Captain Crunch: Super Phone Phreak

Total Page:16

File Type:pdf, Size:1020Kb

Captain Crunch: Super Phone Phreak Exploding The Phone db923 www.explodingthephone.com Bibliographic Cover Sheet Title Captain Crunch: Super Phone Phreak Publication High Times Date 1977-06-00 Author(s) Long, Steve V/I/P p. 51 Abstract History of John Draper and phone phreaking. Keywords John Draper; Captain Crunch Notes Lots of good background material on Draper's youth, but also many inaccuracies. Article is part of db367 and db899, i.e., we obtained it as part of an FBI file. The following pages may contain copyrighted material. We believe that our use of this material for non-commercial educational and research purposes constitutes "fair use" under Section 107 of U.S. Copyright Law. If you wish to use this material for purposes that go beyond "fair use," you must obtain permission from the copyright owner, if any. While it will make us slightly sad to do so, we will nonetheless comply with requests from copyright owners who want their material removed from our web site. , '-; ~ , ;'~-i.:.;, ~:." .~~; ~y:; ~,~ . ';.: " ' " . 1,. .",":~ -.-rit ~ ..... -- , " ,.," !o? '~ , --:";1:. ;_ ~I.j~ .. ',.:;." ;...... " " : 'Il; ". .~. ~, ' . " ", , . '. ::~~5~?~~:}~~Z~:.:;~~;~~;?}:'i~r ;~;~:~:i#:j,¥.ifl~:~:':~~:~· ": t~?l~{'~~·!~,· -\';;i~,:;,:.<t ',~ '-:':'J:. ~·~·~~~'~~~;:-~I~\).~:: :,'. '.: .,{~,~:;.~,'. ~ ;~:. :,:': ~.}~:.~; ":~.~ '~~. ,.• ' -, .,', .•..,.. , .•...•" ,... ~...•• ,.,.' :.' . '. ..,,". ~'_....•.".." "':'" ,--. ····3··' .·~.·:.~~:~}::·.~·;:~>.',L~~~~;t.·~:~>~,~,:: :~::.;;~.'~:..:.: ':i'~:~; '. '. ' ,~ ." .,,:: -. ~\;~\" '.:'" > .;;.: :.':.:' :"~ . ~~; ~~~;.~ :-:/t~·~;::~t :,;::~ ;~; ~:.:~:~; \T::::'~';:~" .~ ;J.....',' ,~,.' .... <;,~,. '< I n 1973' a couple of phone phreaks -;.) ;'. ..¢R<'~ :t:-.... ,. .,": -. : di_scovere~ the toll-free 800 number ,; ::.~. "- ~ ~ ~~ ..... ~"'-:. .... ~.. : ...) .. ':., ....." . ~-:...';'.""~~'.';' ~1',;-~"",,:~ ':;'. .' . atthe WhIte House. The number '\d~ ~ : .:: ..-:.. ~ .. " , 800 424·9337. White House staffers used H ...-..:. i. $ ., :..;::: ... _ ; ~".. ~. ". ' , .- ~. for whffiatthe Phhreaks desChribe as ·k'casup.dl. • ...:..:::-.~~' .. "";''':.,~~; ..~.:t~:;:;,.} ... ~ ...... ~_ ..,. - . ' . .J\' :.:f7J 1 '1 semi-o cia.l cit-chat:' T e phrea s uc;p 'their expertise with the phone system II') tap this line andlisten for hours to the buzz •. ~~ "~" - ".,; i:~'~" ,,; ':.... .. .. ,,':;.,'.; ...,' of conversations going in and Qut of the ;:~:'<:'~~f,·1:~·.~,,{.~;\:~~~~:~~~~;::..; :~::~:~~~~:.: ,',:., '~l·t·.'.~~~~. :,.~ .., /··.:£::~rL~~~s:~~~~~!~Sc:~:~:}rr~: .,.• "", <:,' •.•.. :. • .•••'.... • .' ': .' ,SecretS~rviceagentswouldsay.'Tmsorry. ,,:.:; ':~'1~ :!'~" .' .• "r,'. ~:.;'':.,~;:;-,!;:~v '" .'.•- -" ,. : .' •• .' ~'.' '.: ·d ~, you must have dialed an incorrect num- , .....'. ','" :~:~', •. ; •.' ~ .7'· ,:;~' '~:. ;:>~ ~'.' ber:' The phreaks discovered that the code '. ' .' •' " : ... , •. ' :.::.... :" .' ••• , ,0, word "Olympus" stood for President Nix- .'. -, . qn,who was then embroiled in the Water- . '·"~"'''l.,.,,,,-<:gatescandal. ~." '~'" '" '•.~",..s.,. ~ ~:"7 "".-",~. ~ .' .~ ~ .".~_ .,j (": • • ... ... ..... ....... .. '.'" ..." .. ...1t I ,: . ,J:r;!;"'i":·:.s<·;:::~r.:~· ':'! One day in the spring of 1974. at about :'., r • ::~·:~~\~}~i·~r"::;~i·,t~'P"three'in the morning the phone phreaks .. "\ ' .~ ... ~.... ~:J"-..."~~":""-"-L ...."""'''~"''',,,~ ... " ..' ~ .. •• ,..·-,:{:})::-,,~·<~'~\',·J:'i.'9'~<.~I?le.q. the WhIte 1;Iouse numbe~. usmg an ~., . , . .::, ";7:.:~·:~::;:;:·~.,f;;"~::'~.'f..untraceable line. A Secret Service man .. '" . .• , .,'... ',.'. '",.... d "9337" . o. · ' ...?,.:..;~;/;~~ ".;....~ ...~ ~ ~.. ~~;V';:~answere : .. .. ..~ ~ "., , .::.~ '.>:~ .;\.'.i;··:::,::'·:;\~:::";.l:'-:' '~Olympus, please. It's urgentl".one'.. "~" ':l '.. -. ':' . '. : '. ~ ·phreaksaid. ," .- . • ~~~~ • t. • ~ ?':~';. "One moment:' came the reply. "'''~:', o ....':/ " ;.:·Three minutes later they heard a fa- ~'\!. o ' "tigued voice say. "Yes.?"U didn't sound like ~. Nixon, buttheydecided to go ahead. ". .~,', 0.' "Si~' the phreak exclaimed. "we have a '. X.: '" . crisisonour'hands!" . ,", ~~;:. ,;: ',;j~ .; .,. ~. "r:es, :what's tI:e na.t~~~. of thr:_~:i~is:;~s < 11 '., '~~'1'" i1' I ul<1rl'l 'know 1l.1I'~auy;· it wail M.x6il! 1tie ~-',"" If/ .·j·t" phone phreakgulped. "'''7'e <" .', ,r:~l "Sir:' hesaid, "weare outoftoilet paper!" , ;;.1dt.v,YJ',frf.::"'<:'·r: • ; There was a long pause: then Nixon ''A',' " ~. cursed and began yelling, "Who the hell - ~.~.,' ":~"" are you? What's the meaning olthis?" ,~ "~ ',>~l)~ .. ,,' :','?:' 'Another voice came on the line. "Who are you? Howdid you get this number?" The phreak mumbled, "Sucker!" Then there was another pause. lastinl5 maybe a minute. followed by a muffled. ,', . '., voice in the background: "Getting a trace?" ~:·.A ',;' 0 few seconds later there was a ker-chunk .. ,_ .:.' t~ ·. .' •• 0 -, sound and the line was dead. 'Later that year two southern California phreaks tied up every long-distance trunk , , . ' ;~ ~ ........" .... " ........ .. .. ........ ,"~ , .. ," line coming into Santa Barbara, telling all .. -'''' .. callers that a mysterious explosion had • " ~. >.'." .wipedoutthe city. They'd managed to gain , .;control of all incoming long-distance calls .> by using-tw.o side-by-side phone booths on the beach and some very simple phone- . phreaking equipment. , The first call 'was from a mother to her son. a student at the University of Califor· I nia. Santa Barbara campus. The two -{ " .... ~ .. '.' .. , . '" ~ ",;-, phreaks told the \voman that they \vere : .' ..":. ,.' ~ •• " .' • ' "', ", • .•"·.·... .,,....,·"YLth the ~ational Guard Emergency <;:om- .. ·.... 11 ''::;~'':':~~~~:'.;<'~ .~(~~;~o:>:" :~':~~~:}""~' >}:;~<~~:.,: ":':~:' :: ,~:, :,,:<;i.;.:::':.;·· ·;";?~~~~1dtiQns:~~n!era~d:tp'aft~~~~aS::n.%-~ ~ " 'lon3erany TIi>;·'.'Prsit'! Iyf l.1Wtlrnh ~. -::: ' ... , -. ; ,:.: ~;. ta Barbara. In breathless tones theysmd the ca~~)Us an~.in fact. the entire city of 6am~ ", .' , . 51 ; '~'" :.: ; ..':" .. " :. ... '" ., Barbara had been wiped ou't in a freakish from phone-relayed computer terminals, though that line is being held open by the 4 'nuclear accident-a "nuclear m!wn:, including the FBI's National Crime I_ caller. Using the 2.600-cycle. signal you th~y told her. She was politely d tq. mation data bank and e~n how to p could call long distance anywhere and not trate AUTOVON (Automatic Voice Net­ be charged. Denny told John Draper. who " .; hang up in order to clear the' me for emergency phone calls. work), the top-secret red-alert military was skeptical. But a(tera quick trip to a pa~' A few minutes later the horrified moth- , phone network. But that's not really what phone Draper was converted, and Captai;} er called back, this time with operator' phone phreaking is all about. Witness. foJ:' Crunch wasborn. assistance. The phreaks calmly repeated example, the life of John Draper, better Denny and the Captain began using their story to the operator, asked her not known as Captain CruI\ch. their whistles to call friends throughou: to place calls to Santa Barbara and told her the country. As the only sighted phone not to worry. Within minutes the phreaks tra. aptain Crunch, an ex-Air Force phreak. it was Crunch's task to ma~f= had newspaper and television reporters, ,,~ radar technician, Vias, for years. the "whistle trips" with Denny and his bIb:: FBI agents and police officers calling from ~ most famous of the phone phreaks friends. Every Saturday the Captain would all over the country. Hundreds of anxious and their de facto spokesman. He was even drop off Denny and two other I6-year-old people who had heard about the "melt profiled by Ron Rosenbaum in Esquire. He blind kids at a pay booth. then go to a down" phoned to check on relatives and may also have a better working knowledge friend's house. A few hours later the kids friends. The phreaks told the callers that of the world's phone systems than anyone would phorie' him and say. "You can come .they had reached a National Guard base 50 else alive. back now. We're cold and tired;' and the miles from the disaster site and that they In 1976 the Capta~n was entrapped by a Captain would pick them up. were tied into emergency circuits. After phone phreak turned FBI informer and Captain Crunch and his friends learnec' about an hour the two became frightened was incarcerated. appropriately, in t~e to do a lot with the \\1'histles. They would by the chaos they were causing and re­ call pay phones in London's Waterloo stor!'ld the phone system to normal. They Station just to talk to strangers about the were nevercaught. They called themselves weather. Or call South Africa to hear the time. And they could "mute" incoming eady stuff. And it's tempting to think "phone,phreaks" a.nd they long-distance calls so that no one would be of these phone phreaks as purveyors hadfigured out how to charged. But by 1972, when he was ar­ of electronic guerrilla warfare. It's rested for whistling calls to Australia. the tempting to think of them as McLuhanist place calls to any placein Captain had graduated to more sophisU­ anarchists infiltrating the all-seeing, all­ the' world for free. catedtoys. knOWing government-by-data-bank that Next to a Captain Crunch whistle. the rules our lives. Some phone phreaks even Whatother country has· simplest phone phreak device is a Black think of themselves that way. It's a tempt­ 16-year-oldblind kids that Box, which provides an "on hook" signal to ing point of view. but it's probably all the phone company while a call is being wrong. Phone phreaks are something
Recommended publications
  • Steve Wozniak
    Steve Wozniak. http://www.woz.org http://en.wikipedia.org/wiki/Steve_Wozniak http://en.wikipedia.org/wiki/Blue_box http://en.wikipedia.org/wiki/Apple_computer Steve Wozniak’s patent: Microcomputer for use with video display. Apple 1 manual. Apple 1 manual (PDF). http://apple2history.org/ http://www.digibarn.com/ http://www.macmothership.com/ http://www.multimedialab.be http://www.mast-r.org Wozniak’s early inspirations came from his father Jerry who was a Loc- kheed engineer, and from a fictional wonder-boy: Tom Swift. His father infected him with fascination for electronics and would often check over young Woz’s creations. Tom Swift, on the other hand, was for Woz an epitome of creative freedom, scientific knowledge, and the ability to find solutions to problems. Tom Swift would also attractively illustrate the big awards that await the inventor. To this day, Wozniak returns to Tom Swift books and reads them to his own kids as a form of inspiration. John Draper explained to Wozniak the Blue Box, a device with which one could (mis)use the telephone system by emulating pulses (i.e. phone phreaking). Although Draper instructed Woz not to produce and especially not sell the gadgets on account of the possibility of being discovered, Wo- zniak built and sold Blue Boxes for $150 a piece. Wozniak met Steve Jobs while working a summer job at HP, and they began selling blue boxes to- gether. Many of the purchasers of their blue boxes were in fact discovered and sure enough John Draper was linked to their use. 1975. By 1975, Woz dropped out of the University of California, Berkeley (he would later finish his degree in 1987) and came up with a computer that eventually became successful nationwide.
    [Show full text]
  • Fun with Dick and Jane and Interview with a Phone Phreak
    Fun with Dick and Jane by Lewis Gum and Edward Oxford Betty Furness [consumerist]: Who uses these gizmos? Joe Doherty [director-corporate security, AT&T]: The cross-section of American society. They range in age from 25 to 55, professional people, doctors, lawyers, businessmen. Betty Furness: Well, you're making it sound like they' re not necessarily poor people. Joe Doherty: Not necessarily at all. They are just out to steal telephone service. - From NBC's Today Show, July 13, 1978 Cheating on phone service is nothing new. The idea probably was triggered soon after Alexander Graham Bell yelled out to Watson across the first telephone hookup. In fact, con artists actually did follow Professor Bell's footsteps very closely: Claims to prior invention rolled in just as soon as a bright future was forecast for the new gadget. After the good professor's work was successfully defended, other attempts at ripoff popped up at regular intervals. Currently, the best-known means of telephone fraud involves the use of toll service. While motives behind beating the phone company differ- from getting something for nothing to the challenge of outfoxing the system- the methods run the gamut from the crude to futuristically sophisticated. The rationale promulgated by practitioners varies. But Dick, the businessman passing an invalid credit card number; Jane, the housewife charging a call to an unauthorized third party; and Bud, the electronic wizard using widgets to hitch free rides on the telephone network, do have something in common: Each is committing fraud. Some people with otherwise impeccable credentials somehow feel that the telephone company is so big that if you can get away with cheating Ma Bell, then it's all right.
    [Show full text]
  • Phone Phreaking
    Phone Phreaking Sam Wolfson CSE 120, Winter 2020 Administrivia • Tic-Tac-Toe due tonight! • Checkoff during office hours, or submit on Canvas • LCM Report due Monday • Final Project Design Document due Monday • Talk to course staff if you’d like help brainstorming • Work with a partner!!!! • Next week in section: Innovation Exploration • Presentations will take place both Tues and Thurs • The rest of section will be project work time � Who are the phone phreaks? • People who study, explore, and experiment with telecommunications equipment. • Listen to patterns and tones on telephone lines and attempt to decipher them • Read obscure technical journals about the inner workings of the telephone system • Impersonate operators or other telco employees • Build devices to make the telephone network act in ways not intended by the designers • For the most part, primarily interested in knowledge, but sometimes ended up in legal trouble… How Do Phones Work? (Part 1) • Picking up the phone closes the hook switch, connects the phone to the other person • Vibrations from speaking into the microphone change the resistance and the current flowing in the wires • When the other person speaks, their microphone vibrates your speaker How Do Phones Work? (Part 2) • Phones include a few other parts to make them easier to use • Duplex coil prevents you from hearing your own voice over the speaker • Ringer and keypad – how do they work?? The Phone Network • In reality, you are not directly connected to your conversation partner. � � � 1 OK! 5 2 6 Telephone Office 3 7 4 8 Please connect me to 5! The Phone Network • In reality, you are not directly connected to your conversation partner.
    [Show full text]
  • Signaling Vulnerabilities in Wiretapping Systems
    University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science November 2005 Signaling Vulnerabilities in Wiretapping Systems Micah Sherr University of Pennsylvania Eric Cronin University of Pennsylvania Sandy Clark University of Pennsylvania Matthew A. Blaze University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/cis_papers Recommended Citation Micah Sherr, Eric Cronin, Sandy Clark, and Matthew A. Blaze, "Signaling Vulnerabilities in Wiretapping Systems", . November 2005. Copyright 2005 IEEE. Reprinted from IEEE Security & Privacy, Volume 3, Issue 6, November-December 2005, pages 13-25. This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_papers/224 For more information, please contact [email protected]. Signaling Vulnerabilities in Wiretapping Systems Abstract Many law enforcement wiretap systems are vulnerable to simple, unilateral countermeasures that exploit the unprotected in-band signals passed between the telephone network and the collection system. This article describes the problem as well as some remedies and workarounds. Comments Copyright 2005 IEEE. Reprinted from IEEE Security & Privacy, Volume 3, Issue 6, November-December 2005, pages 13-25.
    [Show full text]
  • Mind Hacking
    Mind Hacking Table of Contents Introduction 0 My Story 0.1 What is Mind Hacking? 0.2 Hello World 0.3 Analyzing 1 You Are Not Your Mind 1.1 Your Mind Has a Mind of Its Own 1.2 Developing Jedi-Like Concentration 1.3 Debugging Your Mental Loops 1.4 Imagining 2 It's All in Your Mind 2.1 Your Best Possible Future 2.2 Creating Positive Thought Loops 2.3 Reprogramming 3 Write 3.1 Repeat 3.2 Simulate 3.3 Collaborate 3.4 Act 3.5 Mind Hacking Resources 4 Quick Reference 5 Endnotes 6 2 Mind Hacking Mind Hacking JOIN THE MIND HACKING MOVEMENT. Mind Hacking teaches you how to reprogram your thinking -- like reprogramming a computer -- to give you increased mental efficiency and happiness. The entire book is available here for free: Click here to start reading Mind Hacking. If you enjoy Mind Hacking, we hope you'll buy a hardcover for yourself or a friend. The book is available from Simon & Schuster's Gallery Books, and includes worksheets for the entire 21-Day plan: Click here to order Mind Hacking on Amazon.com. The best way to become a mind hacker is to download the free app, which will guide you through the 21-day plan: Click here to download the free Mind Hacking app. Sign up below, and we'll send you a series of guided audio exercises (read by the author!) that will make you a master mind hacker: Click here to get the free audio exercises. Hack hard and prosper! This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
    [Show full text]
  • UC San Diego UC San Diego Electronic Theses and Dissertations
    UC San Diego UC San Diego Electronic Theses and Dissertations Title Technologies of Social Change : Mapping the Infrastructure of the Occupy Movement from #OccupyWallStreet to #OccupySandy Permalink https://escholarship.org/uc/item/6vh0q283 Author Donovan, Joan Publication Date 2015 Peer reviewed|Thesis/dissertation eScholarship.org Powered by the California Digital Library University of California UNIVERSITY OF CALIFORNIA, SAN DIEGO Technologies of Social Change: Mapping the Infrastructure of the Occupy Movement from #OccupyWallStreet to #OccupySandy A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Sociology (Science Studies) by Joan Donovan Committee in charge: University of California, San Diego Professor Martha Lampland, Chair Professor Geoffrey Bowker Professor Manuel Castells Professor Kelly Gates Professor Isaac Martin Professor Charles Thorpe 2015 Copyright Joan Donovan, 2015 All Rights Reserved The Dissertation of Joan Donovan is approved, and it is acceptable in quality and form for publication on microfilm and electronically: Chair University of California, San Diego 2015 iii DEDICATION For my wife, Nathalie iv TABLE OF CONTENTS Signature Page ............................................................................................................... iii Dedication ...................................................................................................................... iv Table of Contents ..........................................................................................................
    [Show full text]
  • History of Hacking Part 1: Phone Phreaking Bruce Nikkel
    History of Hacking Part 1: Phone Phreaking Bruce Nikkel Published in HISTEC Journal, a publication by the Swiss computer museum Enter (https://enter.ch). This is part one of a four part series on the history of computer hacking. The words "hacker" and "hacking" in the context of technology was first used in the Tech Model Railway club at the Massachusetts Institute of Technology (MIT) in the 1950s. A “hack” by students referred to a clever technical or engineering achievement (sometimes in the form of pranks) for the purpose of fun and learning. Early hackers and hacking were not associated with criminal activity. To begin this series we start with hacking activity on the earliest public global network, the original telephone system. In this article we explore early hackers known as "phone phreaks" or “phreakers” and the technical methods they used. Before home computers or the Internet became popular, a hacking technique called "phone phreaking" was used to exploit weaknesses in the global telephone system. The word "phreak" is an English misspelling of "freak" using the "ph" from the word phone (the switching of "f" with "ph" for hacking is also used today with the word phishing). Phone phreaks learned how telephone networks functioned and manipulated central switching infrastructure by generating tones and pulses. Unlike the hacks from MIT students, phone phreaking was considered criminal activity in many countries where wire fraud laws prevented unauthorized misuse of network systems and bypassing telephone billing to make free calls. When phone companies started to transition from human switchboard operators to automated dialing and switching systems they needed a way to pass signals from the customer's phone to the telephone switching infrastructure.
    [Show full text]
  • The Hacker Voice Telecomms Digest #1.01
    p3 … Connections p5 … A Rough Guide To Number Stations p12 … BT 17070 Line Test – Option Map p13 … Communications Your Letters Answered, Perhaps! p14 … Phreaking Around With * - Part 1 p21 … JoyBubbles R.I.P p22 … Phreaking Bloody Adverts! Pssst! Over Here… You want one of these?! p23 … Culture: Caffeinated Beverages - Tea p25 … Who Are They Watching? The Hackers Voice Telecomms Digest Team p27 … Google Chips Editors: Blue_Chimp, Demonix. Staff Writers: Blue_Chimp, Naxxtor, Belial, 10nix, p27 … Unexpected Hack? Demonix & Hyper Contributors: UltraViolet, eDgE, and Sam. P28 … Phreaking Around With * - Part 2 DTP: Demonix. Cover Graphics: Demonix. P31 … Social Engineering Printing: THV. A limited number of printed versions of this digest is made available p33 … Hiding Your Tracks With TOR on release please contact the HVR team for further details. Thanks : To everyone who has input into this p35 … The Random Data Dump issue, especially the people who have submitted an article and gave feedback P36 … Back Page on the beta releases. Back Page: Demonix. What is The Hackers Voice? The Hackers Voice is a community designed to bring back hacking and phreaking to the UK . Hacking is the exploration of Computer Science, Electronics, or anything that has been modified to perform a function that it wasn't originally designed to perform. Hacking IS NOT EVIL, despite what the mainstream media says. We do not break into people / corporations' computer systems and networks with the intent to steal information, software or intellectual property. The Hackers Voice projects include a Radio Show, Forums, an IRC server and much more. Please visit our site and join in with the community: http://www.hackervoice.co.uk/ Article Submissions.
    [Show full text]
  • The Little Blue Box
    Exploding The Phone db92 www.explodingthephone.com Bibliographic Cover Sheet Title Secrets of the Little Blue Box Publication Esquire Magazine Date 1971-10-00 Author(s) Rosenbaum, Ron V/I/P p. 116 Abstract Lengthy and famous article explains how the phone lines work in technical detail, with technical details of different methods of phreaking. Author interviewed serveral phreaks including Captain Crunch, Joe Engressia, Mark Bernay and a phreak who is given the alias Al Gilbertson for this article. Their histories and current lives are discussed at length. Keywords gambling; blue box; tandem; Las Vegas; Phillipines; Fraser Lucey; Pacific Telephone and Telegraph Company (PTT); black box; 2600; phone phreaks; Joe Engressia; multi-frequency tones; Bell Telephone Laboratories; long-line trunks; toll switching offices; Captain Crunch; Dr. No; Frank Carson; Marty Freeman; Peter Perpendicular Pimple; Alefnull (phone phreak); The Cheshire Cat; toll-free loop-around; 4A switching machine; stacking tandems; phone tapping; verification; Memphis; University of South Florida; Los Angeles; General Telephone and Electronics; Seattle; Cambridge, MA; New York; MF Boogie; Number 5 crossbar switching system; phone tripping; band-six in-WATS numbers; AT&T; 2111 conference; Vancouver, Canada; Mark Bernay; Automatic Electric; Northwest Pacific Bell; computer hackers; FBI; Alexander Graham Bell (phone phreak); breadbox; Millington, TN Source ProQuest The following pages may contain copyrighted material. We believe that our use of this material for non-commercial educational and research purposes constitutes "fair use" under Section 107 of U.S. Copyright Law. If you wish to use this material for purposes that go beyond "fair use," you must obtain permission from the copyright owner, if any.
    [Show full text]
  • 2600 Magazine Autumn, 1992 OCR'd By: (Tsk, Tsk. You Didn't Really Think I
    2600 Magazine Autumn, 1992 OCR'd by: (Tsk, tsk. You didn't really think I) (was gonna tell you that, did you? &) (the next thing I know my phone, elec) (gas & cable are shut off, my Visa is) (maxed out, and the FBI says I killed) (JFK & MLK. I think NOT!!!!!!!!!!!!!) (Anyway, you should buy, or better yet, subscribe to this GREAT) (magazine, these guys need & deserve our support. I have taken) (great care to make sure that ALL addresses, etc. are accurate.) (Still, considering just what it is they do, this is just a bit) (ironic, isn't it??????????????????????????????????????????????) STAFF EditorInChief Emmanuel Goldstein Office Manager Tampruf Artwork Holly Kaufman Spruch "The back door program included a feature that was designed to modify a computer in which the program was inserted so that the computer would be destroyed if someone accessed it using a certain password." United States Department of Justice, July 1992 Writers: Billsf, Eric Corley, Count Zero, The Devils Advocate, John Drake, Paul Estev, Mr. French, Bob Hardy, The Infidel, Knight Lightning, Kevin Mitnick, The Plague, Marshall Plann, David Ruderman, Bernie S., Silent Switchman, Scott Skinner, Mr. Upsetter, Dr. Williams, and the transparent adventurers. Technical Expertise: Rop Gonggnjp, Phiber Optik, Geo. C. Tilyou. Shout Outs: 8088, NSA, Mac, Franklin, Jutta, Eva, the Bellcore Support Group. 2600 (ISSN 07493851) is published quarterly by 2600 Enterprises Inc., 7 Strong's Lane, Setauket, NY 11733. Second class postage permit paid at Setauket, New York. POSTMASTER: Send address changes to 2600, P.O. Box 752, Middle Island, NY 119530752. Copyright (c) 1992 2600 Enterprises, Inc.
    [Show full text]
  • Phone Phreak - out in Phun City
    Exploding The Phone db175 www.explodingthephone.com Bibliographic Cover Sheet Title phone phreak - out in phun city Publication Ramparts Date 1972-10-00 Author(s) Sherman, Robert V/I/P Vol. 11, No. 4, p. 12 Abstract The First International Phone Phreak Convention is held in New York. Article describes the proceedings and attendees. The book "Basic Telephone Switching Systems" by David Talley was recommended at the convention. The Phreak Philm, showing three ways to make free phone calls, was shown. Keywords phone phreaks; New York; Diplomat Hotel (New York, NY); blue box; black box; toll free loops; Agnew; red box (the Milhous); Answeroo; First International Phone Phreak Convention (FIPPC); Youth International Party Line (YIPL); Yippies; Al Bell (phone phreak); Basic Telephone Switching Systems (book by David Talley); David Talley (author); Signetics (company with info on tone oscillators); Abbie Hoffman; John Draper; Captain Crunch; Phreak Philm Source An anonymous phone phreak The following pages may contain copyrighted material. We believe that our use of this material for non-commercial educational and research purposes constitutes "fair use" under Section 107 of U.S. Copyright Law. If you wish to use this material for purposes that go beyond "fair use," you must obtain permission from the copyright owner, if any. While it will make us slightly sad to do so, we will nonetheless comply with requests from copyright owners who want their material removed from our web site. = " ,~n, cG T~m Bo~" is the name- w~:apper. He rubs]~"a~ainst the side of ceive free long-distance c~lls. Th’~ call- .
    [Show full text]
  • Basic Telephone Systems Conclusion
    Exploding The Phone db318 www.explodingthephone.com Bibliographic Cover Sheet Title Inside Ma Bell Publication 73 Magazine Date 1975-06-00 Author(s) Whipple Jr., Spenser V/I/P p. 67 Abstract Overview article on the operation of the telephone network from a ham radio perspective. Includes schematic circuit diagrams for red and blue boxes. Keywords 73 Magazine; blue box; red box Source Alan Rubinstein The following pages may contain copyrighted material. We believe that our use of this material for non-commercial educational and research purposes constitutes "fair use" under Section 107 of U.S. Copyright Law. If you wish to use this material for purposes that go beyond "fair use," you must obtain permission from the copyright owner, if any. While it will make us slightly sad to do so, we will nonetheless comply with requests from copyright owners who want their material removed from our web site. Spenser Whipple, Jr. c/o 73 Magazine Basic Telephone Systems Peterborough NH 03458 Conclusion Inside Ma Bell he automatic couplers we have in many combinations. T described so far would be ideal for a On the right-hand side we see that a repeater autopatch or possibly an answering +21 volt supply is connected to the CT machine or automatic dialer (although we'll output through one transformer winding, mention others specifically designed for while ground is connected to the CR lead answering machines and dialers later), but to through a resistor and another transformer connect just a few extension phones we need winding. This provides the talking power to a bit more.
    [Show full text]