💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › F4ITH › bug.txt captured on 2021-12-03 at 14:04:38.
-=-=-=-=-=-=-
. . ___::http://_:::hybrid.DTMF:___::org::___::___:::: / || || |_| __ || || || _|| || | | | | :__|| |:_ | | : :: | || |:_ |/ | | : \ | | _ | __:|: _::_ | |: | | --: --<_____ |___ |_|__\____||_ ||_ ||_ ||____ |_|\__>-- |/ |/:::BL4CKM1LK:|/ |/:: |/::@%$!|/ : : : : : : . . . . Remote Information Interception Over The International PSTN. A Very Brief Overview of Remote Telecommunications "Spying". by hybrid <hybrid@f41th.com> ============================================================================== In this article I will discuss various "information gathering" techniques which can be covertly deployed, implementing the PSTN as a trojan. I'm not going to discuss the standard "microfone in the wall" scenarios because that is to obvious, the basis of this article is that no-one needs to actually break into your house and place some bullshit listening device in a coffee mug, they dont need to. Nearly every single premisis on this planet has some kind of telecommunications equipment installed, if someone was to "bug" you, the harware needed to carry out such a task is allready in place.. (The Subscriber Loop), think about it, what is a standard domestic phone line? -- In most casess its a pair of copper wires going into a persons home and back to the local exchange, frame point, creating a loop. To break things down even more.. what is on the customer terminating end of that bundle of copper wires? -- A Microphone and A Speaker, (Transmission). If you dont know much about electronics, or have no common sense, you'll probably be thinking, "big deal"... Well, the point is that a telephone speaker can be turned into a micophone when in idle state by reversing the circuit of the customer loop, essencially becoming a room bug when you place the handset down. Now this is just a VERY simple example of what I am going to discuss in this article. To begin with, I'll list some of the most likely "targets" for a digital sniper. ========================================+======================================= WHO/WHAT | WHY ========================================|======================================= Scientific Research | Depending on the level of | "research" some entitys may wish | to have detailed knowledge of | just what the other entitys are | doing, usually when some kind of | academic competition is | concerned, and depending on the | level of scientific research. ========================================|======================================= Diplomatic Internal Government | People/Organisations that are | involved in any government work | are likely targets to "buging" | usually in the interests of | intellegence gathering on the | other-side's part. Worldwide | governments percieve it as | imperitive to possess knowledge | of what other governments are | upto, right down to the smallest | detail. ========================================|====================================== Business People/Organisations | Its common knowledge that | competing companys like to know | what the opposition is upto, and | what strategic advantage they | may have. In this case financial | reasons are usually the | foundation. ========================================|====================================== Crime "Suspects" | Usually when law agencies | suspect some kind of organised | crime, or need more evidence | they will use resources to | gather information. Very | obvious, if someone's down with | somthing, they are a target to | this activity. ========================================|====================================== Attorneys | These people will do anything to | know what the "opposition" has | up their sleve. They'll bug each | other, aswell as clients. ========================================+====================================== The list could go on forever.. The main basis is, if A wants to know what B is doing, they'll try their best to find out somehow, and vise versa. It could be any scenario. Now, I'm not going to drift out of the scope of this article, because the idea is to discuss how someone can be "buged" just by using the PSTN and nothing more. Now, the scary thing is, a single person with a telephone can be just as "dangerous" than a fully trained covert "spy" with a briefcase full of 007 warez.. To emphasise and explain this, I'm going to set up two scenarios. The first scenario is domestic, the second is more business based. We'll start with the first scenario and suppose that "Mr A" is the target, and "Mr B" is the sniper. Mr B has no purpose or has no reason to spy on Mr A, he just feels like it.. to make things a little more interesting, Mr A (the target) lives in Virginia (703) and Mr B (the sniper) lives in another country, lets say, England (+44). To save me writting a big essay, I'll list some of the more effective methods that Mr B could implement in order to gather as much information about mr A as possible (using a telephone and nothing more) ================================+============================================== OBJECTIVE | ACTION ================================|============================================== Find out Mr A's Contacts | Telephone Records/Bills: who does mr A | Call? Examining Mr A's most commonly | called numbers would reveal a great deal | about his activitys, perhaps even more | effective than simply listening to his | telephone conversations. Essentialy an | entire profile could be built up on | someone just by looking at their | phone records: ie: what taxi companys | they use, when and what time they go | out, what kind of food they like, etc. | Telephone records are considered | sensitive information for this matter, | but can be obtained by customer request | (fax) or someone in the phone | company(BOC) requesting to view them for | billing purposes. Customer records are | also kept in an array of databases | concerning the maintanance of a local | exchange. See * Note. ================================|============================================== Monitor Mr A's Calls (realtime) | Perhaps slightly more elaborate, but | easily achieved. Mr A's line information | can be modifyied at the local switching | office to induce a number of occurances. | Using ManMachineLanguage, a subscriber | line can be setup to trigger an | automatic conference call with a "silent | number" whenever mr A pics his phone up. | Aswell as this, a subscriber trunk can | be configured to loop to 2 POT lines | (similtaniously), ie: routed to Mr A, | aswell as a loopline (which can be | remotely dialed into). Mr B could | effectivly "sit on the trunk". ================================|============================================== Audibly Monitor Mr A's House | The simple scenario would be that Mr A | has an AnswerPhone, which in most casess | would have a remote-room monitor | function built into it. Believe it or | not, these kind of answerphones DO | EXIST! It's a gimic built into an | answerphone that allows a person to | phone there own number when they are | away from there house, plug in the 2 | digit answerphone code, and then be | presented with a menu such as "1. listen | to messages, 2. record OGM, 3. room | monitor".. So they can check out what is | going on in there house while they are | away. The scary thing is, these | answerphones have 2 digit passcodes, | which are plugged in while the OGM | occurs, an answerphone can also be | remotely switched on/off by ringing it | 10 times and hanging up and calling | back. Using this "room monitor" function | Mr B can do just that.. monitor audible | room activity. See * Note for the more | plausable method. ================================|============================================== Find Additional Information | The most common threat to any subscriber | to the phone company is the fact that | RBOCs hold detailed account information | concerning their customers, which can be | obtained for reference by an "engineer" | or such.. for example, one piece of | information leads to another, ie: the | customers prefered method of paying the | IXC bill will lead to bank details and | from there, credit details and status, | to social security information. ================================+==============================================