THE IC'S RULES OF PHREAKING These are the standards of hacking employed by the Inner Core. The text comes from a data file written by and for IC members. HACK YOUR OWN CODES. Don't leech from someone else. Having codes is like having sex, if you don't protect yourself you'll end up with a venereal disease. You have no idea where a code has been before you got your hands on it, when it was hacked or how long it's been in circulation. Time is a very important factor, the longer a code has been in use, the greater the risk. DON'T STAY ON A CODE MORE THAN THREE DAYS. Don't give the suckers an even break. To run a trace, MCI needs to shuffle a lot of papers. Ain't that nice. Paper work takes time, and it's highly unlikely they could accomplish the feat in three days. It's even more unlikely they would even know they've been phreaked for at least a week. All company's have thirty day billing cycles, if you started using the code the day after the bills went out, you'd have twenty nine days left to play with it. The customer gets his billing and bitches up a storm. The company now has the option of setting up a trap, but alas, they notice you haven't used the code in three weeks and have no destination number to PIN. If you phreaked the code one day before the billing cycle ends, the customer may notice right away. Figure you have two days for it to reach the customer. If he yells right away it takes a few more days for the security department to process the paperwork for the trace. By that time you're long gone. DON'T STAY ON A NODE MORE THAN THREE DAYS. If you insist on burning the same company, you're going to develop a pattern. You call your girl friend in Alaska every damned day using the same company. It doesn't take a genius to predict what you're going to do tomorrow. They know where you enter their system and where you're going to. You've given them everything they need to run a good trace. Spread the wealth a little. Use US Telecom, then ITT, Lexitel, Skyline, Metro and a few of the 800's if you like. Spread it out. These people have no way of comparing. So you can screw Peter, Paul and the rest of the Apostles with no worry. Just don't be a dip stick and get lazy. Everyone is worried about THE TRACE. Don't be. It's no big deal for AT&T, after all it is their network, but for the leech services it's an entirely different matter. This is why we don't mess around with AT&T except through secondary accesses like PBX's or Diverters. This is the scenario MCI's security department will run down. They call up a number you've called....... "Hello, this is Inspector Bullshit with MCI. Did you receive a phone call from the 212 area code on November 22, 1945 at 4:00 A. M.? " "You didn't?" "We've traced fourteen calls to this number in the last two weeks, by the way, who am I speaking with?" "Well Mrs. Blabbermouth, perhaps someone else in your household received the calls? " "I see, your daughter has a boyfriend in New York. "I'm afraid he's in some serious trouble Mrs. B. If you'll cooperate with me we won't pursue this matter with your daughter." "That's correct, little Susie Blabbermouth won't be involved. It would be a shame to cause you folks trouble, after all she didn't actually make the calls."" All I need is the boy's name and phone number." "Let me see if I have that right."Jimmy Phreaker at 212-555-1212?" "Thank you Mrs. B you've been very helpful." The point is, if Bullshit had really run traces he wouldn't be calling to con the information. The exchange is typical of those used by most phone companys and illustrate several important issues. Make sure the person you're calling is cool and there's no chance someone else could rat on you. It is very unlikely MCI will make such a call if you use the IC's Rules of Phreaking. Yet, if it were to occur these are your friend's options... 1. HANGUP 2. "FUCK YOU"...THEN HANG UP 3. "I WAS WATCHING MIAMI VICE AND YOU INTERRUPT ME WITH THIS CRAP. FUCK YOU"....HANG UP. 4. If you want to be nice about it; "I don't know what you're talking about.....HANG UP. The problem is now resolved. Remember these guys are like rabid dogs in heat, they're excellent con artists. Believe nothing you hear. You don't have to talk to them. If they had anything on you they'd be standing at your door with a search warrant. Their abilities in this area are very restricted. They operate by manipulating your fear and you have nothing to fear but your own fear. Don't try to come up with some lame explanation, you know you received the call and they know it. So don't make an ass out of yourself trying to explain away the obvious - HANG UP! What happens if your are caught? Congratulate yourself on being an asshole. The number of phreaks caught are so small you have now qualified for membership in a really elite group of jerks. Inspector Bullshit now has several options. Grab your computer......... this will be done no matter what. Grab your data files and any hard copy you have laying around. This to help identify other subversives and also to supply incriminating information about you. Try to scare you into a confession. Standard operating procedure - keep your fucking mouth shut. You have nothing to gain by talking and a much to lose. If you're a minor you can forget about jail time, an adult is looking at a couple of weeks in the slam - may-be. Realize this, they don't really want your ass as much as they want THE MONEY. That's right boys and girls the buck talks loud and clear. If you're caught, you've broken every one of the IC's rules. At worst you're looking at a couple of thousand in phone bills. Get a lawyer to do your talking for you, that'll be about a five hundred dollar retainer. If the company is willing to settle for the money, and your computer, pay it - it's cheaper in the long run. If they want you in the calaboose then fight it. As a first time offender the odds of you actually getting time are slim. Incidentally, Inspector Bullshit will drop a little extra on the bill for good measure. Have the attorney demand they produce their records of all "alleged phone conversations". In fighting a phreaking case you'll want to have a jury trial. The technology behind the running of a trace is so complicated even a halfassed lawyer could confuse the average layman. He can make Inspector Bullshit describe switching down to atomic subparticles if he wants and by the time he gets to how a trace works the jury would be so confused you'd skate on a "reasonable doubt". It would be interesting to see if a sharp shark could subpoena the actual equipment used to run the trace. I don't think MCI would care to have one of their computers offline for the time it would take to have "independent" examiners checking out the functionality of the switching mechanisms. To phreak or not to phreak. It's a question only you can answer for yourself. The following are electronic BBS conversations at a Hacker Bulletin Board. They have been left intact (misspellings too)with the exception of codes and phone numbers which could conceiveably get my ass in hot water. The Hacker network of communication is loosely knit but extremely effective in getting information circulated quickly. Lady G (Lady Godiva) is the only female I've ever seen on a hack board. Amazingly she conned her way inside, yet turned out not to be a threat to hackers even though she is employed by government. Numb. --> 72 Title --> JUST A LITTLE CODE From --> BIG BYTE Left --> 19-Apr-86 2:30 am While not to much to say just heres a sprint (Code Deleted) Also Bill the Cat do you know some people down in Florida like Blackbeard or been on some off my Conferences?? Let me know. .s opps /s shit B17> --> Next bulletin Numb. --> 73 Title --> Fed trap From --> BIG BYTE Left --> 19-Apr-86 3:05 am Where i live here in Green Bay Wi, they are busting our town for illegal use of the phone. The number they are getting kids (leeches on) is 1-800-437-7010 it is GCI of Ancrage <-spelled wrong Alaska and so far they have busted 400 people from one school and have questioned 1500 its like a bad dream oh who cares not me. Just be careful and dont use it unless you fell lucky. All the codes used are in the 467xxxxx area so may be other areas are safe. later bb B17> --> Next bulletin Numb. --> 74 Title --> Bobo.. From --> THE ARABIAN KNIGHT Left --> 19-Apr-86 11:10 am Bobo, Leave me mail. Id like to get a sprint Code(New). I got a new Pbx, maybe old. but it works fine.. Ak Bobo- Why are you so worried About Lady G? Does she know alot about you or something? B17> --> Next bulletin Numb. --> 75 Title --> [ Lady G. ] ? From --> THE D MEN TOR Left --> 19-Apr-86 1:23 pm I can run CNA's in 415, Give me e-mail and I'll find out whatever you want to find out about her BOBO. Have you spoken with her? How do you really know this person is over 30 etc...... later, The D men tor...Confused. B17>W Enter the name of the person you wish to send mail to: >THE D MEN TOR What is the subject of this letter? >Lady G Mail: You may enter up to 100 lines of text. Press CTRL-A or CTRL-Q when done. D men The numbers for Lady G are 415-(Deleted) and 415-(Deleted). She is over 30 because 1. She's uses expressions that are 15 years out of date. 2. I recoginize this becuase I too am 15 years out of date. I don't like people getting busted. She pirates but that's about it. I wonder why she's on so many hack boards. Motor City went down right about the time she logged on. I might be totally wrong, BUT, I want to check it out just to be safe. You can call me Mr. Paranoia. She rattles my cage and it makes me nervous. Let me know what pops. Bobo E>S Filing mail for THE D MEN TOR... B17> B17>7 --> Telecommunications Today (7)... --> 60 bulletins posted; some new! B7>N Numb. --> 59 Title --> Police Sting From --> CHARLIE SMITH Left --> 19-Apr-86 6:29 am Here is an interesting story: AUSTIN,TX--Law enforcement officials here have joined a growing number of police agencies nationwide running "sting" operations to catch persons using bulletin boards for illegal purposes. Based on information posted on a bulletin board it operated, The Austin Police Department said it has been able to turn off two pirate boards here and expects shortly to make a number of arrests for misdemeanor violations of Texas' newly enacted computer crime law. For more than two years, the police department secretly ran a board called the Underground Tunnel, which was set up to appear as a normal BBS run by a Sysop called "Pluto". But late last month - to the surprise of the board's more than 1,000 users - Pluto was revealed as Sgt. Robert Ansley, a seven-year veteran of the Austin Police Department! "Most of the users were people interested primarily in several on-line fantasy games or in electronic messaging." Ansley said. "To get to the levels where people posted information on how to crash corporate sysems, the user had to ask for increased access. We were very careful not to solicit or entrap anyone into leaving illegal information." The Austin Police Department disclosure caught most of the BBS's users by surprise. "I liked the board's electronic messaging capabilities," said user Michael Whalen, the managing editor of the Daily Texan, the student newspaper of the University of Texas, here. "I was really surprised at how the officer was able to pull this off." What the police found, according to Ansley, included access codes belonging to the world's largest credit reporting organization, TRW Information Services Systems Division of Orange, California. "Most offenders seem to be real big on TRW," said Ansley. Sting and intelligence gathering bulletin board operations are on the rise throughout the country, according to law enforcement officials. Several police departments nationwide have already used bulletin boards to track down and arrest microcomputer users who post illegally obtained calling card codes, mainframe access procedures and passwords, or other confidential information. According to one high-level West Coast law enforcement officer who declined to be identified, federal officials are now joining local authorities in running b5lletin boards (BBSs) in several key metropolitan areas. "You better believe law enforcement agencies are interested and in in some cases, running bulletin boards," said Dan Pasquale, a sergeant with the Fremont, California, police department. Last month, police in Fremont, capped three and a half months of bulletin board operations by arresting eight individuals for alleged credit card fraud, misuse of telephone credit card operations, and technical trespass. Pasquale said most corporations whose passwords or calling card numbers were posted on Fremont's BBS were unaware that their information had been compromised. ** Hackers Note Here** Pasquale actively solicited the posting of codes, passwords, credit cards. Qualifying as entrapment. More experienced hacks pulled out before he sprang his trap. More than 200 people were arrested coast to coast. Only one was elite and he beat the rap. The rest were rodents. Although police are pleased with their results, some users say they feel the sting bulletin boards are unfair to both the innocent users and the suspected criminals alike. Whalen said students at the University of Texas used the board extensively, andhe claimed that some people accused of posting access codes and other information on the board felt they had been entrapped when they discovered that the BBS was a police sting operation. Whalen also said that some users were concerned about the privacy and sanctity of electronic mail left on the board. "Ansley said users are foolish if they don't think a sysop reads the mail on the board," he added. Indeed, as police turn increasingly to bulletin boards to catch suspected criminals, the issue of entrapment has also become a growing concern, one to which police are sensitive. "At no time did the police department urge users to leave access codes, applications, or passwords for corporate computers on The Tunnel," Ansley said. To prove entrapment, a suspect would have to clearly show that the government agent offered some type of inducement to promote criminal activity, said Jim Harrington, the legal director of the Texas Civil Liberties Union here. "The whole area of police gaining information on [criminal activities] by reading electronic mail is very interesting." Fremont police held a series of meetings with a district attorney before they started a board, according to Pasquale. "We established a point where entrapment began and made sure we never crossed that point, and in fact, messages on the board were scripted in conjunction with the district attorney's of Ahem, let me hasten to point out the Gemini System is NOT a police BBS! Charlie Numb. --> 60 Title --> Infocom From --> ATILLA THE HUN Left --> 19-Apr-86 11:37 pm Well I don't know if anyone has heard this but, I have heard that Infocom will start (or may have started) calling AE lines to see if they contain any infocom software. If so they download it and check the serials, and bingo if a pirated version then plain and simple YOU IS BUSTED! oh well anyone else know of anything more, I picked it up under discussion at a bbs. atilla the hun -<*----- B7>OFF In The News Press reports of hacker misdeeds seem to be written in flavors which border upon awe to contempt. It depends on the publication. Newspapers ten to permit more editorializing. Between the two extremes there is a point of reason. I've often wondered, "If a fifteen year old kid can break into a 'secure' government computer, what could a fully trained enemy agent do?" It's a reasonable question. Virginia - A fourteen year old hacker who called himself Phineas Phreak was the first to be prosecuted under the state's computer trespassing law. Arrested for hacking at a Bulletin Board, he was placed on one year's probation and ordered to pay $300.00 in compensation to the board's operator, Allen Knapp. Milwaukee - A hacker group who called themselves the 414's after their area code were arrested by FBI agents and found to have access to more than 60 computer databases. These included a California Bank, a cancer center and the Los Alamos Scientific Laboratory. California - Stanley Rifkin a computer consultant for Security Pacific Bank, stole the bank's passwords and liberated 10 million dollars from the institution. He then erased the electronic records of the transactions. While Rifkin was not a hacker, he hold the distinction of being the country's number one computer thief. His arrest was not the result of his computerized misdeeds, but instead, his lack of expertise at being a thief. Washington - The United States Government has become the nation's leading user of computers. As such, they are a target of internal thieves who have used their systems to divert funds for their own uses. A number of arrests of computer related theft has led the government to believe they haven't scratched the surface yet. It's estimated that only one in 22,000 computers crimes will ever be prosecuted. San Diego - A computer hacker, Bill Landreth pleaded guilty to tapping the GTE Telemail network in Vienna, Virginia. Known as "The Cracker" he agreed to cooperate with Federal Investigators in a larger investigation. Four teenagers from Irvine, California were subsequently arrested and named Landreth as their source of information on hacking. Landreth has since written a book "Out of the Inner Circle". The four kids from Irvine don't receive royalties. TRW - Hackers armed with stolen passwords broke into the TRW credit system and reviewed information on employment records, bankruptcies, loans, social security numbers and credit cards. The password was stolen from a Sears and Roebuck and was reportedly in circulation for the better part of a year. The credit card numbers, expiration dates and credit limits of card holders were used to make fraudulent purchases. TRW changed the password. Atlanta - Edward Johnson took exception to Jerry Falwell's fund raising activities. His mother had a thing for T.V. preachers and often gave money to Falwell's Liberty Foundation. Mr. Falwell's collectors were oblivious to the fact the elderly lady lived on social security and couldn't afford the donations. On a previous occasion she had attempted to give the family farm to Jimmy Swaggart. Johnson adjusted his phreaker program into a phone cranker to auto dial Falwell's 800 and tie up the line for 30 seconds a call. Falwell's people reported they lost one million in donations from the activity. Southern Bell finally trace the calls and gave Johnson two choices, stop or lose his phone line - he stopped. After all, it was "God's will". Washington - Representative William Hughes from New Jersey has introduced a bill to make computer theft of data and certain "kinds of hacking activities" federal felonies. New Jersey - Seven teenagers were arrested on charges of credit card fraud, phreaking and hacking. An investigation into credit card purchases led local police to the operator of a hacker bbs. Armed with a search warrant the police seized his computer and all related data. Inspection of same led to the arrests of the other six. Now known in hack circles as the New Jersey Seven, they reportedly had the ability to change the attitude of a government satellite. The Inner Core reports they consider it unlikely the kids knew they had the capability. In my research, I've noted government and business to be at greater risk from their own employees than from hackers. Credit card fraud is the leading hacker crime. The pales beside the reported cases of computer theft from internal sources. The Rifkin case is the most noted. However, thousand of unreported thefts occur every year. MAKING MONEY WITH YOUR CODES Ok, phreaking will save you money, that's fine. Wouldn't you rather make some bucks off these jokers? No biggy. You sell your codes. Is it illegal? You bet, but your the adverturesome type with avarice in your heart...this is how it works. Abdul wants to call the Middle East so he can talk with his camel. No problem. Call the international operator and ask how much it costs for an hour to Jordon. Charge the raghead fifty percent of the cost for hooking him up and let him talk as long as he likes. MCI and Sprint both access the Middle East so you're in business. Foreigners are good to deal with. They're extremely paranoid anyway so tell them you have to make the calls from a phone booth. This isn't true BUT, you're covering your own ass. There are a variety of good reasons why a phone booth is called a fortress, this is one. DO NOT SELL THE CODES. Abdul knows nothing about phreaking. The dumbshit will stay on the code too long and will end up getting his ass traced. The telcos don't give two shits about this guy. THEY WANT YOU!. You're the guy costing them the big bucks. Abdul will make a deal and your tit will be in the ringer. So keep control of the codes. If you want to be a nice guy and hand out codes to your phriends fine. Just be sure they don't have big mouths and that they know the IC's Rules of Phreaking. You'll find a list of the countrys MCI and Sprint access in the appendix. You'll also notice there are a lot of places that they don't go. India for one. The only way to book passage to India is on AT&T. You'll need to bag a PBX or a Diverter for that action. Equal Access What does equal access mean to you? Not much. Access was the issue that permitted Mci to break up At&t. The result was the sudden emergence of the companies you'll find listed in this chapter. At&t still retains an 85%+ share of the telecommunications market. The rest of the business enterprises are basically parasites attempting to feed off of Ma Bell's network. Equal Access means you get to pay 2 to 5 dollars a month for "access" to the long distance network, whether you want it or not. It means your local telco can go begging to the Public Utilities commissions claiming the need for rate increases in the wake of the break up. Pacfic Tel was hurt so much they posted sales recently of one billion dollars. I first in the company's history. There is one small advantage to equal access. Ustel (950-1033) customers can crossover to the Sprint Network (950-0777) and make international calls. By appending the equal access code to the customer code the call will be cross connected. In short, equal access means this..."Bend over and smile America". If you thought you were getting screwed before, well you ain't seen nothing yet. Equal Access Codes 10824 ATC Directline 10482 Access America 10939 Access Long Distance 10282 Action Telecom 10444 Allnet Americall 10002 Americall LDC Inc. 10053 American Network 10366 American Telco 10050 American Telephone Exchange 10080 Amtel Amertel 10824 ATC Communications 10287 ATS Communications 10272 Bell of Pa 10606 Biz-Tel 10300 Call America 10221 Capitol Telecommunications Inc. 10987 Clay Desta Communications 10266 Com Systems 10885 Communigroup of Kansas City 10733 Comp-Data Communications Compute a Call Comtel of Pine Bluff 10203 Cytel10233 Delta Communications 10339 Dial USA Directline Discount Long Distance EO Tech10054 Eastern Telephone Systems 10634 Econo Line of Midland Econo-line of Waco 10256 Execuline 10393 Execulines of Florida Garden State Telco 10235 Inteleplex 10884 ITI 10488 Itt 10535 LDL - Long Distance for Less 10084 LDS LDX LTS 10066 Lexitel 10852 Line One 10036 Long Distance Savers 10537 Long Distance Service of Washington Long Distance Telephone Savers Max Long Distance 10222 Mci 10021 Mercury Long Distance 10622 Metro America Communications National Telecommunications of Austin Network I/Metromedia 10855 Network Plus 10638 Northwest Telecom Ltd. 10785 Olympia Telecom 10808 Phone America of Colorado 10936 R - Comm 10211 RCI 10787 STS/Star Tel 10800 Satelco 10888 Skyline 10087 Southernnet 10321 Southland Systems 10777 Sprint 10889 St. Joseph10787 STS/Star Tel 10007 TMC of Arkansas 10021 TMC of Chattanooga 10007 TMC of El Paso 10007 TMC of Miami 10007 TMC of S.E. Florida TMI of Oklahoma 10826 Tel AMCO Tel-Central Inc of Oklahoma 10330 Tel-Share 10626 Tel/man 10007 Telemarketing Communications 10899 Telephone Express 10331 Texustel 10850 Tollkall 10824 Transcall 10333 US Telecom 10859 Valu-Line of Longview Valu-Line of Wichita Falls 10687 WTS Communicatons 10085 Westel 10220 Western Union 10995 Wylon ESS The following is a file taken from a Hack Board. I think it is intellegently written and accurate. +====================================+ + ELECTRONIC SWITCHING SERVICE V1. + + EXERT FROM 2600 MAGAZINE FEB '84 + +FROM THE RADIO STATION: 718-xxx-xxxx+ +====================================+ THERE WAS OF COURSE NO WAY OF KNOWING WETHER YOU WERE BEING WATCHED AT ANY GIVEN MOMENT. HOW OFTEN, OR ON WHAT SYSTEM, THE THOUGHT POLICE PLUGGED IN ON ANY INDIVIDUAL WIRE WAS GUESSWORK. IT WAS EVEN CONCEIVABLE THAT THEY WATCHED EVERYBODY ALL THE TIME. BUT AT ANY RAT E THEY COULD PLUG IN YOUR WIRE WHENEVER THEY WANTED TO. YOU HAD TO LIVE--DID L IVE, FROM HABIT THAT BECAME INSTICT--IN THE ASSUMPTION THAT EVERY SOUND YOU MAD E WAS OVERHEARD, AND, EXCEPT IN DARKNESS, EVERY MOVEMENT SCRUTINIZED. 'FROM NINETEEN EIGHTY-FOUR' ESS IS THE BIG BROTHER OF THE BELL FAMILY. ITS VERY NAME STRIKES FEAR AND APPREHENSION INTO THE HEARTS OF MOST PHREAKERS, AND FOR A VERY GOOD REASON. ESS (ELECTRONIC SWITCHING SYSTEM) KNOWS THE FULL STORY ON EVERY TELEPHONE HOOKED INTO IT. WHILE IT MAY BE PARANO ID TO SAY THAT ALL PHREAKING WILL COME TO A SCREECHING HALT UNDER ESS, IT'S CERTAINLY REALISTIC TO ADMIT THAT ANY PHREAK WHOSE CENTRAL OFFICE TURNS TO ESS WILL HAVE TO BA A LOT MORE CAREFUL. HERE'S WHY. WITH ELECTRONIC SWITCHING, EVERY SINGLE DIGIT DIALED IS RECORDED. THIS IS USEFUL NOT ONLY FOR NAILING PHREAKS BUT FOR SETTLING BILLING DISPUTES. IN THE PAST, THERE HAS BEEN NO EASY WAY FOR THE PHONE COMPANY TO SHOW YOU WHAT NUMBERS YOU DIALED LOCALLY. IF YOU PROTESTED LONG ENOUGH AND LOUD ENOUGH, THEY MIGHT HAVE PUT A PEN REGISTER ON YOUR LINE TO RECORD EVERYTHING AND PROVE IT TO YOU. UNDER ESS, THE ACTUAL PRINTOUT (WHICH WILL BE DUG OUT OF A VAULT SOMEWHERE IF NEEDED) SHOWS EVERY LAST DIGIT DIALED. EVERY 800 CALL, EVERY CALL TO DIRECTORY ASSISTANCE, REPAIR SERVICE, THE OPERATOR, EVERY RENDITION OF THE 1812 OVERTURE, EVERYTHING! HERE IS AN EXAMPLE OF A TYPICAL PRINTOUT, WHICH SHOWS TIME OF CONNECT, LENGTH OF CONNECT, AND NUMBER CALLED. DATE TIME LENGTH UNITS NUMBER 0603 1518 3 1 456-7890 0603 1525 5 3 345-6789 0603 1602 1 0 000-4011 0603 1603 1 0 800-555-1212 0603 1603 10 2.35* 212-345-6789 0603 1624 1 0 000-000-0000 (TSPS) A THOUSAND CALLS TO "800" WILL SHOW UP AS JUST THAT--A THOUSAND CALLS TO "800"! EVERY TOUCH TONE OR PULSE IS KEPT TRACK OF AND FOR MOST PHREAKS, THIS IN ITSELF WON'T BE VERY PRETTY. SOMEWHERE IN THE HALLOWED HALLS OF 19 5 BROADWAY, A TRAFFIC ENGINEER DID AN EXHAUSTIVE STUDY OF ALL 800 CALLS OVER THE PAST FEW YEARS, AND REACHED THE FOLLOWING CONCLUSIONS: (1) LEGITIMATE CALLS TO 800 NUMBERS LAST AN AVERAGE OF 3 MINUTES OR LESS. OF THE ILLEGAL (I.E PHREAKERS) CALLS MADE VIA 800 LINES, MORE THAN 80% LASTED 5 MINUTES/LONGER; (2) THE AVERAGE RESIDENTIAL TELEPHONE SUBSCRIBER MAKES FIVE SUCH CALLS TO AN 800 NUMBER PER MONTH. WHENEVER PHREAKERS ARE BEING WATCHED, THAT NUMBER WAS SIGNIFICANTLY HIGHER. AS A RESULT OF THIS STUDY, ONE FEATURE OF ESS IS A DAILY LOG CALLED THE "800 EXCEPTIONAL CALLING REPORT." UNDER ESS, ONE SIMPLY DOES NOT PLACE A 2600 HZ TONE ON THE LINE, UNLESS OF COURSE, THEY WANT A TELCO SECURITY REPRESENTATIVE AND A POLICEMAN AT THEIR DOORWITHIN AN HOUR! THE NEW GENERICS OF ESS (THE #5) NOW IN PRODUCTION, WITH AN OPERATING PROTOTYPE IN GDNZFA, nILL, ALLOW THE SYSTEM TO SILENTLY DETECT ALL "FOREIGN" TONES NOT AVALABLE ON THE CUSTOMER'S PHONE. YOU HAVE EXACTLY 12 BUTTONS ON YOUR TOUCH-TONE (R) PHONE. ESS KNOWS WHAT THEY ARE, AND YOU HAD BEST NOT SOUND ANY OTHER TONES ON THE LINE, SINCE THE NEW #5 IS PROGRAMMED TO SILENTLY NOTIFY A HUMAN BEING IN THE CENTRAL OFFICE, WHILE CONTINUING WITH YOUR CALL AS THOUGH NOTHING WERE WRONG! SOMEONE WILL JUST PUNCH A FEW KEYS ON THEIR TERMINAL, AND THE WHOLE SORDID STORY WILL BE RIGHT IN FRONT OF THEM, & PRINTED OUT FOR ACTION BY THE SECURITY REPRESENTATIVES AS NEEDED. TRACING OF CALLS FOR WHATEVER REASON (ABUSIVE CALLS, FRAUD CALLS, ETC.) IS DONE BY MERELY ASKING THE COMPUTER RIGHT FROM A TERMINAL IN THE SECURITY DEPARTMENT. WITH ESS, EVERYTHING IS RI GHT UP FRONT, NOTHING HIDDEN OR CONCEALED IN ELECTROMECHANICAL FRAMES, ETC. IT'S MERELY A SOFTWARE PROGRAM! AND A PROGRAM DESIGNED FOR EASE IN OPERATION BY THE PHONE COMPANY. CALL TRACING HAS BECOME VERY SOPHISTICATED A ND IMMEDIATE. THERE'S NO MORE RUNNING IN THE FRAMES AND LOOKING FOR LONG PERI ODS OF TIME. ROM CHIPS IN COMPUTERS WORK FAST, AND THAT IS WHAT ESS IS ALL ABOUT. PHONE PHREAKS ARE NOT THE ONLY REASON FOR ESS, BUT IT WAS ONE VERY IMPORTANT ONE. THE FIRST AND FOREMOST REASON FOR ESS IS TO PROVIDE THE PHONE COMPANY WITH BETTER CONTROL ON BILLING AND EQUIPMENT RECORDS, FASTER HANDLING OF CALLS (I.E. LESS EQUIPMENT TIED UP IN THE OFF ICE AT ANY ONE TIME), & TO HELP AGENCIES SUCH AS THE FBI KEEP BETTER ACCOUNT OF WHO WAS CALLING WHO FROM WHERE,ETC. WHEN THE FBI FINDS OUT THAT SOMEONE WHOSE CALLS THEY WANT TO TRACE IS ON A ESS EXCHANGE, THEY ARE THRILLED BECAUSE IT'S SO MUCH EASIER FOR THEM THEN. THE UNITED STATES WON'T BE 100% ESS UNTIL SOMETIME IN THE MID 1990'S. BUT IN REAL PRACTICE, ALL PHONE OFFICES IN ALMOST EVERY CITY ARE GETTING SOME OF THE MOST BASIC MODIFICATIONS BROUGHT ABOUT BY ESS. "911" SERVICE IS AN ESS FUNCTION. SO IS ANI (AUTOMATIC NUMBER IDENTIFICATION) ON LONG DISTANCE CALLS. "DIAL TONE FIRST" PAY PHONES ARE ALSO AN ESS FUNCTION. NONE OF THESE THINGS WERE AVAILABLE PRIOR TO ESS. THE AMOUNT OF PURE FRAUD CALLING VIA BOGUS CREDIT CARD, THIRD NUMBER BILLING, ETC. ON BELL'S LINES LED TO THE DECISION TO RAPIDLY INSTALL THE ANI, FOR EXAMPLE, EVEN IF THE REST OF THE ESS WAS SEVERAL YEARS AWAY IN SOME CASES. DEPENDING ON HOW YOU CHOOSE TO LOOK AT THE WHOLE CONCEPT OF ESS, IT CAN BE EITHER ONE OF THE MOST ADVANTAGEOUS INNOVATIONS OF ALL TIME OR ONE OF THE SCARIEST. THE SYSTEM IS GOOD FOR CONSUMERS IN THAT IT CAN TAKE A LOT OF ACTIVITY AND DO LOTS OF THINGS THAT OLD ER SYSTEMS COULD NEVER DO. FEATURES SUCH AS DIRECT DIALING OVERSEAS, CALL FORWARDING (BOTH OF WHICH OPEN UP NEW WORLDS OF PHREAKING WHICH WE'LL EXPLORE IN LATER ISSUES), AND CALL HOLDING ARE STEPS FORWARD, WITHOUT QUESTION. BUT AT THE SAME TIME, WHAT DO ALL OF THE NASTY IMPLICATIONS MENTIONED FURTHER BACK MEAN TO THE AVERAGE PERSON ON THE SIDEWALK? THE SYSTEM IS PERFECTLY CAPABLE OF MONITORING ANYONE, NOT JUST PHONE PHREAKS! WHAT WOULD HAPPEN IF THE NICE FRIENDLY GOVERNMENT WE HAVE SOMEHOW GOT OVERTHROWN AND A MEAN NASTY ONE TOOK ITS PLACE? WITH ESS, THEY WOULDN'T HAVE TO DO TOO MUCH WORK, JUST COME UP WITH SOME NEW SOFTWARE. IMAGINE A PHONE SYSTEM THAT COULD TELL AUTHORITIES HOW MANY CALLS YOU PLACED TO CERTAIN TYPES OF PEOPLE, I.E. BLACKS COMMUNISTS, LAUNDROMAT SERVICE EMPLOYEES... ESS COULD DO IT, IF SO PROGRAMMED. *** BIOC FROM WHACKOLAND BBS: *** AGENT THE RADIO STATION BBS 300/1200 BAUD --------------------------------------- GAMES PHONE COMPANIES PLAY Some phone companies have come up with clever little tricks to fuck up the phreaks hacking activities. One of these is the CARRIER BLAST. Simply put, they shoot a 300/1200 baud answer tone across the phone line right before you connect with your destination. This move makes your computer THINK it's connected with the computer you're calling. The attempt is laughable. All you need do is to take the modem offline for that period of seconds when the carrier is blasting. For the Hayes and the Hayes compatible modems you work this command into the dialing sequence, "+++,". Each modem in the AT mode permits you to take the modem offline and "idle". The function is programable so you can use any keyboard character. The "+++" puts the modem in idle, the comma is a timing element you've preprogrammed. If you want a five second delay, you will have programmed "ATS8=5" or "ATS8=10" for a ten second delay. After your delay the modem will continue to execute the dialing sequence. You'll now use "ATO" to put the modem back on line. The whole routine will look like this,"+++,ATO". Consult your modem manuals if you don't have a Hayes Compatible. Each manufacturer has "borrowed" the same features from Hayes. The result will be the same even if your commands may differ. Another little gimmick has been borrowed from the PBX. After entering your code you have to enter "9" to get out. No big deal. Just use nine as a suffix. If you've ever tried hacking an AT&T credit card (and I recommend that you don't) you'd notice that you can dump the entire dialing sequence all at once. This is a classy system. Not so with MCI or UStel. After you've entered the 0 and the area code of your destination the system beeps you that it has received the proper format. While this beeping is going on you can't dial over it. The solution is simple, insert the "comma delay to wait for the "beeper" to get done. The one problem you may encounter depends on the size of you modem's buffer. The Hayes compatible can accept forty five digits. The MCI/UStel format requires a full 44 digits. You have one to spare. If your buffer size is smaller, you'll have to break the dialing sequence in two separate routines. A bit of a bitch but liveable for the return. Code format bastardizations are a nice change. The telco's hope that in deviating from the norm, it will be less advantageous for the hacker, who like anyone else develops habits, to whack away at their systems. Itt's reverse arrangement is a prime example. The Pbx The Pbx (Public Branch Exchange) is a switching station. In the old days an operator would stick a plug into a slot and connect with an incoming call and another plug to a second slot to establish a connection with the destination. The equipment is the same in theory except, today the microchip has eliminated the human operator. The phreak is interested in the board's dial in/out capability. The legitimate users of the Pbx can call into a number, enter a code + a routing number and have an At&t line to dial out with. Pbx's afford the hack indirect access to Ma Bell without exposing him to the risk of a trace. There are two principle uses, Teleconferencing and Overseas calls to area only At&t services. To find a Pbx the hack scans a local prefix. This is also known as War Dialing after the movie War Games. To find the unit the hack must be equipped with a modem capable of recognizing a dial tone. The Hayes modem can not. The Apple Cat is considered the ideal phreaking modem. Not only can it recognize dial tones it can generate the frequencies needed to emulate a blue box. The Cat is not one of Ma Bell's favorites. The Hayes user is forced to sit and listen to the dialing if he wants a Pbx. Most phreaks will usually make a deal with a cat owner for pbx locations. The phreak will recognize the Pbx when he hears a second dial tone. He'll now start playing around looking for the code. Many switchboards have simple and easy to remember 4 digit codes like 1234. The hack will always go for the obvious. Code lengths can be any where from zero to eight digits. Pbx's are very user friendly. When you screw up it'll beep at you to let you know. This is a worksheet for Pbx hacking 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 3 3 3 3 3 3 3 3 4 4 4 4 4 4 4 4 5 5 5 5 5 5 5 5 6 6 6 6 6 6 6 6 7 7 7 7 7 7 7 7 8 8 8 8 8 8 8 8 9 9 9 9 9 9 9 9 The hack will now enter a number from the far left column. If it beeps at him he knows he's guessed wrong so he disconnects and redials. With an autodialer that's no big deal. He goes back to work on the first column. He will eventually it a number which doesn't generate an error message. He circles it and proceeds to the next column. When he's succeeded in hacking out the code, he will hear another dial tone. This is his At&t line out. Most phreaks will test the line by dialing information, local to the Pbx. Some units require an additional out code. Would you believe 9 ? Actually the Pbx will accept any preprogrammed 2 digit code, like 85. Nine has become a habit and many virgins have lost their cherry to a phreak by doing the obvious. I've seen units that required no code, only the 9 to get outside. It's impossible to make a Pbx secure. If a hacker want's it, and he's willing to work on it, he'll get it. The only option available to the business is to disconnect the in/out dialups and supply their outside personnel with long distance travel cards. Loops Loops are mildly interesting in the hack/phreak world. They consist of two telephone numbers that, when connected, permit callers to hold conversations with strangers or friends whom they've met by appointment. A loop has a high side and a low side, meaning one of the pair of numbers emits a tone while the other is quiet. Loops in 213 and 818 areas can be found by dialing any prefix and 1118 or 1119. Pacific Telephone has injected a rather annoying "click" into the line which makes data transfers impossible and voice communication tedious. This situation doesn't exist in other areas of the country. At first glance, loops may not appear to have any practical value. To the hacker it has two uses. It enables him to voice with people he doesn't want to have his phone number and it's useful in conferencing (see Alliance). Many hacks refuse to make their personal information available to those who are not long standing bbs acquaintances. Loops make safe voicing possible. A Few Loops 201-531-9929,9930 201-938-9929,9930 206-827-0018,0019 206-988-0020,0022 212-283-9977,9997 208-862-9996,9997 209-732-0044,0045 212-529-9900,9906 212-283-9977,9979 212-352-9900,9906 212-220-9977,9979 212-365-9977,9979 212-562-9977,9979 212-986-9977,9979 213-549-1118,1119 214-299-4759,4757 214-291-4759,4757 307-468-9999,9998 308-357-0004,0005 402-779-0004,0007 406-225-9902,9903 714-884-1118,1119 These loops were taken from a Hack Board and are for the 808 area. ((((((((((((((((((((((((((((((((((( ( ( ( ( ( ( ( Here are some loops for ya. ( ( ( ( ( ( ( ( (808) = 1 ( ( (9907)= Loud ( ( (9908)= Silent ( ( ( ( ( ( ( ( ( ( 1 328 (Loud) (Silent) ( ( " 322 """"""""""""""" ( ( " 572 """"""""""""""" ( ( " 261 """"""""""""""" ( ( " 239 """"""""""""""" ( ( " 668 """"""""""""""" ( ( " 885 """"""""""""""" ( ( " 961 """"""""""""""" ( ( " 245 """"""""""""""" ( ( " 332 """"""""""""""" ( ( " 335 """"""""""""""" ( ( " 623 """"""""""""""" ( ( " 624 """"""""""""""" ( ( " 959 """"""""""""""" ( ( " 742 """"""""""""""" ( ( " 879 """"""""""""""" ( ( " 882 """"""""""""""" ( ( " 329 """"""""""""""" ( ( " 247 """"""""""""""" ( ( " 235 """"""""""""""" ( (((((((((((((((((((((((((((((((((((((( The Loop master (Merauge) was here DIVERTERS Diverters are privately owned call forwarding machines. They'll be found almost exclusively in areas that don't have call forwarding. This also means ESS isn't operational in your area. This is how it works... You may not realize it, but the sounds of a call connecting are permanently etched on your subconscience mind. Whether it's the sounds of tones or clicks, you know when your call has connected. Pay attention next time, you'll see what I mean. A call going to a diverter makes two connections. First to the number you called and second to the number that the diverter called. When you hear this second connection, you'll know that you've bagged a diverter. The call will be connected to a person you have absolutely no interest in talking to. Tell the person that you have the wrong number, click the rocker on your phone, and wait for HIM to hang up. Your call is now in a never never land between the first number you dialed and the number that the diverter called. Wait about two minutes. You'll hear a faint dial tone in the back ground. That's your AT&T line out. You can now dial anywhere in the world. Since you're dealing with a real human on the other end, be prepared for the unexpected. I called one diverter recently and had a fellow answer the phone. I used the wrong number routine and clicked the rocker, but HE DIDN'T HANG UP. Hey, I'm cool, a dummied up and waited. After five minutes HE STILL WOULDN'T HANG UP. Not only that, he started making lewd suggestions that he and I get together for a date. I like girls and this joker was grossing me out. I said,"Jesus fucking Christ" very disgustedly (for emphasis) and clicked the rocker arm again. THE SON OF A BITCH STILL WOULDN'T HANG UP. I gave up and went to a PBX. This is the moral of this story. This fellow had been burned before. He knew the flaw in his diverter and he knew what to do about it. Plus the guy gets 10 points for have some style. He knew what I was trying to do to him and he played the game out all the way. A good show. Manufacturers of diverters are hip to the game. Their newer machines have disconnect features that restrict a phreaks call out abilities. Never the less, there are hundreds of thousands of the older machines still out there with their cherries intact. Firms that use a diverter are too cheap to hire and answering service. For this reason alone they won't be too quick to upgrade their systems. They'll get a little incentive after they receive a several thousand dollar phone bill. I spoke with a phreak not too long ago who received a 2 thousand dollar phone bill for conferance calls he'd made with a diverter. Explained the steps he'd taken in its use. I asked him if the second dial tone he received was as loud as the first. I informed him as kindly as possible, "You dumb shit, that was your dial tone not the diverter". There's a moral in there somewhere. The Black Box Another credible file on box building. Note the black will work under Crossbar or Step by Step but not with ESS. *************************************** * * * HOW TO BUILD A BLACK BOX * * * *************************************** A BLACK BOX IS A DEVICE THAT IS HOOKED UP TO YOUR FONE THAT FIXES YOUR FONE SO THAT WHEN YOU GET A CALL, THE CALLER DOESN'T GET CHARGED FOR THE CALL. THIS IS GOOD FOR CALLS UP TO 1/2 HOUR, AFTER 1/2 HOUR THE FONE CO. GETS SUSPICOUS, AND THEN YOU CAN GUESS WHAT HAPPENS. THE WAY IT WORKS: WHAT THIS LITTLE BEAUTY DOES IS KEEP THE LINE VOLTAGE FROM DROPPING TO 10V WHEN YOU ANSWER YOUR FONE. THE LINE IS INSTED KEPT AT 36V AND IT WILL MAKE THE FONE THINK THAT IT IS STILL RINGING WHILE YOUR TALKING. THE REASON FOR THE 1/2 HOUR TIME LIMIT IS THAT THE FONE CO. THINKS THAT SOMETHING IS WRONG AFTER 1/2 AN HOUR OF RINGING. ALL PRTS ARE AVAILABLE RADIO SHACK. USING THE LEAST POSSIBLE PARTS AND ARANGEMENT, THE COST IS $0.98 !!!! AND THAT IS PARTS FOR TWO OF THEM! TALK ABOUT A DEAL! IF YOU WANT TO SPLURGE THEN YOU CAN GET A SMALL PC BOARD, AND A SWITCH. THERE ARE TWO SCHEMATICS FOR THIS BOX, ONE IS FOR MOST NORMAL FONES. THE SECOND ONE IS FOR FONES THAT DON'T WORK WITH THE FIRST. IT WAS MADE FOR USE WITH A BELL TRIMLINE TOUCH TONE FONE. ** SCHEMATIC 1 FOR MOST FONES ** ** LED ON: BOX ON ** FROM >--------------------GREEN-> TO LINE >--! 1.8K LED !---RED--> FONE !--/\/\/\--!>--! ! ! ------>/<------- SPST PARTS: 1 1.8K 1/2 WATT RESISTOR 1 1.5V LED 1 SPST SWITCH YOU MAY JUST HAVE TWO WIRES WHICH YOU CONNECT TOGETHER FOR THE SWITCH. ** SCHEMATIC 2 FOR ALL FONES ** ** LED ON: BOX OFF ** FROM >---------------GREEN-> TO LINE >------- ---RED--> FONE ! LED ! -->/<--!>-- ! ! ---/\/\/--- 1.8K PARTS: 1 1.8K 1/2 WATT RESISTOR 1 1.5V LED 1 DPST SWITCH HERE IS THE PC BOARD LAYOUT THAT I RECOMMEND USING. IT IS NEAT AND IS VERY EASY TO HOOK UP. SCHEMATIC #1 SCHEMATIC #2 ************** **************** * * * ------- * * ----- * * ! ! * * ! ! * * ! * * RESISTOR ! * * ! ! ! * * ! ! * * ! ! / * * -------- ! * * ! ! \ * * ! ! * * ! ! / * * --SWITCH-- * * ! ! \ * * ! ! * * ! ! / * L * ! ! * F L * ! ! ! * F I>RED- -RED>O I>RED- ---RED>O N>-----GREEN---->N N>-----GREEN------>N E * H * E E * * E ************** **************** ONCE YOU HAVE HOOKED UP ALL THE PARTS, YOU MUST FIGURE OUT WHAT SET OF WIRES GO TO THE LINE AND WHICH GO TO THE FONE. THIS IS BECAUSE OF THE FACT THAT LED'S MUST BE PUT IN, IN A CERTAIN DIRECTION. DEPENDING ON WHICH WAY YOU PUT THE LED IS WHAT CONTROLS WHAT WIRES ARE FOR THE LINE & FONE. HOW TO FIND OUT: HOOK UP THE BOX IN ONE DIRECTION USING ONE SET OF WIRES FOR LINE AND THE OTHER FOR FONE. *NOTE* FOR MODEL I SWITCH SHOULD BE OFF. *NOTE* FOR MODEL ][ SWITCH SHOULD BE SET TO SIDE CONNECTING THE LED. ONCE YOU HAVE HOOKED IT UP, THEN PICK UP THE FONE AND SEE IF THE LED IS ON. IF IT IS, THE LED WILL BE LIT. IF IS DOESN'T LIGHT THEN SWITCH THE WIRES AND TRY AGAIN. ONCE YOU KNOW WHICH ARE WHICH THEN LABEL THEM. *NOTE* - IF NEITHER DIRECTIONS WORKED THEN YOUR SWITCH WAS IN THE WRONG POSITION. NOW LABLE THE SWITCH IN ITS CURRENT POSITION AS BOX ON. HOW TO USE IT: THE PURPOSE OF THIS BOX IS NOT TO POEPLE WHO CALL YOU SO IT WOULD MAKE SENCE THAT IT CAN ONLY BE USED TO RECEIVE! CALLS. WHEN THE BOX IS *ON* THEN YOU MAY ONLY RECIEVE CALLS. YOUR FONE WILL RING LIKE NORMAL AND THE LED ON THE BOX WILL FLASH. IF YOU ANSWER THE FONE NOW, THEN THE LED WILL LIGHT AND THE CALLER WILL NOT BE CHARGED. HANG UP THE FONE AFTER YOU ARE DONE TALKING LIKE NORMAL. YOU WILL NOT BE ABLE TO GET A DIAL-TONE OR CALL WHEN THE BOX IS ON, SO TURN THE BOX *OFF* FOR NORMAL CALLS. I DON'T RECOMMEND YOU DON'T WANT IT TO ANSWER WHEN MA BELL CALLS! Incidentally, never let it be said that all hackers are literate. Just knowing thieves. The Infamous Blue Box The follwoing appears to be a credible set of plans for the Captain Crunch machine. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ $ $ $ BLUE BOX PLANS! $ $ --------------- $ $ $ $ Edited and Uploaded by: $ $ $ $ $ $$$$$$$->The Spirit Of Radio<-$$$$$$$ $ $ $ Written by: $ $ $ $ Mr. America from Osuny BBS $ $ $ $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ This file will explain the construction, troubleshooting, andadjustmentof a Blue Box. We all know that the touch tone frequencies are composed of 2 tones (2 different freqs.) so that is the reason why we have 2 VCO's (Voltage Controlled Oscilators). We'll call them VCO#1 and VCO#2.If you have noticed VCO#1 and VCO#2 are exactly the same type of circuits. That is why only 1 was drawn. But remember that whatever goes for VCO#1 also goes for VCO#2. Both VCO'S are composed of a handfull of parts. One chip, two capacitors,2 resistors and five potentionmeters. All of this will give you (when properly calibrated) one of the freqencies necessary (the other one will come fromVCO#2) for the operation of $ the Blue Box. Both of these freqs. will bemixed in the speaker to form the required tone. This is one of the most sophisticated designs I have ever made. Why? Because other designs will drain the battery after 10 calls. This design will make them last 10 months!!!!!! But nevertheless, don'tforget to put in aswitch for on and off. Ok let's build the two VCO'S andcalibrate the unit before we get to the keyboard construction. VCO CONSTRUCTION TOOLS REQUIRED 1 ocilliscope(optional but not req) 1 Freq. counter (REQUIRED) 1 Volt meter " " " Electronics tools (Pliers, drll, screwdrivers, etc.) PARTS R1 1.5K RESISTOR 5% R2 1K RESISTOR 5% C1 .1uf ELECTROLYTIC CAPACITOR 16VDC C2 .01uf " " (MYLQR) 16VDC C1 2207 VCO CHIP BY EXAR ELECTRONICS Remember the above only says VCO#1 but the same is for VCO#2 R3-R4 150 OHM RESISTORS 5% . C3-C4 .1 uf ELECTROLITIC CAPACITOR . 10VDC . P1-P10 200K TRIMMER POT - 20 TURNS DIODES USED IN THE KEYBOARD ARE 1N914 TYPE(40 OF THEM) & 13 SWITCHES FOR THE KEYBOARD SPST MOMENTARY. SPKR YOU CAN USE A TELEPHONE SPEAKER FOR THIS (IT WORKS BEST) BUT REMEMBER TOTAKE OUT THE DIODE THAT IS CONNECTED ACCROSS IT. IMPORTANT NOTES 1. DO NOT USE ANYTHING ELSE OTHER THAN A MYLAR CAPACITOR FORC2. 2. PINS 10,9,8 SHOULD BE TIED TOGETHER AND BE LEFT FLOATING. 3. ALL RESISTORS SHOULD BE 5%! NOTHING ELSE! 4. A TELEPHONE SPEAKER GIVES THE BEST RESULTS. TROUBLE SHOOTING By now you should have constructed the two VCO'S on a bread board or anything that pleases you. Check for cold solder joints,broken wires,polarity of the battery, etc. Before we apply power to the VCO'S we have to adjust the pots for their half way travel point. This is done by turning them 21 turns to the right and then 10 turns to the left. Do the same for all ten of them. Now apply power to the unit check to see that you have power in the chips by putting the positive lead of your volt meter on pin 7 andthe negative lead on pin 12. If you do not have anything there turn off the unit and RECHECK THE WIRING. When you get the right voltages on the chips, connect a diode to a piece of wire (look at fig. 2 for the orientation of the diode) from round to any pot at point T (look carefully at the schematic for point T it is labeled T1-T10 for all pots). You should be able to hear a tone, if not disconnect the lead and place the speaker close to your ear and if you hear a chirp-like sound, this means that the two VCO'S are working if you don't, it means that either one or both of the VCO'S are dead. So in this case it is always good to have an ocilloscope on hand. Disconnect the speaker from the circuit and hook the ocilliscope to 1 of the leads of the speaker & the ground from the scope to the ground of the battery. Connect again the ground lead with the diode connected to it from ground to any pot on the VCO that you are checking and you should see a triangle wave if not turn the pot in which you are applying the ground to until you see it. When you do see it do the the same for the other VCO to makesure it is working. (amplitude is about 2VAC). When you get the two VCO's working you are set for the adjustment of the individual spots. ADJUSTMENT Disconnect the speaker from the circuit and connect a freq. counter (the positive lead of the counter to one of the speakers leads that belongs to VCO#1 or connect it to pin 14. Connect the negative lead to the battery negative and connect the jumperlead with the diode from ground to pot number 1.T1 (the first pot number 1 point T1). If you got it working you should hear a tone and get a reading on the counter. Adjust the pot for a freq. of 1700hz and continue doing the same for pots 2-5 except that they get different freqs. which are: : $$$$$$$$$$$$$$ : : $ $ : : $ P1 1700hz $ : : $ P2 1300hz $ : : $ P3 1100hz $ : : $ P4 900hz $ : : $ P5 1500hz $ : : $ $ : : $$$$$$$$$$$$$$ : Now disconnect the freq. counter from the speaker lead of VCO#1 or from pin (which ever you had it attached to at the beginning) and connect it to the speaker lead of VCO#2 or to pin 14 of VCO#2 and make the same adjustments toP6-10.: : $$$$$$$$$$$$$$$ : : $ $ : : $ P6 1100hz $ : : $ P7 700hz $ : : $ P8 900hz $ : : $ P9 2600hz $ : : $ P10 1500hz $ : : $ $ : : $$$$$$$$$$$$$$$ : When you finish doing all of the pots go back and re-check them. KEYBOARD IF YOU LOOK AT FIG-2 YOU WILL SEE THAT THE KEYS ARE SIMPLE SWITCHES. CONNECTED TO A GROUND AND TWO DIODES ON THE OTHER END. THESE DIODES ARE USED TO SIMPLIFY THE CONSTRUCTION OF THE KEYBOARD BECAUSE OTHERWISE THE DISTRIBUTION OF THE GROUND SIGNAL FOR BOTH VCO'S WOULD HAVE BEEN DONE MECHANICALLY. THE DIODE WILL GO TO VCO#1 AND THE OTHER WILL GO TO VCO#2. FIG-3 SHOWS THE ARRANGEMENT OF THE KEYS ON THE KEYBOARD. BELOW IS A TABLE THAT WILL HELP YOU CONNECT THE KEYS TO THE REQUIRED VCO'SPOTS. <-------------------------------------> < > < (-FIG 2-) > < > <-----!-----!--------!--------!-------> < ! ! ! ! > < TO ! TO ! FREQ ! FREQ ! KEY > < POT ! POT ! OUT: ! OUT: ! > < ON ! ON ! ! ! > < VCO1! VCO2! ! ! > <-----!-----!--------!--------!-------> < 1 ! 06 ! 1700hz ! 1100hz ! C > < 2 ! 10 ! 1300hz ! 1500hz ! 0 > < 1 ! 10 ! 1700hz ! 1100hz ! E > < 4 ! 07 ! 0900hz ! 0700hz ! 1 > < 3 ! 07 ! 1100hz ! 0700hz ! 2 > < 3 ! 08 ! 1100hz ! 0900hz ! 3 > < 2 ! 07 ! 1300hz ! 0700hz ! 4 > < 2 ! 08 ! 1300hz ! 0900hz ! 5 > < 2 ! 06 ! 1300hz ! 1100hz ! 6 > < 5 ! 07 ! 1500hz ! 0700hz ! 7 > < 5 ! 08 ! 1500hz ! 0900hz ! 8 > < 5 ! 06 ! 1500hz ! 1100hz ! 9 > < - ! 09 ! ------ ! 2600hz ! X > < ! ! ! ! > <-------------------------------------> REMEMBER THAT IN FIG-2 IT'S THE SAME FOR EACH KEY EXCEPT THE "X" KEY, WHICH ONLY TAKES ONE DIODE.