[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: PWN17.3 Cracker are Cheating Bell ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ]
Current issue : #17 | Release date : 1988-07-04 | Editor : Shooting Shark
Phrack XVII IntroductionShooting Shark
Dun & Bradstreet Report on AT&TElric of Imrryr
D&B Report on Pacific TelesisElric of Imrryr
Nitrogen-Trioxide ExplosiveSignal Substain
How to Hack Cyber SystemsGrey Sorcerer
How to Hack HP2000'sGrey Sorcerer
Accessing Government ComputersThe Sorceress
Dial-Back Modem SecurityElric of Imrryr
Data Tapping Made EasyElric of Imrryr
PWN17.1 Bust UpdateSir Francis Drake
PWN17.2 Illegal Hacker CrackdownThe $muggler
PWN17.3 Cracker are Cheating BellThe Sorceress
Title : PWN17.3 Cracker are Cheating Bell
Author : The Sorceress
                      #### PHRACK PRESENTS ISSUE 17 ####

                  ^*^*^*^ Phrack World News, Part 3 ^*^*^*^

                           **** File 12 of 12 ****


  +-------------------------------------------------------------------------+
  -[ PHRACK XVII ]-----------------------------------------------------------

                   "The Code Crackers are Cheating Ma Bell"
           Typed by the Sorceress from the San Francisco Chronicle
                            Edited by the $muggler

             The Far Side..........................(415)471-1138
             Underground Communications, Inc.......(415)770-0140

  +-------------------------------------------------------------------------+
In California prisons, inmates use "the code" to make free telephone calls
lining up everything from gun running jobs to visits from grandma.

In a college dormitory in Tennessee, students use the code to open up a
long-distance line on a pay phone for 12 straight hours of free calls.

In a phone booth somewhere in the Midwest, a mobster uses the code to make
untraceable calls that bring a shipment of narcotics from South America to the
United States.

The code is actually millions of different personal identification numbers
assigned by the nation's telephone companies.  Fraudulent use of those codes
is now a nationwide epidemic that is costing America's phone companies more
than $500 million each year.

In the end, most of that cost is passed on to consumers, in the form of higher
phone rates, analysts say.

The security codes range form multidigit access codes used by customers of the
many alternative long-distance companies to the "calling card" numbers
assigned by America Telephone & Telegraph and the 22 local phone companies,
such as Pacific Bell.

Most of the loss comes form the activities of computer hackers, said Rene
Dunn, speaking for U.S. Sprint, the third-largest long-distance company.

These technical experts - frequently bright, if socially reclusive, teenagers
- set up their computers to dial the local access telephone number of one of
the alternative long-distance firms, such as MCI and U.S. Sprint.  When the
phone answers, a legitimate customer would normally punch in a secret personal
code, usually five digits, that allows him to make his call.

Hackers, however, have devised computer programs that will keep firing
combinations of numbers until it hits the right combination, much like a
safecracker waiting for the telltale sound of pins and tumblers meshing.

Then the hacker- known in the industry as a "cracker" because he has cracked
the code- has full access to that customer's phone line.

The customer does not realize what has happened until a huge phone bill
arrives at the end of the month. By that time, his access number and personal
code have been tacked up on thousands of electronic bulletin boards throughout
the country, accessible to anyone with a computer, a telephone and a modem,
the device that allows the computer to communicate over telephone lines.

"This is definitely a major problem," said one telephone security expert, who
declined to be identified.  "I've seen one account with a $98,000 monthly
bill."

One Berkeley man has battled the telephone cheats since last fall, when his
MCI bill showed about $100 in long-distance calls he had not made.

Although MCI assured him that the problem would be taken care of, the man's
latest bill was 11 pages long and has $563.40 worth of long-distance calls.
Those calls include:

[]  A two-hour call to Hyattsville, Maryland, on January 22.  A woman who
    answered the Hyattsville phone said she had no idea who called her house.

[]  Repeated calls to a dormitory telephone at UCLA.  The student who answered
    the phone there said she did not know who spent 39 minutes talking to her,
    or her roommate, shortly after midnight on January 23.

[]  Calls to dormitory rooms at Washington State University in Pullman and to
    the University of Colorado in Boulder.  Men who answered the phones there
    professed ignorance of who had called them or of any stolen long-distance
    codes.

The Berkeley customer, who asked not to be identified, said he reached his
frustration limit and canceled his MCI account.

The phone companies are pursing the hackers and other thieves with methods
that try to keep up with a technological monster that is linked by trillions
of miles of telephone lines.

The companies sometimes monitor customers' phone bills.  If a bill that
averages about $40 or $50 a month suddenly soars to several hundred dollars
with calls apparently placed from all over the country on the same day, the
phone company flags the bill and tries to track the source of the calls.

The FBI makes its own surveillance sweeps of electronic bulletin boards,
looking for stolen code numbers.  The phone companies occasionally call up
these boards and post messages, warning that arrest warrants will be coming
soon if the fraudulent practice does not stop.  Reputable bulletin boards post
their own warnings to telephone hackers, telling them to stay out.

Several criminal prosecutions are already in the works, said Jocelyne Calia,
the manager of toll fraud for U.S. Sprint.

If the detectives do not want to talk about their methods, the underground is
equally circumspect.  "If they (the companies) have effective (prevention)
methods, how come all this is still going on?" asked one computer expert, a
veteran hacker who says he went legitimate about 10 years ago.

The computer expert, who identified himself only as Dr. Strange, said he was
part of the original group of electronic wizards of the early 1970s who
devised the "blue boxes" complex instruments that emulate the tones of a
telephone and allowed these early hackers to break into the toll-free 800
system and call all over the world free of charge.

The new hacker bedeviling the phone companies are simply the result of the
"technology changing to one of computers, instead of blue boxes" Dr. Strange
said.  As the "phone company elevates the odds... the bigger a challenge it
becomes," he said.

A feeling of ambivalence toward the huge and largely anonymous phone companies
makes it easier for many people to rationalize their cheating.  A woman in a
Southwestern state who obtained an authorization code from her boyfriend said,
through an intermediary, that she never really thought of telephone fraud as a
"moral issue."  "I don't abuse it," the woman said of her newfound telephone
privilege.  "I don't use it for long periods of time - I never talk for more
than an hour at a time - and I don't give it out to friends."  Besides, she
said, the bills for calls she has been making all over the United States for
the past six weeks go to a "large corporation that I was dissatisfied with.
It's not as if an individual is getting the bills."

There is one place, however, where the phone companies maybe have the upper
hand in their constant war with the hackers and cheats.

In some prisons, said an MCI spokesman, "we've found we can use peer pressure.
Let's say we restrict access to the phones, or even take them out, and there
were a lot of prisoners who weren't abusing the phone system.  So the word
gets spread to those guys about which prisoner it was that caused the
telephones to get taken out.  Once you get the identification (of the
phone-abusing prisoner) out there, I don't think you have to worry much" the
spokesman said.  "There's a justice system in the prisons, too."

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2014, Phrack Magazine.