7       (             M~        ze                          X    X                  T                  "          x  bT  v        *                                                                             LoST-Legion of the Square Tomato

Monthly Newsletter-Issue Two-September 1, 1991


Welcome to Issue 2 of the LoST Newsletter.....first, a few words......

Membership-
If you would like to become a member of LoST, please call on of the BBSs listed at the end and leave mail to the LoST Account( just like that) with the following info: Handle, real name, voice number, BBS number( if any), age, areas of specialization, and a sample of your writing, if you would like to join as a writer only.  However, writing is not all we do.  We are here to disseminate information.  We are glad to share info..were not stingy like the good people are...if in fact they are good at anything other than being stingy!!!!! 

LoST NEWS-

:::::::::::::::::::::::::::::::::::ATTENTION::::::::::::::::::::::::::::::::::::

LoST NODE II-The Missle Bay is down PERMANENTLY until further notice.  This is due to a large catostrophic hardware failure..and we mean HUGE.  However, support for LoST grows and so do our nodes.  We hope to be adding a Node III soon or perhaps merging with another group.
-Hellbender-
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

MEMBERS-LoST is currently seeking knowledgeable members and writers to apply for entrance or positions at the BBSs listed at the end of this article.
********************************************************************************
PHREAKING-LoST is currently preparing to employ caller id to its own benefit and use and is looking for any and ALL technical information about calelr id for the construction of certain devices to defeat and utilize caller id.
*******************************************************************************
CARDING- LoST is always looking into a good deal for hardware.  If this art interests you, please contact us.
********************************************************************************
ANARKY-LoST LOVES ANARKY.  The founders of LoST are a couple of the biggest anarkists around.  We go on runs once every week or so and would like to bring some new faces into our deeds.  If this interests you please get in contact with us if you live in the SF Bay Area, preferably SF or the Peninsula.
********************************************************************************
MAILBOXING-Thats right....so, you NEED that new TV Guide or you are curious to see where people spend their money?  Go mailboxing...SURE its a federal offense, but isnt everything nowadays?? Anyways, its fun...if you like this sort of thing( we do, and we DO)let us know...its fun,fun,fun till ya DROP!!!
********************************************************************************
And now....for some REAL NEW news......
<------------------------------------------------------------------------------>
 LoST Node III in a BBS near you soon????
It could be.  Red 5!, the SySOP of MacSavvy BBS in San Mateo is considering becoming Node III of LoST, and is currently questioning the group that he is a co-founder of, UpLink, as to whether or not they would like to join ranks with us.   Should this occur, the original goals of both groups will be merged into one super-group.  In addition, LoST will retain its duty to the P/h/a/c community in an informational sense and UpLink will retain its duty in its original software sense.  If you have any suggestion, opinions or thoughts concerning this, please get into contact with the LoST Account on any of the fine BBSs listed at the end of this newsletter or drop Red 5! or any other member of UpLink a note.

Scanning news...
For all you scanners out there, here is a starting point: 1-800-776-XXXX and 1-800-989-XXXX...lots of neat stuff on those two exchanges.....either do it by hand or get HolyWardialer....a fine UpLink product.

-Hellbender-

Mailboxing/Anarchy news...
The last run of LoST by myself and The Anachronism  was quite profitable.  We obtained several bankcard statements (VISA,MC,AMEX,OPTIMA, etc...) as well as actual bankcards....yes, thats RIGHT, actual plastic...in addition, we obtained something VERY useful to us: Shell Service Station cards.  Needless to say, they provided us with plenty of gas, spare parts and food for our many anarchy runs since then and now.  And all of that weas gained from mailboxing.  And this labor day weekend is the BEST for boxing.  You get TWO maybe even THREE days worth of mail PER box....beat that, eh?  ANd multiply that by 20-30 boxes and you just filled the back of our station wagon....wheeeeeeeee...heehee.  In addition, we were able to drive MANY K-Mart green carders crazy in the electronics dept. and wreaked a little havoc with a NEW game that we invented....youve hear of mailbox baseball?  Well, now there is sideview mirror baseball...Why?  BECAUSE....were BORED...hehehe..just go to a baseball game and pick up a few of those miniature woodem bats, the 13-15 inch ones, and bat away.  Also invented was KFC tag.  Basically, you get points for tagging various types of cars with Kentucky Fried Chicken (Kittens??? Ewwwww....).  The scoring is a follows:
70s Model Car-1 pt.
80s Model Car-2 pt.
90s Model Car-3 pt. 
Lowrider cars-4 pt.
Classics (Stangs, Cobras)-5 pt.
Setting off the alarm on ANY car-6 pt.

Note: Any piece of chicken is fair ammo, and mashed potatoes and gravy are kept in reserve for open windows.  Getting something through open windows advances you to the bonus round where points are doubled, and pedestrians are worth 100 pts!!!! CAUTION:  We reccommend playing this game at NITE....hehehe.  
That about sums it up fer anarky.  So get out there and HAVE FUN..and if you wanna share in the fun, drop the LoST Account some mail at the BBSs listed at the end of this file.
   
-Hellbender and The Anachronism-

Hacking-
Well, hacking has been slow.  I am personally working on some VAXs right now, but other than that, life is slow in uucp city.  Ho-hum.
-Hellbender-

Caller ID-

We have a special piece on caller id this month.  Check this out.  
*******************************************************************************


                                                                            
 <[*]>------------------------------------------------------------------<[*]>
  <*>                                                                    <*> 
  <*>                                                                    <*>
  <*>                                                                    <*>
  <*>                             Caller  ID                             <*>
  <*>                                                                    <*>
  <*>            Transcribed from Aug. 1991 Radio Electronics            <*>
  <*>                                                                    <*>
 <[*]>------------------------------------------------------------------<[*]>



Caller Number Delivery
----------------------

   Most of your telephone operating companies are now in the midst of
upgrading to a totally digital system that includes a number of new CLASS
services.  By far the most popular new servive is known as Caller Number
Delivery, which can show you who is calling before you pick up your telephone
handset.

   Caller number delivery does appear rather controversial.  At least one
state (Pennsylvania) has banned this new service.  In other areas, the caller
is given the option of blocking out their caller ID, for those calls when
"anomynity" might be desired. [Ed. note: read "phreaking"]  Maybe for a drug
overdose hotline. [Ed. note: or the Gay Hotline]  Blocking can get done by
entering a three-digit code before you make your call.

   So what is caller ID and how does it work?  Figure 1 shows you some of the
more interesting Bellcore documents that involve caller ID.  But the key
horse's-mouth paper you'll need is Technical Reference TR-TSY-00030 and
titles SPCS Customer Premises Equipment Data Interface.  The cost is $25 via
VISA.


FIGURE 1:

   1. NYNEX Catalog of Technical Information, #NIP-7400, Free.
   2. SPCS Customer Premises Equipment Data Interface, #TR-TSY-0030, $25.
   3. CLASS Feature: Calling Number Delivery #FSD-02-1051, $30.
   4. CLASS Feature: Calling Number Delivery Blocking #TR-TSY-000391, $33.

            The main Bellcore service number is (800) 521-CORE.
            Of these resources, (2) is by far the most important.


   Figure 2 shows you the exact placement of the tone codes.  Caller number
delivery is normally provided as a code burst between the first and second
full rings while your phone is still on its hook.  Enough delay is provided 
to allow for the short half second breaks sometimes involved in selective
ringing.


FIGURE 2: The Caller ID Data Burst

                                 
                  |<--------------6 seconds-------------->|   
                  |                                       |
              /\/\/\/\/\                              /\/\/\/\/\
              ||||||||||          ==========          ||||||||||
    ----------||||||||||----------**********----------||||||||||----------   
              ||||||||||          ==========          ||||||||||      
              \/\/\/\/\/          Caller  ID          \/\/\/\/\/  
              First Ring            Tones             Second Ring

            
   After your first ring gets detected, a data path is established.  A data
path is simply any method of receiving some modem tones.  The ID tones are
then routed to suitable circuitry to recognize the data burst and strip out
the needed information.  The format and codes are related to the digital
codes used in pagers.

   The tones sent out are plain old serial binary modem tones at 1200 baud.
A digital logic one (or a "mark") is defined as one cycle of a 1200-Hz sine
wave.  A digital logic zero (or a "space") is defined as nearly two cycles of
a 2200-Hz sine wave.  Each eight-bit character is preceded by a space start
bit and a mark stop bit.

   The transmitted signal level is -13.5 dBm.  While the code transmission is
asynchronous, phase coherence is preserved throughout the entire ID caller
message.  No more than 20 marks are permitted between characters.

   Figure 3 shows you the data format.  It might appear fairly complicated at
first, but making sure the number is valid is quite important.  Almost
certainly, you will elect to use a computer, or at the very least, some
simple microcontroller in your caller ID display circuitry.


FIGURE 3: The Fata Format for the Caller ID Service


    _____________________________________________________________________  
    |  Channel  |           |  Message  |  Message  |         |  Check  |
    |  Seizure  |  Carrier  |   Type    |  Length   |  Data   |   Sum   |
    |  Signal   |  Signal   |   Word    |   Word    |  Words  |  Words  |
    |___________|___________|___________|___________|_________|_________|


   The first thing to be sent is called the "channel seizure signal".  That
consists of 30 bytes of a hex $55 code.  After decoding, another way to look
at this "hey wake up!" signal is one quarter second of a 600-Hz square wave.

   After the channel seizure signal, a carrier signal is sent.  It's used to
condition your receiver for valid data.  The carrier consists of at least 150
milliseconds worth of marks.  After decoding, you have a one-sixth second
solid string of logical ones followed your quarter-second burst square wave
at 600 Hz.

  Your caller-ID receiver circuitry is supposed to use this "wake up call"
and string of marks to prepare itself for vaild data reception.  After setup,
the first valid data byte is called a "message type word".  If that burst is
for the caller number delivery, your message type word will be a hex $04. 
Other codes could get used for other purposes.  For instance, a hex $0A means
"message waiting" for pager applications.

   The next byte is called the "message length word" that tells you how may
digits are to be provided in the caller ID numbers that are to follow.  The
message length does not include itself or the checksum in its count.

   The actual ASCII characters for the caller number follow, starting with
the least significant digit.  For instance, a digit "2" should get ASCII
coded as hex $32.

   Your message ends with a "checksum word" used for optional error
detection.  The checksum is the two's complement of the 8-bit sum of the
message type word, your message length word, and the number of data words
provided.  To provide an error detection, you run all the bits of all the
data words, and then add the checksum to it.  If there are no transmission or
reception errors, you should get a zero result.  A non-zero result means an
irrecoverable error.

   I've just described the single data message format to you.  Some nasty
complications can arise if you have multiple messages or several CLASS
services, such as call waiting.  See the Bellcore info for further details.

   There are a number of caller ID devices commercially available with the
pricing in thr $60 to $500 range.  Typical are the Allied incoming call
identifier, the Bellsouth calling line identifier, the Cidco Slimline series,
and the TC-1021, TC-1080, and the TC-1082.  One discount source of all these
is VSI Telecommunications.

   Do note that your caller number delivery service must be provided to you
before you can use any of these devices.  If a code is not being sent, there
is no way you can receive it.


A Caller-ID Chip
----------------

   As figure four shows us, there are usually four stages to the caller ID
receiver.  The first part is called an FCC Part 68 Interface.  That is needed
to safely and legally connect to your phone system. [Ed. Note: Guess that
means we can skip this stage.]

   The second stage is the analog front end.  The analog front end provides
filtering and amplification, and converts all your tones into actual TTL ones
and zeros.


FIGURE 4: The Four Stages Involved in Calling Number ID Display


                                  Phone Line                                 
    -------------------------------*---------------------------------------  
    -------------------------------|------*-------------------------------- 
                                   |      |                                 
                                   v      v                                
                             FCC Part 68 Interface                         
                                       |                                   
                                       v                                    
                                Analog Front End                             
                                       |                                     
                                       v                                     
                                Number Extractor                             
                                       |                                     
                                       v                                     
                                 Misc. Add-ons
                                       |  
                                       v
                             Calling Number Display


   Figure 5 shows you an analog front end circuit that uses the brand new
Sierra Semiconducter SC11211N caller-ID chip.  You input low-level telephone
tones and get out a serial data stream ready for computer or microcontroller
interpretation.  Inside the chip is a fancy filter, an energy detector, a
tone demodulator, and a clock.  An ordinary TV color crystal and four
capacitors is all you need to use this circuit.  Costs for the 16-pin mini
DIP is in the $4 range in small quantities.


FIGURE 5: Sierra Semiconductor Caller ID Analog Front End IC
                                                                             
                    -----------------------<-------o  Call Progress Unit
                   |       ---------------->-------o  Serial Data Output
                   |      |       --------->-------o  Energy Detect Output
                   |      |      |                                           
           +5V     |      |      |              ------:I:----    
            o      |      |      |             |       ------|  3.58 Mhz
            |      |      |      |     nc      |      |           Xtal
      ----[14]---[13]---[12]---[11]---[10]---[09]---[08]----                 
      |                                                     |
      |                                                     |          
      \                                                     |
       |                                                    |
      /                                                     |
     |                                                      |
     |                                                      |
      ----[01]---[02]---[03]---[04]---[05]---[06]---[17]----              
            |      |      |      |      |      |      |                   
     0.1F  |      |    _____  _____    |      |    _____                   
o-->---I(---       |     ___    ___     |      |     ___                    
o-->---I(----------       _      _      |      |      _  
                                        |      |           
 Tone Inputs From                 -----        -----                        
 Part 68 Interface                |                  |                  
                                  I(                 I(                      
                                  |                  |                     
                                -----              -----                     
                                 ---                ---                      
                                  -                  -                       
                                 0.1F              1F                


   There's also a fancier SC112010 chip fabricated in a smaller package that
deletes the internal crystal oscillator, the level setting, and all the
energy-detection features.

   While these chips are low in cost and work rather well, note that they are
only analog front ends.  All they do is accept low level tones from the part
68 interface and then convert them into a string of digital ones and zeros.

  The third stage is the number extractor.  The number extractor takes the
serial data stream, makes sure it's valid, and then extracts and formats the
calling number.  The number might also be displayed.  The number extractor
almost has to be a computer or microcontroller, since it would be unbearably
expensive otherwise.

  The final and optional stage is any extras added on.  Things like looking
up the actual name of the caller. Or pulling up their sales or service
records.  Or keeping a full record of the last 100 calls.  Or interacting
with a humongous CD-ROM data base.


---------------------------------------------------------------------------

                                                                    July 1991

Courtesy of: The Acid Prince

Now then...wasnt THAT informative?  If THATs not enough, here is a diagram of the RS-232 caller id interface.  Check it out:





SuperPaint!The Jungle:LoST #2:Copy of Caller*ID RS232 Inte!Paint(0,0:576,720)

kd     vers  :CNTL  RInfo   vCfig   DIT     M~  M  M  M  M  M  M  X  Y  g  n  z                  5            v  |  	  
      B  G          K  O  (  0  t  x              O  o        ]              N               O  n  o  p  a        P    W            %                      @  @       Y  X     Y    \     !  "  Q  R  S                &  '  9  F              q    	  
D  w      A  k  4  5  F      $  %  @  (  =  R  h  |                    a  n  o  z  {        ^      J      4        !  #޿   !      !      !     
!     !     !     !     !      !      !     !     !     !  I  #  %  =  U  W      3          (  s    
  E  G       )   w   ~                 !  ![  !  !  !  "-  "/  "1  "~  "  #  #c  #m  #o  #q  #  #  #  #  $7  $y  $  %
  %R  %  %  %  %  &6  &  &  '  '0  '2  '  '  (  (h  (  (  (  )  )b  )d  )  )  *D  *  *  *  *  *  *  +  +V  +  +  ,7  ,9  ,;  ,  ,  -$  -&  -t  -  .  .[  .g  .i  .  /     !  c  /  /R  /  /  0  0  0g  0  0  0  1H  1  1  1  1  26  2  2  3  3h  3~  3  3  4  4`  4b  4  4  5F  5  5  5  5  6M  6l  6n  6p  6  6  6  6  71  7|  7  7  7  8:  8F  8H  8J  8  8  8  8  9-  9{  9  :  :c  :  :  ;M  ;  ;  <:  <  <  =  =4  =^  =  =  =  =  >0  >~  >  ?  ?\  ?  ?  ?  ?  @  @d  @  @  AI  A  A  B  Bm  B  B  C4  Cs  C  C  D0  D|     !  c  D|  D  E  Ed  E  E  F*  Ft  F  G  G_  G  G  HF  HH  HJ  H  H  H  H  IN  I  I  I  J7  J  J  K  K5  K7  K  K  L  L;  L=  L?  L  L  L  L  L  L  M{  M|  M}  M~  M  M  M  M  Xd  Y      5            '  (  :  ;        e  v      F  ^        
                         !     !     !             ! H    !      !     !  R                Brought to you courtesy of City King. Thanks...thats gonna help!!:)
So, you still want them to install caller id?  Maybe...maybe not.  But, we CAN make it WORK FOR us.  And with all the information about it available to us, I am sure that there are ways to defeat it...ie: Send a false number to the CO...will it KNOW any better?  Guess well find out, eh??  Hehehe..
            H P    5     @  5      @5    @   
    @ H     @     @     @          
  0   ? ? <   `   <   ?`       0  ?   `        8 ၀ 0  00     0  >`  `        x 0  0`     0   > `        a   0` 0    0   HD  ? `  3   a    ` 0 0 o 
 ~  HD  `0  c<`    a   1 `   `  x0 HD `  0    a   ` 8     p`0 H  `   ,0      ` 0     ``0    HD  `   0    `  ` 0 p     `00    HD  `   0     `  `   0    `00    HD  `   ?     0  `   `    `00  9  GC  p`    0      0  `     0  `00     GC  `    0      0  ` `   `  `00    GC `    0    0  0  ` `      `00    G`    +    `  `  ` 0`    `00    H2a`    0   `0  ` 0`  `00  H2 `    <`   0 01 8p 8 `0  HD ?|`    `  ? `   ? `0    
  0                                                        
 8x< 
 0DDB # B@?     0  `    0 " DB@ 0     0  `    0 " |DB@ 0     0  `    0 ! (B@ 0     0  `    0 "  (B@ 0     0  `    0 ! @DB 0     0  `    0 ! x< 0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0 
    
     
         # 8      8       `@ D  "   D           "   D     $  !   "    8     >       "    D       "     "     D       ! |      8   
     
     
     
     
     
     
     
     
     
     
          `                              981     1     ـ     31     c1          1                             `    H   @   @   @     
     
     
     
     
     
     
     
     
     
     
     
     
                         `    @  0                P                                          @                   @                 @   
     
     
     0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0  0     0  `    0 " ' 0     0  `    0 " H$D  0     0  `    0 ! H$$ 0     0  `    0 "  DD$     0  `    0   D$    @    $    @    $    @    D     @        @       @       @       @       @       @       @       @       @       @       @       @      @       @       @      @ `a      `       !		        !		@       !		       !		@       !		                 `a                            @               @                               p      	""!       !      A!      ! "!      ""!      A               @                               ?                  
  '9      
8  $QD$B        
|  $P@B-"       "       
|  % B      
8  $! B    @  
  $N| B                @               ?                                                                                     	     	(!     	( !! ?  	pAq ?  		  	H   	'>sq               
                   
     
     
     
     
     
     
     
           
              
              
              
              
      H  @  @  @          
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
              
     !            `               `   !            `               `   !            `               `   !            `               `   !            `               `   !            `               `   !            `               `   !            `     
             
     '             p                 	       '           
                           '       @    	@               @    @  @     '                     
              
              
              
              
              
    x                                            @      @      f~       fcÁ       <c1       <c       ~       <x       <l       ff @      fc? @                                         
    x          
              
              
              
              
              
     '         ! A   |          "   b    1     '     "   "  A                "  A    8     '     "  "  A  @          "    "  A   D     '         ! A   8       
              
    !            `               `   !            `               `   !            `               `   !            `               `   !            `               `   !            `               `   !            `               `   !            `      
      
      
       H  8@  8@  8@ 
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
      
     "      10 0  0< *      0  1 0 9  pf`   " >8|x?`1x ?Ǉǆ 0` *   ;3138`10 6 0~   " 3030`10 0 0 *   31?0`10 0 0   " 3100`10 0 00 *   33313010 0 0`c   " 3|x0`0Ǉǆ 0>     `      
      
      
      
      
      
      
      
      
  ժ                                                                    4  x88    b  !     <  5  DD@   D b @      B@   7 1 〄Gp8HHO R8GcÏ B#&8p 7  0H D H" RDH! H <$D" 7  x' D HH  JD! H B#" 7 1	  DHH JD! H B$D""p 7 1	    DHH FD! H B$D""  H8  @8  @8  @ 7 1	 @@ D" FD!H BDD"" 5 /xp8 B8 ǈ c <p              @     @                                      YXxpqs`8quq  "fDd"!"!Hd  "D  !GDx  "D"!!ȑD  "D"!!D   "D"!"!HD  DxqDxd         p          8   c      ><1 @ <         8   !        B  @ "!           = 7\! %0q,8 B! !q8Ë = 7"a"!"&D2D B$@! " $L = 7"A!$D"D<B$@!  $H = 7"A"!"$D"| B@! " $H = 7"A "!"$D"@ BB@! " $H = 7"A"!"dD"D BB$@"!" $H = 7@! Cp"8><A<? ȏ#                                    6   00 	@       0    @ 1   @ 	@  !         @  @ @ :b%"8 ! pq<!088\8<]D  @ :&d B""D L! !"D "DD@"a D"`"D  @ :$D B"T@ H! !"D DD@AD"@ D  @ :$D B"T8 H! !>D "DD@"A D"@ D  @ :$D B" H! !D D "DD@"A D"@ D  @ :dD B"D@H! !D"D"DD@"A D"@"D@ @ :D A8B  pD<ለ8h`8@@8<@<D                        D       8                 @ O     @1Ȉ   88*HH@  	D2D@$HH@  D"<@ HH@  	D"D@ HH@  	 D"D@ HH@  D"D@ H  8"<0 O 
     
                       H#    "    d$   abB
.]fpJ   # H0"a" I$   " "H "A H#  " BH "A" H    " H "A" H    "  H "A" H$$   " ~G
 AH#                 
     3    @ 0   >|      2 	    @    @  "A!"    : 	aŇb%ŀa P( @IHp$   ! Ë : 	&H&d F@B&" P( @IH $  ! H$L : $H$D D@B$ D"<x)( D  @A H$H 9 $O$D D@B$" D" @)(   	 O$H : $H$D D@B$" @    H$H : $HdD D@B$"A @@$$   H$H : GD D@AA>|	pဃ G#                   4       
<P     ` @   2   B    
BP      @%  ; 5b%BÀpq. B 8qp88BÄ   p ; 5&d B$@0 B DC$D $@ @ ; 5$D UB$@x  B  <"  $@ ; 5$D UB'  B  D"D $@ @ ; 5$D "B$   B  DD $@ @ ; 5dD "B$@  B  D$D $@ @ ; 5D "BÀxpa  < q <
 # p          
               @       H  @  @  @        @@     % 8p"Y.81axC<x8@ % "D"fH0D DDH"DD"D@ % U"@"DH @ DDH"DD@@ % U"8"DH 8 DDH>DD
"@@ % """DH  DDH DD
"@@ % ""D&DH D DDH"DD"D % "8pDO 8xC<x8x     @  	     @     MissilecatastrophiccallerwasAndwoodenserviceanonymityvalidthe
Phreaking-
This months phreaking article is on phield phreaking...thats right...phreaking MINUS the computer....so sit back and take a look...
********************************************************************************
The Art of Phield Phreaking.

Yeah, yeah, yeah, I KNOW there are TONS of files on phield phreaking.  Well this one aims to be the MOST complete and comprehensible in its class.  In addition, it aims to show YOU, the UN-common criminal how to put the stature and fun back into phield phreaking.  First the stature part.

Most 'phreaks' nowadays are those that use the computer to make their own PBX's or alter the OS of a switching computer or alter their bill in COSMOS, or something like that.  That's all well and good, but unfortunately anyone that DOESN'T do this sort of thing, and yet claims to be a phreak is looked down upon as a 'codez' kid or a lamer or something like that.  Well, let me tell you THIS: Nothing and I mean NOTHING is farther from the truth.  I have been in ROLMS and learned about ESS and dabbled in DMS.  It IS fun AND useful and QUITE powerful but hey, you can rack up a phone bill of THOUSANDS of dollars charged to someone else WITHOUT doing/knowing all that stuff.  All you REALLY need is a quick, agile brain, some daring and the right tools, not to mention some cool friends to do this with and a car.  Now for the FUN/DOING part of phield phreaking.

I.-WHAT YOU NEED.

From my experience in canning/Bell raiding, this is the BEST list of stuff that you could EVER need to phield phreak adequately.

1. A lineman's handset-can be stolen from a Pac Bell van or made yourself ( directions later)
2. A 7/16 socket wrench OR TWO swiss army knives ( to be explained later)
3. A flashlight.
4. A portable computer *NOT* required, but VERY useful.
5. A list of those carriers that do conference calls OTHER than AT&T in case their equipment is 'down'.
6. A list of people to call on the phone..heheh
7. Some food and drink.
8. A CAR..*NOT* mandatory, but once again, VERY useful.
9. A *SECLUDED* Bell Can.-Find this yourself..they are rare.
10.A police scanner
11.GUTS and a TWISTED MIND!!!!!!!!!!!

II.-WHAT TO DO.

Ok so you have everything mentioned above.  Cool.  Now then, park the car near the Bell Can and wait for about 15 minutes, scanning the area, etc.  Turn on the scanner as well and set the volume to a low setting...but an AUDIBLE one.  Now then, leave the car and open the Bell can.  Now then, you can use the ratchet OR the two knives in the following manner.  The nut that 'locks' the Bell can is 6-sided.  Put the LARGE flat-tip screwdriver blades of the knives on OPPOSITE sides of the nut.  Once they are in there, grasp them both by the handles and start turning.  About 1/2 to 1/4 turn later you should hear a "SPROING" or something similar.  Then grab the handle on the Bell can and turn it...it should open easily.  Now then, on the inside parts of the doors there should be a few spools of wire and some other stuff....GRAB it all and put it inder the seat of your car...you may need it later.  Now then, with the wire you have 'borrowed' from the can run several-I usually figure 4 is plenty-lines to the car, in through the door.  Try covering the wires going from the can to the car with branches, old furniture, a car, or something else.  Now then, prepare to have fun.  Hook up the lineman's set to one set of wires and run an ANI on the line...in SF and other areas around here you dial 760 and it spits the number you are calling from back out at you.  Write this down.  Now then, call up AT&T conferencing and tell them you want to do a conference call...the number is 700-456-1000.  The operator will ask if you want it charged to that line and you say yes.  They will ask a name.  Give them a BS one.  Then give them the real ph#.  They will then call you back in a few minutes and prepare the conference.  When they ask if you want them to control it tell them no and ask how to control it yourself, if you don't already know...duh.  Now then call up a bunch of your cool friends in NY and MD etc and have some fun.  The possibilities are ENDLESS....so enjoy it.  Here are a few examples:  Call up a dating service LATE at nite.   Usually they will have an answering machine.  Hack it...if you can't then you are lame and should stop reading.  Once you get in, listen to the messages.  Call people and stuff like that...its HELLA fun to do....then get customers to give you their credit info and play with them...send them cheese pizza's from Domino's, etc.  Then, when that gets old, change the outgoing message and have fun!!  Next, you can call places like QVC and Home Shopping Network using the three-way calling of people in the conference.  Link the operators together and listen to the fun....its a blast.  Also, when talking to people, get psychotic,suicidal, weird, etc...anything to get a rise outta them.  I recommend calling suicide/rape hotlines and torturing them with some HUGE fabricated story..they can't ever be sure its fake so have fun with them....NOTE: When doing torture that requires a semi-adult approach, make sure ONE person will do the talking and that everyone else will be quiet or mute -out..otherwise the joke dies fast.  Something else to do is to call up enemies, celebrities, cops, pigs, whatever and do GROUP torture...immitate cartoon characters, make weird noises, play tunes with your touch-tone(tm) pad, etc.  They will go crazy cause of it..I promise....
This is just SOME of the fun one can have.  Try different stuff.  ALWAYS call people...its fun and the best way to do this sort of thing.  It also helps to call up people with access to private systems.  Often they are either sooooooooooooooooo stupid/cool that they tell you anything you want to know...neat eh?  FINALLY: Be careful when doing this...even having a great conference it is EASY for the controller, the one in the car, to get distracted...keep your EYES AND EARS OPEN TO the scanner and the activity around you.  Sometimes you can fake the cops out...other times you lose..ask me, I know a couple of people that have lost out.  And NEVER EVER EVER take any PERTINENT info with you.  If you get arrested, God only knows what they do with that info they get.  If you need to take ph #'s w/ you encrypt them in a human-readable form.  IE: if my ph# is 444-4444, write it as 555-5555.  It works and it is safe.

One other thing:  if you plan to be there a while, find the address of the nearest house and order Domino's..hey, if you bring some credit card #'s with ya ( to be discussed WAY later) its FREEEEEEEEEEE!!!

To make a lineman's handset: Get a regular old modular phone and cut the wall jack off the end of it...get a red and green alligator clip set and attach the clips to their like colors....use these clips on the terminals in the bell cans.  You are set.  I PERSONALLY recommend stealing the damn stuff from a bell van...but thats ILLEGAL...oh NO....oh well..heheh...

That's about it...if you have any questions or comments, or if I have left anything out (likely since this was written in a drunken stupor) let us know at the BBSs listed at the end of this newsletter.
-Hellbender-

NOTE:Node I will be changing ph#'s/area code as of Sept. 21..College ya know. so keep and eye open for the new one...in ALL cases, mail the LoST ACCOUNT for info!

Hellbender/LoST Founder(#1)/Pres.

Well that draws to an end LoST Newsletter #2. We hope you have enjoyed it thoroughly.  Lots of time and energy by SOME people went into this.  I would personally like to thank: The Acid Prince, City King, and Red 5! for all their support and supplies (especially CK,,tanks fer da picture!!!!)  Greets to: Razor Ratte, The Terrorist, The Buzzard, Hackman, Qwert(y???? UIOP????..uh-oh...), and all the others whose names I am WAY to tired to remember.  Thanks to the Mac community and to phreakers and hackers EVERYWHERE...keep the torch lit, eh?  Wheee.

-Hellbender-
Copyright 1991
September 1st 1991.Issue 2
  


All of these fine BBSs support LoST in one way or another:
MacSavvy:415-340-8054-SySOP:Red 5!
Invoked Illusions:415-441-6035-SySOP:Hellbender
The ELites Hideaway:415-672-1944-SySOP:The Terrorist
Stigmatta BBS:415-459-6660-SySOP:Crush Commander



DAMTs-
N      
    }  ~            h  i                      /  R                Q  e  f  }  ~              9  V  W    &  ;        '  x                                                                                                                                                                           !     !     !     !     !              !     !  5***************************************DAMT's***********************************
I.  What IS a DAMT?

Simply put, a DAMT (dial-in automated maintenance) is similar to the REMOBS of old but with fewer powers and less range.  A DAMT can be used to check the status of a subscribers line, short the line for a specified period of time (ie: Kill the line) and several other functions.

II. What do they do?

Well, for starters, you can monitor a persons telephone conversation.  This reqiuires either an unprotected DAMT, OR a password/code for the DAMT you are using, otherwise all you will hear is garbled noise.  In addition, you can short a persons line for up to 10 minutes...while this is no great thing to do, if they are in the middle of a conversation they will royally flip out.  You can also perform other functions on their line, but I currenty dont understand all of them, so  I will keep you informed.
Drawbacks-
A DAMT can only kill a line for ten minutes.  No use for any long term revenge.  An un-passworded DAMT is RARE...most of the time you hear just static instead of the conversation.  Also, DAMTs are only good for the prefix that they are in and usually one other...ie: if the DAMT is 444-4444, it will only work for subscribers in prefix 444 and maybe 445 or something like that.  

III. Getting into the DAMTs.
This is simple.  Once you find one via scanning etc, it will answer you with a speak n spell voice.  The password is usually 4-7 digits.  The ones that I have found have had simple passwords :1991, 1234567, 123789, etc.  Nothing to complex.  Just play with them.  ya cant go wrong.

Well, thats about it.  As you can see, unless you get a good DAMT, the yare rather useless.  But hey, better you know just in case than be boggled should the golden opportunity arise!  
..College ya know. S
III. Finding DAMTs.
Finding them is not that difficult.  Usually they can be found in the lower areas of an exchange, usually between 0001-1000.  Just scan prefixes in that range and youll hit them.  Personally, the highest up I have ever seen them go is XXX-0059.  So the combinations possible that they may lie in are not that big.  Just SCAN!!! Hehe
IV

UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!UPDATE!!!
********************************************************************************
it is curently 7:45 AM Sunday, Sept. 1st, and LoST would like to announce a VERY successful mailboxing run.  Over 50 lbs. of mail were seized, leading to the procuring of a Citibank preferred credit card( da PLASTIC!!!!), and several CC statements.  Also, we obtained TWO boxes of blank checks, among other things.  If you would like to purchase any of the checks an EXCELLENT deal will be made...(Like 50 cents per check....it pays to buy in bulk.)  Well this is being sent everywhere now.  The copy on TEH lacks this little update due to technical difficulties, so look for THIS one...hehehe...

-Hellbender/MiG MASTER-
h  '  '  '  (  (b  (                              &                                                                                                                                                                                                                                                                                                                                                                                                                                              ze@        V    o    !  '  ,&  2h  7:  <  C  J5  L~  L  L  S)  W  _  gL  l  r  wQ  ze                    K     N    M     N   	     
     N     N   
      P                             '         J@            !   "   Q   R   S                   &  '  :  G                  	E  
x  
  
  B  l  5  6  G      %  &  A  (          o  z  {        ^      J      4        !  #  %  =  U  W      3          (  s    
  E  G      )  w  ~                [           !-  !/  !1  !~  !  "  "c  "m  "o  "q  "  "  "  "  #7  #y  #  $
  $R  $  $  $  $  %6  %  %  &  &0  &2  &  &  '  'h  '  '  '  (  (b  (d  (  (  )D  )  )  )  )  )  )  *  *V  *  *  +7  +9  +;  +  +  ,$  ,&  ,t  ,  -  -[  -g  -i  -  .  .R  .  .  /  /  /g  /  /  /  0H  0  0  0  0  16  1  1  2  2h  2~  2  2  3  3`  3b  3  3  4F  4  4  4  4  5M  5l  5n  5p  5  5  5  5  61  6|  6  6  6  7:  7F  7H  7J  7  7  7  7  8-  8{  8  9  9c  9  9  :M  :  :  ;:  ;  ;  <  <4  <^  <  <  <  <  =0  =~  =  >  >\  >  >  >  >  ?  ?d  ?  ?  @I  @  @  A  Am  A  A  B4  Bs  B  B  C0  C|  C  D  Dd  D  D  E*  Et  E  F  F_  F  F  GF  GH  GJ  G  G  G  G  HN  H  H  H  I7  I  I  J  J5  J7  J  J  K  K;  K=  K?  K  K  K  K  K  K  L{  L|  L  L  M  NA  NB  NM  N  O#  O@  OA  Pb  Pc  S  S  S  S  TY  TZ  T  U  U  UK  U  U  U  V3  Vp  V  V  V  V  V  c  gK  gL  h  h  i  i  i  i  i  i  k  k  k$  k%  m#  m.  n  n  n  p  p  p-  qJ  qK  r  r  r  r  r  r  s  s  s  s  u  u  u  u  v	  v
  vF  vi  v  v  w   w  w  w  zC  zD  z]  z^  z_  zb  zc  zd  ze !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  
!  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  ! H ! !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  +!  
!  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !  !         ' _     #  /  D|     ( ) * + X                H P    (    H P     P       '                                                  =/             P 
-:ImageWriter 
     ( K (      z\  z\     z\          8  ?      a  g          M  S      u  ~  -  -  3  3  L{  L|  L}  L  L  NA  N  O#  O<  O=  O?  O@  Q  Q  \  \  \  \  ]  ]  `!  `+  ap  ay  a  a  d  d  e  e  h>  hE  i%  i.  i  i  j  j  k   k  k  lr  m"  m  m  n  n  p  p  p  p  qK  q  r  r  r  r  r  r
  rj  r  r  r  r  s  s/  sx  s  s  t  t  t'  t  ui  v  v  w
  w  w  w%  w.  w7  w@  wI  wR  w[  wd  wm  wv  w  w  w  w  yL  y  z\  z^  za  zb  zd  ze        g    >    n         z     f                         S                  ~         .         4     M~    M     M     M     X          5                          v     |    	    
            B    G                    K     O    (    0    t     x                               O    n    o     p    a                 P          %                       W                                  O    o                            ]                              N                                                                               &                             M{     M}                                                                                                                         