💾 Archived View for spam.works › mirrors › textfiles › hamradio › wpscan.txt captured on 2023-11-14 at 10:05:18.
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
Weld Pond sends you.......... "HACKERS SCAN AIRWAVES FOR CONVERSATIONS""Eavesdroppers tap into Private Calls" by Mark Lewyn Aug 14, 1992 Washington Post On the first day of the Soviet coup against Mikhail Gorbachev in August 1991, Vice President Quayle placed a call to Sen. John Danforth (R-Mo.) and assessed the tense, unfolding drama. It turned out not to be a private conversation. At the time, Quayle was aboard a government jet, flying to Washington from California. As he passed over Amarillo, Tex., his conversation, transmitted from the plane to Danforth's phone, was picked up by an eavesdropper using electronic "scanning" gear that searches the airwaves for radio or wireless telephone transmissions and then locks onto them. The conversations contained no state secrets -- the vice president observed that Gorbachev was all but irrelevant and Boris Yeltsin had become the man to watch. But it remains a prized catch among the many conversations overheard over many years by one of a steadily growing fraternity of amateur electronics eavesdroppers who listen in on all sorts of over-the-air transmissions, ranging from Air Force One communications to cordless car-phone talk. One such snoop overheard a March 1990 call placed by Peter Lynch, a well-known mutual fund executive in Boston, discussing his forthcoming resignation, an event that later startled financial circles. Another electronic listener over- see heard the chairman of Popeye's Fried Chicken disclose plans for a 1988 takeover bid for rival Church's Fried Chicken. Calls by President Bush and a number of Cabinet officers have been intercepted. The recording of car-phone calls made by Virginia Gov. L. Douglas Wilder (D), intercepted by a Virginia Beach restaurant owner and shared with Sen. Charles Robb (D-Va.), became a 'cause celebre' in Virginia politics. Any uncoded call that travels via airwaves, rather than wire, can be picked up, thus the possibilities have multiplied steadily with the growth of cellular phones in cars and cordless phones in homes and offices. About 41 percent of U.S. households have cordless phones and the number is expected to grow by nearly 16 million this year, according to the Washington-based Electronics Industry Association. There are 7.5 million cellular telephone subscribers, a technology that passes phone calls over the air through a city from one transmission "cell" to the next. About 1,500 commercial airliners now have air-to-ground phones --roughly half the U.S. fleet. So fast-growing is this new form of electronic hacking that has its own magazines, such as Monitoring Times. "The bulk of the people doing this aren't doing it maliciously," said the magazine's editor, Robert Grove, who said he has been questioned several times by federal agents, curious about the hackers' monitoring activities. But some experts fear the potential for mischief. The threat to businesses from electronic eavesdropping is "substantial," said Thomas S. Birney III, president of Cellular Security Group, a Massachusetts-based consulting group. Air Force One and other military and government aircraft have secure satellite phone links for sensitive conversations with the ground, but because these are expensive to use and sometimes not operating, some calls travel over open frequencies. Specific frequencies, such as those used by the President's plane, are publicly available and are often listed in "scanners" publications and computer bulletin boards. Bush, for example, was accidentally overheard by a newspaper reporter in 1990 while talking about the buildup prior to the Persian Gulf War with Sen. Robert Byrd (D-W.Va.). The reporter, from the Daily Times in Gloucester, Mass., quickly began taking notes and the next day, quoted Bush in his story under the headline, "Bush Graces City Airspace." The vice president's chief of staff, William Kristol, was overheard castigating one staff aide as a "jerk" for trying to reach him at home. Some eavesdroppers may be stepping over the legal line, particularly if they tape record such conversations. The Electronic Communications Privacy Act prohibits intentional monitoring, taping or distribution of the content of most electronic, wire or private oral communications. Cellular phone calls are explicitly protected under this act. Local laws often also prohibit such activity. However, some lawyers said that under federal law, it is legal to intercept cordless telephone conversations as well as conversations on an open radio channel. The government rarely prosecutes such cases because such eavesdroppers are difficult to catch. Not only that, it is hard to win convictions against "listening Toms," lawyers said, because prosecutors must prove the eavesdropping was intentional. "Unless they prove intent they are not going to win," said Frank Terranella, general counsel for the Association of North American Radio Clubs in Clifton, N.J. "It's a very tough prosecution for them." To help curb eavesdropping, the House has passed a measure sponsored by Rep. Edward J. Markey (D-Mass.), chairman of the House telecommunications and finance subcommittee, that would require the Federal Communications Commission to outlaw any scanner that could receive cellular frequencies. The bill has been sent to the Senate. But there are about 10 million scanners in use, industry experts report, and this year sales of scanners and related equipment such as antennas will top $100 million. Dedicated scanners, who collect the phone calls of high-ranking government officials the way kids collect baseball cards, assemble basements full of electronic gear. In one sense, the electronic eavesdroppers are advanced versions of the ambulance chasers who monitor police and fire calls with simpler scanning equipment and then race to the scene of blazes and accidents for a close look. But they also have a kinship with the computer hackers who toil at breaking into complex computer systems and rummaging around others' files and software programs. One New England eavesdropper has four scanners, each one connected to its own computer, with a variety of scanners, each one connected to its own computer, with a variety of frequencies programmed. When a conversation appears on a pre-selected frequency, a computer automatically locks in on the frequency to capture it. He also keeps a scanner in his car, for entertainment along the road. He justifies his avocation with a seemingly tortured logic. "I'm not going out and stealing these signals." he said. "They're coming into my home, right through my windows." [End of the article. There was no identification of who "Mark Lewyn" is, or who he works for, or his journalistic credentials. The only thing for sure is that he is not a staff writer for the newspaper, since the byline for the paper's own writers is "Washington Post Staff Writer."]