allnet
- Communications Corporation has added 4,000 miles of fiber-optic route to its
- network.
-
- In a $36 million deal, the company purchased capacity, in the southeastern
- US from Microtel, SouthernNet and Southland FiberNet. All three are members of
- the National Telecommunications Network.
-
- -------------------------------------------------------------------------------
-
- Southern Cal to link 11,000 users on net (Communications News)
-
- The University of Southern California is in the process of establishing a
- $21.8 million University Communications Network that will link more than 11,000
- users throughout 185 buildings.
-
- Voice and data will be transmitted over the network, which will use an
- AT&T System 85 PBX, a system of local-area networks, and an intercampus
- microwave network.
-
- Approximately 12 miles of fiber-optic cable will be used to link 21 USC
- schools. The system will include 10 Information System Networks and 504
- Starlan networks.
-
- The telecommunications project is scheduled for completion in March of
- 1988.
-
- ------------------------------------------------------------------------------
-
- Dallas to use Cell System (Communications News)
-
- The city of Dallas has begun a $2.9 million program to outfit personnel in
- various city departments with mobile cell roaming data communications systems.
- The network will consist of 545 Mobile Data International MDI 9031 mobile data
- terminals with the 8020 integral data radio, 20 6000 series hand-held portable
- data terminals, related base equipment and automatic zone transfer between six
- calls using 11 radio frequencies with frequent re-use.
-
- Full roaming between the cell sites will be handled on a transparent basis
- to the operator.
-
- -------------------------------------------------------------------------------
-
- Singapore in Net Upgrade (Communications News)
-
- The Republic of Singapore will install two digital international gateway
- exchanges as part of a total network upgrade program.
-
- The Telecommunications Authority of Singapore and AT&T International will
- provide AT&T's 5ESS digital switch. The company said this is the first
- application of the 5ESS as an international switching point.
-
- The first switch will be handed to the authority in April of 1988 and the
- second in April of 1989.
-
- -------------------------------------------------------------------------------
-
- That's it for Network News & Notes, some of these articles may not be too
- interesting, but each has some significance as in interesting systems to
- hack, box, defeat or find more information about. If you know of any
- interesting news articles be sure to drop them in mail.
-
-