💾 Archived View for gemini.spam.works › mirrors › textfiles › phreak › PHREAKING › part1_tx.txt captured on 2022-07-17 at 11:07:38.
View Raw
More Information
⬅️ Previous capture (2022-06-12)
-=-=-=-=-=-=-
- **************************************************************
- *
- *
- Phreaks *
- *
- Long Distance Phone Thieves *
- *
- OR *
- *
- The Phreaker's Handbook *
- *
- **************************************************************
MCI
MCI is the Queen Mother of the long distance companys. There are
only a handful of companys that are "networked". This means
they've built their system to a point where travelers (or phreaks
can call into a local phone number and be in the "network" even
if they're three thousand miles from home. The exception is when
you're in an area that isn't serviced. Most LD services utilize
800 numbers so that you can connect even if you're out in the
boonies.
Here we have two different code formats, one for the so called
"executive" user, primarily business , the other for the average
person. Executive class entails using the 950-1022 dialup. To
make a call you need to enter no less than thirty two digits. You
dial zero plus the area code and phone number that you want, then
the area code and phone number with a four digit "security code"
at the end. It'll look like this, 9501022 (the dialup)
02125551212 (zero plus the area code and phone number ) then
7045551212xxxx (your area code,phone number and security code).
Many years ago I saw a piece of graffiti on the bathroom wall of
the Cotton Bowl. It went like this, "I've shit in England - I've
shit in France - But before I shit here again - I'll shit in my
pants." I feel the same way about this format. As a businessman,
I wouldn't waste my time trying to dial all this garbage. A real
pain in the ass. Hackers, don't find the format that tough. With
the exception of the user's telephone number and code the rest
are known quantities. You're left with fourteen numbers to hack
out. This can be reduced even further. MCI's 950 codes are good
anywhere in the country. Experienced phreaks pick an area that is
known to have an extremely high population density. New York City
is a case in points, area code 212. The number of digits has just
been reduced to eleven. The phreak will choose a prefix that is
occupied predominantly by business and cut the number down to
eight digits, which is one less than Sprint's code. I've seen
425,943,344,964,269,422,820,227,635,747,486,668,686,233,248,532,
732,306,938,255,925,678,and 564 posted on hacker boards. It seems
that Wall Street is a juicy target. The interesting thing about
hacking MCI's 950 numbers is that the phreak also gets the number
?j??of the person who's going to be getting the bill. It's not
unusual for the hacker to call the victim on some pretense just
to find out who it is. If it's a large company who might not
notice a few additional phone calls, he'll use the code sparingly
so as not to attract attention. The end result will be years of
free long distance.
MCI's second format is pretty standard. A local dialup and a five
digit code followed by the area code and number you wish to speak
with. They've recently instituted a new "security measure". One
phreak hacked out eight codes in about an hour. He let them sit a
day before he got around to using one of them, some phreaks let
them sit as long as a month. In that twenty four hour period all
but one of them went bad. It isn't unusual to see codes go bad. A
few of them fall by the wayside due to natural attrition, people
not paying their bills or cancelling service. To see seven fall
with one blow is mathematically improbable. It means they've
been reprogramming the computers to scan the dialups and check
for activity. If a node has an activity average of fifty calls
an hour and the hacker pumps the actual amount over that
average, it'll trigger a feature in the programming that'll
generate an activity report for a system operator to read.
Furthermore, the computer will list all the phone numbers called
and the codes that connected them to the system. If the phone
numbers are identical it can safely be assumed they're being
telephucked. The report will also show a time lag of about
fifteen seconds between calls. Isn't technology wonderful?
The hacker's solution to their solution is obvious. Don't keep
dialing the same phone number over and over. The first generation
of hacker programs did (and still do) use a one number
destination. Consequently, they've set a pattern that, after
four or five years, the phone companies have finally noticed. It
takes about twenty minutes of reprogramming to beat it. Hacks
have now started using large files dialups similar to the one in
the appendix. It's not too difficult to blitz the call counter
feature either. MCI doesn't publish their dialup numbers except
to their customers and then they only give them one at a time.
Their ratio seems to be figured at around one dialup for two
hundred thousand of population. To find other dialups all one
needs to do is scan the prefix surrounding a known node. Hacks
are now rewriting their software to spread their hacks out over a
wider area. Fifty to one hundred hacks on one node and then they
move to another. The five digit code hacked on a local dialup is
good only on that node. A New York code won't be good in
Cleveland. It took MCI several years and a ton of money in losses
and programming time to come up with this little security wonder.
It'll take a fifteen year old phreak twenty minutes of
reprogramming at a cost of zero bucks to bust it. Kinda makes you
wonder doesn't it?
What of the one code that was still good? The hacker didn't touch
it. He realized the system had detected him. It wouldn't be hard
recognize his pattern of calling. He knew the good code might be ?j??"trapped". Any activity on it would have been traced (illegally).
If he stayed on the code long enough for the security department
to process the necessary paperwork he would undoubtedly be
busted. He decided that it was wiser to protect himself and those
that he called by not using it. He noted the number just in case
he should hack it out again at a later date.
Some psychologists say that names can affect the development of a
child. I knew two kids when I was in school who's names are
etched in my memory forever, Jock Strap and Harry Balls. Their
parents should have been shot. The president of MCI is Orville
Wright. Orville has his work cut out for him.
GTE SPRINT
Sprint is owned by General Telephone. If you've ever lived in a
GTE area you can attest to the absolute crapola you've received
as service. Sprint has advertised good connections and rightly
so. Their international access is equal to AT&T. Like MCI and all
the other LD services, they don't go everywhere. They've
concentrated building their network in the metropolitan areas
where the money is so you country bumpkins are going to have to
wait a little longer.
I recently spoke with Sprint's security department. They have a
service oriented philosophy. They don't want any restrictions on
data line users. A study indicated a respectable percentage of
Sprint customers were computer operators. Sprint maintains a
considerable number of dialup ports. I estimate the ratio is one
port for each forty thousand of population. As of this writing,
Sprint has not completed it's national 950-0777 setup.
Consequently, she still has a large number of local dialups in
the system. Scanning to either side of a local non 950 dialup
will yield a wealth of unpublished nodes.
Sprint's code format runs 9 digits in length and also uses
prefix qualifiers . In this case a three digit coding identifies
the physical area of the country the code has been assigned to.
The next 4 digits are presumably it's record place within their
computer system. Therefore, xxxXXXXxx would translate to a three
digit prefix, followed by a four digit record number, with the
remaining two digits being what used to be a travel code.
Hackers report success rates of one per 300 hacks using the
random number approach, a bit on the shabby side. Success ratios
on MCI are around seven percent, or seven per hundred
hacks,actually pretty good. On Metro three to four percent is
about right. Essentially, Sprint is spreading their valid
accounts out over a wider area, keeping the density low, thus
making them harder to find. The hacker can increase his return
ratios by using the prefix and suffix technique. His first time
on the system he'll use a random hack, searching for a nine digit
code. Then use the first three digits of the code as a prefix,
and the last to digits as a suffix. All he needs then to hack is
the four digits in between. The return rate is currently one per ?j??two hundred hacks using this approach, a 33% increase in
efficiency.
Sprint has achieved a reputation for vigorously prosecuting
phreaks. Yet, they are as limited as all the other companies.
They rely mainly on fear. Occasionally, they'll snare some kid
who overstayed his welcome. They make a big deal giving the
impression they're busting thousands a day. This just isn't so.
Phreaks only get caught when they get stupid or lazy. You can't
blame Sprint for capitalizing on some phreak's lack of brains.
Conversely, you can't blame the phreak for cashing in on Sprint's
lack of smarts.
As an update, Sprints 950 dialups require 9 digits. Local nodes
used to come in at 7 and 8 digits. As the local dialups disappear
the 9 will become the norm. Sprint still has no specialized
security systems. The rumors of profound phreak snaring abilities
are basically untrue.
They win a few and lose a few, although it appears they lose more
than they win.
Allnet Communications
Allnet is a run of the mill telecom company. They utilize the
standard 6 digit format and can be found at 950-1044. They appear
to have developed or purchased software for analyzing their data
much the same way Mci has. Furthermore, they seem to have
established a customer profile with which to compare current
hacking activities against the record of past calling habits.
A hacked code will remain valid for three days. It seems to take
that long to run the programming.
Additionally, a code that connects for only a few seconds will be
invalidated within 24 hours. The obvious solution is stay
connected for several minutes. It works. On the user profile
strategy, there is no means of defeating it except to rape the
hell out of the code from the minute one lays hands on it. Those
that adhere to the I C's Rules of Phreaking wouldn't care since
they don't stay on a code more than three days any way.
Itt is Internation Telephone and Telegraph and operates out of
Seacacus New Jersy. They've been the the telcomunications
business for many years and have specialized in telix type
services.
Itt's connections aren't particularly terrific for data
transmissions. Phreaks have complained of excessive line loss
over relatively short distances. The company's strong point is
and will continue to be their telix activities.
The code format for this service is different. In an obvious
attempt to deter phreaking, they've departed from the usual node,
?j??code, number arrangement. Instead they utilize a reverse
arrangement, node, area code and number, then the code. From a
practical point of view there is little difference. From an
operational viewpoint the phreak must chain together his dialing
sting instead of using just one. I others words, instead of
punching one macro to output his call, two are required.
The coding uses a prefix and suffix as area qualifiers. The first
two digits of the code refer to the area of the country the code
has been assigned. Consequently, most phreaks prefer to use the
prefix in their hack attempts. The object is, of course, to
improve effieciency.
Itt has no special security considerations as far as traces and
traps go. They have instead emphasized getting the phreak
disconnected as quickly as possible. Most Itt's will go bad in
three days (See Chapter on Updates). Hense it is impossible for a
phreak to be on the system long enough to require concern about
traps and traces.
Itt is expanding it's overseas network and is offering services
to Singapore as well as the regular European countries.
ITT LOCAL DIALUPS
201-463-0900 305-545-8895 513-228-6506 717-234-0718
201-589-6343 305-764-4522 513-651-1823 717-299-4796
202-565-4110 312-364-6020 515-284-5040 717-347-9135
203-324-1172 312-922-1013 518-462-2068 717-825-2761
203-333-2722 313-662-2041 602-257-8200 803-233-1351
203-527-7389 313-964-2843 608-258-8900 803-256-3060
203-787-0170 314-656-0800 609-338-0340 803-573-7639
203-794-1085 315-471-2900 609-989-1631 803-577-6728
203-866-8411 316-267-1088 612-375-0690 804-355-1433
209-445-9300 317-637-5223 614-224-0024 804-380-9038
212-248-0151 401-273-8263 615-327-2511 804-627-3596
214-651-0609 404-525-0714 615-521-7600 805-395-0123
215-376-4864 405-525-7731 615-697-7000 813-223-5380
215-433-2166 408-280-1301 616-458-2472 817-338-4749
215-563-3256 412-261-4930 617-357-5562 904-358-8522
216-375-9040 414-933-5680 702-323-7191 913-371-1300
216-621-0490 415-495-2816 704-375-4311 916-448-6606
219-237-1700 415-858-2750 713-862-5067 918-585-5001
302-654-2809 502-589-9360 714-973-8032 919-378-9489
303-861-4411 504-566-8300 716-325-1180 919-725-3532
305-425-7791 512-474-4397 716-845-5150 919-832-9438
?`?
Listing of Cities Serviced by ITT
Allentown Anaheim Annapolis
Athens Atlanta Baltimore
Boston Brooklyn Cambridge
Camden Charlotte Chicago
Compton Dallas El Monte
Elk Grove Fort Worth Fort Lauderdale
Gainesville Galveston Garden City
Gardena Gary Glendale
Greensboro Greensville Hackensack
Houston Inglewood Jacksonville
Joliet Kankakee La Plata
Long Beach Los Angeles Lynchburg
Miami Morristown New Brunswick
New York Newark Newport News
Norfolk Norristown Northbrook
Oak Brook Oakland Orlando
Palo Alto Philadelphia Reading
Richmond Rochester Rome
Rosenberg Sacramento San Jose
Santa Monica Santa Ana Scranton
Sherman Oaks Spartanburg St. Petersburg
Tampa Thousand Oaks Trenton
Van Nuys Washington West Palm Beach
White Plains Wilkes-Barre Wilmington
Winston-Salem
Western Union Metrophone
Metro was everyone's whore. Metro never said no. Any too bit
phreak could bang a metro code. The system was of interest to
business primarily due to there method of billing breakdowns.
Metro has been raped to the tune of tens of millions in phreak
related losses.
Metro is currently, for phreaking purposes, offline. It's unknown
whether she has changed her code format or has simply closed
shop. Her previous code format was a standard 6 digit affair. The
equipment used was old and had very poor line quality. This was
apparent in 1200 baud data communications but would not
necessarily have been noticed on voice transmissions. The listing
for her networked dialups is included below.
201-427-1100
201-487-3155
201-531-7900
201-643-2227
201-825-8852
201-828-8660
202-737-2051 ?j??
203-222-1148
203-323-1468
203-522-0003
203-748-0770
206-382-0910
212-732-7430
212-950-0220
213-202-6117
213-404-4100
213-618-0231
213-624-8884
213-629-1026
214-595-4282
214-742-4500
215-351-0100
215-770-8940
216-374-1001
216-861-5163
219-237-4805
219-420-0011
219-882-8901
301-659-7700
302-429-9439
303-623-5356
305-326-3300
305-462-3530
312-356-4480
312-396-2550
312-450-5875
312-480-8901
312-496-2431
312-578-3900
312-679-8120
312-844-6981
312-853-4700
312-888-5580
312-891-8083
312-981-8870
312-986-0566
313-963-4847
313-996-8900
314-342-1130
315-474-3911
317-635-6284
401-272-0356
402-422-1120
404-223-1000
405-232-9011
408-947-7606
409-833-9331
412-261-5720
414-277-1805
414-633-3636 ?j??415-499-8086
415-579-6001
415-676-1062
415-724-3170
415-794-4800
415-833-9200
415-836-6900
415-852-0900
415-956-0162
419-243-1046
502-561-0900
504-566-8500
512-224-9600
512-474-6057
513-228-1576
513-241-1747
516-933-9700
516-950-0220
518-436-6200
602-254-2930
602-323-0502
606-231-8961
608-251-9596
609-338-0100
609-641-0004
609-989-1900
612-370-9000
614-224-0577
616-242-9580
617-950-1020
618-235-8870
619-233-0327
702-329-1025
707-584-4931
713-224-9417
714-527-7055
714-591-9351
714-594-9311
714-877-6641
714-972-9515
716-852-9200
716-950-1020
717-238-4731
717-348-4300
717-846-6304
718-950-0220
804-225-1920
804-623-9004
805-968-0700
806-379-8271
806-762-0004
815-966-2401
816-471-1999 ?j??817-322-1422
817-338-1639
817-565-9202
817-757-2002
818-350-1028
818-954-8699
818-992-8282
913-621-3186
914-684-0268
915-532-0025
915-561-5481
915-658-2943
915-676-0078
916-443-6921
918-587-6770
Thrifty Telephone Exchange
TTE is an example of a mom and pop telephone company. It services
a very small area and utilizes 800 as its sole source of out of
the area access for its customers. The 800's are also more
expensive for the customer.
TTE offers two dialups in the 818 area, 902-0950 and 908-0951.
These are located in Van Nuys, California, a part of the City of
Los Angeles. She utilizes the standard 6 digit format.
TTE is a good example of a company hackers just won't mess with.
Not because of any great security measure or because of some
ultra sophisticated phreak catching ability, but simply for the
reason they don't have enough customers (valid codes) to make the
effort worthwhile. TTE has a rough road to hoe. It seems too
small to be of interest for a larger company to gobble up and is
unable to compete on the grander scales of Mci or Sprint. She's
bound to belly up sooner or later. This situation is not unique
in the industry.
Access Communications
Access is a company in the genre of TTE with the major exception
it appears to have the benefit of more capitalization. There
operate out of the 801 area and offer a local dialup at 801-359-
3900 as well as national access at 800-548-0003. The code length
is identical to ITT, 7 digits. The prefix may safely assume the
use of prefix qualifiers.
Access' format is standard with one minor exception. Node + code
+ 1 + area code and destination number. Like ITT's reverse
format, the minor deviation from the norm is bound to save the
telco money. The problem all these companies have is they must
make the format easy enough for an idiot to operate and the MUST ?j??make the dialups and formats public knowledge. In doing both they
make their systems vulnerable.
U.S. Telecom
U.S. Telecom was known as the "Metro" of the 950's. Codes were
easily hacked and density varyed in direct proportion to the
population of the area serviced. The Director of "Code Abuse" is
a fellow named "Frank Porko". It seems one of the prerequisites
of being in telecommunications is you have an odd name. Frank
was recently promoted to this exaulted position. U.S. Tel isn't
making money, so the company has been swallowed up by a bigger
fish, Sprint. Frank didn't strike me as overly bright on the
subject of phreaking. The company has tried the "Carrier Blast"
only to find it worked for a couple of days and the phreaks by
passed it. It can still be found at the end of the dialing
sequence for their 950. Their latest security gizzy is to limit a
caller to four tries before it routes him to a dummy line. Sound
familiar? Sprint does it with two tries and it doesn't work for
them either. Ironically, phreaks in the military are hurting
USTel much worse than the civilian poplulation. It appears
government computers are being put to uses other than those
intended. U.S. Tel's 950-1033 dialup is already famous among
phreaks. They've placed qualifiers on the codes, even so the
return rate runs around five per hundred hacks. Five percent -
not bad. The node uses the standard six digit format. I spoke
with one of their chief programmers who was trying to hack out
codes. He complained the only code he could find was his own.
This explains why the company's response time is so pathetic.
Phreaks and computer engineers thinking at different levels. This
supports the old saying of "Set a Theif to Catch a Thief".
U.S. Tel sports two 800 numbers, 800-345-0008 and 800-245-0033.
These babies are infamous. The 345 number used to have codes
packed like sardines, every tenth (fifteenth at the most) number
was a good code. How could you lose? After several years of
getting their asses kicked they finally changed the format and
wised up a bit and went to a 14 digit code, ie. AT&T format. The
format is constructed of two sets of three digits followed by two
sets of four digits, XXX-XXX-XXXX-XXXX. We can assume the first
sets of three are area qualifiers, actually area codes. USTel
doesn't use the actual area code as do AT&T and MCI. Area codes
818 and 714 return as 527 and 662 respectively. Additionally, the
three digit prefix and suffix are also bastardized. Hackers have
deduced this is the product of a mathematical formula indexed
from the users area code and phone number. The four digit
"security code" is obtained by the same formula. A group of
hackers who call themselves the IC (Inner Core) are working on
cracking this coding. There are fifty of them. This translates to
fifty intellegent people, fifty computers all dedicated to
breaking the MCI/Ustel code. It would seem it is only a matter
of time before they succeed. It's their belief they will also
reap the AT&T formula in the bargain. This stems primarily from ?j??the fact MCI "borrowed" AT&T's format.
??
Hackers love a challenge and will rise to one almost at the
dropping of a pin. Code cracking is what they love best. I have
no doubt that the IC will succeed.
Update
The 14 digit format is being used for new accounts. Older
customers still have their 6 digit codes. US Tel has never had
terrific connections and under Sprint this has not improved.
Two digit prefix qualifers are used. The calling areas are very
small. Sprint is still the best bet for away from home phreaking.
SBS SKYLINE
Each long distance company tries to promote itself in different
ways. Skyline's approach is two fold, first price (so what's
new), and secondly the fact they use satellites to get their
calls to their destinations. This isn't terribly impressive.
Never the less, they obviously feel enough people will be
impressed it's worth mentioning. Point in fact, most of the LD's
use satellites. It would be impractical, not to mention
expensive, to use AT&T's network for 100% of their traffic.
Skyline has a well established dialup at 950-1088. Her format is
the standard 6 digits. Hacks report it is a fairly easy system.
It appears she has divided the country in areas which are rather
large geographically. A code that originates in one area will be
workable two to three hundred miles from its point of origin. The
six digit code will also work on her 800-446-4462 dialup. There
are reports she also uses a seven digit format collateral to the
six.
Skyline has a reputation for vigorously calling the destination
numbers after more than ten calls have been placed. This is the
most they can realistically do. One must assume they will score
a certain percentage of people who are willing to give them
information about the origin of the calls. Yet, as far as
experienced hacks and phreaks go, you can be equally sure the
trail will stop there and the possibility of back tracking is
nil, if not impossible. This problem is not unique to Skyline.
She appears to be your run of the mill long distance carrier
without much to make it especially noteworthy. Like all other
services, she isn't making money and is playing the merger game.
I predict by 1988 you will have three majors in the business,
AT&T, MCI, and Sprint. The rest are fish bait waiting to be
gobbled up by the larger fish. See Updates for further
information. ?j??
Alliance Teleconferencing
Alliance is a service of At&t. It provides people, usually
business with what is essentially a party line; several people
can join in the same conversation at the same time. It's an
outstanding tool for business. The phreak approaches Alliance
essentially from the same perspective, except that phreakery is
the business.
As a service of At&t, Alliance is approached indirectly through a
PBX or a diverter. The origination phone number of all calls
place to Alliance is supplied by the ANI - Automatic Number
Identifier. Placing the call through a PBX insures the ANI, and
the people receiving the bill, will be someone other than the
phreak.
AT&T offers two basic conference services, Alliance 1000 and
Alliance 2000. The former is your basic voice communication and
the later has special graphic abilities. The service operates in
all fifty states, Mexico, Canada, Puerto Rico, Bermuda and the
Virgin Islands.
To make a conference call the phreak will need to have the phone
numbers of all the parties. Since this is not always desireable,
the controller can route the call through a number of loops, thus
insuring the location of the phreak remains unknown (See Loops).
The controller will then call 0+700+456-1000 for an audio
conference. He'll then dial in the phone numbers as you would any
At&t call. When the party answers, he'll tell him to hold on
while he connects the rest of the group. He'll hit the # button
to continue adding people or the * to cancel his input. He can
resume adding callers at any time by hitting the # button. Ending
a conference is easy, everyone hangs up.
A national conference was held after the 415 bust to discuss
added security measures to counteract the sting techniques used
by the Fremont Police Department. Elite phreaks from coast to
coast were dialed in. The phreaks saw the need for immediate
discussion to plan their future actions and to discuss the
details of the bust. One of the parties to the conference had
actually seen the hacker known as Trask as he was being arrested.
Trask's down fall held vital concern to many on that conference
as he held many personal phone numbers and names in his data
base. The police did not obtain that information nor did Trask
make a deal with them. Needless to say he was prosecuted. Other
hackers involved in the 415 bust did make bargains with law
enforcement which resulted in wide spread arrests. The Fremont
Sting has successfully been used in Texas and there is every
indication it will be used elsewhere.
?j??
Alliance provided the means for these hacks to meet and discuss
their vital concerns. Some company with a PBX was billed for the
calls. It would be accurate to say that while the 415 conference
was called under "emergency" conditions, most conferences are
little more than bullshit sessions. Some pranksters like to play
games like dialing six or seven operators and listening to the
say, "Operator", "Operator", "No I'm the operator can I help
you?". This can go on for five or six minutes before they realize
they've been cross connected. Others like to call their favorite
software company and taunt them as to how they've cracked their
latest security measures. These applications are rather juvenile.
At&t Security is a feared aspect of the phreak's existence. With
the exception of the PBX and the Diverter, Ma Bell holds all the
cards. Tracing is a snap. Even so, At&t doesn't appear to be a
mean mother in the tracking down of her Alliance phreaks. The
company with the PBX is going to be stuck with the bill and it
appears the phone company has little incentive to follow the
scent.
Phreaks of fifteen to twenty years pass used to place calls and
have them billed to phone booths. ESS has made that game
obsolete. However, Ma Bell didn't sit still for the theft. They
dropped the billing on the party who received the call. If then
didn't pay, they lost their phone service. The obvious option was
to give them the name and location of the person that really was
responsible for the call. There are no reports that this
collection device is still being used. From the phreak's vantage
point, Alliance is pretty safe.
Another old method of phreaking from payphones, and purported to
have dome from Abby Hoffman, was to place a call from a payphone
and to reverse the handset of an adjacent payphone to signal the
operator that money was being dropped. As the phreak dropped the
coins into the phone he wasn't placing the call from, the clinks
and cur-chunks would signal her the correct amount had been
deposited. This was corrected by simply making the telephone
cords shorter.
Cur-chunks are out and tones are in. So the technique now has a
new twist called the Red Box. the box is a simple, handheld,
battery operated tone generator that duplicates the tones used to
signal the operator the money has actually been placed into the
payphone. Utilizing 1700 hz and 2200 hz (Duel Multi Frequency
Tones), the box signals that a nickel has been dropped by pulsing
the frequencies at 66ms one time. A dime is recognized by 66ms on
once, off once, and on again. This produces two "beeps". The
quarter is shown at 33 ms off and on five times.
The newest phone technology also brinks greater phreaking
opportunities. The Cordless telephone is one example. These units?j?
use two frequencies, one to send and the other to receive. the
FCC restricts the number of frequencies available so that a trial
and error approach in hacking is feasible. Most people don't
realize a cordless signal can carry for miles enabling others to
hear every word of their conversations. A properly equipped
techno-phreak can zero in on the signal, locate the source, and
screw around until he find the correct "in" level. The result is
a Godzilla of a phone bill for the unsuspecting owner of the
cordless phone. Most phreaks wouldn't go to this kind of trouble.
Your technoelectrical wiz kids will.
Ess, while being the scourge of phreakdom, has also enabled him
some benefits. The payphone games and 950 phreaking are just two
examples. ESS has, however, completely obliterated the use of the
infamous Blue Box. Phone company computers are programmed to be
sensitive to the 2600 hz tone needed to seize a trunk line. And
818 system operator (an adult) boxed one call on ESS. He was
detected and traced but not arrested. The second time he box, he
had a knock on the door and was arrested by the local police who
had been accompanied by telco security. It's estimated by the mid
1990's the entire country will be on ESS. Today, only the major
metropolitan areas utilize the service. Crossbar is still the
norm for the boonies.
Ess is a technological marvel, a logical step in the ever
evolving future of the phone industry. Yet, it has some very
scary aspects. The ability for abuse is tremendous. In the movies
you see the cop saying "We didn't have enough time for the
trace." Not any longer. Traces, wire taps and much more can be
programmed to be automatic. An operator at a console can push a
few buttons and Zap, no civil rights. I knew a woman who's
brother was a highly placed official in Pac Tel. Her boyfriend
had broken up with her and she was livid. The boyfriend's
communications were traced and tapped as a "courtesy" by the
brother. There is a history of past abuse which spawned the few
laws designed to protect the consumer. However, just as there are
laws against wire fraud, there are plenty of phreaks breaking
those laws. The phreak can hide behind the technology of the
computer and use it to break the law. So can your phone company.
Murphy's law is applicable here, if it can happen it will.
Government has a philosophy of regulating and controlling the
hell out of small and medium sized business. Large politically
powerful corporations are afforded the convenience of policing
themselves. A classic case of the fox watching the hen house. If
the public were even remotely aware of the capabilities of ESS
the uproar would shatter Washington. Phone services have been
taken for granted. The combination of ESS and the Data Services
who sell their information over the network makes it impossible
for anyone to have true privacy. TRW is a prime target of the
hacking community. Hacks abuse that data service and others for
their own informational needs. It logically follows that any ?j??
agency with the inclination could use those services to create
non existent people or to kill the electronic lives of real ones.
The computer gives spying an entirely new dimension. Believe it,
Big Brother really is Watching!
with the bill and it
appears the phone company has little incentive to follow the
scent.