Copy Link
Add to Bookmark
Report
Hackers Issue 08
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, October, 1996: Mischief Night!
Edited by: Revolution
-------------------
Hackers Forums
-------------------
From the Editor . . . . . . . . . . . . . . . . . . . . . . . . Revolution
Letters . . . . . . . . . . . . . . . . . . . . . . . . Hackers World Wide
Checks and Balances . . . . . . . . . . . .Voters Telecommunications Watch
-------------------
Technology
-------------------
DTMF Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . .Jojo
Hacking Answering Machines . . . . . . . . . . . . . . . . . . . . . .Jojo
MCI - 1-800-Collect Fraud . . . . . . . . . . . . . . . . . . . .PBXPhreak
Phone Bugging and Modifications . . . . . . . . . . . . . James M Atkinson
--------------------
Politics
--------------------
Is the NSA Watching? . . . . . . . . . . . . . . . .NorthStar Mailing List
The End . . . . . . . . . . . . . . . . . . . . . . . . . . . . Revolution
----------------------------------------------------------------- ------------
copyright 1996 by Mike Scanlon All articles remain the property of their
authors, and may be reprinted with their permission. This zine may be
reprinted freely as a whole electronically, for hard copy rights mail the
editor. HACKERS is published monthly by Mike Scanlon, to be added to the
subscription list or to submit articles mail mrs3691@megahertz.njit.edu
----------------------------------------------------------------- -------------
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #1 of 9
From the Editor
Finally? Another issue? Hell yeah. We finally have a respectable
web site up at http://people.delphi.com/scanlonr. If you have a page of your
own, or know someone who does, try and get them to link me to advertise the
page. I'm toying with the idea of starting a newsgroup, just for the fun of
it, but more on that in the coming months.
The coming months? Yes, I plan on getting into the mag a lot more,
for real this time. I finally have a steady job and am getting used to the
school work. And while ideas are being toyed with, how about a minicon in
Manhattan? That's kind of off in the distance now, but if anyone knows of any
perspective sites, send me mail.
A political column has been started courtesy of VTW, checks and
balances. I've found an author for a bug of the month column, but could not
get in touch with him before I felt this issue should be out. Also, Hackers
Profiles will be a monthly column, but I did not have time to get an interview
done after I decided to get this issue out.
I'm not going to write much more now, but I've been hustling behind
the scenes these last couple of weeks with a couple of projects...so don't
change that dial. Look for a lot more from this direction...
-Revolution
* * * * * * * * * * * * * * * * * * * *
As always, the standard disclaimer applies. All of these articles are
provided for informational purposes only, Mike Scanlon and the respective
authors cannot be held accountable for any illegal acts they are used to
commit.
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #2 of 9
Letters
>From matt@matt.net.house.auSun Apr 21 18:41:18 1996
Date: Wed, 17 Apr 1996 19:09:28 +1000 (EST)
From: Matty <matt@matt.net.house.au>
To: Mrs3691@hertz.njit.edu
Subject: Handy Hack
G'day.. just started reading HACKERS #8 (finally got around to getting
it!) and thought I may as well make a fool of myself and contribute this
hack by a friend and I. It's not very exciting, and has nothing to do
with breaking into secret government computers or anything - but we were
proud of ourselves.
This was two years ago - when the lab that held the Sun workstations was
restricted to a few students 9and not open like it has been since they
stuck the colour linux boxes into another lab - anyway)
There was an aging line printer... 132 columns or so... extremely noisy
and usually having reams and reams of paper in a complete mess on the
out-tray bin and all over the floor. (it's been replaced by a laser now..
but I continue)
The problem was, there were some morons in the lab who were either
blind, stupid, or had difficulty reading the large sign above the printer
that we had made saying "THIS PRINTER DOES NOT PRINT POSTSCRIPT" - which
it didn't. Every time a postscript file came through, the printer would
happily churn out literally hundreds of pages of gibberish - wasting both
paper and ink - and being a general nuisance to those of us who had
important things to print out. One night my friend and I had important
things to print, but some lusers had postscript jobs queued ahead of us.
Anyway, it was typical programmers time (like about midnight or 1am) so
the Big Chief wasn't around to log in as root and nuke the jobs.
So anyway, after the usual "you dipshit" letters to the offenders, we
started thinking how we could get our jobs to go through.
Well, as usual, the printer was out of paper anyway. So I went on the
hike to the Computer Services Centre (from our faculty) with my large
backpack, and returned with around 3 inches of fanfold paper. The
advantage of the printer room (which is now gone - but basically it was a
partitioned-off section of a general computer lab) was that the security
camera was blocked by the partition - hence I could rip off as much paper
& stuff as I liked. The fake job I printed out was discarded in the usual
manner (banner & login name ripped into various segments and disposed in
random bins along the way out along with a few cusses about the printer
screwing up again) and I hiked back to the faculty with the paper.
First off, we took the ribbon out (no sense wasting the ink - it was
almost dry anyway) and then tried taking the paper out but of course the
printer had built-in detectors and wouldn't print. So we tried the
looping paper trick, but it started strangling the tractor.
Next we tried getting a long strand of holey bits and looping that around
- it failed due to a second paper-detector.
So two loops were made - and after the long wait for the glue to dry we
put them in - and it worked for a bit - then the loops jumped out. So we
cut them up tight enough to not jump but loose enough not to rip (it was
really crappy paper that would rip if you looked at it hard enough) -
waited again for the glue to dry - and set it off again. Worked
perfectly - we jammed a bit of paper over the tractor so it wouldn't get
damaged by the hammers, and hour or so later the crap stuff was out of the
queue and we could print our stuff.
While we waited my friend wrote up a short spiel about how to clear the
print buffer on the printer and how to defeat postscript jobs - this was
pinned on the noticeboard above the printer where it stayed until we took
it down when the line printer was replaced by a laser.
The tech. staff thought it was cool - we had a few compliments from others
who used the lab and experienced the same problems we did - and yeah we
were pretty proud.
Well that's it. Not a great hack, but still, a hack.
ObLittleHack:
Dialling 199 on a Telecom Commander PABX actually rings _every_ extension
on the system. Kinda fun in a big shop where you spin some crap to a
clueless salesperson who wanders off to find out and you reach over & grab
the phone, dial, hang up, look innocent, and wait for the joyful tones of
an entire PABX ringing - then the look on the faces of everyone who rushes
to pick up the phone, gives the standard welcome speech "Hello, Fred
Bloggs Nose Picking service, Jane Doe speaking; how can I help you?" and
gets the annoying *beeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeep* in the ear.
(Australia only - I assume the numbers & stuff differ overseas)
matt@matt.net.house.au (not on DNS)
tp943845@ise.canberra.edu.au (on DNS)
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GIT/GMU/GO d- s++:- a-- C+++ UL++++(S+) P--- L++++>$ E- W+++(--) N+(++) !o
K- w--- O M-- V--(!V) PS+ PE++ Y+ PGP t+ 5++ X+ !R tv--- b+ DI(+) D++ G--
e>++ d++ r--->+++ !y+
------END GEEK CODE BLOCK------
-------------------------------------------------------------------------------
>From matt@matt.net.house.auSun Apr 21 18:41:27 1996
Date: Wed, 17 Apr 1996 19:58:35 +1000 (EST)
From: Matty <matt@matt.net.house.au>
To: Mrs3691@hertz.njit.edu
Subject: Another Hack
Oh yeah... forgot to add this one:
Lacking sufficient ethernet cabling and cards at the time, we were unable
to set up net.house properly - however with a few null-modem cables and
SLiRP (http://blitzen.canberra.edu.au/slirp/) we finally got the place
nettable. The link looked like this
INTERNET
|
128K_ISDN
|
/~~~~~~~~~~~~~~\
|AARNet gateway|
\______________/
|
eth
|
/~~~~~~~\ /~~~~~~~~~~~\ /~~~~~~~~~~~\ /~~~~~\
|blitzen|--eth--|ise-gateway|--eth--|csc-gateway|--eth--|annex|
\_______/ \___________/ \___________/ \_____/
I
modem
I
(telco)
I
my-modem
I
/~~~~~~~~\ /~~~~~~\ /~~~~~~~~~~~~~~\
|neil-mac|==serial==|smoopc|==serial==|matt.net.house|
\________/ \______/ \______________/
In order, my PC runs SLiRP off blitzen through the annex (they haven't
given proper (C)SLIP/PPP to students yet) Smoo runs slirp off my PC, and
Neil runs slirp off Smoo's PC. So when you look at it, Neil's Mac was
faking it was Smoo's PC which was faking it was my PC which was faking it
was blitzen.canberra.edu.au *phew!*
My poor little 28.8K modem was pretty busy keeping up with it all, but
the link worked (albeit slow at times - especially the Mac - hehe)
When Spakman moved in, the link got worse - it was the same to my pc, then
we had spak's pc slirping off mine and his laptop slirping off his pc, and
Neil's mac slirping off my other serial port. A nightmare of cables and
not much say in whose PC went where on the desk (cable length limitations)
Now I have my ethernet card back, and neil has a new ethernet-able mac, so
net.house is fully coax-ed and there's just the one slirp link faking
PPP from my pc to blitzen - and I IP-forward and proxyarp the rest of the
house. But that serial==serial==serial==serial slirp connection to get
every computer in the house on the net has to be one of the better hacks
we've done this year.
Again, not a 'secret government documents' - kind of hack, but I've been
out of that scene for a while...
matt@matt.net.house.au (not on DNS)
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GIT/GMU/GO d- s++:- a-- C+++ UL++++(S+) P--- L++++>$ E- W+++(--) N+(++) !o
K- w--- O M-- V--(!V) PS+ PE++ Y+ PGP t+ 5++ X+ !R tv--- b+ DI(+) D++ G--
e>++ d++ r--->+++ !y+
------END GEEK CODE BLOCK------
-------------------------------------------------------------------------------
>From matt@matt.net.house.auSun Apr 21 18:41:32 1996
Date: Wed, 17 Apr 1996 20:25:30 +1000 (EST)
From: Matty <matt@matt.net.house.au>
To: mrs3691@hertz.njit.edu
Subject: Australian ANI numbers & stuff
They say there's two types of users - those who read everything first and
then send the mail, and those (like me) who just keep on mailing and
mailing until everything is read & sent :)
Anyway, I'm on to the letters section now. I don't know about that 1114
and 1115 that some guy/gal wrote in - it could be true but it sounds kinda
fake. The number I know has always been 19123. HOWEVER (I just had a
brief flash of insight) the 111x stuff _could_ be for a pay phone - I'll
have to test that one out. 19123 does _not_ work on pay phones (it says
"No information to identify telephone number" in this cool robotic voice)
- works on normal house phones though (and I assume a PABX or other
non-pay-phone phone)
New info: dialling "12711" will identify which service carrier you're
using for long distance calls, and how to use a different carrier. I
guess it's of some use to someone somewhere in Australia :)
Apologies for my 3-message spam - I really should learn to collate all my
thoughts first but I'm a spontaneous kind of person :)
matt@matt.net.house.au (not on DNS)
-----BEGIN GEEK CODE BLOCK-----
Version: 3.12
GIT/GMU/GO d- s++:- a-- C+++ UL++++(S+) P--- L++++>$ E- W+++(--) N+(++) !o
K- w--- O M-- V--(!V) PS+ PE++ Y+ PGP t+ 5++ X+ !R tv--- b+ DI(+) D++ G--
e>++ d++ r--->+++ !y+
------END GEEK CODE BLOCK------
[ Exactly the kind of hacks I was looking for...anybody can hack into
government computers, but what the hell do you do when the printer is out
of paper? Definetly cool hacks. You win the Hack of the Month award, send
me your snail mail address and I'll mail it out to you. ]
-------------------------------------------------------------------------------
>From jmfriedman@chop.isca.uiowa.eduSat Mar 30 18:27:28 1996
Date: Thu Mar 28 19:07:34 1996
From: jonathon friedman <jmfriedman@chop.isca.uiowa.edu>
To: mrs3691@hertz.njit.edu
Subject: HACKERS 7
I would like to respond to the 13 year old who wants to learn how to hack. I
would not recomend it, or at least actually doing it espieccially if you are a
"newbie". You will probably ask why should you tell me what to do,w ell, I am
13 years old as well, and I used a rlogin bug to get in to a computer at our
university (when i was 12) and I didn'at do anything, though Ic oudl have bu t
I was caught they didn't do anything like taking me to court but if I had done
something I could have been, anywyas the moral, Don't hack, especially if youd
on't know wha tthe hell you are doing.
--Jon
---
Wise man say the meaning of life is "Life is like.....Ever seen forest gump?"
[ Good advice, despite the typos...in my opinion, the real hacks are those
like the first two letters. Anyone can run an 8lgm script. Levy's version
of Hackers is what it is really all about. ]
-------------------------------------------------------------------------------
>From turgjb@ee.mcgill.caSat Mar 30 18:43:39 1996
Date: Sat, 30 Mar 1996 14:48:22 -0500 (EST)
From: Turgeon Jean-Benoit <turgjb@ee.mcgill.ca>
To: mrs3691@hertz.njit.edu
Subject: Hackers subscription
I read the latest edition of Hackers. Its a great zine!
Sysadmins at our lab are quite paranoids about hackers, they feel the network
is threathened by hackers every minute and even look for any file containing
the word "hack" in all users home dirs. Anyway, hiding ourselves is not
the way to go. So to end this story could you add my address to the
subscribtion list.
Thanks JBT
[ The same thing is done on the computers at my campus. If anyone out there
is currently in college, watch the names of the files you leave lying around. ]
-------------------------------------------------------------------------------
>From arcane@texnet.net Thu Oct 10 19:58:01 1996
Date: Wed, 04 Sep 1996 09:24:35 -0500
From: Brian Thomas <arcane@texnet.net>
To: mrs3691@hertz.njit.edu
Subject: phone number decyphering
I ran across issue six from 96 and saw the article on dialing the ANI code
to determine the number you are at. In the article wyle@max.tiac.net wrote
about a three digit code that will give you the phone number for any phone
in an area code. In our area code (817) I have found that the numbers are
actually based on the prefix and not the area code. For example
817-741-#### would dial 974 but 817-752-#### would dial 972. For anyone
that tried to find a number based on this code and failed you might try
again and use the numbers around it because of a difference in your prefix.
-------------------------------------------------------------------------------
>From gauravm@giasbma.vsnl.net.in Thu Oct 10 20:01:48 1996
Date: Mon, 30 Sep 1996 19:09:53 +0530 (IST)
From: GAURAV MARBALLI <gauravm@giasbma.vsnl.net.in>
To: mrs3691@hertz.njit.edu
Subject: Very tightly secured UNIX system
Hi! My name is WeByte from Mumbai, India. Our ISP gives us a UNIX based
Lynx browser for the Internet (Lynx version 1.0). We get access to the
UNIX prompt, but it is a Restricted Korn Shell ('coz it says rksh:
everytime). Earlier security was not so tight and so me and my friend used
to Cracker-Jack the password file, to get the passwords for the more
expensive TCP/IP accounts. But not anymore man!! Security is so bad, we
aren't allowed to use even "ls -la" forget "cd". So help me man. I tried
methods suggested by other hackers like "shelling" out of "vi" and stuff
like that, but man, we do not even have "vi". We use PICO. So help me
man!! I want that passwd file. (Remember I am a rookie) Bye for now! and
Thanx!!
[ Another testament to the horror of not leaving back doors. ]
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #3 of 9
Checks and Balances
Courtesy of Voters Telecommunications Watch
===========================================================================
VTW BillWatch #62
VTW BillWatch: A newsletter tracking US Federal legislation
affecting civil liberties. BillWatch is published about every
week as long as Congress is in session. (Congress is out of session)
BillWatch is produced and published by the
Voters Telecommunications Watch (vtw@vtw.org)
Issue #62, Date: Tue Oct 22 02:32:41 EDT 1996
Do not remove this banner. See distribution instructions at the end.
___________________________________________________________________________
TABLE OF CONTENTS
New feature at VTW: CaseWatch
About VTW Center's CaseWatch
Subscription Information and donation policy (unchanged 2/18/96)
___________________________________________________________________________
INTRODUCTION BY SHABBIR J. SAFDAR
I'm still not quite sure how we've done this, but I'm proud to say that
we still don't have any money and we're about to announce a brand new
Web publication. Today, our nonprofit organization, the VTW Center
for Internet Education, unveils a new publication dedicated to following
important legal disputes that affect the net.
Our new publication, CaseWatch (http://www.vtwctr.org/casewatch/),
focuses on the evolving common law of the Internet. Small, often
private disputes between individuals and organizations are today
creating the common law of the Internet, in at least as much as they
are a sign of society's continuing discourse on how to integrate the
Internet into our lives. The disputes we cover in CaseWatch today may
continue to be obscure, but more than likely, we'll look back at them
many years from now with the benefit of perspective and see their
importance.
CaseWatch isn't for the faint of heart. It assumes a knowledge of both
Internet technology and a not insignificant legal background. However
it should still be accessible to most everyone reading this list, as you
are already better educated on these issues than most of the public.
CaseWatch is researched and produced by Diana Jarvis (daj@vtw.org). Diana
graduated from Harvard in 1986, and Yale Law School in 1992. She clerked for
Justice Robert W. Sweet, a Federal District Judge in the southern district
of New York. She has been with VTW since 1994 and is currently VTW Center's
Staff Counsel.
Please take a moment and visit CaseWatch at VTW Center's new home page
at http://www.vtwctr.org Most of all, take a moment to send a note of
congratulations to Diana for her first VTW publication, as well as starting
work as VTW Center's first full time staff member. She can be reached
at daj@vtw.org.
Here is this month's CaseWatch synopsis:
What community standards should determine the obscenity of images
loaded onto a Californian BBS and downloaded into Tennessee? We still
don't know, thanks to the fact that Robert Thomas' habit of collecting
addresses from all his customers enabled the Sixth Circuit to decide that
the mere presence of a computer BBS did not make his operation any different
from the traditional pornographer who sends magazines or videotapes
through the mail. The Supreme Court apparently agrees, having denied
certioriari on October 7th.
Don't forget!
On Sunday November 3, 1996 will be the seminar on the New York State
Internet Censorship legislation. Be a part of it by showing up, or show
up online through RealAudio and participate in the trivia contest to win
valuable prizes (including VTW tshirts!). For more information on the
seminar, see http://www.vtw.org/speech/
___________________________________________________________________________
ABOUT CASEWATCH
[The following information is taken from http://www.vtwctr.org/casewatch/about/]
The legislation tracked by VTW is not the only law in cyberspace. As
the Internet becomes more prevalent, it will inevitably become the
subject of disputes, some of which will be settled in court. Because
the law laid down by judges in their opinions resolving these disputes
-- the common law -- is just as much law as legislation passed by
Congress, CaseWatch will try to track court opinions on issues
affecting the online community much as BillWatch tracks legislation.
Chicago Law School professor Lawrence Lessig has argued for a chance to
allow the common law of cyberspace to developed unhindered by
unnecessary and premature legislation:
"[W]hat the system of cyberspace regulation will need is a way to pace
any process of regulation -- a way to let the experience catch up with
the technology .... This is the practice of the common law. [It] is
democratic not because many people get to vote together on what the law
should mean, but because many people get to say what the common law
should mean, each ofter the other, in a temporally spaced dialogue of
cases and jurisdiction. Unlike other lawmaking, what defines the
process of the common law is small change, upon which much large change
gets built; small understandings with which new understandings get
made. What counsels it here is the way this process will function to
create in an as yet uninhabited, unconstructed, world.
What will be new are the communities that this space will allow, the
constructive ... possibilities that these communities will bring.
People meet, and talk, and live in cyberspace in ways not possible in
real space. They build and define themselves in cyberspace in ways not
possible in real space. And before they get cut apart by regulation, we
should know something about their form, and more about their
potential."
The Path of Cyberlaw, 104 Yale L.J. 1743, 1743-46 (1995).
Every new issue of Casewatch will try to bring you a new, usually quite
recent case that will reflect the development of Lessig's common law of
cyberspace and highlight the ways in which the Internet is quickly
being drawn into our legal lexicon.
___________________________________________________________________________
SUBSCRIPTION INFORMATION AND DONATION POLICY
We do not accept unsolicited donations at this time.
If you want to help, for heaven's sakes, register
to vote at http://netvote96.mci.com/register.html.
You can receive BillWatch via email or WWW:
To subscribe via email, send mail to majordomo@vtw.org with
"subscribe vtw-announce" in the body of the message. To
unsubscribe from BillWatch send mail to majordomo@vtw.org with
"unsubscribe vtw-announce" in the body of the message.
BillWatch can be found on the World Wide Web at http://www.vtw.org/billwatch/
___________________________________________________________________________
End VTW BillWatch Issue #62, Date: Tue Oct 22 02:32:41 EDT 1996
___________________________________________________________________________
This file provided by:
Voters Telecommunications Watch
*** Watching out for your civil liberties ***
Email: vtw@vtw.org (preferred)
Gopher: gopher -p1/vtw gopher.panix.com
URL: http://www.vtw.org/
Telephone: (718) 596-2851 (last resort)
===========================================================================
VTW BillWatch #63
VTW BillWatch: A newsletter tracking US Federal legislation
affecting civil liberties. BillWatch is published about every
week as long as Congress is in session. (Congress is out of session)
BillWatch is produced and published by the
Voters Telecommunications Watch (vtw@vtw.org)
Issue #63, Date: Tue Oct 29 00:18:48 EST 1996
Do not remove this banner. See distribution instructions at the end.
___________________________________________________________________________
TABLE OF CONTENTS
CaseWatch: Jurisdiction in cyberspace
Subscription Information and donation policy (unchanged 2/18/96)
___________________________________________________________________________
CASEWATCH: JURISDICTION IN CYBERSPACE
[Here is a summary of this week's CaseWatch, http://www.vtwctr.org/casewatch/]
Dennis Toeppen is the guy who registered "Panavision.com"
(and then posted aerial photographs of Pana, Ill, on the site until NSI
put it on hold) along with approximately 240 other domain names, at least
some of them 'bitchin' corporate names'; as Josh Quittner put
it in his Wired column about mcdonalds.com.
By now at least four of the companies which have discovered their
companyname.com registered to Toeppen have now sued for assorted trademark
violations -- one of them being Panavision, of course -- and although the
real question is whether Panavision has a right to Panavision.com simply
because it has trademarked the name, the first question, as it turns out, is
whether Panavision (which is based in California) can sue Toeppen in a court
in the state of California, when the guy by his own admission rarely goes
there and maintains his web page in Illinois.
The court's analysis is this: it's not just having a web page
-- it's what you're doing with your web page which dictates where
you can get sued (and if you're infringing a trademark, you've had an effect
in the trademark owner's home town). But the details haven't all been worked
out yet. ....
[Read the whole story for free in this week's CaseWatch,
http://www.vtwctr.org/casewatch/]
___________________________________________________________________________
SUBSCRIPTION INFORMATION AND DONATION POLICY
We do not accept unsolicited donations at this time.
If you want to help, for heaven's sakes, register
to vote at http://netvote96.mci.com/register.html.
You can receive BillWatch via email or WWW:
To subscribe via email, send mail to majordomo@vtw.org with
"subscribe vtw-announce" in the body of the message. To
unsubscribe from BillWatch send mail to majordomo@vtw.org with
"unsubscribe vtw-announce" in the body of the message.
BillWatch can be found on the World Wide Web at http://www.vtw.org/billwatch/
___________________________________________________________________________
End VTW BillWatch Issue #63, Date: Tue Oct 29 00:18:48 EST 1996
___________________________________________________________________________
This file provided by:
Voters Telecommunications Watch
*** Watching out for your civil liberties ***
Email: vtw@vtw.org (preferred)
Gopher: gopher -p1/vtw gopher.panix.com
URL: http://www.vtw.org/
Telephone: (718) 596-2851 (last resort)
Copyright 1994-1996 (commercial use without permission prohibited)
===========================================================================
Copyright 1994-1996 (commercial use without permission prohibited)
===========================================================================
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #4 of 9
***************************************************************************
D T M F S C A N N E R
***************************************************************************
By: Jojo
This article gives descriptions and plans for building a small electronic
circuit that reads digits dialed on a phone line. I made it all up myself
so u won't find anything about it in books; it works fine, I sold a lot
of these devices to friends.
If u already have experience in building electronic circuits then u will
find this circuit very easy to build: two graphic files (DTMF.BMP and
DTMFPCB.BMP) give circuit diagrams *and* printed circuit board layouts :-)
If u r a beginner and want to learn about building an electronic circuit
using the printed circuit board layouts, just print the graphic file
DTMFPCB.BMP and take it to an electronic components shop. They will
tell u how easy it is to use those layouts: they can make the board
for u for less than $10, then all u'll have to do is soldier the
components on it.
If u just want to know more about how a digit is dialed on a phone line
then read the "how does it work?" part.
W H A T ' S A D T M F S C A N N E R ? :
-----------------------------------------------
It's an electronic device that connects to a phone line and reads the
digits dialed on it. DTMF stands for: Dialing Tones using Multiple (or
Modulated) Frequencies. The scanner described here can be used in 2
different ways:
1. PHONE LINE --> DTMF SCANNER --> YOUR EYES
The scanner has LEDs (Light Emitting Diodes) on it; when a
digit is dialed on the phone line, some of these LEDs will
light, others won't, depending on which digit is dialed. So
you can "read" the digits just by looking at the LEDs :)))
2. PHONE LINE --> DTMF SCANNER --> COMPUTER
The scanner can also be connected to the Centronics interface
of a computer: the centronics is the 25-pins connector at the
back of your computer that is usually used for connecting a
printer.
The computer then uses a little program to read the signals
received on the Centronics interface and display the digits
dialed on the phone line. These digits can be saved in a file.
NOTE: this scanner uses special electronic components called
opto-isolators that ELECTRICALLY SEPARATE the signals on the
computer side from the signals produced on the scanner side.
That means that your computer CAN *NOT* be damaged even if
the scanner goes electrically "mad". You could even connect
1000 Volts to the scanner's input, the output on the computer
side would still be held at a standard low voltage!
W H A T ' S T H E G O O D T H I N G A B O U T T H I S
D T M F S C A N N E R ?
---------------------------------------------------------------
Some people use sound cards (like SoundBlaster) to scan digits
dialed on a phone line. The DTMF scanner can be more usefull
cuz it's a *small* device that u can carry in ur pocket :) :) :)
It uses low-cost components: the whole thing costs less than $20.
T H E C I R C U I T D I A G R A M :
---------------------------------------
UUencoded graphic file (DTMF.BMP):
[ Section: 1/1 File: dtmf.zip Encoder: Wincode v1.4 ]
Original Input File Size: 11647
begin 644 dtmf.zip
M4$L#!!0``(`(`&``=""A30)`#2T``"9+!0`(````1%1-1BY"35#MG<_/-<EU
MU\MC>P82*R>_Y&23!"%D4/X")!9(+,8+2!A!Y%7D[)`UB@P2SNQ"!EA`-+"`
M!8HB-DA(2"@[+T!96<(+5IA=_H&`C&+0$8J"[8QRN/6CJ^MG=W5W/?=V5W^_
M[_L^[[VWJ[N?^[FGJDY5G3KW;_S2E_[FYY761X]_?^7Q[]^_H]2GGU7J,^IS
M:ED?F[_JXX_M?_K/X\&WOO6MQ__Z%3%_E8C]3__1+^GG4&?]BW<$ZJQ/?T.@
MSGK_^P)UUG^'G7;7CW]6H,[ZR2\*U%G?_?L"];93^*?=]<4/!.HL]:%`O9FB
M[O=G^@V!8*=@"J80F)Y2[X$I[!1,P10"TY/J!Y\1J'>__YY`\*5.KS_X?8$Z
MZZ/?$:BWG:+N]X^9^`<"==;OH.[WCT/Y%8$ZZU>^(U!G?>>_"=2;Z7<$ZJP?
M^5F!P/3T^H6?$ZCWV!0^?_]QU/L"==;7OR90[['IUP7JO1[U!P)UUK_"'$K_
MNH]Y_OY[>7Y)(/11Y_>E?DR@WGT4[+3_&A_Z?0B"(`B"H/WK40(!*IA"$'1.
M??\G!.JLG_YI@3KK#\&TNWX?3%'W4?<A"((@"((@"#X_F((I!*9@"J80F((I
MF$(STS\4J#?3;PITKKK/U+/8(/G#?NJ8G8)I03]Q[+OCP+3$]*?`M'O=!]/^
M,6A/87HO';13J,04XZCN^N93[/1>&>N?PI2IJ=U5@[3.WWQ&W;\9TSWM*=NO
MI]</B8,7BJ*`Z7(QMM=D>\Z%]3]VU/V`J?W9AZFST^LS/;@]JJVVWJSN'V/:
M:%.-3)ENY1X\Q4Y'8?J4K9&M=?_R+>DSH;;Y_+#3MS#G09AB7S3VFE]`/WLL
M[SGF3TM,#SJHU+/8(/JY+X!I;WWA6'Y^K$>]:AP%IF`*IF`*IF#Z@@E4`E/8
M*>P43,$43*^\;HH^"DS!]*9,6Y<"!<(\/YA"$(2U:`CC*&RE6(FTT_]LG&GA
M+;<Z\XTQ:'<(ZE7NW^.]JN);[AI_>@_7+&"JWZY[RU/X_E1B*9P_C.=?+6=O
M,DH4ZCF83MM/Z-AO?46FFX?HS;'GMZG[2CFF7`#81N%F?=1!.^UI@&"ZH?*#
MZ19?2C75ZE98]_#YG=_/-9\?`R0(<])@"CTU9@)K?%B+1FP/F([/]-@V/C!%
M>PJF8`JF8`JF8`JF8`JF8(I])V"*\3[L%.TIF$*(/0=3"$PA:'M7S6UANJ.$
M`"W'\X=[),R/?4Q5S_"_L>+Z2LPW7.DN3)>[J"C^M!AY#J:'F'HN/'^=ALT`
MK58W/TQ1EXO%+--[[9%X_-W+U/U<_<(3&8%I@YWZ/1*%"MS8GC9Z!R0W</E7
MX_G!]%C=+^Z-[,L4>R0V^*=M]CR(S]_4GA[>(X$I%`A0(0CK4=OU7_XKF';7
M-\"TM][_(9CVUA]_"4Q[ZZ,S?2_/($P_>^Q]@&FIBT(,6G=]Z4_`M/O,TV^`
M:7<[_01,N]LI?/[N^NK_.1%3"$R1-@5,(0AK)Q"TO]4=)/AL97T_RGN^OZ=I
MBYEHC[P<)N]YB6GG`=)MXE"R6$DP[1]_^G;CJ!O;J?*IY.U+:E$>UFJQ*?*7
MUG[K@?*>D^QERJMQTBJ,>1.TI]UJ]<WZ_8-]U*U\J0TQO84ZV97I*#[_EKSG
MI=#S[*4;T\(D'@1!IVDBD%\*3)&S"SF[+JR/W@73WOK@0S!]38X8,-VB?_H^
MF'9O3S\%T][ZWL^#:?>8WM\&T][Z:Q^!:?>8WE\#T^Y]%&+0^K>G_T^@<^V-
MA`KZ"ZC[_>WTQP7JW>]_4:#.0G,*.[V"/O[;`G76M[\J4&>]>RP?"E3*,2-0
M]WG^WQ*HL_[.!P?VYP3[?!"--NO+O]PE-K7*-"9_CPRJZN,^>9%K0?CKF7['
MT^=V6T[,M$8KCEZ_1POQ3A^FHA[_P+3O/I\FIC>I^_M[C61/RE)[.I'GF_11
MSV"Z\"TT(^IKG^GD2X%I+SM=]?D37TIN$6E_++9G&WGS`W8*[9B7^E&!.NLS
ML-/^3(_%]$(%_>!8_E.HM!XE4&_]VI\7"$S/OQ[U/8$ZZ^M@VEU?^9\"==;?
M0OQI=_WNL;SG4$&_C7%4=_U'C*-0]R^@_X68WN[ZLS\2J+/^WCL"]=[+\SF!
M.NL7_[=`G?57ORP0OIKC]/KDGPG46>]CDT1W_7.,]S'/?P']YJ\+U%D_B<7H
M_N.H7Q2H-U/,2_7WI?Z20-T-52`P/7^<]+$\O1`"^YZSWQ3KIFA/+Z#_O'O/
M&533AUCC.^O^*.Q>`5,PO2I3I?\JMV?<_BSEA]%;\94R1?43\D7-'EUE+Z"+
MJOEU?Z+>&*VF&Y').V&+2G1`!F/J8/G]S$E^&/TS+A8_,G]L0HFI>/S(<HVN
MEQV0X9A*M$<\R66B_Z4D)6$J$ZSYITB$SQA_P-0?5$-LG&YGJMQ#F2PU9VJ/
M!$Q-FI2H[ML_*F8Y`Z^E5;DV4_-"5O>G'!$65,14!7259>K-4+>N\XDUIJ[X
MN$Q]YR-)?IA^[:DOE+:G8449A>G<C4N6RR3L]RGHU>-^G[)^7\(3O2D_F-JV
M).KWE6LMAK)3B=S-I(]:\TH3"\M/*5QD>BDX=!NFY1KY)DR'J?O&BPF8*C6W
MI\L)#L$TTWOO"82\/1`$0:?-8@I!$`0=UY_^J4#P^<$4@B`(@C`VQ9PT!$'0
M8/K\YP6"H!OJTT\%@B`(PMCTG',H8`I!$`2?'X(@"((@K$5#$`1!$(0X:0B"
MX/1#$`1!$`1!$`1A&`4-K'??%0B"T$=!$.P4@B`([2F$?7POU;=^0Z#>=?^/
M!.JL?_@-@7JWIY\5J'?=_T"@SGK_CP7JK.]_(A!B>D^O7_TQ@6"GY^^CL,;7
M7=_[QP)!$`1!$`1!$`1!$`1!$`1!$`1!$`1!=POJ8"6*6$B@[?`*>KRN<1*#
MZ1Y1X36>F?*ABX,IF#Z':>DP].9VRG83W:-7>UQ,G\;FQ^,5,1_)_4R=RI2H
MG2F9,XAD8FJ[-ONH=HL[,N7V?I_<I^"8LGBFYM^-F/):W=?>J:G.[4Q9DS1<
MV3*5>S&EY/\2[_8KL1DE&)(J8,IT%Z848J-"@5U,'W9*OCTE5_>KMQB1*05/
M,H1[F%*!Z5WZ*!;=E[,?AE*,T'H_P1@5_7XKTZJ=SCU+L[V&_JGY(.[FGSY,
M,,*F^_?('+<SA3AQ&IW3`Z8=F,[^:3164C1[E;:UA5KZE,C\$J;D>1MWG_;=
MXO9,HR1"--OPHR<'TUVBI-^?F3*8]IE#,4Z`@ZS`M._\J:W\I:/0$:9M*WQF
MTJ0VY#*KKP*FGJGIIAJ<,S_/^FB"38.AXJ-R,]$2TY;EJ)#I/-*/CLK-1'6F
M9O!>.AX7?DQ"J9AI<-4;,XW?=C`V7:_]NA"8;F&Z7OOU%']:]V_?GBHR_;:9
MG$N9\GJGK6?XLO;T[DS9H@AZEL!.=_918%ICVN99!OYI@:FI`(.'[*4J,@T6
M5K9-))*;Z]]ZXJ7=I**=JD-V>GO7LUSWW:I\WD=!^YCFC\'TN)VF)VQFNEB0
M6J\RI)W&B+AYA3]J>--&>*AN_WE,PY#*++R2UH>W%V<:].Z]XJ7BBZ8WX&3]
M:\@II^0ME@MM$IL_^>-I$G:D%I76;*I;>QI2S#X0DM';TW20T\(T:S#`=+%B
MEPJEOM1JFPBFJX4R_W3-4#D4F)8*94S79D52.^5P#F;QS(&8,DT3^*5"^3AJ
MQ1/(F$IP\=(=P'25:3J.&I[I8_W#[!PGV]2]"5/O=<5!Z[LF82_!5*8)/9XC
M3)N8SCA6[53Y<IF=CC@OE3*UQA-U(XDX7PY8OI.^^G3+K#T==%L9'[73QJ!6
M3CZ4]O.OQI2M@_E8(?'ULHWIIHV6Y/YM/OF:_3Z)67`*;&F5Z0._W<;;>"].
MVHC'(I>M'3)H>SHMP&_I]Z?5U*8[I?[I+9FNCZ.TK2XR)5Z:PN=Y>]N0==_L
MIS--:;H3\BC3P+5(MO6I*81B,-&1\3[K_?N/*,BJ*89,*VX`C9=.A8XQM3U;
MY=K:Y*ENIV[(!CN-^GW'*SFLE*O6G,1#ZY>#($`P+1519:9^AQJ%9LSF95O3
M>2HH2W9^U_94^<XF6%CVH]"D:;#/HTO8[$A@NC*.TM6=IUU^D9WZ+FNXZO[6
M3$UY>XIV":(!?2D+R)V8SO,;I4*;T63]_K!XJ?[^*2B4NZ`+/.IAS^D1JE]D
M?*9YN46FKCV-0JDY.,)[C?WR3+U-T4:F4^@.I3=125#/F(9*>YCR<E=CXO_#
MB],T>3T=\?T6CVBN5)_II'`;1%1.5^#"VDFPB,+1%'Y^)$Q==1.FLFRGAFDW
M.Z7V6>VAF,;O>HWIMO;T%DR-HTY1OQ]/R*VUIYOZ_::-U6/$G\9,M]7];?XI
MC3;BISI3I:;F+RVTPG3C..I.3$O>_P&FB]$4<@NF;EK9_)<66FE/M\;TPDX7
MQU%3+-NM<_93Z36:#VQE:IP$<:$7[7'2XZ>/H>1`9;"TP+1G<SM(W<\71-H;
M33"EWIE377[CSM<=CBFQ3WQ(_D>YJ&]/!4S7F=+\*,HU#:8'F0J8]F*J<J:5
M$VU[.@6BA)X#SXZ9]6%I6"^66IG:Z`A:8;ILZ^Y$,VYR%CVBJ"5#Q-R>SA/*
M&W&04,:4W07!M)B]KXFI"SB=F`Z;2I:V]?N[U^7(QOB%3%U@]MW]4VMI:L<P
MBWR4.9CVNDW*E,'T\)B5C!,ELYTJ,.UP'W)+>J07$+79.LA@"H$IF((I!*9@
M"J80F((IF((I!*9@"J80F((IF$)@"J9@"H$IF((I!*9@>F^F-B":!@W0>>OX
MT\J6,S(;]L!T5ZQD+>.V9;HQ$A5,P?0E3%LN`:;=[91M>+5-S*E/,SGH=1>W
MN"OP?DRIG2G9S`?D4_?:KLT^JMWBCDRYO=^G<,LT^;ASLCE1*[<8DBFOU7WM
MG9KJW,Z4-4G#E2U3N1=36F&Z[2YVVZ0AJ0*F3'=A&G4<I3*[F#[LE'Q[2J[N
M5V\Q(E,*GF0(]S"E`M.[]%%V)Q.'N1]#A-;[:?LB+O3[$=.JG5*X?[_-7D/_
MU'P0=_-/6:<^E:@]C<UQ.U.,HSAQ&IW3`Z8=F+(O$XV5E*^MM/KENV`:-YGA
MGN:H/?6\C;M?O@*8KC&--H8&F_@?/3F8[AWOE^W4;7>&#L^AV.Q=_GN-6JX`
MIJWSI[;RMUSA7J*#3-M6^,RDB9J:"VO<-/O#@^6:H8-,33?5D-S8S[.Z46G(
M=!J@@JD[U+(<!:9;F)K!^^HU]"24BIFR`M-T%,KS_^NU7Q=*F<).EYBNUWX]
MQ9_6?;H[4T6FWS:3<RG3H!8OM*=@FN<P,RB"&AO8Z;X^BH=ERJJAT!+3-L\R
M\D_-O#1%_FG3KW$=I@TJ,@T65J!]=JH.V2G&IL6Z[U;E\SX*.NKS[^JCP+1H
MIVGYS4P7"U+K56XP-N7F%?ZHX4T;X:&Z_><Q#4,JL_!*6A_>7IQI.!;O%"\5
M7S2]`2?K7R/&3*1OL5!F*U,V?_+'<_YN&;ONIW;4I3T-*68?",FS_/$/Y35,
MT]%1"].LP3@GTS]Y1F](#7Y/J4SJ2ZVVB>=@^ODOR'68KAKJXM?Q+9[94S]R
M)3M=C9Q*[93#.9C%,WOJDR_+*YDR35.<I3+Y.&K%$\B82G#QTAW>1+_W6COM
MS#0=1[V&Z5>^*\]B.GW5*]FF[DV8>J\K#EI_[B3L>U^3IS&5:4*/YPC3)J;A
MDO**G2I?+K/3I^E7?R"O8FJ-)^I&UA<(EF^DKS[=,6M/GZ9/OBA/:T_)C!</
MV6G;5R;-C<9+UE[^\G^0IS%EZV`^5DA\O6QCNNEKS<G]VWQR-[W[@3ROWR<Q
M"TZ!+:TR?>"WVW@;;\5)&_%8Y+*U0X:<YY\7X+?T^]-J:M.-4O_TEDS7QU':
M5A>9$B]-X?.\O6W(]2BSG\XTI>E.R*-,@Q8[V=:GIK"4T40'QONL]^\_HB"K
MIA@RK;@!-&`Z%3K$U/9LE4MKDZ>ZG;HA&^PTZO<=K^2P4JY:<Q)GJE\.0WG!
MM%!$E9GZ'6H4FC&;EVU-YZF@+-GY7=M3Y3N;8&'9CT*3IL$^CRYALR.!Z<HX
M2E=WGK;M1';JNZSQJOL;,S7E[2G:)8@&]*4L('=B.L]OE,IL1I/U^^/BI>K[
MIZ!,[H(N\*B'/:='J'Z1\9GFQ1:9NO8T"J7FX`CO-?;+,_4V11N93J$[E-Y#
M)4$]@QHJ[6#*RUV-B?\/KTW3Y/5TQ/=;/*2Y4G6FD\)M$%$Q78$+:R?!(@I'
M4_CYD3!UU4V8RK*=&J;=[)3:9[6'8AJ_ZS6FV]K36S`UCCI%_7X\(;?6GF[J
M]YLV5H\1?QHSW5;WM_FG--R(GZI,E9J:O[3,"M.-XZ@[,2UY_P>8+D93R"V8
MNFEE\U]:IMZ>ZJ`KRGROE9A>V.GB.(K<E-YHE([OY:'Y]7Y,%^.DAV?*`=/%
M[Y"I,FU(/7&W^5/*%T2:K\8FS0?J?L^K<=0<@^E2<(--?$C^1^UJ8-K.E.9'
MO,YTP."2MV(J#4QK_BF81D54SG0C-+V,[QTSNQ^#U"NM69D_;%+<V?@[15.<
MS*[>>0]3&QU!.YD&QDUVW,2NH7@I4S6S=7_L\[=GJN;V=)Y0WHB#A#*FQ:'!
MTYE*P%2.\]S'M)2]KXFI"SB=F+XTE6S*]/$FG\HTZ/=WK\N1C?$+F;YT:."9
M*EOW[>8$.T/^7/_4WE#M&&:1CS(_&5/]A^+V]&3CJ.I=4J;\>J9Z8=CV^\J%
MS,;QL6=GJJN5<U*<G:K7,O6ALO.LT5G'^\NA?K8-(;V`*&:LU:5'.$#SVDS/
MIN33[/OADD#GGNN#P!1,P11,(3`%TU,ZJ'8<RLK-H?K)C.EU.R:Q<P!NS#J-
M8,G.9+E"4X%I$H0._W:793K-](7S?NGK\:P@![,MEFOXQ[QR<Z9281J^+N$Q
M_=-P*S(5/\:E([_8"$RG]9)&IK+`%'7?_VBJ^W;^V+:_Y;H_S\30P=_MRDQ-
MOU-H3X/7X_8T:5.CUA3M:5#WE5V(GOM]-67)8&7C%>Q_@5T;7T'Y*6VSG(U^
M/ZC[V4LJ-N;X.471C_!/D^^]#6F%ZVQUIG/*K81IDA5";N[S%^Q4Q?/_`;#:
MTB:8OK5((#`%4S"%>BRFDNQW1TP4&0_[L;PET]I6'HV3^'9,2RYJ/`"(GK1C
MYYDIKU_AI$Z_^(D1-P)PL]'D1J+1A//LTZK@G,F?W9J.:$2F9D0TAYRJ<$XO
MGSV)YZPRIO9)3Z8-5SCO-+_].R.IS?"'3"4\)QK+/M-.65QX(MO07CU1)G:N
M;&FWU6F8SG6_Q#2SJO1Y.U-J9TKF#+)ADG/79A_5;O$"IO6Z'YV4,,T,E=;O
M7TLIV][OD_B-)IHDBV>Z;Q?+FS&MS$:G:P`)T]10DZ>E[>2E(J;N:^]4;6/*
M9%;)M'E;IG(N.YTGHWV_[V>DJTQ30Z7Z?6F%Z38GF,THP9!4`5.FLS'-JG*^
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M+RWI)&KP<`]3;F*J]*2)FIH+8]PJ\(=?D,-C,U/EAB=/8*HMM25IK!V,NN_?
MH^BSX&F`>CJF*JS[=C!4*&U+]63:LAQ58!I<]35,IXAS6FE/Z>GMJ6K*6JXG
MH=3)F/H(:9E[<CM%I?_)'`0]U_VDW_?QU2Z8>KXXK=^_E/R(Y__7:[\NE#(-
MVM-7,>WJI^ZRTRK3]=K_**3.5O<[E#C&U.2)5::'SI@V9+IA;::G:T])7ID#
M4=Q"9]!;!W9ZR7[_3==E&DQ\B6G;IZU"_]3,2U/0GJJFW^)*3-=59!HLK$#[
M[%0=LE/,21?KOEN5S_LH:.=<7_883(_;:5I\,]/%@M1ZE2'M-$;$S2O\4<.;
M-L)C=?M/8\K,Q<=N%K9TBY&8AOYXIWBI^*+I#3A9_QHQ9B)]BWF1S4S9_,D?
MSWF19>RZG]I1H<CV]C2DF'T@)*.WI^GHJ%`D8YHU&&"Z6+&7BG!KFPBFS46X
MVK-M^9JSQ3/ORW1M.B6U4P[G8!;/'(CIG/NC6B1"M>()9$PEN'CI#F"ZRC0=
M1PW/U*S[V8FG-V/JO2Y7Z8/71YLPI&EA<UKAD"G"M(GIC&/53I4OE]GIB/-2
M*5-K/%$WLKX^L'P???7IAEE[.N1<'YGQXB$[;?LJFKG1&'CMA7Q4@UTQ]O6R
MC>F&$;^]T(#;3&K]_L-0M9T&MK3*U'SCDJ_2[<N)\R64K1TR:'LZ+<!OZ?>G
MU=2F^Z3^Z2V9KKNPVE87F1(O3>';2^0#U5'JOOU*.G)[)WLRG<[.[-0V`C0N
MTUWC?=;[]RF*$JPSK;@!U!*_>BNFMF>K7%F;/-7MU`W98*=1O^]X)8=-6N!I
M1]K,=`Z&]9-_8)H7466F/G230C-FF:/>>2HH2W9^U_94^<XF6%CVH]"D:;#/
MHTO8[$A@NC*.TM6=I]#AR$Y]ES5@=7];IJ:\/46[!-&`OI0%Y$Y,Y_F-:I&M
MX_WD\;!XJ?;^*2B2NZ`+/.IAS^D1JE]D?*9YJ46FKCV-0JDY.,)[C?WR3+U-
MT4:F4^@.I;=025#/J(9*VYGR<E=CXO_#2],T>3T=\?T6CVFN5)OII'`;1%1*
M5^#"VDFPB,+1%'Y^)$Q==1.FLFRGAFDW.Z7V6>VAF,;O>HWIMO;T%DR-HTY1
MOQ]/R*VUIYOZ_::-U6/$G\9,M]7];?XIC3?BIQI3I:;F+RVRPG3C..I.3$O>
M_P&FB]$4\O+=C-3S<H6+V5VVSJDJ%%EI3[?&])Z`Z;R'_E5VNN!3FB_^,\DO
M+J8W9DHTO[R5*=EYTH+I+<9)O\8R@V_C\,LZ_GLYPB\S8#455O.AA?8B/\`!
MT\7OD*DS+7\.Y[++^8]DCZ9O/W%8\\(\/6FN^PM?YM>R-?5:3,-G,5-59ZKF
M<]]\^RSI*D%\_O9T$],PH50?IL23W3+Y']6K7<U.5;7N&Y(^I5149()\C"G-
MCW@HIO7V5(.KU/V.3*65*5^#J<MB%O3[\_=R6-O4?\6G/?/]?MAN[&.J<J:U
MTVR:M<P_U<OXWC&S^S%(-:7Z>[8_JF;F,],L=6(?ILI_M_HBTT5;Y\F2R3R>
MIEE/-7(*F)9&+FH^=(BIFMO3>4)Y(PX2RIB^M-5=(#(?KS+=[/.O,"UE[VMB
MZ@).)Z;\BE2R9\G=$?3[N]?ER,;XA4ROT).]+=,@VDSM&&:1CS('TUXW29DR
MF!Z>\R7C1,ELI^JZ3-==P-4"O3XY<DMZI!<0M=F6?!4PO6G:2`+3ZH!)>2]3
MJ3D/O[ADW'[VQ#!4/E&W'<CZE/W3JV#JF<[?;!`PC1/'S_^GC\-7P31@*IZI
M6;ZP3/U29L)1I,04=;_`U&+Q4WA,\XPQF&YG.H]C`J8ZJI$D9^J^G"/YDR4A
M2)[>LST-ZKDR&S[1GNYEZN>DS5/+2TT;$?4_F9^P?\U.8"NW+]&7!--X*F]Q
MYB_\\J@V'W7QX`V9YG#!M#V/"*E2#%K!8%5.$4R'G)<"4PA,P11,(3`%4S"%
MP/1Z3$VRY,>\&#Z5/?%2E2T2&N?`@0]O&]M3RQ!KF?+J!<ZD3[XJ8-I9[WPH
M%V"Z?H$SZ?T?RAAVRF[>5[$-F=1+.";G@EK>Q?(&^E3.S)3:F9(Y@VSXV=RU
MV4>U6[Q1>_K+<F*FW-[OD_@`?K+Q?!/3?;L#CM3]_RNO9,IK=5][IZ8ZMS-E
M3=)P9<M4GLST'\E+F=(*TVWW8#-*,"15P)3IN4S5OY07,8TZCE*)74P?=DJ^
M/257]ZNW>!O]V1?EA4PI>)(AW,.4"DR?WD?)1_(*IC;RGL-<92%"IN`[(53S
M/4[2[__,M^5U3*MV.O<LS?8:^J?F@WB=?_K)OY$7,#5!;1*UI[$Y;F=Z(GWP
MFK$I)TZC<WK&8/JB>:F)*?L2T5A)^=I*07YD:*7?C^TR84J>MW'W2^>#Z3K3
M*#`KV'3ZZ,G!=.]XOVRGPF#:9P[%Q@K[*,+U\\%TT[<BZ,&00'V9MJWPF4F3
MVI!KP-P(=(BIZ:8:DG'.\ZQFZ,3!,,(/4,'4'6I9C@J96H*A>8-IS%0U98/6
MDU`*3(O?*EN8ZV-IJ/VZ4,J4P72!Z7KMUU/\:=V?[WM3ICI5)+NDGRG3AE3,
M>H8O8\K!T3LR9;O0&7A.@9WN[*,&9EIU&]N8MGF6@7]:8*I:?HFK;6A;49%I
ML+"R=4^BYJLN%A+T%G:J#MGIW41M==^MRN=]%'34Y]_51X%I.??N4::+!:GU
M*C<8FW+S"G_4\*:-\&#=_K.8AB&567@EK0]O+\XTZ-U[Q4O%%TUO$#JK@S+-
MWF)68CO3<-8DGD&9\LW*V'4_M:.\Q([V-*28?2`DH[>GZ>@H+Y$SS1H,,%VL
MV(42F2^UVB:>DZD*4LQT=#ZH"]-50^50IV"J9J:5Q/&O9KHVG9+:*8=S,(MG
MOB'3.0F::ID'/LQTSE)5*)$S7?,$,J827+QTAV<Q]?DYK\<T'4>]G*D)+9;`
M3CO^%F3;:+-SG&Q3]R9,O=<5!ZWOFX3MF%C2_A+D'W=C*M.$'L\1IDU,9QRK
M=JI\N<Q.7YT`U797;\O4&D_4C:PO#RS?1E]]NE_6GKZ2J7@7H"]30_2@G;9]
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M7=W9#U-"._5=UHC5_4V9FO+V%.T21`/Z4A:0$46UM!!^?J-08CN:K-\?&2]5
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MJ[-3!:8=;D)N28_T`J(VVX&'!B00F((IF$)@"J;7%S<MMZT6@,K;:L#TJ8:Z
M=AS:;J@DT,:\5*LS2"30,S(;0V`*IF`*N10CT^H/F(+IF:O[G.NAJ3BTDL&-
MDBR.8-IG%P?+M,=!^1V+=IS*Z0:&^!E46??U7R'"P5ZDB>GTRF&F)K.O:IGZ
M`M/R"+<0ST_FHG=@RHXI%YB:[$6;F=;VG3BFJ[.)8_3[=J="PM3@I!UV"J9I
M!KC03DWP1V^FZQ<8E*F+):-\QQ>M7N6XG;*-7;-9S_1I)L&O[N(6MUQ<A*ED
MZ;UI]2H5IM3.E":7>6)JNS9RM:?EES@G4S9[:_O5?6[O]TE\M#G9X+.)Z;Y0
M]M,PW3R.XK6ZK[U34YW;F>JY"////A(?D7X3IK3"=//W*CS:4T-2!4R9+EWW
MRZNH^2LSA,Y,'W9*OCTE5_>KMWC%C)[2O:?2OP^UV6EY%;5X,H4'2BD0]C"E
M`M,S]5&FJW$MO7Y8-L68:=E0LQ?$AHESF%@K1&B]G\4]YY?J]ST6VWV['I1K
MIIBTIT5#I<)-C']$%3LE#NRTS5Y#_]1\$*?R3R<LMB7*F":FF#`M&A:E+[#.
M*R=1>QJ?M9WI-<)U#"WE*D^US0SF3ZL$J'R/X`@EUCT:TPF:J9RF?8J9IJ9(
M01:]K4S9E^#PQ/E*%"3S'2!<AWV;'S--&5&A%9PR%ND+E)A*8I<)4_*\38TI
MG7_-)?OM3.>NAKS/0(U,)3-]=R6Z-E,S"IQSD9K9$).M,/&/HB<A4]=BM##-
M)V332W*PE^SB+6E#_I;X,`4/)D>699K)H%:F2=Y)#UF-P;26M+'8T\^%:?)I
MI_V)>B2CFIB42DQ7HH;S3\V4`Z9FU9*BSJ/@D4:#(=],:D,U$Y^TQTXCIDG#
MLY`2M6H+K]S('S/U0[RT5/0F0SOUW;>M]FQ>/,K4MA_K3O4\SVJ&3AP,(Z9?
MYD5Q4.'-*TR35RA*9:SZ,VU9C@J9>D^%KL/4_*[*[3H.C#;PI<PQGE(;T/J-
MZTR-L[QZ!=-TGY1I='.3I32+U'$MJEU$,W\B,&GA#78:OVV6H&E>NX`N=$JF
MQC\-&GJ#N/3+F%X]RXY!.1BF-O]RA>EZ[==3_.>L^VD(#Z?.N/>EZDPC@NU,
M]<B"37NA,J:EI+QY>WH)IEQF*@[GE+F=@I>S%,3-3-GW:Y3;Z;X^BD[(U%B/
M%*R$G`<5,_`/:':Q#-/E(<0JTS;/4LW^Z<1T;C%L!3A]N)34F7(0FT?AD[J*
M3,.QQ+:)-<-7-=2/LX6>UYGNLU-UR$Y'F`KD:GOJ_J>Y/6U+N$5N53[OHT92
MC4C\(I7[*-K&-'\,IIDOM=E.T^MM9AHY'.E!:KW*<YARFMV=HE(4/^`];Z(^
M-N7F%?ZHX4T;X9=U^VFTU\14D@\_+)/.H22MZA.9AB&5>0@LE6[QK/%^\*%6
MF":?.4UV$6>"I?7[[/_.V+6+IC?0GIJ\1N97H<`SY&CA><77)/^UUVM,L[=8
M*KP1@O'R"X_GY*CRLCEIH2-VRDUVFME1E_;TG'V49AJ,6VKM:7'AVCZ@-J;I
MZ*B%Z>HBREF94EA':OU^G:FM<IR'_*Q4;%HHPJUMXI68M@58F`?.SS3_+0+8
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M,)UZ,O,RF8)^T9V#&(QVIK+*=#H[LU/;"-`5F$9YT-*Z[WI9]D%5Q^90MC"M
MN`&-RXQGRH-6;D^=+5/]&I%*Y1Q3W:*2*M=O_>E2W4Z9BVM35\G9E?_:/K#B
M(%/K+D1'E'+5FB5D:H\$X5TC,EUPMQN93CCCX\HO>U%(G.TT`\W75Q)<XW)Y
MT#C#0\N7B)^6"KO=XY0??Y!TK4K$U#^/+F&S(UTK#]H\+_463-WND;@]G7=F
M<V*GOLNZ0G5O63N)G4%:/*F5Z=(7Q9D'*MGZ5`Q"OA'3>7ZC5'@SFO`$WGF-
M\S%EES]"VM9-*;A&7GR!AZH.GM(C5+_(=>QT8KIB(QG3_-TO,B4.)_25_QU4
M.M\GEQ3M9^IMBC8R97>44G/T1ZYMJ)0NPG=@RLM=C8G_EY2IMM;IB.^W^)+F
M2KN8QALH*&&JKU)8.PD643B:PL^/Q)%QUV:Z(8W?@IW2\OD;[906)AY&9AJ_
MZS6FV]K36S`UCCH%IDGIJ@!U[/>;-E9?WT[)S(E2>`U*CG?T3^D:(_XN3(V!
ML81UMXWIQG'42$QU%2_/"UFF)>__`-.U6?0AF)*=JZLP==/*YK^T0+4]G<*N
M2B/?@IU>D^F<A++(5"2>T6RTTZI/R>(^I-(9XVP^-7"*3#F9JHH7"D@Z,UV,
MD[Y80KIBW5<^N4QAW9(#ILDX:"7B[!YV6FY/[<M<6V.C;.Z^O6^WG1[M./EZ
M7]%1F(IG60JPWAU?#*9=URTGIM3ODM>J^TQSIIK.3,\<6_*CWWK+]G1;,*Y=
M@"7_HU1PVB!TYKK_Y_[34;MA+@>*TY;+V%9B?E0.PUC>(,&S8V8'!J06`F'>
M4#]SN"YVZ8%FIK*3:7".&[FY9N+Y^N@+!YW3::'T(%.5,]U8O4DH8\I;+])%
MW_YJEZ%I%Z8VXH0.,'4!IQ-33N(IGJ3??>\43-7<GLXK']LN3#;&KYJA\7GZ
MVE_LTA1V9DKU`?_BQCC;MK^:Z7L?GH)IT._O7$"FE"F_C.E7/I"3)%R7,()/
M;9X/T%X32=B>JE<Q_;N?R#C#.7)+>J07$&UBR4V?2R?]DU\0J+/>_Z%`$`1!
M$`1!$`1!$`1!$`1!$`1!$`1!$'0!J?M)WEKJ?I*WUBMBBEY<,^6M!:9@"J9@
M"J8OOP.;O64Z"RG9/\Z1()N;1P?JVV/ZA[(OL=L4;8LKFZQ8=\7*_2JF7[8G
MFJUDRB:.9C*I0*2#SLV4'*60J7E1/W%H=)9M^\-S\\5-6<?7,S6O3A]&\-'<
MANGT]V%1(5.E@_3UCC1B_T,\4W.4O`W;EV>F8I/3J.!U\XS]UQG=C:DX$),U
MEIG*S%3*3"5B*O=CJCPVNV=L9JK\CSDUKSNJE-MF6V>JE#W'/Y8.NA131XS<
M14GO_?!,+9IF.V6AX#G;K8_W8BI3-^0MS_;N<Y-*V^H^.VMW3/4SJN:4NP%3
MVT<M,EWMHQQ3OB%3-9&5S)=RL#73R"!S7RIAZATK[TM%%GX#GU]/GCFFRNUO
M)%/OO1D'/K]+0&%]?I=7UQ%4K-R9`4)[?;H14XQ-P11,P11,P11K?%@WO3U3
MJ*_^];L"]<Z%]&\%ZJQ_]^L"==;/?TV@SOK,;PG4N^Z_(U#O7$@L4&?]=?A2
MW?7=W_O_4$L!`A0`%`````@`8`!T(*%-`D`-+0``)DL%``@````````````@
E`````````$14348N0DU04$L%!@`````!``$`-@```#,M````````
`
end
[ Section: 1/1 File: dtmf.zip Encoder: Wincode v1.4 ]
How does it work?
A digit dialed on a phone line is a simple sound containing
two special frequencies:
1 ---> 697Hz & 1209Hz
2 697 1336
3 697 1477
4 770 1209
5 770 1336
6 770 1477
7 852 1209
8 852 1336
9 852 1477
* 941 1209
0 941 1336
# 941 1477
The circuit used here uses 5 cells with a NE567 device and a
LED in each cell. Each cell will be adjusted for detecting one
of the special frequencies above in the sound carried on the phone
line. When the cell detects the frequency it LIGHTS THE LED.
The uA741 part: it's here to fix the level of the sound (like an
amplifier) that is sent to the 5 NE567 cells. At first just adjust
the 100K variable resistor at half its way.
Use the variable resistors (220K) to fix the frequency detected
on each of the 5 cells:
cell 1 has to light ONLY IF digits 1 or 2 or 3 are dialed
cell 2 has to light ONLY IF digits 4 or 5 or 6 are dialed
cell 3 7 or 8 or 9
cell 4 1 or 4 or 7 or *
cell 5 2 or 5 or 8 or 0
So cell 1 will detect frequency 697Hz
2 770
3 852
4 1209
5 1336
You can then know what digit is dialed simply by looking at the
LED or LEDs which are on:
LED1 & LED4 ---> 697Hz & 1209Hz ---> digit=1
1 5 697 1336 2
1 697 1447 3
2 4 770 1209 4
2 5 770 1336 5
2 770 1447 6
3 4 852 1209 7
3 5 852 1336 8
3 852 1447 9
4 941 1209 *
5 941 1336 0
NOTE: if u find that too many LEDs are on then it means that the uA741
part delivers too powerfull sounds. If u find that too few (or none)
LEDs are on, then it means that the uA741 part delivers sounds at
a too low level. All u have to do is fix the 100K variable resistor
to get a good working sound level delivered to the 5 cells.
The outputs OUT1...5: these r used if u want to connect ur scanner to
a computer's centronic interface. When LED1 is on, OUT1 is at the low TTL
level (0V). When LED1 is off, OUT1 is at the high TTL level (+5V). LED2..5
and OUT2..4 work in the same way.
If u r using these outputs then u must have D0=+5V so that the "TIL" chips
(these r the opto-isolators) can work. D0 is the Data bit0 output of the
centronics interface, so ur program on the computer must output a "1" on
this pin to take it to +5V.
T H E P R I N T E D C I R C U I T B O A R D :
---------------------------------------------------
The PCB construction plans (tracks, pads, components layout) used for
building it on a printed circuit board is contained in a file named
DTMFPCB.ZIP: it contains a high resolution graphic file that you can
print on a laser printer.
U S I N G I T W I T H Y O U R C O M P U T E R :
-------------------------------------------------------
If you want to use your computer for reading the digits, u have to
write a little program that reads the 5 Centronics interface inputs
(pins 10,11,12,13 and 15 connected to the scanner circuit).
The electrical state of the Centronics inputs are usually at port addr
379h: the byte read at this addr has bit7=NOT(pin11_of_the_Centronics),
bit6=pin10, bit5=pin12, bit4=pin13, bit3=pin15. All of these 5 pins are
connected to the OUT1..5 of the scanner circuit, so u just have to read
the byte at addr 379h to know which LEDs are on.
Reading the byte of the centronics inputs can be done using instructions
like "INPORTB" in C or "BYTE=INP(&H379)" in QBASIC.
***************************************************************************
[ Jojo (Jojo on Brinta BBS / email an617527@anon.penet.fi)]
***************************************************************************
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #5 of 9
***************************************************************************
H A C K I N G A N S W E R I N G M A C H I N E S
***************************************************************************
By: Jojo
This articles shows how to take advantage of a "special feature" of
some answering machines to hack their access code in less time.
ANSWERING MACHINES:
-------------------
Most of 'em can be hacked by having ur modem call that machine and try
(at each call) all the possible access codes until u hear the beeeeeep
that tells u it's the right one.
Many answering machines have 3 digits access codes, and give u 7 seconds
at each call to try to find the right access code. So u'll have ur modem
dial as many digits as possible during these 7 seconds... until u hear
the beeeeep.
THE SPECIAL FEATURE:
--------------------
Among those r some machines with the following special feature: when u
dial a list of digits it will search the right 3 digits access code in
*ALL* the list STARTING AT ANY DIGIT. If u dial 123 456 then this special
answering machine will not only see 2 codes "123" & "456": it will see
the following codes: "123", "234", "345", "456".
That's the special feature.
TAKING ADVANTAGE OF IT:
-----------------------
Instead of making ur modem dial 000, 001 ... 999 which would make 3000
digits, u can make it dial a special list of digits: that list is only
about 1000 digits long and has all the 3 digits codes in it.
I wrote a program in C to find that special list. Here is the uuencoded
file:
[ Section: 1/1 File: list.zip Encoder: Wincode v1.4 ]
Original Input File Size: 566
begin 644 list.zip
M4$L#!!0````(`&``="!+A'W1S`$``.T#```$````3$E35`W`P0W```@"P'^3
M[B(HB/-/UE[]4,6JKIHJ5;EJJU)U!118Z,(45'!A"RE<$446NSA%%5W<8HI7
MC6I6=_54J]K56YWJJT$-:[IF:E3CFJU)S9508JE+4U+)I2VE=&646>[RE%5V
M><LI7RUJ6=NU4ZM:UVYM:J^""BM=F8HJKFPEE:M#'>NZ;NI4Y[JM2]T!(-#`
M``(,+!#@0((-#BC0X((!#TUTHP<MM-&+#OHPQ#1F,,(8LYA@#B+4T$""#"T4
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M2P$"%``4````"`!@`'0@2X1]T<P!``#M`P``!``````````!`"``````````
:3$E35%!+!08``````0`!`#(```#N`0``````
`
end
[ Section: 1/1 File: list.zip Encoder: Wincode v1.4 ]
***************************************************************************
[ Jojo (Jojo on Brinta BBS / email an617527@anon.penet.fi)]
***************************************************************************
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #6 of 9
(i) // \\ (i)
(*) (-) (*) \\ MCi - 1-800-COLLECT FRAUD // (*) (-) (*)
(*) (-) \\ // (-) (*)
(*) \\ Written by PBXPhreak // (*)
.----------------------------------------------------------------.
| If you have any comments or questions about this phile then |
| send PBXPhreak email at pbxpbx@netaccess.on.ca .. you can |
| also visit my www page at http://www.netaccess.on.ca/~pbxpbx |
`----------------------------------------------------------------'
.----------------------------------------------------------------.
| Greets Go out to the Following DUDEZ!.. |
|----------------------------------------------------------------|
| Evian, Sloppy, KatKiller, Optic, Ip, Fiasco, Telmnstr, Plant |
| Darkagl, Lefty, Emmanuel, Terminal, Sinner, Snoninja, N0-D0Z3 |
| Dtmf, Plot, Rage, Ace, Dr-Freeze, Qsilver, Phractal, D-fens |
| KC, Juliet, K-RaD, T3, Theejoker, Substance, Odd, Teklord |
| CG, Doug, U4ea, Alpaca, Antix, Dip, Yuckfou, Macpass, Mdma |
| Mother, Nitzerebb, Quagmire, Hitraject, T99, T-800, Paradin |
| Digint, Seen, Dark Tangent, Dark Knight, Tek, Ajax, Black Flag |
| Motorola, XGIRL, Gweeds, Zeed, Phiber Optic, Kemo, Viciouz |
|----------------------------------------------------------------|
| - IF I MISSED YOU.. SORRY.. - PBXPhreak |
`----------------------------------------------------------------'
.--------------------------------.
| Be sure to check out |
|--------------------------------|
| www.netaccess.on.ca/~pbxpbx |
| #hack |
| #phreak (gpkbot=bot) |
| #cellular (dialtone=bot) |
| #2600 |
| #bluebox (blueboss=bot) |
| #linux (linbot=bot) |
`--------------------------------'
.------------.
| Disclaimer |
`------------'
This file is written for informational purposes only. I PBXPhreak don't
take any responsibility for any actions taken by readers of this text
.--------------.
| Introduction |
`--------------'
MCI is one of the United States leading long distance providers
and one of my favourite telephone companies. With the method explained
in this phile you can successfully call anywhere in the united states
for phree!!.
.---------------------------------------------------.
| Important MCI Numbers: |
|---------------------------------------------------|
| 800-265-5328 (800 COLLECT) |
| 800-444-1111 (Network MCI Services) |
| 800-444-2222 (Customer Service -> Proof Positive) |
| 800-444-3333 (General Information) |
| 800-444-4444 (Service Express) |
| 800-444-5555 (Proff Positive) |
| 800-374-3637 (Friends and Family set up) |
| 800-799-7994 (Customer Service) <-- *NEW* |
| 800-888-8800 (MCI Long distance help) |
| 800-945-2799 (MCI Fraud Department) |
| 800-950-1022 Calling Card Dialup |
| 800-888-8000 Calling Card DIalup |
| 800-FRI-ENDS Friends and Family Setup |
`---------------------------------------------------'
.-----------------------.
| How the Magic is Done |
`-----------------------'
I am warning you! if you are chicken shit and hate to speak to
operators then you wont like this method!!
The first step is calling 1-800-265-5328 (800-COLLECT). You will
probably want to divert if you are calling from home.
Once you are connected to the 800 # it will say .. "Thank You
for calling 1-800-COLLECT.. Please Enter the number you wish
to call .. area code first" . You will hit "0". You will then
be transfered to a MCI operator. She will come on and say "May I
have the Area code and Number you are calling". This is when you
tell the Operator how PBXPhreak defrauds MCI everyday of his life
and tell the MCI fraud squad his info!! (just kidding). When she
asks for the # you wish to call, tell her a # you want to call.
You can tell her any number except some #'s it doesnt notice in
its database. Like Defcon voice bridge (801-855-3326) and the rest
of those silly 801 partylines (801-234-4444) (801-234-7448) . She
will then ask you for your name. You will tell the operator "I would
like to charge this call on my mastercard. (Use this dead card)
She will ask for the card number. (5371-5990-0600-2787) . Now she
will ask for expiry date (01/98) . She will now ask for Zip code ..
Here is the trick. You must say its an overseas card. (she will enter
00000 into the computer) .. (MCI only checks algorithm for overseas cards)
if you told her a zipcode for the USA , the computer would check the
zipcode against the card and it would not be valid. The call should go
through. She will say. "Thankyou for using 1-800-COLLECT".
If you are using a payphone you can use the MCI Carrier Access K0DE
and it will be AUTOMATED!!.. DIAL like so.
10222+0+718-123-4567 (Enter your Number you wish to kall!!)
After you enter that you will hear a voice "MCI". Then the automated
operator will say "For a Collect call press 11". When you hear that
enter the Credit Card #. Then it will ask for expiry. Then is will ask
for Mailing Zipcode. You will enter "00000" (5 if you cant count). then
it will say "Thankyou for using MCI".
"Thankyou for ABUSiNG MCi" - PBXPhreak
.-------------.
| Final Words |
`-------------'
Well there you have it. Easy as hacking root on 127.0.0.1!!!
if you have any comments, questions, or anything else you want
send me email. the address is at the top of the phile. Until
we meet again. CYA!! /mode #hack +o PBXPhreak (hehe)
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #7 of 9
TSCM.COM - Counterintelligence and Counterterrorism WWW Page
Phone Bugging and Modifications
By: James M Atkinson
If you are reading this then you probably have a telephone, and if you have
a telephone, then you have an excellent bugging device already installed in
your home or office.
In many cases nothing has to be done to the telephone (ie: Northern Telcom)
to turn it into a room bug, but in most cases a simple capacitor (costs a
nickle) can be installed and a wire snipped to turn your telephone into a
VERY high quality bug.
Telephones have microphone, speakers, ringers, and power... everything a
good bug needs to listen in on your business or home affairs.
What follows are a few of the Hundreds of things a spy can do to turn a
telephone into an excellent eavesdropping device.
RF Transmitter
This is a classic phone bug, a small RF transmitter is attached to your
phone line somewhere.
Power may be supplied by the current on the phone line or from a battery.
Most devices of this nature only transmit when the phone is lifted off of
the switch.
RF Transmitter-w/Microphone
This is similar to the above device, but it has its own microphone, and is
typically installed inside the telephone. Normally considered a room bug.
It may transmit the RF over the phone lines as well (carrier current - 9khz
to 32mhz typical).
Infinity Transmitter/Harmonica
An older devices, which was attached to a telephone, and when called from
an outside telephone would enable the caller to listen in on room audio...
Considered obsolete, but still sold in spy shops.
Recorder Starter/Drop Out Relay
This is little more than a device that detects when you lift your phone
handset off of the hook.
Its purpose is to activate a tape recorder hidden nearby.
This type of device is popular with private investigators and "wanna-be
spies".
Some recorder starter devices also detect sound, and only activate if sound
is detected on the line.
CO/REMOBS Monitoring (Remote Obseravance)
Allows the phone company or government to legally tap/monitor your phone.
* Message split, to be continued *
--- ifmail v.2.8.lwz
* Origin: Toronto Free-Net (1:340/13@fidonet)
ƒ ALT.2600.MODERATED (1:340/26) ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒ ALT.2600.MODERATED ƒ
Msg : 12 of 12
From : Graham Bullers 1:340/13 31 Oct 96 22:57:52
To : All 03 Nov 96 06:22:34
Subj : [part 2] HACKING
ƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒƒ
.RFC-Path:
news.spydernet.com!news.pinc.com!news.bctel.net!noc.van.hookup.net!nic.win.hooku
p.net!vertex.tor.hookup.net!loki.tor.hookup.net!ve3ied!gts!torfree!ab756
From: ab756@torfree.net (Graham Bullers)
.RFC-X-Newsreader: TIN [version 1.2 PL2]
.RFC-Approved: ab756@freenet.toronto.on.ca
* Continuation 1 of a split message *
What happens is the computer that handles your calls is instructed to
transmit a real time digital copy of your call to anywhere in the world.
All that is required is access to the ESS translation, and access to a
T-Carrier or OC-xx data line (a normal "loop" line is rarely used).
With a 622mb fiber optic line most users can easily access (record) over
11,100 lines at a time in a local area.
This function of the phone system is very loosely controlled as the
maintenance people at the phone company use it for routine maintenance.
Any computer hacker/PHreaker can easily access the system.
Savvy Private Investigators and Insurance companies have been known to
illegally use this system to gather information on targets...
Hookswitch Bypass Methods
Inside your telephone is a switch that disconnects the microphone in your
telephone handset when the telephone is hung up (Hookswitch).
If the telephone is modified (cut one wire, install cap) then the
microphone will be hot all the time.
If the microphone is hot all the times then the "spy" can go anywhere
outside of the the building; plug a audio amplifier/monitor into the line;
and gets clean room audio now.
It is effectively the same as installing a microphone in the room or
building.
Several types of Hookswitch Bypass Methods follow:
* Resistance/Capacitance Bypass
* Capacitance Bypass
* Spare Pair Bypass
* Spare Pair to Microphone Bypass
* Spare Pair to Earpiece Bypass
* Third Wire Bypass
* Ground Return Bypass
* Reversed-Biased Diode Bypass
* Neon Bulb Bypass
* Four-Layer Device
* Ringer
* Handset Wiring Change
Comments
To be contacted for a confidential consultation
please E-mail: jmatk@tscm.com
or send a letter via US Mail to:
James M. Atkinson
Granite Island Group/TSCM.COM
127 Eastern Avenue #291
Gloucester, MA 01931-8008
or call:
(508) 546-3803 Telephone
URL: http://www.tscm.com/
Copyright c 1993, 1994, 1995, 1996 James M. Atkinson
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #8 of 9
Is the NSA Watching?
From NorthStar Mailing List
Julian Assange's thoughts were:
>From best-of-security-request@suburbia.net Wed Jun 12 07:59:58 1996
Resent-Date: Wed, 12 Jun 1996 20:18:48 +1000
Date: Wed, 12 Jun 1996 20:18:43 +1000
From: Julian Assange <proff@suburbia.net>
Message-Id: <199606121018.UAA07143@suburbia.net>
To: best-of-security@suburbia.net, lacc@suburbia.net
Resent-Message-ID: <"PQG5a.0.nl1.6cfln"@suburbia>
Resent-From: best-of-security@suburbia.net
X-Mailing-List: <best-of-security@suburbia.net> archive/latest/107
X-Loop: best-of-security@suburbia.net
Precedence: list
Resent-Sender: best-of-security-request@suburbia.net
Subject: BoS: NSA is monitoring key internet routers - Puzzle Palace Author
The National Security Administration is Poised to Control the Internet
The oppressive atmosphere of Orwell's 1984 arises from the omnipresence of
Big Brother, the symbol of the government's concern for the individual. Big
Brother controls the language, outlawing words he dislikes and creating new
words for his favorite concepts. He can see and hear nearly everything -
public or private. Thus he enforces a rigid code of speech and action that
erodes the potential for resistance and reduces the need for force. As Noam
Chomsky says, propaganda is to democracy what violence is to
totalitarianism. Control thoughts, and you can easily control behavior.
U.S. history affords a prime example in the era named after Senator Joseph
McCarthy, though he had many supporters in his attack on freedom of thought
and speech. Perhaps his most powerful friend was J. Edgar Hoover, who fed
him material from FBI files (some of it true) which he used to attack
individuals for their supposed political leanings. By the time of
Watergate, the CIA had become at least as notorious as the FBI, due largely
to its assassinations of foreign leaders and support for military coups
around the world.
Now its the 90's. A computer revolution seems to be happening and with it a
dramatic increase in people using the Internet, as well as people watching
what the people use it for. Ever heard of the NSA? This could very well be
the NSA decade for the Internet. Conspiracy, power struggles and
survellience of the citizenry may be what is remembered about the NSA
during this period of time. I used to think democracy meant people keeping
a watchful eye on its government, not its government keeping a watchful eye
on its people. Today we can now see comparisons being drawn between the FBI
of the 50s and the CIA of the 60s, the obvious government corruption in the
70s, Reagan in the 80s (sorry - that was just incompetence), and the
emerging role of the NSA in the 90s.
Is NSA Sniffing the Internet? Do they have the jurisdiction? Lets take a
look back and see what they are all about and make an educated hypothesis.
Budgetary authority for the National Security Agency (NSA) apparently comes
from the Central Intelligence Act of 1949. This act provides the basis for
the secret spending program known as the black budget by allowing any arm
of the government to transfer money to the CIA "without regard to any
provisions of the law," and allowing the CIA to spend its funds as it sees
fit, with no need to account for them.
Congress passed the C.I.A. Act despite the fact that only the ranking
members of the Senate and House Armed Services Committees knew anything
about its contents; the remaining members of Congress were told that open
discussion, or even clear explanation, of the bill would be
counterproductive. There were complaints about the secrecy; but in the end
the bill passed the House by a vote of 348-4, and the Senate by a majority
voice vote. Hmmmm, it seems several legislative disasters have occurred by
landslides. Anyone remember the Telecommunication Attack of 1996?
The NSA's estimated $10 billion annual allocation (as of 1990) is funded
entirely through the black budget. Thus Congress appropriates funds for the
NSA not only without information on the agency's plans, but without even a
clear idea of the amount it appropriates; and it receives no accounting of
the uses to which the funds were put. This naturally precludes any debate
about the direction or management of such agencies, effectively avoiding
public oversight while spending public funds. Weiner notes the analogy to
"Taxation without representation." In any respect, it seems to be
unconstitutional - a major point that has failed to stop them.
"The NSA has also spent a great deal of time and money spying on American
citizens. For 21 years after its inception it tracked every telegram and
telex in and out of the United States, and monitored the telephone
conversations of the politically suspect." (Weiner, Blank Check)
Due to its unique ability to monitor communications within the U.S. without
a warrant, which the FBI and CIA cannot legally do, NSA becomes the center
of attempts to spy on U.S. citizens. Nominally this involves only
communications in which at least one terminal is outside the U.S., but in
practice target lists have often grown to include communications between
U.S. citizens within the country. And political considerations have
sometimes become important. Oh yeah, I forgot to mention that in the NSA's
Charter they claim to be unable to spy on US citizens. Apparently, the real
charter is as elusive as what they do with taxpayer money.
The Huston Plan, formally known as "Domestic Intelligence Gathering Plan:
Analysis and Strategy," was submitted in July 1970 to President Nixon. The
goal of the plan was to relax some restrictions on intelligence gathering,
apparently those of NSCID No. 6. Some parts of the intelligence community
felt that these relaxations would assist their efforts.
Like most intelligence agencies, the NSA uses words such as "interrupt" and
"target" in a technical sense with a precise but often classified
definition. This specialized language makes it difficult to legislate or
oversee the activities involved. For instance, in NSA terms a conversation
that is captured, decoded if necessary, and distributed to the requesting
agency is not considered to be the product of eavesdropping unless one of
the parties to the conversation is explicitly targeted. However, the NSA
does not depend on semantic defences; it can also produce some legal
arguments for exempting itself from normal requirements. How convenient.
For those who feel your lives are too flawless to be affected, or for those
of you who actually vote Republican or Democrat thinking the change will
come from within (nice try), and for the lowest common denominator -
dittoheads, this is not a good thing. Complete control over a secret agency
with at least 60,000 direct employees, a $10 billion budget, direct command
of some military units, and the ability to read all communications would be
an enormous weapon with which to maintain tyranny were it to arise. A
President with a Napoleonic or Stalinistic delusion would find the perfect
tool for the constant supervision of the individual by the state in the
NSA; not unlike scenarios depicted in novels such as Orwell's 1984.
====================================
1) NSA Homepage
http://www.nsa.gov:8080/
2) NSA Can Break PGP Encryption
http://www.quadralay.com/www/Crypt/NSA/break-pgp.html
3) Houston Chronicle Interview
http://www.quadralay.com/www/Crypt/NSA/letter.html
4) Original Charter of the National Security Agency
http://www.quadralay.com/www/Crypt/NSA/charter.html
5) CFP'92 - Who Holds the Keys?
http://www.cpsr.org/dox/conferences/cfp92/denning.html
====================================
Americans would not have any privacy left, such is the capability to
monitor everything: telephone conversations, telegrams, or in our case
email, it doesn't matter. There would be no place to hide. If this
government ever became a tyranny, if a dictator ever took charge in this
country, the technological capacity that the intelligence community has
given the government could enable it to impose total tyranny. There would
be no way to fight back because the most careful effort to combine together
in resistance to the government, no matter how privately it was done, is,
and would continue to be, within the reach of the government to know. Such
is the capability of this technology ...
I don't want to see this country ever go across the bridge. I know the
capability that is there to make tyranny total in America, and we must see
to it that this agency and all agencies that possess this technology
operate within the law and under proper supervision, so that we never cross
over that abyss. That is the abyss from which there is no return...
So, is the NSA 'sniffing' on the Internet? Does their reputation seem
worthy of our trust and respect? Lets take a look at some of their recent
plans for Internet communication. Then you can decide for yourself if you
want to watch the magic act....the "now you see it....now you don't" act
starring Freedom, of course.
Puzzle Palace co-author Wayne Madsen, in an article written for the June
1995 issue of Computer Fraud & Security Bulletin (Elsevier Advanced
Technology Publications), wrote that "according to well-placed sources
within the Federal Government and the Internet service provider industry,
the National Security Agency (NSA) is actively sniffing several key
Internet router and gateway hosts."
Madsen says the NSA concentrates its surveillance on destination and
origination hosts, as well as "sniffing" for specific key words and
phrases. He claims his sources have confirmed that the NSA has contracted
with an unnamed private company to develop the software needed to capture
Internet data of interest to the agency.
According to Madsen, the NSA monitors traffic primarily at two Internet
routers controlled by the National Aeronautics and Space Administration
(NASA), one in College Park, MD (dubbed "Fix East") and another at NASA
Ames Research Center in Sunnyvale, CA ("Fix West").
Other NSA Internet sniffers, he said, operate at busy routers known as Mae
East (an East Coast hub), Mae West (a West Coast hub), CIX reportedly based
in San Jose), and SWAB (a northern Virginia router operated by Bell
Atlantic).
Madsen continues on to say the NSA may also be monitoring traffic at
network access points (NAPs), the large Internet gateways operated by
regional and long-distance service providers. The NAPs allegedly under
surveillance are in Pennsauken, NJ (operated by Sprint), Chicago (run by
AmeriTech and Bell Communications Research), and San Francisco (Pacific
Bell).
Madsen claims the NSA has deals with Microsoft, Lotus, and Netscape to
prevent anonymous email. "One senior Federal Government source has reported
that NSA has been particularly successful in convincing key members of the
US software industry to cooperate with it in producing software that makes
Internet messages easier for NSA to intercept, and if they are encrypted,
to decode," Madsen wrote. "A knowledgeable government source claims that
the NSA has concluded agreements with Microsoft, Lotus and Netscape to
permit the introduction of the means to prevent the anonymity of Internet
electronic mail, the use of cryptographic key-escrow, as well as software
industry acceptance of the NSA-developed Digital Signature Standard (DSS)."
Similarly, according to reports in several trade magazines, the Defense
Messaging System (DMS) developed by the Pentagon is nearly ready for
implementation, but prospective users are threatening to shun the universal
e-mail platform unless Pentagon officials eliminate cumbersome security
procedures designed by the NSA.
DOD designed DMS a decade ago to replace the aging AUTODIN message system
and to serve as the armed services' global e-mail infrastructure. Officials
familiar with DMS' security features, which rely on the National Security
Agency's Fortezza encryption card, said the system's slowness is likely to
alienate users who send mostly unclassified messages over commercial e-mail
systems. Users of wireless systems are also complaining about the high
overhead.
The DMS adopted the Fortezza card and is expected to implement over 450,000
cards in the next few years. Inside sources note that the NSA is using the
DMS as a justification for paying companies such as Microsoft and Netscape
to adopt the Fortezza card as a standard for their products. NSA has pushed
agencies such as the CIA, NASA, IRS and the Federal Reserve to adopt
Fortezza without success.
Cost is also a major factor. Fortezza's PCMCIA cards cost nearly $100 each
and all computers must be equipped with a card reader that costs an
additional $150. (Would you like to have to buy a modem or pre-assembled
computer system that would make it easier for the NSA to monitor your
communications? Not me!)
Is the NSA really snooping on the Net? If they are, would that violate the
agency's charter, which specifically prohibits it from spying within the
US? "Well, Net traffic is routed from God knows where to God knows where
around the world," says George Washington University Professor Lance
Hoffman, a professor of Communications and Telecommunications Systems
Policy at George Washington University. "So if the NSA is doing this, they
could say they are not violating their charter not to spy in the US. That's
the thing. Intelligent routers send stuff any which way."
What can be done? - you say. There is a solution. Encryption. Next issue
will discuss trap doors and your right to encryption as strong as you can
make it.
====================================
6) The Agency That Came in from the Cold
http://www.ams.org/committee/profession/shaker.html
7) The Codex Surveillance & Privacy Page
http://www.thecodex.com/
8) Profiles of the U.S. Intelligence Community
http://www.kimsoft.com/korea/usintel.txt
9) Intelligence and CounterIntelligence
http://www.kimsoft.com/kim-spy.htm
10) The National Security Administration
http://hops.cs.jhu.edu/~arvi/nsa.html
*** proteios@indirect.com PLEASE send us any other relevant URLs you may
find ***
====================================
----------------------------------------------------------------------------
NorthStar is an Internet Distribution List provided by the Internet Users
Consortium
a fiercely independent Grass Roots organization founded by Martin Thompson
and Kenneth Koldys, Jr, to inform and coordinate Internet Users concerning
political and government actions against the complete self-actualization
of the Internet and our Constitutional Rights in Cyberspace.
----------------------------------------------------------------------------
Past issues of NorthStar are archived at the NorthStar Archive
http://www.iuc.org/www/proteios/northstar.html
on the Internet Users Consortium WWW site
----------------------------------------------------------------------------
***Please feel free to distribute NorthStar to as many people and relevant
forums as possible. That is one way to inform, educate and take action.
All we ask is that you keep NorthStar intact. It is concise for that very
reason.
***If you wish to submit an article to NorthStar, please send your
article to proteios@iuc.org
--
[ route@infonexus.com ] Guild member, Information enthusiast, Hacker, demon
...this universe is MINE... I am *GOD* here...
* * * * * * * * * * * * * * * * * * * *
-= H A C K E R S =-
Issue #8, File #9 of 9
The End
Hackers Magazine Next issue will be out on time.
* * * * * * Until then, remember to link the Hackers
317 MLKing BLVD home page. Keep those letters coming,
Newark, NJ 07103 and keep your eyes on this space. A lot
(201) 623-2510 of good things to come.
mrs3691@megahertz.njit.edu
http://people.delphi.com/scanlonr
And where ever you hack, may the ethic be with you!