<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> < > < The United Phreaker's Incorporated Proudly Presents > < > < The Phreaker's Bag Of High Tech Tricks > < > < By: The Lost Avenger > < > < An Upi Production 1990 > < > <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Reprinted In File Form On January 17, 1990 Orignally Publised In Toronto Star Sunday January 7, 1990 =============================================================================== PIRATES RING UP MILLIONS IN ILLEGAL CALLS By Leslie Papp TORONTO STAR A New breed of pirate is plundering Canadian companies armed with a telephone instead of a cutlass. They're called "fone phreakers" the telephone equivalent of computer hackers and they're costing companies millions of dollars. Phreakers charged $1 millions worth of illegal calls to Toronto's Call-Net Telecommunications Ltd., a private telephone network, over a six month period last year. And Call-Net isn't their only victimm. A Metro finacial services company was hit for $30,000 in a single day, telecommunications security sources said. A travel business recently lost $100,000 in illegal calls and a major entertainment company was stung for $100,000 over about three months. "It becomes pretty mind boggling" says Jack Cloutte, head of Bell Canada security in Ontario. "More than 100 cases of suspected telephone fraud go to his department monthly. And that's only a fraction of the actual abuse going on. "It's A big concern of ours." Cloutte said, nothing that Bell is a frequent victim. Phreaker's have repeatedly palnted listening devices in the company's vital Adelaide Street switiching center, seeking access to secret Bell Canada codes and other data, he said. Although new technology is being developed to make it harder to raid telephone networks, phreaker's remain a step ahead of the authorities, he admitted. Canada has thousands of fone phreakers, ranging from clumsy tennages to experts with years of experience. And they boast a long list of shady successes, including: o Unauthorized use of companies' long distance services to reach friends anywhere in the world. o Free calls with homemade electronic "boxes" that beam signals along a phone line to fool Bell Canada operators and equipment. o Use of telephone company test loops as a phreaker chat line. o Eavesdropping on private messages of executives and lawyers after cracking the code of their voice mailboxes, answering machines that play messages back over the telephone. o Listening to the cellukar phone conversations of insuspecting business people. o Tapping telephone wires leading into a company to obtain codes for voice mailboxes and long distance services. o Charging conversations to calling card numbers obtained by fraud. "The amount of abuse is well beyond what we expected," said Sergeant Val King, head of the RCMP's computer and telecommunications crime section in Ottawa. Oftern companies being defrauded dob't even know they're victims. And telephone raiders are proving extremely difficult to catch. "They're have so many mehtods of covering their trail," King lamented. "They're can jump through 50 different (telephone) systems before they access the one next door." Phreakers are formidable opponents, agreed Ros Morley owner of Commmunications Systems, a Toronto telecommunications consulting firm. "Some of the kids doing this are 14 to 16 years old," he said. "They start working with computers in Grade 2 and they're building computers by Grade 6. "They're practically electrically engineers when they reach Grade 10." Older than most is the Wizard, a Toronto phreaker who boasts about $2,000 in unpayed bills every month. "I'm screwing Ma Bell out of her money," the Wizard notes with pride. "That's the glory of it. That what unifies phreakers." In his mid 20's, but looking younger in a paisley tie and dapper pale gray suit, The Wizard said he's been phreaking for about eight years. Inside Information "It's just a knowledge thing," he said, adjusting his glasses. "The whole thrill is manipulating Bell to do what you want." Having inside information is a big help in cracking phone systems. And salting Bell Canada with listening devices is one way to get useful secrets, he said. Posing as electrical engineering students, several ohreakers, himslef included, have taken tours of Bell's main Adelaide St. switching center, he said. and they planted miniature microphones, wired to tiny transmitters broadcasting on a high end FM frequency. "You just take a tour and drop a bug." the Wizard said. "Then you listen across the street, on a Walkman, as the technicians user their codes." Now the Adelaide St. center is electronically "swept" for bugs on a routine basis, he said. "If we didn't learn from history we'd have to have our heads read." Bell recognizes phreaking as a serious problem, Cloutte sais, but most businesses don't know how exposed they are to a phone line invasion. Call-Net was badly burned, said the firm's president Mike Kedar, adding he opposed publication of new that $1 million in illegal calls was charged to the company. "It's nobody's business," he said. "We had to pay for it. It's over and done." Silence is the best response to fone phreaking, Kedar said. "It's a story that should not be told." Consultant Morley said that sttitude is widespread among firms that have been stung. "A lot of these companies are just plain embarrassed," he said. "And corporations that haven't experienced (a phreaker raid) don't believe it can happen." Not Noticed Large businesses, with six figure monthly phone bills, ofter don't notice when phreakers add a few thousand dollars to the telephone tab, said King of The Royal Canadian Mounted Police. Sergeant Dave Hodgson of the Metro police fraud squad has specialized in computer and telephone communications crime since last spring and has investigated about 10 cases. How many resulted in charges? "None," he said with a bitter laugh. "As far as getting anything for court, you're just blowing again the wind." Bell Canada does better than police in nabbing phreakers, Cloutte said. The company's Ontario Investigator, Walter Heapy, handles about six cases monthly. And almost all result in criminal charges, civil charges or an out of court settlement. "There's always an electronic trail." said Heapy. "A call can always be traced back to its orgins. It's a function of time." Heapy's most publicized case was the conviction of Leslie Lynee Doucette, 35, formerly of Toronto, in 1987. She was arrested in her Rhodes Avenue home after stealing $12,211 worth of long distance call over a two month period. She was again charged last May, after being arrested by U.S. federal agents in Chicago in connection with a conspiracy involving dozens of phreakers and as much stealing $1.8 million worth of long distance calls over a two month period. But the possibility of arrest doesn't worry the Wizard. "The ones they catch are kids who don't know what's going on," he said, "I know what I'm doing. if I'm doing anything slightly risky I'll use a pay phone or a string of numbers it can only be traced back so far." =============================================================================== THE PHREAKERS' BAG OF HIGH-TECH TRICKS By Leslie Papp TORONTO STAR How do they do it? How do teenages crack sophisticated telecommunications networks, steal missions worth of long distance calls and escape scot-free? One secret is a big bad of hightech tricks shared by "fone phreakers" across North America And Europe. It provides basic weapons and strategics used to attack telephone systems. In the hands of a phreaker with special genius, these tricks can be used to invade virtually any phone networks, experts say. "Eventually, any system can be cracked," noted Corporal Brian Binnie, the RCMP's telecommunications fraud expert in Toronto. "If you have a phone line you're vulnerable." Businesses risk huge telephone charges when a phreakerpenetrates their in house communications network and plunders long distance calls. It's complicated, but here's how it's done: Many firms operate WATS lines, or 1-800 numbers, allowing staff to dial long distance calls automatically billed to the company. Often there are two such line: an INWATS paying for calls going into the office, and an OUTWATS, covering calls going out. Electronic Pipeline With such systems, exectives can make long distance calls from anywhere in the the world by dialing the INWATS number and punching in a code automatically passing them to the OUTWATS. Phreakers call this set up an "extender," says the Wizard, a telecommunications pirate with eight years of experience. "They're real treasures. You call a 1-800 number and punch in the code - usually seven digits - and then you dial anywhere in the world." Codes can be broken with a "demon dialler," a computer trying number after number on the target system until it finds and records the right one, he said. Homemade wiretaps also prove helpful, the Wizard noted, pulling one from his pocket. Phreakers like to link extender, using one to reach another creating a pipeline of illegal calls streacting through several countries before reaching the person they want. Basic Weapon "The longer the trail you set the harder it is them to get you," the Wizard said. Cracked codes are shared and often listed on computer bulletin boards around the world. That results in a deluge of long distance charges within a few days or weeks, sometimes totaling hundreds of thousands of dollars or more. Electronic "boxes" are another basic weapon in a phreaker's armory. Scores of these have been developed, said Ross Morley, head of a Toronto telecommunications consulting firm. All generate signals to mislead phone companies and include the: o "Red Box." It creates the electronics pulses that an operator hears when change is loaded into a pay phone. o "Blue Box." It signals Bell Canada that a call is finshed stopping charges even though a phreaker's is still on the line. o "Black Box." It emits an electronic pulse telling Bell equipment that a call did not go through, even though it really did. Countermeasures haven been developed to foil blue and black boxes, said Jack Cloutte, head of Bell Canada security in Ontario. Butt these defences are not used everywhere. "There are a ton of other boxes," Morley notes. "Phreakers come up with them faster than the phone company can counter them." Telephone test loops are another phreakers target, Cloutte said. These are reached through two numbers used by Bell lineman to test phone circuits. Callers dialing one test loop numbers can speak free of charge to anyone dialing the other. "We do have a means of preventing that," said Walter heapy, one of Bell's top investigators. "But the door's not always closed." Another door left leads to exectives' voice, or electronic, mailboxes, the Wizard said. To demostrate, he picked up a phone and quickly punched in a telephone number and four digit code. At the receiving end, the answering machine of a multinational accounting firm's vice president played back confidential message of its owner. Nothing much there this time the Wizard said with a disappointed sniff. Just a few appointments scheduled and a meeting cancelled. But a few months ago there was news of a company merger, he said. "We know about it before it hit the papers." Voice mailbox codes are easy to "hack out" he noted. Oftern they're obvious, based on the owner's name, or run in an easy to remember series like 1-2-3-4. Business secrets also leak to phreakers through cellular phones, the Wizard said. Calling Cards A cellular message is really a radio transmission that is easily picked up with a scanner. A phreaker can eavesdrop on long sections of conversations, especially in a central Toronto location at rush hour, when traffic is slow, he said. "I've heard brokers talking about stock tips." the Wizard chuckled. "There guys don't know how easy it is to listen in. They talk about what mergers are coming up, and so on. Phreakers, however must weed through a jungle of 823 frequencies used by cellular companies. As a caller travels, the conversation is constantly switched to a different frequency, usually allowing an eavesdropper to hear only bits of a message. Phreakers can overcome this problem with a device that can track a specific call as it is passed from one frequency to another. Among the simplest of phreaker scams is misuse of calling card numbers. Card numbers are easily obtained, sometimes by peaking over a user's shoulder at a busy location, like an airport. Once taken, numbers are listed on computer bulletin boards. That results in long distance charges far excess of a card's allowable limite as it is used simultaneously by phreakers in the United States, Canada and Europe, Cloutte said. International data bases, used by major credit card companies to keep track of stolen numbers, do not yet exist for calling cards, he said. "All countries aren't in one pool," he said. =============================================================================== CULPRITIS GET A THRILL IN SNUBBING AUTHORITY By Leslie Papp TORONTO STAR Youth, electronics genius and an obsessive need to thumb a nose at authority bind "fone phreakers" throughout North America and Europe, expects say. "It's almost like a disease," said Jack Cloutte, head of Bell Canada security in Ontario. "It can be addictive. Computer and electronics whiz kids get a deep psychological thrill out of stealing telecommunications (Yeah right, I phreak because I get my jolies out of doing it, yeah right! If the fucking cost of calling long distance were lower they wouldn't have such a problem! -Tla), he said. It is a way of realizing a Dungeons And Dragons style fantasy, matching their powers against police and Bell investigators in a secret battle of wits. "Some are good," Cloutte said with a hint of admiration. But most are not quite normal. "A lot of people into this are kind of strange," (Ok, this is another stupid statement said made by this guy. He's starting to piss me off! -Tla) he said. They're very bright, but somehow out of sync with society. "They get a charge of beating the system. You can compare it to an athlete who gets a charge out of winning a big game." Cloutte said. "It can be become a real obsession. Sometimes they can't stop." Most phreakers don't see themselves as criminals. Usually they gain no profit from what they do and consider their invasions a game of high tech hide and seek, hurting only Bell and fat cat corporations. But phreakers aren't simply pranksters, said John Kuhn, a CNCP Telecommunications strategic planner. They are twisted individuals, he said. "There's a criminal element to their psyche making them want to wreck something that's orderly." (Oh no, this guy is stupid he doesn't know a slightest thing why we are doing it. I think Bell and the other corporations deserve to get ripped! -Tla) You may distrubute this file freely but may not change any part of this file in whole or part without the written or verbal concent of the author. =============================================================================== Call These Great Upi Boards! =============================================================================== Node Number Board Name Sysop Baud =============================================================================== Hq 416-Upi-Home The Northern Phreaker's Alliance The Lost Avenger 12/24 1 416-Upi-Nde1 The Shining Realm FrosT BitE 12/24 2 514-Upi-Nde2 The Order Of Kamikaze Tomcat 12/24 =============================================================================== 01-17-90/001 Copywrite 1990 By The Lost Avenger-All Rights Reserved <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> < > < The United Phreaker's Incorporated Proudly Presents > < > < Computer Ace Guilty After `Worm' Goes Berserk > < > < By: The Lost Avenger > < > < An Upi Production 1990 > < > <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Reprinted In File Form On January 30, 1990 Orignally Publised In Toronto Star Sunday January 23, 1990 =============================================================================== COMPUTER ACE GUILTY AFTER `WORM' GOES BERSERK SYRACUSE, N.Y. (AP) - A jury found a suspended graduate student guilty of federal computer tampering charges last night for unleashing a "worm" a rogue program, that crippled a nationwide network of thousands of computers. Robert Morris, 24, said trouble started when he made a programming error that caused the "worm" to go beserk and cripple the Internet system on November 2, 1988. It also immobilized an estimated 6,000 computers, including onces at, the U.S. National Aeronautics and Space Administration, military facilities and major univerities. Now he faces up to five years in jail and a $250,000 fine. Morris, a suspened Cornell University graduate student, is the first person brought to trial under a 1986 federal computer fraud and abuse law that makes it a felony to break into a federal computer network. In a closing statement, U.S. Justice Department trial lawyer mark Rasch said it was no accident that the "worm" attacked the network. The "worm" didn't break in by accident or mistake. Robert Morris intended for the worm to break in," he said. But defence lawyer Thomas Guidoboni reiterated his argument that it was a programming error. "It's not the side effects, it's not the mistakes, but what he actually intended to do," said Guidoboni. "He never intended to prevent authorized access." Prosecutor Ellen Meltzer reminded the jury in her summation that testimony showed Morris deliberately stole computer passwords from hundreds of people so the "worm" could break into as many computers as possible. He unleased the "worm" from the computer system at Massachusetts Institute of Technology in Cambridge and made it look like it was sent by the University of California at Berkeley so authorship of the program could not be traced to him at Cornell, she said. Guidoboni insisted that Moris of Arnold, Md, didn't intend to cause permanent damage to computer files. "There was no work lost, work was delayed. That's the bottom line." said Guidoboni. You may distrubute this file freely but may not change any part of this file in whole or part without the written or verbal concent of the author. =============================================================================== Call These Great Upi Boards! =============================================================================== Node Number Board Name Sysop Baud =============================================================================== Hq 416-Upi-Home The Northern Phreaker's Alliance The Lost Avenger 12/24 1 416-Upi-Nde1 The Shining Realm FrosT BitE 12/24 2 514-Upi-Nde2 The Order Of Kamikaze Tomcat 12/24 =============================================================================== 01-30-90/002 Copywrite 1990 By The Lost Avenger-All Rights Reserved <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> < > < The United Phreaker's Incorporated Proudly Presents > < > < Phone Calling To The Future > < > < By: The Lost Avenger > < > < An Upi Production 1990 > < > <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Reprinted In File Form On February 13, 1990 Orignally Publised In Toronto Star Monday February 12, 1990 =============================================================================== PHONE CALLING TO THE FUTURE By Bill Reno SPECIAL TO THE STAR LAS VEGAS - There is no limit to what the telephone can do for a business of any size. Those who do not learn to use the power of voice processing will not survive in tomorrow's marketplace. That was the message that emerged here last month from Infotext 90, a convention for the voice processing industry. Voice processing has grown from a start in 1983 to a billion dollar a year business involving thousands of enterprises. The industry produces computerized information, entertainment and customer services delivered over the world's most pervasive medium: The ordinary telephone. Callers in the U.S. can access a seemingly endless array of services, such as used car prices, legal advice, dating tips, sports scores, job openings and cat lore. Trivia games with cash prizes, fantasy baseball leagues and cross continent personals are some of the more popular phone entertainment offerings. Phone Lines Most of these services were developed by individual suppliers who have knowledge and entertainment concepts to sell and can be reached on pay per call phone lines. Callers are billed the cost of the services by the phone companies, which keep part of the revenue for use of the line and pay the rest to the information provider. Caller pay lines have special number prefixes, the most common being 976, which cover a single area code, and 900, which can be accessed by callers from anywhere in the U.S., except Alaska and Hawaii. Callers to these numbers are all billed the same rate, regardless of the distance of the transmission. A New York based 900 service giving up to the second commodity prices, for example, will cost callers from Manhattan to Seattle precisely the same amount per minute. About 100 services are available on 976 phone lines from Bell Canada in Ontario and Quebec. The majority of the lines are the often controversal adult fantasy lines, which are on the wane in the U.S. because of market saturation. The 900 service is not yet available in Canada, except for automated polling or call count lines, which are actually routed into the U.S. over the AT&T network. Bell plans the introduction of full 900 service in Ontario some time in 1991. Essential links in the delivery system are the telephone service bureaus - agencies which thousands of phone lines from the carriers. The lines are then connected to specialized voice processing computers and re-rented to the information providers, who promote their services to their target audiences, typically through radio and television advertising. Fortunes have been made almost overnight by information providers know in the industry as infopreneurs, who understand what information or entertainment callers will pay for and how best to package and promote it. One dramatic example of sucess in this new industry is Arthur Toll, a former airline executive who founder Gateway Telecommunications in 1987 with two answering machines costing $70 each. Last year his company, which now includes a service bureau, advertising agency, equipment manufactor and media production house, had gross billings of $39 million (U.S.) and is currently the largest provider of 900 services in the U.S. Voice Processing While the voice information industry was launched by individual infopreneurs like Toll, established businesses sre rapidly, and profitably, incorporating voice processing into marketing and customer service programs. Already in wide use is the dealer location service, where callers enter their postal code into their touchtone phone to hear a short advertisment along with the address and phone number of the nearest dealer. Also becoming popular are phone entry contests and product sample request lines. The caller is normally asked to answer a few basic market research questions, which the business uses to build present and potential customer databases. A case study presented at the convention demonstrated how Revlon used a $100,000 (U.S.) phone sweepstakes to stimulate calls to an automated advertising and market research 900 number. Phone Bills Since the callers paid $2 on their phone bills to enter the contest, most of the costs of the program were covered by the entrants themselves. Among the several Canadians attending the convention was Mandle Cheung, president of Computer Talk Technology in Richmond Hill, a major designer and manufacturer of voice processing systems in this country. Cheung was impressed by the inventiveness of Americans in creating new applications, but felt there was nothing to learn from then on the technology side. "Everything the Americans are doing with developing the hardware and software itself, we do as well, in some cases better," Cheung said. "We feel we have more appreciation for how small and medium sized businesses can exploit this exciting new technology." You may distrubute this file freely but may not change any part of this file in whole or part without the written or verbal concent of the author. =============================================================================== Call These Great Upi Boards! =============================================================================== Node Number Board Name Sysop Baud =============================================================================== Hq 416-Upi-Home The Northern Phreaker's Alliance The Lost Avenger 12/24 1 416-Upi-Nde1 The Shining Realm FrosT BitE 12/24 2 514-Upi-Nde2 The Order Of Kamikaze Tomcat 12/24 =============================================================================== 02-13-90/003 Copywrite 1990 By The Lost Avenger-All Rights Reserved <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> < > < The United Phreaker's Incorporated Proudly Presents > < > < Teen Hacker Taps Into Network Send Teachers `Rude' Messages > < > < By: The Lost Avenger > < > < An Upi Production 1990 > < > <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Reprinted In File Form On March 2, 1990 Orignally Publised In The Toronto Star March 1, 1990 =============================================================================== Teen Hacker Taps Into Network Send Teachers `Rude' Messages By Caroline Byrne TORONTO STAR A teenage hacker infiltrated a computer network at least 20 times in the past two months with obscene messages to teachers across the United States and Canada, the Peel Board of Education says. "The kid broke into this around Dec. 15 and what he was doing, which less than amusing, was ... sending out really rude messages," board chairman Carolyn Parrish said yesterday. The main computer for international network, called CHIMO, is at the board's Mississauga office. "It was a little embarrassing. Obvisously we had to shut it down for a while," she said. About 900 teachers from Vancouver to Newfoundland and south to Texas were using the computer network when messages started appearing. Using his home computer, the youth discovered the passwords of several teachers and left "alarming" notes in their electronic mailboxes. Peel police Sergeant John rennie said yesterday. Police would not say how they caught the suspect because that would be submitted in court as evidence. A 17 year old Morningstar Secondary School in Mississauga has been charged with 10 counts of unlawful use of a computer. He cannot be named under the Young Offenders Act. You may distrubute this file freely but may not change any part of this file in whole or part without the written or verbal concent of the author. =============================================================================== Call These Great Upi Boards! =============================================================================== Node Number Board Name Sysop Baud =============================================================================== Hq 416-Upi-Home The Northern Phreaker's Alliance The Lost Avenger 24 1 416-Upi-Nde1 The Shining Realm FrosT BitE 24 2 514-Upi-Nde2 The Order Of Kamikaze Tomcat 96 3 305-Upi-Nde3 Ferrari Mr. Ferrari 38.4 4 416-Upi-Nde4 Time Zone Destoryer 38.4 5 716-Upi-Nde5 The Knight's Society Jeff Knight ? =============================================================================== 03-02-89/004 Copywrite 1990 By The Lost Avenger-All Rights Reserved <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> < > < The United Phreaker's Incorporated Proudly Presents > < > < Phone Company Update > < > < By: Tomcat > < > < An Upi Production 1990 > < > <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -=ð[ úMa Bell UpDateú ]ð=- -=ð[ úMa Bell Updateú ]ð=- -=ð[ úMa Bell Updateú -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Good news to all of you PhReAkEr'S out there who dislike Ma Bell's metohd of handling long distance calls [don't know why you dudez wouldn't though?!] Ma Bell will now have competition. As many of you may know, Bell Canada has had a monopoly on the phone line business of Canada for a while, with AT&T and Northern TeleCom and others only able to make phones, not having the right to try to use their phone line(s) in Canada, unlike the United States. A Bell representitive has said that there is competetion for the phone market against Bell, and the other phone company fighting this monopoly has asked the government of Canada for permission, which the Bell rep., said that the other phone company [don't know what they are. Probably At&t] will probably get permission to use their business here in Canada, therefore destroying Bell's monopoly on phone power. If this DOES go through, and Bell DOES lose their monopoly, the Bell rep., said that the long distance prices will Decrease [GOOD if you don't phreak, and good if you do, so when and if you get busted... ], though the local charges, for having touch tone, a line, etc..., will have to increase. The phone company challenging Bell is not known to me, though, as I said above, is probably AT&T. Other possible big name phone companies that may be in for some of Canada's phone market may be: Northern Telecom, Sprint, MCI and others. Look for version 1.1a for another Bell / Other Phone Co. Canadian UpDate. -=>- Tomcat -<=- [HEaT] [ZoNE] [UPi] You may distrubute this file freely but may not change any part of this file in whole or part without the written or verbal concent of the author. =============================================================================== Call These Great Upi Boards! =============================================================================== Node Number Board Name Sysop Baud =============================================================================== Hq 416-Upi-Home The Northern Phreaker's Alliance The Lost Avenger 24 1 416-Upi-Nde1 The Shining Realm FrosT BitE 24 2 514-Upi-Nde2 The Order Of Kamikaze Tomcat 96 3 305-Upi-Nde3 Ferrari Mr. Ferrari 38.4 4 416-Upi-Nde4 Time Zone Destoryer 38.4 5 716-Upi-Nde5 The Knight's Society Jeff Knight ? =============================================================================== 03-06-89/005 Copywrite 1990 By The Lost Avenger-All Rights Reserved <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> < > < The United Phreaker's Incorporated Proudly Presents > < > < Music On Hold Adapter (Music Box) > < > < By: The Lost Avenger > < > < An Upi Production 1990 > < > <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Reprinted In File Form On March 4, 1990 Orignally Publised In Radio Electronics August 1989 =============================================================================== Music On Hold Adapter By Steve Sokolowski Have you ever been in the middle of a phone conversation, and need to either walk away for a couple of minutes or switch lines? The kids might be crying, the washing machine might need fabric softener, whatever. Here's an inexpensive "Electronic hold button" controlled by a Touch Tone phone, with provision for audio for the other party, using either a music synthesizer IC module or a radio. Unlike normal hold buttons, this one doesn't cut your phone handset off from the other party; you can still hear one another, ans also the audio, if you use it. Rather, what it does is let you provide this audio to the other parrty, and then lets you hang up the handset without losing your party; you can also opt for silence. When you wish to resume conversation, pressing the pound (#) key shuts off the audio if used, and allows you to hang up and disconnect when you need to know how hold buttons and Touch Tone phones work. Placing A Call On Hold The normal on hook voltage of a phone line is about 50 volts, depending on particular central office equipment. When you lift a phone's handset, 600 ohms is place acriss the phone line, dropping the voltage to 5 volts. The hold adapter prevents a disconnection when you hang up the handset, by placing R6 And LED1 across the phone line using RY1. The synthesizer provides music for the party on hold; it can be left out if desired. Touch Tone Operation Touch Tone Phones produce Dual Tone Multi Frequency (DTMF) signals, using a 4 X 4 keypad that produces two tocuh tone sinusoidal outputs. The frequencies are determined by the key row and column (see Figure 1); The row frequencies are lower than those of the columns, and a Touch Tone signal is the sum of both. Normal Touch Tone pads have 12 keys, but the operator console keys (A-D) which normally aren't used. Adding two sinusoids is equivalent to multiplying two sinusoids whose frequencies are the difference if the orginals. Early Touch Tone pads used indicators and capacitors; modern versions are crystal controlled intergrated circuits that create staircase sinusoids. Circuit Description The G8870 represents each tone pair as a 4 bit code, where the column of a key is the first two bits, and the row of a key is the second two bits; both pairs of bits range from 00-11. This 4 bit code is then decoded by a 4514 4 to 16 decoder (IC3) to give the digit dialed. Pressing the (*) key on a Touch tone phone adds a 1209Hz sinusoid (a Row 4 tone), and a 941 Hz sinusoid (a Column 1 tone), to give a binary code of 1100. Similary, pressing (#) key adds 941Hz And 1477Hz sinusoids, to give a binary code of 1100. If a user preses a key on a Touch Tone phone used to operate the hold adapter, pin 15 (Strobe SçD) Of IC1 goes high. That stobe output is inverted by NOR gate IC2-a, and is fed to pin 23 (INHIBIT) OF IC3, enabling that device. If The Touch Tone key pressed is either (*) or (#), then either pin 19 or pin 14 of IC3 goes high, since those are the pins corresponding to these keys. Pin 19 of IC3 goes to pin 12 of IC2-b, and pin 14 of IC3 goes to pin 5 of IC2-c. Note that IC2-b and IC2-c are used to create a NOR gate reset set (RS) flip-flop, which then controls RY1. Since only one Touch Tone Key is interpreted at a time, there's no mormal instance when both pin 19 and pin 14 of IC3 fo high simultaneously; that only happens when IC3 is deferctive or there's a short. If neither the (*) key nor the (#) key have been pressed, then both pins stay low. Pressing the (*) key drives pin 12 Of IC2-b high and pin 11 of IC2-c goes low. Similarly pressing the (#) key drives pin 5 of IC2-b high and pin 4 of IC-b goes low. When pin 4 Of IC2-b, goes high by pressing the (*) key, Q1 turns on and the contact of RY1 closes, preventing a disconnection when you hang up the handset. That's because phone line current now flows through R6, the secondary of T2, and the hold indicator LED1, which is now lit. When pin 4 of IC2-b goes low by pressing the (#) key, Q1 turns off, current stops flowing through the coil of RY1 (opening its contact), and disconnecting the hold adapter. The hold adapter doesn't work as a standard hold button, because pressing the (*) key doesn't disengage your phone handset. It just lets you hang up or switch to another lone without being disconnected, because a second current path is now across the phone line. To include audio, the music synthesizer module goes in parallel with LED1, and the audio fed from the synthesizer to the primary of T@. The audio modulates the 5 volt phone line voltage and is heard by both you and the party on hold. If you prefer either dialogue or some other music, you can replace the synthesizer with a radio that has an earphone jack. To do that, plug an external earphone cord into the jack, and connect an earphone jack to the PC board hole for the synthesizer output, using S2 (an SP3t switch) as indicated. For silence, jumper the secondary of T@; that can be done using either a jumper or S2, although the use of S2 is strictly optional. Just remember that pressing the (*) key lets you hang up without being disconnected, but doesn't disengage the handset. The hold adapter uses IC4, a 7805 5 volt DC regulator with C4 as filter, and 12 volt DC, 250mA, wall transformer T1; S1 is used as the ON/OFF switch. Construction User sockets for the IC's, transistor (if desired), and relay. Any suitable cabinet will do, and user a 1 amp, 120 volt to 12 volt DC wall transformer. Use screws and spacers or adhesive foam to attach the PC board to the cabinet. You can use any SP3T switch you want for S2, as long as it'll fir in the cabinet. Music synthesizer modules play repeating 30 battery socket and speaker. The 1.5 volt battery socket and speaker. The 1.5 volt battery will likely be present; the speaker may be, depending on the model. Note the polarity of the battery (if present) before removing it. The mechnical ON/OFF switch depicted is a metal flap, riveted on the the right end, and with the left end on the right end, and with the left end resting against the module board by spring tension. Connect the pad on the PC board labeled "1.5 V" to the synthesizer's battery terminals, break the speaker wires or foils (if the speaker is present), and the solder any ON/OFF switch closed. Attach the synthesizer to the PC board using doublesided tape or adheasive foam. The two PC board pads underneath the "1.5V" label connect the audio to the primary of T2. The secondary of T2 goes in series with R6 and LED1, adding audio to the 5 volt DC offhook voltage. For silence, jumper the secondary of T2. To display all 10 decoded Touch Tone keys, install R9 to R18 And LED2 to LED11 (with bezels), the former mounted in the PC board, the lattered mounted on the the front panel of a cabinet. Installation And Test Connect the red and green wires of a standard phone cord to their PC board locations; the yellow and black wires aren't used. The other end plugs into a T adapter with two RJ-11 female telephone sockets feeding into one RJ-11 male telephone plug. Plug the hold adapter and the Touch Tone phone into the T adapter, and plug the T adapter into the telephone jack. To test the hold adapter, dial a friend; if R9 to R18 and LED2 to LED 11 were used, the LEd corresponding to the Touch Tone key pressed should light. To place a call on hold, press the (*) key; RY1 will close, connecting R6 and LED1, audio should now be heard by you in the handset if the synthesizer or a radio is present, and you can now hang up the handset. Pressing the (#) key disengages the hold adapter, opening RY1's contact, disconnecting R6 and LED1, and stopping the audio. Since the current path had now been removed, hanging up the telephone will disconnect your party, unless you first press the (*) key again. Figure 1: Touch Tone Keypad 1209Hz 1366Hz 1477Hz 1633Hz Ú-------------------------------¿ 697Hz | 1 2 3 A | | | 770Hz | 4 5 6 B | | | 852Hz | 7 8 9 C | | | 941Hz | * 0 # D | À-------------------------------Ù Schematics To Music Box: Parts Needed -=-=-=-=-=-= Resistors =-=-=-=-= R1, R2, R4 - 100,000 Ohms, 1/4 Watt, 5% R3 - 47,000 Ohms, 1/4 Watt, 5% R5 - 50,000 Ohms, 1/4 Watt, 5% R6 - 120 Ohms, 1 Watt, 5% R7 - 220,000 Ohms, 1/4 Watt, 5% R8 - 1,000 Ohms, 1/4 Watt, 5% R9 To R18 - 1,000 Ohms, 1/4 Watt, 5% Capacitors =-=-=-=-=- C1, C2 - 0.01 æF Disc C3 - 0.1 æF Disc C4 - 470 æF 16 Volt Axial Tantalum Electrolytic Semiconductors =-=-=-=-=-=-=- Q1 - 2N222 Transistor IC1 - California Micro Devices G8870 Touch Tone Reciever IC2 - 4001 Quad NOR Gate IC3 - 4514 1 of 16 Decoder (High Output) IC4 - 7805 5 Volt DC Regulator To 220 Type LED1 To LED11 - Standard Red LED's Other Components =-=-=-=-=-=-=-=- S1 - SPST 120 Volt AC Switch S2 - SP3T Rotary Or Slide Switch T1 - 120 Volt AC To 12 Volt Dc, 250 mA, DC Wall Transformer T2 - Audio Transformer, 1000 Ohms Primary, 8 Ohms Secondary (Mouser Electronics, Catalog NUmber 42tm013) RY1 - 6 Volt SPST Relay With 100 Ohm Coil XTAL1 - 3.58 MHz Crystal MODULE1 - Music Synthesizer Module Miscellaneous =-=-=-=-=-=-= Suitable Cabinet 4 Wire Phone Cord With Open Wires On One End Or Spade Lugs 4 Prong Or RJ-11 Modular Male Plug On The Opposite End Dual RJ-11 Socket To Single RJ-11 Plug T Adapter Female To Female Rj-11 Adapter Solder Wire NOTE: A kit of parts is available from De-Phone Industries, PO Box 5835, Spring Hill, Florida 34606. The kit includes the single sided PC board ($7.50 US), G8870 Touch Tone Receiver IC ($10.00US), T Adapter ($2.20US), 3.58 Mhz Crystal ($1.75US), And Music Synthesizer Module ($1.75US); Send $15.70US for all parts. Allow 3-4 weeks for delivery, and include $2.50Us for shipping/handling. Florida residents include sales tax; Canadian residents send money order in US funds, with $3.25 shipping/handling. No personal checks, please. Ú------------------------------------------¿ |Ú-----------------------------------------Å¿ Ú---o Green || 1Ú-------¿ || | || Ú-´ Ic2-a |3 || | Ú-o Red +5V || Ú----------------o | 4001 0----------¿ || | | Ú----------¿  || | À-´ | | || | o-C1-R1-o-----|1 IC1 18|-o || | +5V 2À-------Ù +5V¿| || | | | | | C3 || | Ú-------------------------------¿|| || o-Å-C2-R2-Å-o---|2 17|-o || | À|1 Strobe Ic3 24|Ù| || | | | o---|3 | R7 || | | Data1 4514 Inhibit 23|-Ù || | | R3 R4 | 16|-o ||ÚÅ---|2------¿ Ú-----------¿ | || | | À-Á---|4 15|----ÅÅÅÙ | À-| Latch 1 |--¿Data4 | || | | Ú-o---|5 14|----Ù|| | Data2Ú-| |-¿À----22|---Ù| | | | À---|6 13|-----Ù| Ú--|3------Ù À-Â--Â--Â--ÂÙ | | | | | Ground | 12|------Ù | | |A |B |C |D |Data3 | | | | Ú---|7 11|--------ÙÚ-|4-(7)----Ú-Á--Á--Á--Á¿ À-----21|----Ù | | Xtal | | Ú---Å-|5-(6)----| |---(0)-20|----¿ | | À---|8 10|¿ ÚÅ---Å-|6-(5)----| 4 To 16 |---(*)-19|-¿ | | | Ú---|9 || ÚÅÅ---Å-|7 (4)----| Decoder |---(8)-18|-Å¿ | | | GroundÀ----------Ù| ÚÅÅÅ---Å-|8-(3)----| |---(9)-17|-ÅÅ¿| | | +5V-ÙÚÅÅÅÅ---Å-|9-(1)----| |-------16| |||| | | o-----¿Ú-----¿ ÚÅÅÅÅÅ---Å-|10-(2)---| |-------15| |||| | | 4| || |11 ||||||Ú--Ù | | |---(#)-14|¿|||| | | Ú--0--¿ || Ú--0--¿ ||||||| |11-------| |-------13|||||| | | |Ic2-c| || |Ic2-b| ||||||| Ú-|12-------À-----------Ù |||||| | | |4001 | || |4001 | ||||||| | À-------------------------------Ù||||| | | ÀÂ---ÂÙ || ÀÂ---ÂÙ Ú-Ù||||||Ground Ú-------------Ù|||| | | |5 |6 || 13| 12| |Ú-Ù||||À-------------------¿ |Ú-------------Ù||| | | | À---ÅÙ | | ||Ú-Ù||À---------------¿ | || ||| | | | À----Ù | |||Ú-ÙÀ-----------¿ | | || Ú-----------Ù|| | | | À---ÅÅÅÅ--------------Å----Å----Å---ÅÙ | Ú-------Ù| | | | |||À---------¿ | | | | | | | | | | ||À-----¿ | | | | | | | Ú--Ù | | | Ú-ÙÀ-¿ | | | | | | | | | | | | R9 R10 R11 R12 R13 R14 R15 | R16 R17 R18 | | | |(1) |(2) |(3) |(4) |(5) |(6) |(7)| |(8) |(9) |(10) | | | Led2 Led3 Led4 Led5 Led6 Led7 Led8 | Led9 Led10 Led11 | | | | | | | | | | | | | | | | | À----o----o----o----o----o----Ù | À----o-----Ù | | | Ground | Ground | | À----------------------------------------------------Ù | À----------------¿ À--------¿ | Ú-----¿ | | | RY1 0 | | | 0-ÂÙ À----------------------------¿ | 0-Å------¿ | À-----Ù | +15V| | Ú--Á--¿ | | Ú---| RY1 || | | | | Coil|Ù | | | À-----Ù | | | ÚGround | | | | | Ú---------¿| Ú-----------¿ ÚÁ---Á¿ R6 Ú---| Radio || o----| 120 Vac |----¿ | Q1 | | 0 Slience |Ú--| || | | to 12 Vdc | | | | A| S2 0 Radio---Ù| À---------Ù| | | 25mA | | À--Â--Ù Ú----o Ú0----0 Music | Ú---------¿| 120 Vac | Wall | | | | | | À---------Å--|Module 1 || | |Transformer| | | | Sec T2 Pri Ú---------o--| || o----| T1 |-¿ | | | | | | À-Â------ÂÙ| À-----------Ù | | | À----o À-----Ù |- +| | OutÚ-----¿In | | | B| | 1.5V | | Ú---o--| Ic4 |--0--0--Ù | | | | | | | | | 7805| 0 S1 | | Ú-Led1-o-----------------------Ù | | | +| | | | | À-------------------------------------Ù | | C4 À--Â--Ù | À--------------------------------------------Ù | | |Gnd | | | | | | À-----o--------------Ù 0 Ground 5 Volts You may distrubute this file freely but may not change any part of this file in whole or part without the written or verbal concent of the author. =============================================================================== Call These Great Upi Boards! =============================================================================== Node Number Board Name Sysop Baud =============================================================================== Hq 416-Upi-Home The Northern Phreaker's Alliance The Lost Avenger 24 1 416-Upi-Nde1 The Shining Realm FrosT BitE 24 2 514-Upi-Nde2 The Order Of Kamikaze Tomcat 96 3 305-Upi-Nde3 Ferrari Mr. Ferrari 38.4 4 416-Upi-Nde4 Time Zone Destoryer 38.4 5 716-Upi-Nde5 The Knight's Society Jeff Knight ? =============================================================================== 03-06-90/006 Copywrite 1990 By The Lost Avenger-All Rights Reserved <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> < > < The United Phreaker's Incorporated Proudly Presents > < > < Secret Phone Bypassing Stirs Row > < > < Is Underground Long Distance Network That Saves Millions `Illegal' > < > < By: Tomcat > < > < An Upi Production 1990 > < > <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> Reprinted In File Form On March 27, 1990 Orignally Publised In Popular Electronics Electronics Hobbyists Handbook 1990 =============================================================================== Secret Phone Bypassing Stirs Row By: Mike Urlocker THE FINANCIAL POST An underground telecommunications network used by businesses to divert millions of dollars from Canadian telephone companies is flourishing, industry experts say. And apart from cutting their rates to compete, there is little the telephone companies can do to control it. (HAHA to Bell!! -Tomcat). "The telephone companies are scared to death," says Frank Koelsch, senior vice-president of Transition Group Inc., a Toronto-based market research firm. "There's lots of people doing it. It runs the gamut from small business to large corporations." Companies using the system, known as "Canada-Canada Bypass," use private lines and switches to route their domestic long-distance traffic through the U.S., where rates are lower. For example, a Vancouver-based company with operations in Windsor, Ont., could bypass the Canadian long-distance network by routing its traffic over private lines from Vancouver to a switch in Seattle, Wash. From there, the traffi is picked up by a U.S. long-distance carrier and piped across to Detroit. A third hop routes the calls back across the border to Windsor. Monopoly Carrier Similiar methods are used to route overseas calls through the U.S., bypassing Teleglobe Canada Inc., the monopoly overseas carrier. People familiar with the technique say a corperate telecommunications manager could rig such a system so it is invisible both to employees and the telephone companies. With U.S. long-distance rates about half what Canadian companies charge, substantial savings are reaped. The practice violates agreements between U.S. telephone companies and Telecom Canada, the association of nine regional monopoly telephone com- panies, as well as policy of the Canadian Radio-television & Telecommun- ications Commision. Companies that bypass risk having their phones disconnected. Nobody knows how extensive bypassing is. But Koelsch estimates 20% of the $12-billion-a-year Canadian long distance business is threatened. Telecom Canada and rival CNCP Telecommunications say bypass is im- possible to monitor but downplay the damage. "It's probably getting worse," says Frank Degenstein, former president of Telecom Canada. "[But] it's not that economical for companies to do it." The telephone companies say bypass is illegal but others disagree. Koelsch and George Harvey, president of CNCP, say that while bypass breaks the phone companies' agreements, it is not against the law. Further, Koelsch argues that attempts to stop bypass could be challenged as a non- tariff barrier under the Canada-U.S. free trade agreement. "They have perpetuated the myth that it's impossible and illegal," said Koelsch, who recommends bypass to reduce domestic long-distance bills. Alliance Disagrees The Canadian Business & Telecommunications Alliance, which represents 300 major telecommunication users, disagrees with Koelsch's analysis, saying the practice is illegal. To bypass the Canadian network, a Canadian company must lease private lines to the border. As a result, at least peripherally, a Canadian supplier is involved. Telephone companies, CNCP and a half-dozen resellers, small firms that lease bulk private lines from the carriers and resell them at a discount, offer lines to the U.S. That is permitted as long as the traffic is not rerouted back across the border into Canada. CNCP's Harvey says he "absolutely guarantees" CNCP does not let its lines be used for bypass. But, he adds, once lines are in the hands of resellers, "we have no way of checking." In a recent submission to the CRTC calling for increased regulation of resellers, British Columbia Telephone Co. said two Canadian resellers were bypassing the Canadian network. The firms were not named. Resellers, which deny the charge, usually sign agreements with their suppliers not to bypass the Canadian network. You may distrubute this file freely but may not change any part of this file in whole or part without the written or verbal concent of the author. =============================================================================== Call These Great Upi Boards! =============================================================================== Node Number Board Name Sysop Baud =============================================================================== Hq 416-Upi-Home The Northern Phreaker's Alliance The Lost Avenger 24 1 416-Upi-Nde1 The Shining Realm FrosT BitE 24 2 515-Upi-Nde2 Paranor Demon Asmodeus 24 3 305-Upi-Nde3 Ferrari Mr. Ferrari 38.4 4 416-Upi-Nde4 Time Zone Destoryer 38.4 5 716-Upi-Nde5 The Knight's Society Jeff Knight 24 6 408-Upi-Nde6 The Unholy Temple Black Death 24 7 031-Upi-Nde7 Rebel Box (Netherlands) Mr.Miracle 24 8 213-Upi-Nde8 The Drop Site N Sult 24 =============================================================================== 04-27-90/010 Copywrite 1990 By The Lost Avenger-All Rights Reserved