• Tidak ada hasil yang ditemukan

Wiley The Best Of 2600 A Hacker Odyssey Jul 2008 ISBN 0470294191 pdf

N/A
N/A
Protected

Academic year: 2019

Membagikan "Wiley The Best Of 2600 A Hacker Odyssey Jul 2008 ISBN 0470294191 pdf"

Copied!
889
0
0

Teks penuh

(1)
(2)

Wiley Publishing, Inc.

The Best of

2600

A Hacker Odyssey

(3)

Wiley Publishing, Inc.

The Best of

2600

A Hacker Odyssey

(4)

10475 Crosspoint Boulevard Indianapolis, IN 46256

www.wiley.com

Copyright © 2008 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada

ISBN: 978-0-470-29419-2

Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1

No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.

Limit of Liability/Disclaimer of Warranty:The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies contained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read. For general information on our other products and services or to obtain technical support, please contact our Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002.

Library of Congress Cataloging-in-Publication Data: Goldstein, Emmanuel,

1959-The best of 2600 : a hacker odyssey / Emmanuel Goldstein. p. cm.

Includes bibliographical references and index. ISBN 978-0-470-29419-2 (cloth)

1. Computer security—History. 2. Computer crimes—History. 3. Computer hackers—History. 4. Telecommunication—Security measures—History. 5. Wiretapping—History. I. 2600. II. Title. III. Title: Best of 2,600.

QA76.9.A25G643 2008 005.8—dc22

2008018567 2

Trademarks:Wiley and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book.

(5)

This book, and all of the articles contained herein, is dedicated to anyone

who has in any way proclaimed themselves “different from the rest” and

has had the courage to stand up against the forces of sameness which

(6)
(7)

About the Author

Emmanuel Goldstein(emmanuel@goldste.in) has been publishing 2600 Magazine, The

Hacker Quarterly,since 1984. He traces his hacker roots to his high school days in the late ’70s, when he first played with a distant computer over high-speed, 300-baud phone lines. It didn’t take long for him to get into trouble by figuring out how to access something he wasn’t supposed to access. He continued playing with various machines in his college days at the State University of New York at Stony Brook. This resulted in an FBI raid as he once again gained access to something he really shouldn’t have. It was in the midst of all of this excitement that he cofounded 2600 Magazine, an outlet for hacker stories and tutorials from all over the world. The rapid growth and success of the magazine was both shocking and scary to Goldstein, who to this day has never taken a course in computers. Since 1988, he has also hosted Off The Hook, a hacker-themed technology talk show on WBAI 99.5 FM in New York City. In addition to making the hacker documentary Freedom Downtime, Goldstein hosts the Hackers On Planet Earth (HOPE) conferences in New York City every two years, drawing thousands of hackers from all over the world.

You can contact 2600online at www.2600.com or by writing to 2600 Magazine, P.O.

(8)

Executive Editor Carol Long

Development Editor Maureen Spears Production Editor Elizabeth Ginns Britten Copy Editors

Kim Cofer Mildred Sanchez

Editorial Manager Mary Beth Wakefield

Production Manager Tim Tate

Vice President and Executive Group Publisher

Richard Swadley

Vice President and Executive Publisher Joseph B. Wikert

Project Coordinator, Cover Lynsey Stanford

Compositor Chris Gillespie,

Happenstance Type-O-Rama

Proofreader Sossity Smith

Indexer Jack Lewis

Cover Image

©Toledano/Stone+/Getty Images

(9)

Acknowledgments

T

his is far and away the toughest part of the book to write. How do I sum up in words what so many people have meant over so many years? I’ll undoubtedly for-get someone, they’ll notice, words will be exchanged, and new enemies for life will be formed. It’s a painful yet necessary part of the process.

From the beginning there have been people who have been there to encourage me in various endeavors, 2600included. And there have also been those who have actively sought to discourage me and painstakingly point out the many errors of my ways. I would like to thank each of these groups equally. The former gave me the positive rein-forcement that helped convince me that this was all worth it and that it would eventually have a beneficial and lasting effect. The latter gave me the obstinacy and unmitigated wrath to prove them wrong. A positive outlook fueled by anger is really all you need to succeed in this world.

On to specifics. First, I must thank three people who helped me wade through well more than 1,000 articles to sort out the ones that would eventually appear here: Tony Fannin, Mike McTeague, and Kevin Reilly. It was a mountain of material, but I managed to scale it successfully thanks to their help. The many people at Wiley who dealt with our rather unconventional way of piecing together a book deserve particular thanks, espe-cially Carol Long and Maureen Spears. The hard work of my agent, Cameron McClure, made this all come together with remarkable speed and clarity.

(10)

And some of our projects have been pretty bizarre. And, speaking of bizarre, the magazine covers, T-shirt art, web site work, and various designs for the HOPE confer-ences, put together by such artists as Frederic Guimont, Holly Kaufman Spruch, Kiratoy, Kerry Zero, Tish Valter, and Affra Gibbs, have been nothing short of eye-opening in every regard.

Oh, yes, the HOPE conferences—how could I forget? Since 1994, we’ve been hold-ing hacker conferences in New York City called Hackers On Planet Earth, which have drawn thousands of people from all over the globe to the historic Hotel Pennsylvania. And this has all been made possible by a phenomenal volunteer effort, which would take many more pages than I have to adequately acknowledge. Nothing symbolizes the power of the hacker community more than seeing hundreds of people come together to pull off a feat like this every couple of years, a feat which is, of course, impossible. Having these conferences is indeed a real motivation to keep doing what we’ve been doing. It’s one thing to sit back and write stuff from some remote location; it’s quite another to actually meet the audience and hear their stories and realize that it all actu-ally matters.

And none of this would have ever been possible (for me, at least) without the cre-ative inspiration that I got from working at a magical place called WUSB, the non-commercial radio station at the college I went to: the State University of New York at Stony Brook. My fondest memories of the station include cohosting the eclectic pro-gram “The Voice of Long Island” with my good friend Mike Yuhas back in the early ’80s. That place (both the college and the station) taught me so much about diversity and imagination. I was able to steer all of the creative energy from there to the various projects that I became involved in after graduation. I can honestly say that none of this would have ever happened were it not for that initial inspiration. This also led to my involvement with another magical place: WBAI-FM in New York City, a full-power noncommercial station that reaches four states, accepts no corporate money and basi-cally exists to challenge the status quo. (Do I even have to point out how impossible this is as well?) They gave us an outlet for the hacker perspective on technology and

Off The Hookwas thus born. That radio show gave hackers a voice and served as a valu-able staging ground for everything from the Free Kevin movement to our defense against the Motion Picture Association of America when they decided to sue us. Particular thanks must go to past program director Andrew Phillips, who recognized this need before even I did.

(11)

Thanks must also go to Mike Tsvitis who printed our magazine for decades and truly helped us achieve levels of excellence we had only dreamed about.

The international community of hackers continues to inspire me every day. Nothing is cooler than going to some far off remote land and discovering that there are people there who are asking the same questions, performing the same experiments, and gen-erally engaging in the same level of mischief as those of us back home; it’s just further proof that hacking is a distinct part of the human genome.

And of course, none of any of this would have happened were it not for the many people who have written for 2600over the years. Even if your work doesn’t appear in these pages—for that matter, even if your work hasn’t been published in the magazine itself—know that your interest, feedback, and willingness to actually put pen to paper and come up with something different and engaging is the driving force for everything that we’ve been doing since 1984. I cannot thank all of you enough.

And finally of course, a special thank you to God for not striking me down with a bolt of lightning despite the many requests s/he must get on a daily basis. Respect.

(12)
(13)

Contents

Introduction . . . xiii

I

The 1980s: In the Beginning . . . 1

1

Stories and Adventures . . . 3

2

The Last Days of Ma Bell . . . 21

3

New Toys to Play With . . . 65

4

The Early Days of the Net . . . 119

5

Corporate History . . . 157

6

Raids . . . 179

7

The Hacker Philosophy . . . 207

II

The 1990s: The World Discovers Hackers . . . 231

8

Pop Culture and the Hacker World . . . 233

9

The Computer Revolution . . . 277

10

Learning to Hack Other Things . . . 313

11

More Hacker Stories and Adventures . . . 381

12

The Changing of the Telephone . . . 421

(14)

14

The Lawsuits . . . 573

15

Still More Hacker Stories . . . 601

16

A New Era of Telephony . . . 651

17

Retail Hacking . . . 691

18

Toys of the 21st Century . . . 731

(15)

Introduction

T

he question we get asked more than any other at 2600is how in the world did we pull this off? Meaning, I suppose, how did we manage to not only put out a mag-azine for nearly a quarter century that was written by hackers but also to get the main-stream public to take an interest in our subject matter?

Well, it certainly wasn’t easy. I guess the first thing to make clear—and probably the one fact that both those who love us and those who hate us can agree upon—is that it was never supposed to get this big. When we first started out in 1984, we never envi-sioned it going beyond a few dozen people tied together in a closely knit circle of con-spiracy and mischief. Those first issues were three sheets of paper with loose leaf holes punched in the sides stuffed into envelopes. In late 1983, we sent messages to a bunch of bulletin board systems (BBSes) that had hacker content on them. In these messages, we invited people to send in self-addressed stamped envelopes and in return they would get a free copy of the premiere edition of our new hacker magazine. I’ll never forget the thrill I got from seeing the first responses come in the mail.

As for content, we had grown into an interesting group of storytellers and educators by way of the BBSes. Basically, by logging onto one of these systems, we would be able to find other people who seemed able to string together a sentence or two and either tell an interesting tale of a hacker adventure or explain to someone exactly how a par-ticular computer or phone system worked. This is how the core staff developed. And we always knew there would be more people out there to add to the mix.

(16)

When we mailed that first issue, we didn’t know what to expect. Arrest and impris-onment was one possibility that crossed our minds. There was, after all, an investiga-tion underway into some of the people involved in the magazine before we had ever published our first issue—something to do with logging onto computers that didn’t belong to them using other people’s names. Back then, having a computer was some-thing reserved for very few people. There was no Internet to explore. Apart from the BBSes, the only way to learn about real systems that actually did something was to fig-ure out a way to get connected to them and absorb as much as you could. It was never about being malicious or destructive, although even then we had our hands full fight-ing that misconception, which was fueled by the mass media. We were a diverse bunch of curious folk, exploring a new universe and sharing our findings with anyone who cared to listen. We were dangerous.

Strange things started to happen after we sent out the first 2600in mid January of 1984. People started to send in checks for an entire year! Our magazine became the talk of the BBS world and, we would later learn, numerous corporate boardrooms and government agencies. It seemed such a simple idea and yet nobody else was doing it. There had been a newsletter before 2600known as TAP, which had started publishing back in the ’70s with the help of Abbie Hoffman and a bunch of Yippies. It was a fun publication but it came out sporadically and eventually stopped altogether in the early ’80s. What people saw in 2600was something previously unheard of in this commu-nity: consistency. Every month at the same time we released a new issue. And not only was it consistent, but it actually looked somewhat professional, thanks to my recently acquired job as a typesetter for an unsuspecting local newspaper. It really felt as if everything had come together at just the right time for 2600to be born.

After the first year, when people started to actually renewtheir subscriptions, we knew we were on to something. The word continued to spread, more writers came out of the woodwork, and the media followed our every move with rapt attention. While technology was booming, it was still very early in the whole computer revolution. We were seen as pioneers, and I quickly became a “computer expert” even though I had never taken a course and wasn’t particularly technical. It didn’t seem to matter. Any time something happened involving computers or telephones, it was assumed the staff of 2600knew all about it—that is, if we weren’t in fact accused of being responsible for it in the first place!

(17)

and bookstores! That’s when I realized I must have been dreaming, because this was never supposed to happen.

A good deal of the reaction and attention that has surrounded 2600has occurred because of the almost mystical aura surrounding the world of computer hacking. So why all the fascination with hackers anyway? To understand this you simply have to study the American spirit. Despite what much of the world may think today, Americans cherish individuality and innovation and they simply adore a rebellious spirit. The hacker world could not be defined more accurately than with these words. How many movies have been made where the protagonist breaks the rules and fights a system that doesn’t care and doesn’t understand? Are we not always cheering for the individual and hoping that they find the truth and blow the whistle? We have only to look at some of our greatest heroes—Benjamin Franklin, Nikola Tesla, Martin Luther King, Jr.—to see that individual thought and a steadfastness of purpose are prized attributes that can often lead to great things. There was a bit of a hacker in all of these great minds.

Of course, Alexander Graham Bell was another of those people that we all look up to, both inside and outside the hacker community. The Bell system was one of the first massive networks to capture the imagination of a type of hacker referred to as a phone phreak. This was what people played with before computers came along, and I have to admit, it’s always fascinated me more than most other things. Relatively few people today even know what it used to be like when there was just one telephone network. We were lucky with our timing of 2600in that it started publishing at the precise time when the Bell system was splitting apart. So we were there to explain how it all worked and also explore all of the new systems that were coming into being at the time. And, as those in charge seemed incapable of designing easy-to-understand methods of mak-ing phone calls through alternative companies, we became by default the experts on how to place a simple telephone call and, by extension, how to save money.

This ties in to something else the hacker community has always endorsed: free com-munications. Back before my time, the early phone phreaks were going around whistling a special frequency into the telephone. The long-distance phone network, upon hearing that particular tone, would then enter a mode where the caller could input all sorts of other tones and route phone calls all over the world. In addition to regular phone numbers, the caller would then be able to access all sorts of internal numbers as well, things that only operators should be able to do. The trick was that the system assumed the caller was an operator, which basically opened an almost unlimited number of doors. This was called blue boxing. Some people used it to avoid expensive long distance charges. Others used it to map out the system and figure out how it all tied together. And the special frequency that started this whole process? Why, 2600 hertz of course!

I actually didn’t like the name “2600” at first. I wanted something stupid like “American Technological Journal.” I’m forever indebted to those who worked hard to

(18)

change my mind. “2600” summed it all up. It was all about reaching out and grabbing technology, making it do what you wanted to do, and communicating with people all around the globe. Not to mention the fact that in any alphabetical list of publications, we would always be first. It was a match made in heaven.

Of course, running the magazine itself has been anything but heaven. When you deal with material that is—to put it mildly—controversial, you wind up with an im -pressive number of powerful people who want to see you go down in flames. Our very existence has embarrassed almost every major corporation at some point, resulted in numerous emergency board meetings, and made some people’s jobs a bit harder. None of that was our intent, although that’s little comfort to those affected. What we’ve always been primarily interested in doing is simply getting the information out there and watching it grow into something productive. Phone companies have learned not to leave sensitive billing information on computers with default passwords that any-one can access. Credit agencies now actually work to protect all of that data they keep on every one of us. And the people who design secure systems, many of them our read-ers and sometimes writread-ers, know how to think like hackread-ers, which makes their cre-ations innovative and flexible. I believe we’ve contributed quite a bit of good to the world of technology and things are better now than they would have been had we never come on the scene. Of course, that doesn’t mean there haven’t been numerous attempts to put us out of other people’s misery. But when someone believes firmly in freedom of speech and full disclosure, it’s kind of impossible to shut him up.

(19)

Chapter 1:Stories and Adventures

Chapter 2:The Last Days of Ma Bell

Chapter 3:New Toys to Play With

Chapter 4:The Early Days of the Net

Chapter 5:Corporate History

Chapter 6:Raids

Chapter 7:The Hacker Philosophy

I

The 1980s:

(20)
(21)

1

Stories and Adventures

O

ne of the true joys of the hacker world is the wealth of firsthand accounts that

get shared throughout the community. Everyone has a story and many hack-ers have a whole treasure trove of them. This is what comes from being an inquisitive bunch with a tendency to probe and explore, all the while asking entirely too many questions. The rest of the world simply wasn’t prepared for this sort of thing, a fact that hackers used to their advantage time and again.

In the hacker world, you can have adventures and obtain information on a whole variety of levels, using such methods as social engineering, trashing, or simply com-municating and meeting up with each other. All of these methods continue to work to this day. Back in the 1980s, excitement via a keyboard was a fairly new concept but it was catching on pretty fast as personal computers started to become commonplace. It seemed incredible (and still does to me) that you could simply stick your telephone into an acoustic modem, type a few letters on a keyboard, and somehow be commu-nicating with someone in an entirely different part of the country or even another part of the globe. Of course, hackers had already been having all sorts of adventures on tele-phones for years before this, whether it was through boxing, teleconferencing, or just randomly calling people. And there were also the occasional “real-life” adventures, something hackers were certainly not averse to, contrary to the usual stereotypes of pasty-faced teenagers who feared going outside and interacting with the world. The point is that whenever you got a bunch of bored, curious, and daring individuals together, it didn’t really matter what the setting was. On the screen, over the phone, or in real life, there was fun to be had and plenty to be learned in the process.

Tales from the Distant Past

(22)

A Story of Eavesdropping (April, 1986)

Everybody knows an old man who was in the Second World War and has plenty of war sto-ries to tell. Well sometimes it pays to take the time to listen.

We knew that the enemy was monitoring all of our international radiotelephone channels, despite the sophisticated voice-scramblers which “inverted” speech, making high tones into low ones and vice versa. Only authorized persons were permitted to use overseas telephone circuits.

We were equipped with elaborate recorders and switching control boxes which per-mitted us to cut off either side of a conversation, or to substitute ourselves for either party. A strict set of rules forbade us to permit maritime information, weather reports, cargo information, etc. to pass over the circuits.

Influences in Washington sometimes resulted in orders issued to us to permit use of the overseas telephone circuits, even though we were suspicious of previous conversa-tions because parables and unusual phrases often used, made it difficult to follow what was being said. “How can we monitor carefully, when we can’t understand what they’re saying?” went unheeded.

We caught one fellow red-handed in South America using weird terms like “birds leaving the nest with a basket of eggs.” I finally cut in the circuit and told him I’d for-gotten what they meant. He tried a couple of other phrases, which I also couldn’t understand. Finally, he lost his patience and blurted out, “Oh hell. I’m talking about those special munition orders which left yesterday for Germany.”

By this time, a special telephone speech scrambler had been developed which was small enough to fit and use on a desk. Its availability was extremely limited, but a couple of army officers—one in the U.S. and the other in Panama—had been able to get hold of a pair of them, and between them secretly installed them on their desks, unbeknownst to us of course!

One day I heard the fellow in Panama say, “OK Joe, now over to the scrambler,” and their ensuing conversation became unintelligible. We quickly checked the radio tele-phone circuit equipment and discovered that the technical characteristics of the equip-ment they were using and our own were identical. As a result, when they inserted their scramblers the speech inversion righted itself and their conversations went out over the radiotelephone circuit in clear language—readable by anyone! That was the end of the use of their private “secret conversation system.”

(23)

General Marshall in Washington had General Eisenhower on the line in London who couldn’t understand a word of what Marshall was saying. Marshall repeated sev-eral times “Ike, this is GCM—Marshall—GCM—got it?” without results. Finally in frustration Marshall turned to an aide and could be plainly heard to say “What’s the code word for my name?”

The next thing we knew, Marshall was slowly and distinctly repeating his code name interspersed with “GCM” and “Marshall.” Of course, we had to cut the circuit and notify the code group in Washington to immediately “bust” the code—we couldn’t take any chances—revelation of the code word for his name might have been all the enemy intelligence was waiting for to help it “code-break” other communications.

On the other hand, President Roosevelt and Prime Minister Churchill were two of the best and easiest to monitor. Both used references to previously transmitted overheard messages by numbers and most of the conversations were along the lines: “Well Winnie, on number 528, I really don’t think we should do that—you know how they are.” Nobody could gain any information from listening to their telephone conversations.

I always enjoyed listening to Sir Winston originating a call. The British telephone operators were required on everyconnection to announce in advance of a conversation: “You are warned not to mention the names of vessels, sailing dates or conditions, car-goes, weather, etc., etc., etc., any violation on your part will result in the circuit being cut off and your action being reported to the highest authority. Do you understand?” Sir Winston always dociley replied. “Yes ma’am. I understand.”

One enemy group had learned the “language” of speech inversion. For example, lis-tening on the air to a radiotelephone circuit, one might hear a word that sounded exactly like krinkanope. That was the word telephoneafter it had passed through the speech inversion system!

The First Atomic Bomb: A True Tale (March, 1984)

This story was originally related by Laura Fermi, widow of the nuclear physicist Enrico Fermi who, along with assorted colleagues, participated in the first test bomb in the desert outside Alamogordo, New Mexico, in the early morning hours of a summer day in July 1945. When the date had been established for the secret test, staff members from the Manhattan Project (as the secret test was known) were invited to bring their spouses to New Mexico to watch the results of the several years of research. Each staff member had been assigned spe-cific tasks to handle while there. Generally, they acted as observers and were stationed in a circle around the perimeter of the bomb site. Enrico and Laura were stationed in an area about twenty miles to the southwest of the bomb site.

The morning came when the bomb was scheduled to be detonated in the test. Laura told it like this…

(24)

Enrico and I woke up at 3:00 a.m., to go to the site. The test was scheduled for 4:30 a.m. that day, which was July 19, 1945. We drove to our post, about twenty miles from the site. It had been arranged that the nearly 100 of us present would be located in a circle about 100 miles in circumference surrounding the bomb site. We were all to be in communication with each other over telephones, all of which were connected through the exchange in Alamogordo.

We arrived at the site at 4:15 a.m. and almost immediately it began to rain, quite a heavy, very typical torrential downpour during the summer. We waited in our car, and at 4:30 a.m. the time came and went, but the bomb did not go off. Enrico and I assumed it might have been postponed due to the rainstorm, but decided to check with the other staff members to see for sure. For some reason, the telephone there at the site did not seem to work; the operator would not respond. (Note: At that time, nearly all phones in the United States, and certainly in New Mexico, were manual. No dialing of any sort was possible—you had to use the operator for everything.)

Finally Enrico decided that we would drive into town and try to contact the others and see what went wrong. So we drove back to town, and got there about 5:15 a.m. The only place open at that time of night was a hotel, and we stopped in there to use a pay phone. Strangely enough, the pay phone was not working either, or at least the opera-tor never came on the line to ask what we wanted. Enrico was quite curious about all this and decided to investigate. We went outside the hotel, and Enrico found where the telephone wires came off the pole and down into the building. He decided that we would follow the wires, so we walked down the street looking overhead at the wires on the pole as we went along. Finally, we turned down one street and saw a house. The telephone poles and wires from all directions seemed to come down to this house. There must have been hundreds of wires from telephone poles all coming down onto the side of this house and going in through an opening.

We noticed that there was a front porch light, which was on. The front door was open, but there was a screen door, which was closed. We went up on the front porch and looked into the house. A switchboard was there, and there were a dozen or more lights on the switchboard lit, blinking off and on as people were flashing the switch hooks on their phones trying to raise the operator. The room was just dimly lit, and near the switchboard was a sofa, and a woman was laying on the sofa sound asleep! Enrico pounded very loudly on the screen door, and shouted at the woman. Suddenly she opened her eyes and looked at him, very startled. Then she looked at the switch-board. Immediately she sprang up, dashed over to the board, sat down and began fran-tically answering the calls.

(25)

6:30 a.m., which was two hours behind schedule. Later, we talked to the other staff members and found that there had been some confusion because of the rain. None of them had been able to reach the others because the telephone operator had fallen asleep, and the phones were not getting answered/connected…

We on the staff all had a big laugh out of it, but nothing more was ever said or done, and I doubt to this day that that woman is even aware that the first atomic explosion in the world was delayed two hours because of her.

Amazing, but true. Alamogordo was a tiny town back in the ’40s, and it’s very doubtful that the night operator had ever seen so much traffic in her life as the hundred or so people all on the line at once that early morning. More than likely, the poor dear had had a very rough day the day before, in the miserable summer heat, had been unable to sleep during the day, and had come to work that night thoroughly exhausted. She probably decided that “it won’t hurt just to close my eyes for a minute…,” and the rest of the story is already told. After all, experience had taught her that in fact she would not usually get a dozen calls all night on her shift, and she felt relatively safe in stretching out “just for a minute.”

Numbers That Led to Trouble

Having access to telephones and the increasing variety of new uses for them invariably led to all sorts of fun for the average phone phreak. (It was quite common in the hacker world to append a “ph” to any word with an “f” if it had anything at all to do with phones, such as “phreak,” “phriend,” or “phraud.” Sometimes the exact opposite was true, which resulted in the word “fone” popping up every now and then.) Of course, fun in the hacker world usually translated to trouble in the real world, which pretty much summed up where hackers fit in societywise. Our innocence and adventure was always seen as evil and threatening to the uninitiated who couldn’t seem to understand what motivated these strange individuals to go and play with phones for hours on end. As a result of our hard work, we would share whatever strange phone numbers we were able to discover with anyone who was interested in hearing about them. Because there weren’t as many methods of communication as there are today and because there were significantly less phone numbers floating around, discoveries like the ones that follow seemed to mean a lot more. And then, of course, there was one of the all-time favorite phone phreak pastimes: running a teleconference. The unparalleled pleasure of hooking several dozen of your closest friends together and going on a telephonic voyage around the world was something so few people could even conceive of in the 1980s. And yet, everyonein the hacker community had some sort of encounter with teleconferences back then. Some were even rumored to have spent most of the decade connected to one.

(26)

The Scariest Number in the World (December, 1984)

Recently, a telephone fanatic in the northwest made an interesting discovery. He was exploring the 804 area code (Virginia) and found out that the 840 exchange did some-thing strange. In the vast majority of cases, in fact in allof the cases except one, he would get a recording as if the exchange didn’t exist. However, if he dialed 804-840 and four rather predictable numbers, he got a ring!

After one or two rings, somebody picked up. Being experienced at this kind of thing, he could tell that the call didn’t “supervise,” that is, no charges were being incurred for calling this number. (Calls that get you to an error message, or a special operator, gen-erally don’t supe.) A female voice, with a hint of a southern accent said, “Operator, can I help you?”

“Yes,” he said. “What number have I reached?” “What number did you dial, sir?”

He made up a number that was similar.

“I’m sorry, that’s not the number you reached.” Click.

He was fascinated. What in the world wasthis? He knew he was going to call back, but before he did, he tried some more experiments. He tried the 840 exchange in sev-eral other area codes. In some, it came up as a valid exchange. In others, exactly the same thing happened—the same last four digits, the same southern belle. Oddly enough, he later noticed, the areas it worked in seemed to travel in a beeline from Washington D.C. to Pittsburgh, PA.

He called back from a pay phone. “Operator, can I help you?”

“Yes, this is the phone company. I’m testing this line and we don’t seem to have an identification on your circuit. What office is this, please?”

“What number are you trying to reach?”

“I’m not trying to reach anynumber. I’m trying to identify this circuit.” “I’m sorry, I can’t help you.”

“Ma’am, if I don’t get an ID on this line, I’ll have to disconnect it. We show no record of it here.”

“Hold on a moment, sir.”

After about a minute, she came back. “Sir, I can have someone speak to you. Would you give me your number, please?”

He had anticipated this and he had the pay phone number ready. After he gave it, she said, “Mr. XXX will get right back to you.”

“Thanks.” He hung up the phone. It rang. Instantly! “Oh my God,” he thought, “They weren’t asking for my number; they were confirmingit!”

“Hello,” he said, trying to sound authoritative.

“This is Mr. XXX. Did you just make an inquiry to my office concerning a phone number?”

(27)

“What you need is advice. Don’t ever call that number again. Don’t even think about calling that number again. Forget you ever knew it.”

At this point our friend got so nervous he just hung up. He expected to hear the phone ring again but it didn’t.

Over the next few days he racked his brains trying to figure out what the number was. He knew it was something big—that was pretty certain at this point. It was so big that the number was programmed into every central office in the country. He knew this because if he tried to dial any other number in that exchange, he’d get a local error message from his CO, as if the exchange didn’t exist.

It finally came to him. He had an uncle who worked in a federal agency. He had a feeling that this was government related and if it was, his uncle could probably find out what it was. He asked the next day and his uncle promised to look into the matter.

The next time he saw his uncle, he noticed a big change in his manner. He was trem-bling. “Where did you get that number?” he shouted. “Do you know I almost got fired for asking about it?! They kept wanting to know where I got it!”

Our friend couldn’t contain his excitement. “What is it?” he pleaded. “What’s the number?!”

“It’s the President’s bomb shelter!”

He never called the number after that. He knew that he could probably cause quite a bit of excitement by calling the number and saying something like, “The weather’s not good in Washington. We’re coming over for a visit.” But our friend was smart. He knew that there were some things that were better off unsaid and undone.

(If you have a phone or computer story, call or write us!)

The Truth Behind Those 9999 Numbers (January, 1984)

By Mark Bluebox

Once upon a time, I was talking to one of my favorite friends, one of the nation’s old-est and most experienced telephone enthusiasts—some might refer to him as a phone phreak. In this particular conversation, he mentioned to me that I might want to exper-iment with a series of 800 numbers: exchanges starting with 9, followed by the suffix 9999 (800-9xx-9999). And so I did, and a whole new world began to open up in front of me.

They were mostly weather and time numbers in various locations throughout the country. And, because these were 800 numbers, there was NO CHARGE! One number in particular was of a great deal of interest to me and to many others. This was 800-957-9999, which hooked up to WWV, the radio station operated by the National Bureau of Standards that does nothing but tell the time and give shortwave reports. This is the most accurate clock in the entire world! You either have to tune WWV in

(28)

on a shortwave receiver or dial 303-499-7111 in Fort Collins, Colorado. Yet, here I was with an 800 access! Being a bit of a shortwave enthusiast, I don’t have to tell you how convenient this was for me. Unfortunately, it got too convenient for too many people. I guess I made the mistake of giving it to a former president of a large amateur radio club in the Dallas area. He, in turn, printed it in the Amateur Radio News Bulletin where thousands of people probably saw it. Another statewide News Bulletin picked it up and printed it. Through an amateur radio news network, which this bulletin was a part of, the news got as far as California.

One day, I called up the West Link Amateur Radio News Service at 213-768-7333. (This is a service located in West Link, California that broadcasts news over amateur radio, VHF, UHF, etc.) Their latest report had this little item: “Speaking of interesting things, the National Bureau of Standards has got a very convenient time number for those of you that are not constantly at a shortwave receiver. You can dial 1-800-957-9999 for WWV. It’s just another good toll-free service for us to use.” The avalanche had really begun now.

The West Link report was heard on bulletin stations all around the world and appar-ently one station in Nashville, Tennessee, broadcast it. From there it fell into the hands of one of the writers for the DX program on Radio South Africa! I happened to be lis-tening to a program where they were talking about pulling in distant time stations, weather stations, etc. He then mentioned, “For those of you that live in the United States, a convenient toll-free 800 number has been provided by the National Bureau of Standards for WWV and that number is 1-800-957-9999.” Imagine my surprise! Once again, the number had been broadcast all around the world. People in many, many nations now had that number. Of course, the number only worked inside the United States, but the word was being spread by shortwave listeners and QSL people every-where.

The number was getting swamped. Needless to say, it was busy much of the time. A government official, who alsohad this number, thinking that it was legitimate, called up WWV and complained. He told them that they needed to add some more lines to their new 800 number. The general manager of the station said, “I don’t know what

you’re talking about. I don’t know of any 800 number that gets you WWV.”

The government official told him what the telephone number was. The general manager called it and heard his own station. Astounded, he contacted the Mountain Bell Telephone Company in Denver, Colorado. They said, “You’re not paying for any 800 in-WATS number. We show 303-499-7111 for WWV, but we don’t have any 800-957-9999.”

Mountain Bell checked it out and sure enough, the number existed but not on their

(29)

WATS coordinator to find out what happened. He finally made the discovery that some technicians had hooked that number up for transmission testing. (These switching tech-nicians are toll techtech-nicians, AT&T Long Lines switching techtech-nicians, and carrier systems technicians. In other words, they’re the group of people who link switching centers together, from New York to Los Angeles, for example. In this case, the whole escapade was a kind of group effort. The switchmen and the carrier people got together and set up this number for testing, finding noisy carriers, carriers with cross talk on them, etc.)

The WATS coordinator told them they’d better get this number off—too many peo-ple knew about it. He told them to erase every800 test line number that was on the system. Not surprisingly, someone also got chewed out very severely.

So, consequently, 800-957-9999 is no longer in existence. But since then, less than two weeks later, several of the 800 test numbers have begun to defiantly reappear. Check around, you’ll probably find a few interesting ones. But I doubt if WWV’s brief stint as a toll-free service will ever be repeated.

A True Saga of Teleconferencing (April, 1984)

By Electric Moon

“God, I wish I had a box.” David said. “I can see it now. I bump off information in Wisconsin and get an empty WATS line to play with. I keypunch a few multifrequency operator tones, and ta da! It gives me a conference. But I can’t do that anyway, because I’m on ESS.”

“David,” I responded. “I know this sounds stupid, but I don’t understand a word of what you just said. Okay, this is what I know from the conference: With a blue box you make tones of certain pitches, so that the phone thinks you’re an operator. That way you can make long-distance calls for free or start a conference.”

“Very good.” “But what’s ESS?”

“Anyway,” David said. “It’s easier and safer to use an extender to call long distance than to box.”

But what’s ESS?” I repeated.

“Okay here we go. The famous Smith briefing for beginning phreaks. Fasten your seatbelts, ladies and gentlemen.”

“I resent being called a beginner,” I said.

“In the history of our great phone system, Ma Bell has undergone many changes in her youth. She was made up of so-called step-by-step systems. These were lovely and easy to circumvent, but noisy and slow. Also, 2600 Hertz disconnects a step system, so you can’t box off of one. Most of these were switched by hand by small-town opera-tors. Then someone came up with crossbar switching, and Ma Bell made little clicking noises all day long as she switched almost automatically.

(30)

“But, horror of horrors, Ma Bell finally got old. She grew senile and paranoid. In order not to forget things, she wrote them down. Every time a little customer called a number he shouldn’t have known, she wrote up a trouble card on him and filed it neatly away. This system was noiseless and easy. Soon Ma came up with better security measures, longer customer records, and tighter filing cabinets. She buried light-fiber cables, and everyone knows you can’t splice two light-fiber cables together. She changed her own phone numbers regularly, and computerized everything. Each change came about slowly, but the final product was ESS. So the main phone systems are step, crossbar, and ESS.”

“Which one am I on?” I asked.

“I don’t know. Some people can tell by listening to the ring or the busy signal, but I can’t,” he admitted. “If you can get call-waiting, you’re on ESS. Call customer service and ask.”

We talked on conferences almost every night for two weeks. Napoleon Bonaparte set them up, and we talked to the Hacker, Cracker, Tom Keevis, and Max Wilke.

I learned a few things from conferences, and a lot from David. He told me about the Michigan loops. Apparently, if I called a certain number, some stranger would pick up the other end and we could talk. How stupid. Then David explained that the other per-son was calling a phone number too, and we’d get connected somehow. A loop around here was 424-9900 and 424-9901. If I called one end and someone else called the other, we’d be connected. This was useful if we didn’t want to give out our phone numbers. In Detroit, lots of people—not only phreaks—know about loops. If you call up one end of a Detroit loop, someone else is likely to call within five minutes.

“You never know who you’ll get,” David said. “Hacker and I call and wait, and some-times homosexuals get on and say, ‘Looking for guys?’ or girls get on and say, ‘Guess what color underwear I have on?’ But you also get other people—car salesmen, teenagers, and college students—lots of college students.”

He gave me some Michigan loop numbers and I started calling them through exten-ders. I talked to a lot of weird people and a lot of normal people. I also called some pay phones in Berkeley and Carnegie-Mellon, and talked to whoever answered.

The Phreak was my idol. He was the idol of most of the phreaks I knew. Lots agreed that he was the best phreak and hacker (okay, little did we know then). He was only fourteen years old, and lived in Boston.

One day I called up a Michigan loop and heard a lot of static and clicking. I also heard some people talking—mainly two boys. One of them had an unmistakable Boston accent. It was Steve the Phreak.

“Hey Phreak,” I said. “This is Electric Moon!”

“Hi Electric,” he said. Then he asked his friend, “Should we keep her?”

(31)

“Where’d Steve go?” I asked.

“Off to look for more loops, the idiot,” said the boy. “It’s too loud in here already.” “What’s your name?” I asked.

“I’m lvanhoe. I’m a Steve too, but you can call me George.” “What?”

“To differentiate between me and Phreak.”

“I’ll just call you lvanhoe,” I said. “Where’re you located?” “I’m in California. I’m seventeen. And you?”

“I’m in Ohio. I’m sixteen. Call me Electric.” I suddenly realized I was yelling above the din of the loops. The Phreak kept putting on more and more. The loops themselves made clicks and static, but the people on them made it even worse. They couldn’t hear us and they couldn’t hear the people on the other loops, so they loudly chatted away.

Every time lvanhoe or I heard the Phreak beep on or off, we screamed at him to stop adding loops, but he pretended not to notice, and continued at a rate of six or so a minute.

Finally I couldn’t take the noise, I yelled a loop number to lvanhoe, and we duck ed out. “Hello?” asked a quiet, low voice.

“Hi,” I panted. “Thank God we’re out of that mess.”

“Yeah. He’ll probably have it up for a few days before they figure it out.” “He’s crazy!” I said.

“Yeah, but he knows a lot. He still has a long way to go, though. He has to learn to be careful.”

“I know.” I tried to act experienced. “Boxing a conference from his home is incred-ibly stupid.”

“Have you heard him on AUTOVON, though? He’s a riot, but I’d never do what he does!”

“What does he do?” I asked.

“He’ll have to show you,” lvanhoe said.

Click! “Emergency break from G.I. Joe. Will you accept?” asked the operator. “No,” we said in unison. I smiled, imagining the shocked operator. She probably thought his mother was dying.

“No?” she asked uncertainly.

“NO!” we yelled, and laughed as she clicked off again.

“Well,” Ivanhoe said, “that must be Phreak. He probably wants me to call him. I’ll tell him to start another conference.”

“Okay,” I said. I hung up the phone and walked into the kitchen. I set my notebook and pencil on the kitchen desk and took a cold apple from the refrigerator. The phone rang as I crunched the first bite.

“Hello?”

“Hi. Anyone you want to add?” asked the Phreak.

(32)

“Sure. Add Trader Vic.”

“Okay,” he said. I heard a beep, silence, then people talking.

“Quiet down, everyone!” Ivanhoe said. “The Phreak is going to show off, but what he’s going to do is pretty dangerous.”

Beep-beep! Beep-beep! The Phreak had brought Trader Vic on. “Hey dudes, what’s going on?” he asked.

“Shh!” we said.

“You can’t hang up on them once they’re on a conference,” said lvanhoe.

“If someone suspects what we’re doing, we’ll have to hang up the whole conference.” The Phreak beeped off. He was back in a minute, talking officiously.

“Yes, I have a Flash Override call for location four-zero-two-niner,” he said calmly. “Flash Override? Who is this, suh?” asked a deep southern accent.

“This is General Watt.” The Phreak had to make the guy believe he was a Joint Chief of Staff.

A nasal tenor came on the line, heralded by an amazing overture of clicks, beeps, and tones.

“General, for whom are you placing this call?”

“For Ronald Reagan,” said the Phreak. I felt like I had been stabbed. What an idiot! But I couldn’t hang up, because the operator would hear the beeps. I listened instead. “Ronald Reagan?” asked the voice disbelievingly. “Sir, what is the code on this call?” “I’m at the White House right now,” said the Phreak coolly. I knew he was stalling for time as he flipped through stolen AUTOVON manuals. “Sergeant, I have the code right here. I’m at location C-one-four-six-two-D, placing a Flash Override for Timberwolf to location four-zero-two-niner. The operation code is zero-five-zero-niner.”

“That is correct,” the operator said, and I could have hugged the Phreak. “Please hold, sir, and I’ll put your call through.”

Beep! Beep!…ker-chunk.

“Andrews Air Force Base,” said a woman. “General Hodge is out right now. Should I sound his beeper?”

Silence. What now? Two people spoke at once. Trader Vic broke through loudly. “Yeah, like, this is a conference call, and we just, like, wanted to see how you were doing, you know?”

“Excuse me?” asked the startled woman.

“I’m sorry,” I interrupted quietly. The time had come to try and salvage this thing. “I’m the White House internal operator, and we seem to have given the wrong location identifier. Thank you very much.”

(33)

“I’m sorry,” lvanhoe said. “The President decided not to make the call after all. Thank you, though.”

“Yes sir, thank you,” the operator said, and checked off. We held our breaths until we heard the final beep-beep.

“Vic, you idiot!” I cried.

“What?” he asked. “I thought it was pretty funny!”

“Funny, my foot,” lvanhoe said angrily. “That was a stupid thing to say. And Steve, why didn’t you answer?”

“My mom called me and I had to go take out the trash,” said the Phreak. “Phreak, you’re crazy,” I said.

“I know,” he said in his deepest Boston accent. “But you all love it.”

A week later, the Software Pirate called me and said the Phreak had been caught. I called lvanhoe, who told me that Steve was visited that morning by three FBI and two Bell Security agents. Ten other people were also caught. The FBI woke all the boys up at 6:00 a.m. so they wouldn’t have a chance to warn friends.

As soon as school was over, the Phreak called lvanhoe and told him all this. He waited an hour until it was 4:00 in Utah and called the Software Pirate, who called me. The news spread among phreaks and pirates so that anyone involved knew about it by dinnertime on the East Coast.

Late that night, the White Knight set up what we thought was the last conference call. Ivanhoe, David, Demon Diode, and the Cracker all expected they would be caught.

We called the Cracker and asked him to talk.

“Why not?” he said dryly. “I’m just sitting here waiting for the FBI. I have nothing better to do.”

They got him the next morning.

(The names and locations used in this story have all been changed, so don’t even bother.)

Mischief and Ingenuity

While we like to say that hacking is all about education, that’s really only partially true. People often got involved in this little world for no other reason than the fact that it was incredibly fun. Apart from simply impressing those around you with your seemingly superhuman abilities by making pay phones ring back or figuring out someone’s phone number without their telling you (which actually wasa big deal back then), you got to meet some really interesting people and explore technologies that most folks didn’t

(34)

even know existed. So invariably anyone who was drawn into the hacker culture wound up learning an awful lot whether they wanted to or not. But it was mostly the fun of playing with some incredible new toys that got them involved in the first place. And in the end, hackers were able to apply their knowledge to all sorts of practical applications such as in our first story below. Or, as in the case of our trashing adven-ture, they figured out another way to quench their thirst for knowledge, this time by invading an often ignored part of the “real world.” And throughout it all, new bits of information and all sorts of theories were constantly making the rounds concerning the latest discoveries.

A Phone Phreak Scores (April, 1985)

This is another story to add to the annals of social engineering, one that we all can learn from…

A few months ago my Mom had some people refinish and blacktop our driveway. So she called some companies in the phone book, and she chose the cheapest one. They came and did most of the work, and Mom paid them, providing they came back soon to finish the blacktopping job. This all sounded fine, but after several weeks of the company calling up and postponing the final work, Mom wanted it done. She decided to visit the company at the address listed in the phone book, because she would always get an answering machine when she called them, but when she got there, she found out that it was just the back room of a storefront and that the company had vacated it a few months earlier. When she tried calling them, their number had been changed. So I did a CNA on their new number for Mom, and she visited the new address that I got. When Mom got to the new address she found a vacant lot. It was at this point that it started to sound pretty fishy to Mom and I. But how could we find out where they were, if they gave a fake address to the phone company?

That’s when it occurred to me to call the business office that handles that company’s telephone. I called and they answered: “Your number, please.” So I gave them the com-pany’s number, and I proceeded to tell them how I did not get my last phone bill, and how I wanted to make sure they were sending it to the right address. They told me the real name and address (not the one at CNA or Directory Assistance, which was the one it was listed under; there is a difference, you know), they asked if I was “Mr. So and So,” to which I responded “Yes.” Then they asked if I wanted to change the mailing address. I said, “No, that’s my partner’s address. No need to change it. Thank you.”

(35)

and had several other customers and some government agencies looking for them. Because Mom had the goods on them, they were obliged to finish our driveway, and that’s all Mom wanted after all.

Trashing Alaska Style (February, 1985)

By The GCI Guy

We left that Friday night with no idea that we would end up at our local CO. A group of computer enthusiasts and I usually go cruise and look for trouble in our car prop-erly named The Lead Sled. It is named this because it is an extremely old Monte Carlo that is painted five different shades of gray.

There was nothing happening on the local drag and that is when I remembered something I had seen on a BBS the night before.

“Let’s go trashing,” I said with hopes of an answer. But all I got was a grumble from the back seat and a question thrown at me from the driver. I explained to them what trashing was and the whole car seemed to like the idea of looking through someone else’s garbage, especially our local CO’s.

Now the thing that I really hate about our CO is that they have a “mascot” color, baby blue. They paint their repair trucks, representatives, and main building all this same color.

We carefully turned the engine off when we approached the baby blue monster and coasted behind a group of trees. We had to run about a mile to the dumpsters and I think that this was our biggest mistake. But what can you expect from first time trashers?

The CO has a “protective” fence around their lot. So we picked a small, thin phreaker to slide under the gate. He then dived into the dumpster with a look of tri-umph in his eyes.

We waited for him to emerge with a bag when suddenly a man in baby blue over-alls appeared. I yelled for everyone to blow and that’s what we did. The skinny phreaker slid under the fence and we were history.

I ran fast, the fastest I think I ever ran. But with the CO’s security guards after you, you had to. We ran back to the Sled but found that it was surrounded by men in baby blue overalls. This is where we made another mistake—we split up, hoping that maybe we wouldn’t be caught if we weren’t a large group.

“They’ve been caught!” was the only thing that ran through my mind as I ran for an abandoned shopping mall. Me and about two other phreakers hid out there for about two hours until we thought the coast was clear. But we were wrong.

As we were making our way back to the Sled, we were stopped by a security guard who asked us a lotof questions. Luckily we were able to B.S. him. But when we got back to the Sled, it was gone.

(36)

I panicked. No Sled, no ride, and no trash. Then suddenly I heard a honk and it was the Sled.

Since that unfortunate experience we have made countless trips to the CO and have retrieved bags and bags of trash. Learn by your mistakes.

An American Express Phone Story (March, 1986)

By Chester Holmes

This story is a memory of hacking a formidable American institution—American Express. No, not AX’s internal telecommunications network, but the corporation’s toll-free charge card authorization computer. The following can be safely told as our “sys-tem” went down a few years ago.

It all started in the summer of 1982. I had been on the lookout for various exten-ders and other nifty things a phone could link up with. Most were found by scanning and searching 800 number series using the time-honored “hang-up-if-a-human-answers” technique. After a long and fruitless afternoon of such looking, I decided to take a run on down to the local Chinese eatery as my stomach’s contents had been depleted several hours earlier. I wasn’t wont on dining there, take out would be fine. Well, as Murphy would predict, my fried rice order wasn’t ready at the appointed time, so I found myself at the register with a few moments to kill. Murphy struck again: on the register was a sticker with several 800 numbers and the words “American Express Charge Authorization” emblazoned thereon.

The MSG in Chinese food affects people in a variety of ways. Some folks get ram-bunctious, but I get sleepy. I told my associate about this number and told him my right index finger was worn down from hours of dialing. He understood and made some discoveries while playing with the system all that night.

(37)

You’ll note I said we were free to make local calls. We were able to dial 9-0 to get a Bell operator who was most happy to assist in placing our long-distance calls. For some reason however these operators couldn’t help with 900 calls (I got the same operator three times in one night while trying to listen to the space shuttle. We developed a kin-ship by the last call). The AX PBX would give a stern warning if we tried to dial a long-distance call directly (“Class of Service Restriction Class of Service Restriction”), but we soon outsmarted it: it wasn’t looking for a 1+NPA etc. but had a timer going and if you dialed more than eight digits (9+ etc.) in a period of about five seconds you’d get that message. So we dialed the first few digits, paused dialed the remainder, and the call went through (even to the space shuttle).

Connections were generally less than optimum (in fact they sucked) but if you and your called party were in quiet rooms, you could talk for hours. Another minor annoy-ance was crosstalk. I had often heard the familiar 9958 off in the background and once I even faintly heard my buddy. We shouted at one another for a while until one of us hit *#.

I don’t think AX was ever quite aware of our exploits on the system since it was on line for several months: a new system was installed when their authorization people moved to Florida. I had had an Amex card all the while but recently gave it up when they raised their annual “membership” to $45, and didn’t tell me. It was them pissing me off like that that prompted me to tell this tale. I hope you can carry on this tradition and it’s 2600’s pleasure to inform technology enthusiasts everywhere of your stories.

(38)
(39)

The Last Days

of Ma Bell

2

S

ometimes fate has a way of putting you in the right place at precisely the right time. How else could you possibly describe having the opportunity to publish a newsletter on telephones from a hacker perspective right at the exact moment when the phone company as we knew it was coming to an end? It really wasn’t planned this way. We just happened to be there and nobody else was doing what we wanted to do. So what we have as a result of this is a unique time capsule that captures not only the technology of the day but the spirit that guided us in our first few years and that more or less defined the tone of the magazine from then on.

First, some history. Divestiture is what they called what was happening to good old Ma Bell. Prior to January 1984, the Bell System encapsulated the whole phone net-work. Your telephone, the wire connecting it to your wall, the wire connecting it to the telephone pole, the telephone pole itself, the connection all the way back to the cen-tral office, the cencen-tral office itself, and everything long-distance related—all of that was part of one single enormous system. That hugeness and the lack of any real competi-tion was in no small part what fueled the spirit of the early phone phreaks and inspired them to figure the whole thing out and eventually to defeat it. After all, monopolies were always by default the enemies of free-thinking individuals and you couldn’t get much more monopolistic than Ma Bell.

So what happened after January of 1984 (which also happened to be the very month of our first issue)? Basically, everythingstarted to change—the technology, the equip-ment, and, most of all, the playing field. For the first time ever, competition to the phone company was introduced nationwide. Granted, it didn’t happen overnight and it wasn’t exactly a smooth transition. But that’s what made it all so very interesting. And as we already had some familiarity with how it all worked, we found that people began to turn to us to get advice on how to make the right decisions. Oh, the irony.

(40)

ability to choose your own default long-distance company) became available in some parts of the country and, for the rest, these oddities known as 950 numbers and equal access carrier codes became new tools in the long-distance world.

Of course, for people like us it meant that we had a whole new playground to mess around in. For most consumers, it was a total nightmare of confusion and complica-tion. Many longed for the simpler days when one company did it all. But there was obviously no going back. Divestiture changed it all—forever. And we were incredibly lucky to have come in at a time where we could still play with and write about the last days of the original Bell System.

This chapter is divided into two sections, each of which I believe sheds some light on unique and important elements of the Bell System in a distinctly hacker view. First, we look at the “boxing” culture, something that drove the phone company crazy over the course of decades. Then we look at the actual infrastructure of the network, again through the eyes of hackers. So much of it is now gone or radically changed, which to me makes this glimpse all the more fascinating and necessary.

MILESTONES: AHOY! (January, 1984)

(That’s how Alexander Graham Bell used to answer his phone. For some reason, it never caught on...)

This is the very first issue of 2600. We will, on this page, explain our motives and what the goals are which we hope to achieve with this publication.

The idea for 2600was born in 1983. We saw a tremendous need for some form of communication between those who truly appreciate the concept of communication: technological enthusiasts. Of course, others have different ways of describing such people—these range from words like “hacker” or “phreaker” to stronger terms such as “criminal” or “anarchist.” Our purpose is not to pass judgment. 2600exists to provide information and ideas to individ-uals who live for both. All of the items contained on these pages are provided for informational purposes only. 2600assumes no responsibility for any uses which this information may be put to.

Of course, a lot has changed since our first days. War Games came out. And then the 414 gang got caught. Suddenly everyone was talking about phreakers and hackers. And while there were some that sort of jumped into the limelight, others were a bit more cautious. In fact, some were quite upset. Sure, the publicity was fun. But what would be the cost?

(41)

The World of Boxes

Every phone phreak had at least a passing familiarity with those magical devices known as boxes. They were all color coded, some for historical reasons and some simply to use up an available color. But they each did something different and vital in the

MILESTONES: AHOY! (continued)

mysteriously disappeared at the height of the crisis, sparking rumors that they, too, had been raided. However, in November, the magazine resurfaced, with an explanation that a fire had destroyed part of their mailing list. (Incidentally, if your name was one of the ones that was lost, you can claim the issues you are entitled to by sending TAPa copy of their mailing label or a cancelled check.) And then there was the legendary computer bulletin board known as OSUNY. Enthusiasts from all across the country called up this board and left messages ranging from the latest in Sprint codes to how to crash an RSTS sys-tem to what to do once you’ve finally gained access to Autovon. Within a week after being mentioned in Newsweek, OSUNY was disconnected. Word has it that they are still in existence somewhere, but by invitation only. A truly smart move, if that is the case.

Many hackers were keeping a low profile even before the October raids. When the FBI confiscated equipment from 15 sites across the country on the 12th and 13th of the month (sponsored by a grant from the folks at GTE), many of our contacts were lost because they feared the consequences of con-tinuing. Two organizations, the Inner Circle and PHALSE, were deeply affected by the raids. The latter group (whose initials signify Phreakers, Hackers, and Laundromat Service Employees) is still in contact with us on occasion and has promised to contribute many articles devoted to just what was really going on. So it seems that the events of 1983 have conspired to actually strengthen the resolve of hackers and phreakers across the country to put out this monthly newsletter. We hope you will help us continue by subscribing, spreading the word among your friends, and of course contributing articles and information. Since we are non-profit, it really doesn’t matter to us if you Xerox your copy and send it to someone else—all we ask is that you let us know so that we can have a rough idea of how many people we’re reaching.

Welcome to 2600. Turn the page and become a part of our unique world.

Referensi

Dokumen terkait

[r]

Pada pendidikan tinggi kemandirian belajar menjadi lebih diperlukan oleh individu untuk menghadapi tugas dalam bentuk proyek yang terbuka atau pemecahan masalah,

Satuan Kerja : Dinas Pekerjaan Umum, Energi dan Sumber Daya Mineral Kota Palu Pekerjaan : Pembangunan Jalan Balaikota Selatan.. Nilai HPS :

tanggal 18 Desember 2015 Kelompok Kerja Pengadaan Belanja barang persediaan. pemeliharaan dengan kegiatan Pemeliharaan Halaman Gedung/Bangunan

kandungan C organik tanah meningkat pula secara konsisten demikian halnya dengan kehalusan biochar, makin halus biochar makin tinggi kandungan C organik tanah, hal

Pemerintahan daerah adalah penyelenggaraan urusan pemerintahan oleh pemerintah daerah kabupaten/kota dan DPRD menurut asas otonomi dan tugas pembantuan dengan

Iwan Alim Saputra, dkk/ Majalah Geografi Indonesia... Iwan Alim Saputra, dkk/ Majalah

dalam Calon Daftar Pendek dinyatakan gugur, maka kepada peserta yang memenuhi Persyaratan Kualifikasi dan penilaian Persyaratan Teknis Kualifikasi dengan urutan