💾 Archived View for aphrack.org › issues › phrack39 › 10.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content

View Raw

More Information

-=-=-=-=-=-=-

                                ==Phrack Inc.==

                 Volume Four, Issue Thirty-Nine, File 10 of 13

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN        Issue XXXIX / Part One of Four       PWN
              PWN                                             PWN
              PWN        Compiled by Datastream Cowboy        PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


 To Some Hackers, Right And Wrong Don't Compute                    May 11, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Bruce V. Bigelow (San Diego Union-Tribune)
 Special Thanks to Ripper of HALE

The telephone call was anonymous, and the young, male voice was chatty and
nonchalant.  He wanted to explain a few things about hacking, the black art of
tapping into private computers.

He was one of several hackers to call, both frightened and intrigued by a San
Diego police investigation into an informal network of computer criminals using
high-tech methods to make fraudulent credit-card purchases.  Detectives have
seized a personal computer and other materials, and arrests are pending in San
Diego and other parts of the country.

"Half the time, it's feeding on people's stupidity," the anonymous hacker
said, boasting that most computers can be cracked as easily as popping a beer.

Hackers seem full of such bravado.  In their electronic messages and in
interviews, they exaggerate and swagger.

One message traveling the clandestine network notes:  "This text file contains
extremely damaging material about the American Express account making
algorithm.  I do not commit credit card fraud.  I just made up this scheme
because I was bored.

They form groups with names like "Legion of Doom" and "Masters of Deception,"
and give themselves nicknames like Phiber Optik, Video Vindicator and Outlaw.
They view themselves as members of a computer underground, rife with cat-and-
mouse intrigue.

For the most part, they are bring teenagers who are coming of age in a
computer-crazy world.  Perhaps a generation ago, they tested their anti-
authoritarian moxie by shoplifting or stripping cars.  But, as it has with
just about everything else, the computer has made teenage rebellion easier.

Nowadays, a teenager tapping on a keyboard in the comfort of his bedroom can
trespass on faraway corporate computers, explore credit files and surf coast-
to-coast on long-distance telephone lines.

San Diego police say that gathering details from computerized files as credit-
reporting agencies, hackers around the country have racked up millions of
dollars in fraudulent charges -- a trick known as "carding."

Conventual notions of right and wrong seem to go fuzzy in the ethereal realm
that hackers call cyberspace, and authorities say the number of crimes
committed by computer is exploding nationwide.

Like many hackers, the callers says he's paranoid.  He won't give his name and
refuses to meed in person.  Now a college student in San Diego, he says, he
began hacking when he was 13, collecting data by computer like a pack rat.

"I wanted to know how to make a bomb," he said with a laugh.

Like other hackers, he believes their strange underground community is
misunderstood and maligned.  Small wonder.

They speak a specialized jargon of colons, slashes and equal signs.  They work
compulsively -- sometimes obsessively -- to decipher and decode, the hacker
equivalent of breaking and entering.  They exploit loopholes and flaws so they
can flaunt their techno-prowess.

"The basis of worth is what you know," the hacker says.  "You'll hear the term
'lame' slung around a lot, especially if someone can't do too much."

They exchange credit-card numbers by electronic mail and on digital bulletin
boards set up on personal computers.  They trade computer access codes,
passwords, hacking techniques and other information.

But it's not as if everyone is a criminal, the anonymous hacker says.  What
most people don't realize, he say, is how much information is out there --
"and some people want things for free, you know?"

The real question for a hacker, he says, is what you do with the information
once you've got it.  For some, restraint is a foreign concept.

RICH IN LORE

Barely 20 years old, the history of hacking already is rich in lore.

For example, John Draper gained notoriety by accessing AT&T long distance
telephone lines for free by blowing a toy whistle from a bod of Cap'n Crunch
cereal into the telephone.

Draper, who adopted "Captain Crunch" as his hacker nickname, improved on the
whistle with an electronic device that duplicated the flute like, rapid-fire
pulses of telephone tones.

Another living legend among hackers is a New York youth known as "Phiber
Optik."

"The guy has got a photographic memory,' said Craig Neidorf of Washington, who
co-founded an underground hacker magazine called Phrack.  "He knows everything.
He can get into anything."

Phiber Optik demonstrated his skills during a conference organized by Harper's
Magazine, which invited some of the nation's best hackers to "log on" and
discuss hacking in an electronic forum.  Harper's published a transcript of the
11-day discussion in it's March 1990 issue.

One of the participants, computer expert John Perry Barlow, insulted Phiber
Optik by saying some hackers are distinguished less by their intelligence than
by their alienation.

"Trade their modems for skateboards and only a slight conceptual shift would
occur," Barlow tapped out in his message.

Phiber Optik replied 13 minutes later by transmitting a copy of Barlow's
personal credit history, which Harper's editors noted apparently was obtained
by hacking into TRW's computer records.

For people like Emmanuel Goldstein, true hacking is like a high-tech game of
chess.  The game is in the mind, but the moves are played out across a vast
electronic frontier.

"You're not going to stop hackers from trying to find out things," said
Goldstein, who publishes 2600 Magazine, the hacker quarterly, in Middle
Island, New York.

"We're going to be trying to read magnetic strips on cards," Goldstein said.
"We're going to try to figure out how password schemes work.  That's not
going to change.  What has to change is the security measures that companies
have to take."

ANGELHEADED HIPSTERS

True hackers see themselves, in the words of poet Allen Ginsberg, as
"Angelheaded hipsters burning for the ancient heavenly connection to the
starry dynamo in the machinery of night."  These very words were used by Lee
Felsenstein, designer of the Osborne-1 computer and co-founder of the Homebrew
Computer Club.

But security consultants and law enforcement officials say malicious hackers
can visit havoc upon anyone with a credit card or driver's license.

"Almost none of it, I would say less than 10 percent, has anything to do with
intellectual exploration," said Gail Thackeray, a Phoenix prosecutor who has
specialized in computer crimes.  "It has to do with defrauding people and
getting stuff you want without paying for it."

Such crimes have mushroomed as personal computers have become more affordable
and after the break up of AT&T made it more difficult to trace telephone calls,
Thackeray said.

Even those not motivated by financial gain show a ruthlessness to get what they
want, Thackeray said.

"They'll say the true hacker never damages the system he's messing with,"
Thackeray said, "but he's willing to risk it."

Science-fiction writer Bruce Sterling said he began getting anonymous calls
from hackers after an article he wrote about the "CyberView 91" hacker
convention was published in Details Magazine in October.

The caller's were apparently displeased with Sterling's article, which noted,
among other things, that the bustling convention stopped dead for the season's
final episode of "Star Trek: The Next Generation."

"They were giving me some lip," Sterling said.  They showered him with
invective and chortled about details from Sterling's personal credit history,
which they had gleaned by computer.

They also gained access to Sterling's long distance telephone records, and
made abusive calls to many people who has spoken to Sterling.

"Most of the news stories I read simplify the problem to the point of saying
that a hacker is a hacker is a hacker," said Donn Parker, a computer security
consultant with SRI International in Menlo Park.

"In real life, what we're dealing with is a very broad spectrum of
individuals," Parker says.  "It goes all the way from 14-year olds playing
pranks on their friends to hardened juvenile delinquents, career criminals and
international terrorists."

Yet true hackers have their own code of honor, Goldstein says.  Computer
trespassing is OK, for example, but altering or damaging the system is wrong.

Posing as a technician to flim-flam access codes and passwords out of
unsuspecting computers users is also OK.  That's called "social engineering."

"They're simply exploring with what they've got, weather it's exploring a
haunted house or tapping into a mainframe," Goldstein said.

"Once we figure things out, we share the information, and of course there are
going to be those people that abuse that information," Goldstein added.

It is extremely easy to break into credit bureau computers, Goldstein says.
But the privacy being violated belongs to individual Americans -- not credit
bureaus.

If anything, credit bureaus should be held accountable for not providing
better computer security, Goldstein argues.
_______________________________________________________________________________

 Companies Fall Victim To Massive PBX Fraud                      April 20, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Barbara E. McMullen & John F. McMullen (Newsbytes)

NEW YORK CITY -- Appearing on the WBAI radio show "Off The Hook," New York
State Police senior investigator Donald Delaney discussed the movement of
organized crime groups into telecommunications fraud and warned the public
of the dangers of such practices as "shoulder surfing."

Delaney said that corporations are being victimized to the tune of millions of
dollars by unauthorized persons "outdialing" through their private branch
exchanges (PBXs).  He traced the case of Data Products, a computer peripheral
firm, that did not even seem aware that calls could be routed from the outside
through their switchboard to foreign countries.  It was only, according to
Delaney, when it received a monthly telephone bill of over $35,000 that it
perceived a problem.

"It was at 5:10 PM on a certain date that Liriano finally, after weeks of
trying, was able to obtain an outside dial tone on Data Products 800 number.
Subsequent investigation showed that thousands of calls using a 9600 baud modem
as well as manually placed calls had been made to the 800 number.  At 7:30 the
same evening, a call using the Data Products number was placed to the Dominican
Republic from a telephone booth near Liriano's house.  Within a few hours,
calls were placed from phones all around the neighborhood -- and, within a
week, calls began being placed from booths all around Manhattan," Delaney
related.

Phiber Optik, another studio guest and a convicted computer intruder previously
arrested by Delaney, commented, "I'm glad that Mr. Delaney didn't refer to
these people as hackers, but identified them for what they are:  Sleezy common
criminals.  What these people are doing requires no super computer knowledge
nor desire to learn.  They are simply using computers and telephones to steal."

Delaney agreed, saying, "The people actually selling the calls, on the street
corner, in their apartments, or, in the case of cellular phones, in parked
cars, don't have to know anything about the technology.  They are given the
necessary PBX numbers and codes by people higher up in the group and they just
dial the numbers and collect the money.  In the case of the re-chipped or clone
cellular phones, they don't even have to dial the numbers."

Delaney added, "These operations have become very organized very rapidly.  I
have arrested people that have printed revenue goals for the current month,
next six months, and entire year -- just like any other franchise operation.
I'm also currently investigating a murder of a call-seller that I arrested last
October.  He was an independent trying to operate in a highly organized and
controlled section of Queens.  His pursuit of an independent career may well
have been responsible for his death."

Off The Hook host Emmanuel Goldstein asked Delaney what responsibility that the
PBX companies bear for what seems to be rather easy use of their systems for
such activity.  Delaney responded that he thought that the companies bear at
least an ethical and moral responsibility to their clients to insure that they
are aware of their exposure and the means that they must take to reduce the
exposure.  "As far as criminal and civil responsibility for the security of the
system, there are no criminal statues that I am aware of that would hold the
PBX companies criminally liable for failure to insure proper security.  On the
civil side, I think that the decision in the AT&T suit about this very topic
will shed some light of legal responsibility."

Goldstein also brought up the difficulties that some independent "customer-
owned coin-operated" telephones (COCOTs) cause for customers.  "The charges are
often exorbitant, access to AT&T via 10288 is sometimes blocked, there is not
even the proper access to 911 on some systems, and some either block 800 calls
or actually try to charge for the connection to the 800 numbers.

"We've even found COCOTs that, on collect calls, put the charges through when
an answering machine picks up and the caller hangs up after realizing that no
one is home. They are set up to start billing if a human voice is heard and the
caller doesn't hang up within 5 or 10 seconds."

Delaney agreed that the COCOTS that behave in this fashion are an ongoing
problem for unsuspecting users, but said that he has received no complaints
about illegal behavior.  He said, however, that he had received complaints
about fraudulent operation of 540 numbers -- the local New York equivalent of a
900 number.  He said "most people don't realize that a 540 number is a
chargeable number and these people fall victim to these scams.  We had one case
in which a person had his computer calling 8,000 phone numbers in the beeper
blocks each night.  The computer would send a 540 number to the beepers.
People calling the number would receive some innocuous information and, at the
end of the month a $55 charge on her/his telephone bill."

Delaney continued, "The public has much to be worried about related to
telephone fraud, particularly in New York City which can be called "Fraud
Central, USA."  If you go into the Port Authority Bus Terminal and look up in
the balcony, you will see rows of people "shoulder surfing" with binoculars.
They have binoculars or telescopes trained on the public telephones.  When they
see a person making a credit card call, they repeat the numbers into a tape
recorder.  The number is then sold and, within a few days, it is in use all
around the city.  People should always be aware of the possibility of shoulder
surfers in the area."

Goldstein returned to the 540 subject, pointing out that "because so many
people don't realize that it is a billable number, they get caught by ads and
wind up paying for scam calls.  We published a picture in 2600 Magazine of a
poster seen around New York, advertising  apartment rental help by calling a
540 number.  In very tiny print, almost unreadable, it mentions a charge.
People have to be very careful about things like this."

Delaney agreed, saying, "The 540 service must say within the first 10 seconds
that there is a charge, how much it is, and that the person can hang up now
without being charged -- the guy with the beeper scam didn't do that and that
was one of the reasons for his arrest.  Many of the services give the charge so
fast and mix it in with instructions to stay on for a free camera or another
number to find out about the vacation that they have won that they miss the
charges and wind up paying.  The 540 person has, although he may be trying to
defraud, complied with the letter of the law and it might be difficult to
prosecute him.  The average citizen must therefore be more aware of these scams
and protect themselves."

Goldstein, Phiber Optik, and Delaney spent the remainder of the show answering
listener questions. Off The Hook is heard every Wednesday evening on New York
City's WBAI (99.5 FM).  Recent guests have included Mike Godwin, in-house
counsel of the Electronic Frontier Foundation; and Steve Jackson, CEO of Steve
Jackson Games.
_______________________________________________________________________________

 Changing Aspects Of Computer Crime Discussed At NYACC             May 15, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Barbara E. McMullen (Newbytes)

New York City -- Donald Delaney, New York State Police senior investigator, and
Mike Godwin, in-house counsel, Electronic Frontier Foundation (EFF), speaking
to the May meeting of the New York Amateur Computer Club (NYACC), agreed that
the entrance of organized crime into telecommunications fraud has made the
subject of computer crime far different than that discussed just a year ago at
a similar meeting.

Newsbytes New York bureau chief John McMullen, moderating the discussion,
recalled that Delaney in last year's appearance had called for greater
education of law enforcement officers in technological areas, the establishment
of a New York State computer crime lab, outreach by law enforcement agencies to
the public to heighten awareness of computer crime and the penalties attached
-- items that have all come to pass in the ensuing 12 months.  He also
mentioned that issues involving PBX & cellular phone fraud, privacy concerns
and ongoing debate over law enforcement wiretapping & decryption capabilities
have replaced the issues that received most of the attention at last year's
meeting.

Delaney agreed with McMullen, saying that there has been major strides made in
the education of law enforcement personnel and in the acquisition of important
tools to fight computer crime.  He said that the practice of "carding" -- the
purchasing of goods, particularly computer equipment, has become a much more
major problem than it was a year ago and that many more complaints of such
activities are now received.

He added that "call-selling" operations, the making of international telephone
calls to foreign countries for a fee, through the fraudulent use of either a
company's private branch exchange (PBX) or an innocent party's cellular phone
account, has become so lucrative that arrested suspects have told him that
"they are moving from drug sales to this type of crime because it is less
dangerous and more rewarding."

Delaney pointed out, however, that one of his 1991 arrests had recently been
murdered, perhaps for trying to operate as an independent in an area that now
seems to be under the control of a Columbian mob "so maybe it's not going to
continue to be less dangerous."

Delaney also said that PBX fraud will continue to be a problem until the
companies using PBX systems fully understand the system capabilities and take
all possible steps to insure security.  "Many firms don't even know that their
systems have out-dialing capabilities until they get it with additional monthly
phone charges of upwards of $35,000.  They don't realize that the system has
default passwords that are supposed to be changed," he said, "It finally hits
some small businesses when they are bankrupted by the fraudulent long-distance
charges."

Godwin, in his remarks, expressed concern that there is not sufficient
recognition of the uniqueness of BBS and conferencing systems and that,
therefore, legislators possibly will make decisions based on misunderstandings.
He said "Telephone conversations, with the exception of crude conference call
systems are 'one-to-one' communications.  Newspapers and radio & telephone are
"one-to-many" systems but BBS" are "many-to-many" and this is different.  EFF
is interested in seeing that First Amendment protection is understood as
applying to BBSs."

He continued "We also have a concern that law enforcement agencies will respond
to the challenges of new technology in inappropriate ways.  The FBI and Justice
Department, through the 'Digital Telephony Initiative' have requested that the
phone companies such at AT&T and Sprint be required to provide law enforcement
with the a method of wire-tapping in spite of technological developments that
make present methods less effective.

"Such a procedure would, in effect, make the companies part of the surveillance
system and we don't think that that is their job.  We think that it is up to
law enforcement to develop their own crime-fighting tools.  When the telephone
was first developed it made it more difficult to catch crooks.  They no longer
had to stand around together to plan foul deeds; they could do it by telephone.
Then the government discovered wiretapping and was able to respond.

"This ingenuity was shown again recently when law enforcement officials,
realizing that John Gotti knew that his phones were tapped and discussed
wrongdoings outdoors in front of his house, arranged to have the lampposts
under which Gotti stood tapped.  That, in my judgement, is a reasonable
approach by law enforcement."

Godwin also spoke briefly concerning the on-going debate over encryption.  "The
government, through varies agencies such as NSA, keeps attempting to restrict
citizens from cloaking their computer files or messages in seemingly
unbreakable coding.  We think that people have rights to privacy and, should
they wish to protect it by encoding computer messages, have a perfect right to
do so."

Bruce Fancher, sysop and owner of the new New York commercial BBS service,
MindVox, and the last speaker in the program, recounted some of his experiences
as a "hacker" and asked the audience to understand that these individuals, even
if found attached to a computer system to which they should not legitimately
access, are not malicious terrorists but rather explorers.  Fancher was a last
minute replaced for well-known NY hacker Phiber Optik who did not speak, on the
advice of his attorney, because he is presently the subject of a Justice
Department investigation.

During the question and answer period, Delaney suggested that a method of
resolving the encryption debate would be for third parties, such as banks and
insurance companies, to maintain the personal encryption key for those using
encryption.  A law enforcement official would then have to obtain a judge's
ruling to examine or "tap" the key for future use to decipher the contents of
the file or message.

Godwin disagreed, saying that the third party would then become a symbol for
"crackers" and that he did not think it in the country's best interests to just
add another level of complexity to the problem.

The question and answer period lasted for about 45 minutes with the majority of
questions concerning encryption and the FBI wiretap proposal.
_______________________________________________________________________________

 Couple Of Bumbling Kids                                         April 24, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~
 By Alfred Lubrano (Newsday)

Two young Queens computer hackers, arrested for the electronic equivalent of
pickpocketing credit cards and going on a computer shopping spree, will be
facing relatively minor charges.

Rudolph Loil, age 17, of Woodside, charged with attempted grand larceny, was
released from police custody on a desk appearance ticket, a spokesman for the
Queens district attorney's office said.

A 15-year-old friend from Elmhurst who was also arrested was referred to Queens
Family Court, whose proceedings are closed, the spokesman said.  He was not
identified because of his age.

Law-enforcement sources said they are investigating whether the two were
"gofers" for adults who may have engaged them in computer crime, or whether
they acted on their own.

But Secret Service officials, called into the matter, characterized the case as
"just a couple of bumbling kids" playing with their computer.

The youths were caught after allegedly ordering $1,043 in computer equipment
with a credit card number they had filched electronically from bank records,
officials said.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Hackers                                                         April 27, 1992
 ~~~~~~~
 Taken from InformationWeek (Page 8)

Two teenagers were arrested last week in New York for using computers to steal
credit card and telephone account numbers and then charging thousands of
dollars worth of goods and phone calls to the burgled accounts.

The two were caught only after some equipment they had ordered was sent to the
home of the credit card holder whose account number had been pilfered.  Their
arrests closely follow the discovery by the FBI of a nationwide ring of 1,000
computer criminals, who charge purchases and telephone calls to credit card and
phone account numbers stolen from the Equifax credit bureau and other sources.

The discovery has already led to the arrest of two Ohio hackers and the seizure
of computer equipment in three cities.
_______________________________________________________________________________

 DOD Gets Fax Evesdroppers                                       April 14, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~
 By Joseph Albright (Atlanta Journal and Constitution)(Page A12)

Washington -- The Air Force is buying a new weapon to battle leaks:  A $30,000
portable fax-tapper.

Whenever someone transmits a fax, the fax-tapping device attached to the phone
line will sneak an electronic copy and store it in a laptop computer's memory.
Each of the new devices will enable an Air Force intelligence officer to
monitor four telephones for "communications security" violations.

Susan Hansen, a Defense Department spokeswoman, said last week that "there is
no plan right at the moment" to install the devices in the Pentagon, whose
top leaders have been outraged in recent weeks by leaks of classified policy
documents to reporters.

But she left open the possibility that some of them will be attached to
sensitive military fax lines when the tapping devices are delivered to the Air
Force six months to a year from now.

"There are a lot of things that are under review here," she said after
consulting with the Pentagon's telecommunications office.

Plans to buy 40 of the devices were disclosed a few weeks ago in a contract
notice from a procurement officer at Wright-Patterson Air Force Base near
Dayton, Ohio. When contacted, a spokesman referred inquiries to the Air
Force Intelligence Command at Kelly Air Force Base, Texas, which authorized the
purchase.

The Air Force Intelligence Command insisted that the devices will never be used
for law enforcement purposes or even "investigations."

"The equipment is to be used for monitoring purposes only, to evaluate the
security of Air Force official telecommunications," said spokesman Dominick
Cardonita.  "The Air Force intelligence command does not investigate."

Mr. Cardonita said that, for decades, Air Force personnel in sensitive
installations have been on notice that their voice traffic on official lines is
subject to "communications security" monitoring.  The fax-tapper simply
"enhances" the Air Force's ability to prevent "operational security"
violations, he said.

He estimated that the Air Force will pay $1.2 million under the contract, due
to be let this June.  That averages out to $ 30,000 for each fax-tapper, but
Mr. Cardonita said the price includes maintenance and training.

Douglas Lang, president of Washington's High Technology Store and an authority
on security devices, said that, so far as he knows, the Air Force is the first
government agency to issue an order for fax-tapping machines.

Mr. Lang said he has heard from industry sources that 15 contractors have
offered to sell such devices to Wright-Patterson.

"It is one more invasion of privacy by Big Brother," declared Mr. Lang, who
predicted that the Air Force will use the devices mainly to catch anyone trying
to leak commercially valuable information to contractors.

Judging from the specifications, the Air Force wants a machine that can trace
leaks wherever they might occur.

Mr. Cardonita said the Air Force Intelligence Command will use the devices
only when invited onto an Air Force base by a top commander.
_______________________________________________________________________________

 900-Number Fraud Case Expected to Set a Trend                    April 2, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By David Thompson (Omaha <Nebraska> World-Herald)

Civil court cases against abuses of 900-toll telephone number "will be slam
dunks" as the result of the successful prosecution of a criminal case in Omaha
over 900 numbers, a federal postal inspector said.

Postal inspector Michael Jones said numerous civil actions involving 900
numbers have been filed, including three recently in Iowa.  At least one civil
case is pending in Nebraska, he said, and there may be others.

Jones said the mail fraud conviction of Bedford Direct Mail Service Inc. of
Omaha and its president, Ellis B. Goodman, 52, of 1111 South 113th.  Court, may
have been the first criminal conviction involving 900 numbers.

The conviction also figures in Nebraska Attorney General Don Stenberg's
consumer protection program, which calls attention to abuses of 900 numbers, a
staff member said.

Among consumer complaints set to Stenberg's office, those about 900 numbers
rank in the top five categories, said Daniel L. Parsons, senior consumer
protection specialist.

People are often lured by an offer of a gift or prize to dial a toll-free 800
number, then steered to a series of 900 numbers and charged for each one,
Parsons said.

He said that during the last two years, state attorneys general have taken
action against 150 organizations for allegedly abusing 900 numbers.
_______________________________________________________________________________