320 lines
18 KiB
Plaintext
320 lines
18 KiB
Plaintext
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
||
< >
|
||
< The United Phreaker's Incorporated Proudly Presents >
|
||
< >
|
||
< The Phreaker's Bag Of High Tech Tricks >
|
||
< >
|
||
< By: The Lost Avenger >
|
||
< >
|
||
< An Upi Production 1990 >
|
||
< >
|
||
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
||
|
||
Reprinted In File Form On January 17, 1990
|
||
|
||
Orignally Publised In Toronto Star Sunday January 7, 1990
|
||
|
||
===============================================================================
|
||
|
||
PIRATES RING UP MILLIONS IN ILLEGAL CALLS
|
||
By Leslie Papp
|
||
TORONTO STAR
|
||
|
||
A New breed of pirate is plundering Canadian companies armed with a
|
||
telephone instead of a cutlass.
|
||
They're called "fone phreakers" the telephone equivalent of computer
|
||
hackers and they're costing companies millions of dollars.
|
||
Phreakers charged $1 millions worth of illegal calls to Toronto's
|
||
Call-Net Telecommunications Ltd., a private telephone network, over a six month
|
||
period last year.
|
||
And Call-Net isn't their only victimm.
|
||
A Metro finacial services company was hit for $30,000 in a single day,
|
||
telecommunications security sources said. A travel business recently lost
|
||
$100,000 in illegal calls and a major entertainment company was stung for
|
||
$100,000 over about three months.
|
||
"It becomes pretty mind boggling" says Jack Cloutte, head of Bell
|
||
Canada security in Ontario.
|
||
"More than 100 cases of suspected telephone fraud go to his department
|
||
monthly. And that's only a fraction of the actual abuse going on.
|
||
"It's A big concern of ours." Cloutte said, nothing that Bell is a
|
||
frequent victim.
|
||
Phreaker's have repeatedly palnted listening devices in the company's
|
||
vital Adelaide Street switiching center, seeking access to secret Bell Canada
|
||
codes and other data, he said.
|
||
Although new technology is being developed to make it harder to raid
|
||
telephone networks, phreaker's remain a step ahead of the authorities, he
|
||
admitted.
|
||
Canada has thousands of fone phreakers, ranging from clumsy tennages to
|
||
experts with years of experience. And they boast a long list of shady
|
||
successes, including:
|
||
|
||
o Unauthorized use of companies' long distance services to reach
|
||
friends anywhere in the world.
|
||
|
||
o Free calls with homemade electronic "boxes" that beam signals along a
|
||
phone line to fool Bell Canada operators and equipment.
|
||
|
||
o Use of telephone company test loops as a phreaker chat line.
|
||
|
||
o Eavesdropping on private messages of executives and lawyers after
|
||
cracking the code of their voice mailboxes, answering machines that
|
||
play messages back over the telephone.
|
||
|
||
o Listening to the cellukar phone conversations of insuspecting
|
||
business people.
|
||
|
||
o Tapping telephone wires leading into a company to obtain codes for
|
||
voice mailboxes and long distance services.
|
||
|
||
o Charging conversations to calling card numbers obtained by fraud.
|
||
|
||
"The amount of abuse is well beyond what we expected," said Sergeant
|
||
Val King, head of the RCMP's computer and telecommunications crime section in
|
||
Ottawa. Oftern companies being defrauded dob't even know they're victims. And
|
||
telephone raiders are proving extremely difficult to catch.
|
||
"They're have so many mehtods of covering their trail," King lamented.
|
||
"They're can jump through 50 different (telephone) systems before they access
|
||
the one next door."
|
||
Phreakers are formidable opponents, agreed Ros Morley owner of
|
||
Commmunications Systems, a Toronto telecommunications consulting firm.
|
||
"Some of the kids doing this are 14 to 16 years old," he said. "They
|
||
start working with computers in Grade 2 and they're building computers by Grade
|
||
6.
|
||
"They're practically electrically engineers when they reach Grade 10."
|
||
Older than most is the Wizard, a Toronto phreaker who boasts about
|
||
$2,000 in unpayed bills every month.
|
||
"I'm screwing Ma Bell out of her money," the Wizard notes with pride.
|
||
"That's the glory of it. That what unifies phreakers."
|
||
In his mid 20's, but looking younger in a paisley tie and dapper pale
|
||
gray suit, The Wizard said he's been phreaking for about eight years.
|
||
|
||
Inside Information
|
||
|
||
"It's just a knowledge thing," he said, adjusting his glasses. "The
|
||
whole thrill is manipulating Bell to do what you want."
|
||
Having inside information is a big help in cracking phone systems.
|
||
And salting Bell Canada with listening devices is one way to get useful
|
||
secrets, he said.
|
||
Posing as electrical engineering students, several ohreakers, himslef
|
||
included, have taken tours of Bell's main Adelaide St. switching center, he
|
||
said. and they planted miniature microphones, wired to tiny transmitters
|
||
broadcasting on a high end FM frequency.
|
||
"You just take a tour and drop a bug." the Wizard said. "Then you
|
||
listen across the street, on a Walkman, as the technicians user their codes."
|
||
Now the Adelaide St. center is electronically "swept" for bugs on a
|
||
routine basis, he said. "If we didn't learn from history we'd have to have our
|
||
heads read."
|
||
Bell recognizes phreaking as a serious problem, Cloutte sais, but most
|
||
businesses don't know how exposed they are to a phone line invasion.
|
||
Call-Net was badly burned, said the firm's president Mike Kedar, adding
|
||
he opposed publication of new that $1 million in illegal calls was charged to
|
||
the company.
|
||
"It's nobody's business," he said. "We had to pay for it. It's over
|
||
and done."
|
||
Silence is the best response to fone phreaking, Kedar said. "It's a
|
||
story that should not be told."
|
||
Consultant Morley said that sttitude is widespread among firms that
|
||
have been stung.
|
||
"A lot of these companies are just plain embarrassed," he said. "And
|
||
corporations that haven't experienced (a phreaker raid) don't believe it can
|
||
happen."
|
||
|
||
Not Noticed
|
||
|
||
Large businesses, with six figure monthly phone bills, ofter don't
|
||
notice when phreakers add a few thousand dollars to the telephone tab, said
|
||
King of The Royal Canadian Mounted Police.
|
||
Sergeant Dave Hodgson of the Metro police fraud squad has specialized
|
||
in computer and telephone communications crime since last spring and has
|
||
investigated about 10 cases.
|
||
How many resulted in charges?
|
||
"None," he said with a bitter laugh. "As far as getting anything for
|
||
court, you're just blowing again the wind."
|
||
Bell Canada does better than police in nabbing phreakers, Cloutte said.
|
||
The company's Ontario Investigator, Walter Heapy, handles about six cases
|
||
monthly. And almost all result in criminal charges, civil charges or an out of
|
||
court settlement.
|
||
"There's always an electronic trail." said Heapy. "A call can always
|
||
be traced back to its orgins. It's a function of time."
|
||
Heapy's most publicized case was the conviction of Leslie Lynee
|
||
Doucette, 35, formerly of Toronto, in 1987. She was arrested in her Rhodes
|
||
Avenue home after stealing $12,211 worth of long distance call over a two month
|
||
period.
|
||
She was again charged last May, after being arrested by U.S. federal
|
||
agents in Chicago in connection with a conspiracy involving dozens of phreakers
|
||
and as much stealing $1.8 million worth of long distance calls over a two month
|
||
period.
|
||
But the possibility of arrest doesn't worry the Wizard.
|
||
"The ones they catch are kids who don't know what's going on," he said,
|
||
"I know what I'm doing. if I'm doing anything slightly risky I'll use a pay
|
||
phone or a string of numbers it can only be traced back so far."
|
||
|
||
===============================================================================
|
||
|
||
THE PHREAKERS' BAG OF HIGH-TECH TRICKS
|
||
By Leslie Papp
|
||
TORONTO STAR
|
||
|
||
How do they do it?
|
||
How do teenages crack sophisticated telecommunications networks, steal
|
||
missions worth of long distance calls and escape scot-free?
|
||
One secret is a big bad of hightech tricks shared by "fone phreakers"
|
||
across North America And Europe.
|
||
It provides basic weapons and strategics used to attack telephone
|
||
systems. In the hands of a phreaker with special genius, these tricks can be
|
||
used to invade virtually any phone networks, experts say.
|
||
"Eventually, any system can be cracked," noted Corporal Brian Binnie,
|
||
the RCMP's telecommunications fraud expert in Toronto. "If you have a phone
|
||
line you're vulnerable."
|
||
Businesses risk huge telephone charges when a phreakerpenetrates their
|
||
in house communications network and plunders long distance calls.
|
||
It's complicated, but here's how it's done:
|
||
Many firms operate WATS lines, or 1-800 numbers, allowing staff to dial
|
||
long distance calls automatically billed to the company. Often there are two
|
||
such line: an INWATS paying for calls going into the office, and an OUTWATS,
|
||
covering calls going out.
|
||
|
||
Electronic Pipeline
|
||
|
||
With such systems, exectives can make long distance calls from anywhere
|
||
in the the world by dialing the INWATS number and punching in a code
|
||
automatically passing them to the OUTWATS.
|
||
Phreakers call this set up an "extender," says the Wizard, a
|
||
telecommunications pirate with eight years of experience. "They're real
|
||
treasures. You call a 1-800 number and punch in the code - usually seven
|
||
digits - and then you dial anywhere in the world."
|
||
Codes can be broken with a "demon dialler," a computer trying number
|
||
after number on the target system until it finds and records the right one, he
|
||
said.
|
||
Homemade wiretaps also prove helpful, the Wizard noted, pulling one
|
||
from his pocket.
|
||
Phreakers like to link extender, using one to reach another creating a
|
||
pipeline of illegal calls streacting through several countries before reaching
|
||
the person they want.
|
||
|
||
Basic Weapon
|
||
|
||
"The longer the trail you set the harder it is them to get you," the
|
||
Wizard said.
|
||
Cracked codes are shared and often listed on computer bulletin boards
|
||
around the world. That results in a deluge of long distance charges within a
|
||
few days or weeks, sometimes totaling hundreds of thousands of dollars or more.
|
||
Electronic "boxes" are another basic weapon in a phreaker's armory.
|
||
Scores of these have been developed, said Ross Morley, head of a Toronto
|
||
telecommunications consulting firm. All generate signals to mislead phone
|
||
companies and include the:
|
||
|
||
o "Red Box." It creates the electronics pulses that an operator hears
|
||
when change is loaded into a pay phone.
|
||
|
||
o "Blue Box." It signals Bell Canada that a call is finshed stopping
|
||
charges even though a phreaker's is still on the line.
|
||
|
||
o "Black Box." It emits an electronic pulse telling Bell equipment
|
||
that a call did not go through, even though it really did.
|
||
|
||
Countermeasures haven been developed to foil blue and black boxes, said
|
||
Jack Cloutte, head of Bell Canada security in Ontario.
|
||
Butt these defences are not used everywhere.
|
||
"There are a ton of other boxes," Morley notes. "Phreakers come up
|
||
with them faster than the phone company can counter them."
|
||
Telephone test loops are another phreakers target, Cloutte said. These
|
||
are reached through two numbers used by Bell lineman to test phone circuits.
|
||
Callers dialing one test loop numbers can speak free of charge to anyone
|
||
dialing the other.
|
||
"We do have a means of preventing that," said Walter heapy, one of
|
||
Bell's top investigators. "But the door's not always closed."
|
||
Another door left leads to exectives' voice, or electronic, mailboxes,
|
||
the Wizard said.
|
||
To demostrate, he picked up a phone and quickly punched in a telephone
|
||
number and four digit code.
|
||
At the receiving end, the answering machine of a multinational
|
||
accounting firm's vice president played back confidential message of its owner.
|
||
Nothing much there this time the Wizard said with a disappointed sniff.
|
||
Just a few appointments scheduled and a meeting cancelled.
|
||
But a few months ago there was news of a company merger, he said. "We
|
||
know about it before it hit the papers."
|
||
Voice mailbox codes are easy to "hack out" he noted. Oftern they're
|
||
obvious, based on the owner's name, or run in an easy to remember series like
|
||
1-2-3-4.
|
||
Business secrets also leak to phreakers through cellular phones, the
|
||
Wizard said.
|
||
|
||
Calling Cards
|
||
|
||
A cellular message is really a radio transmission that is easily picked
|
||
up with a scanner. A phreaker can eavesdrop on long sections of conversations,
|
||
especially in a central Toronto location at rush hour, when traffic is slow,
|
||
he said.
|
||
"I've heard brokers talking about stock tips." the Wizard chuckled.
|
||
"There guys don't know how easy it is to listen in. They talk about what
|
||
mergers are coming up, and so on.
|
||
Phreakers, however must weed through a jungle of 823 frequencies used
|
||
by cellular companies. As a caller travels, the conversation is constantly
|
||
switched to a different frequency, usually allowing an eavesdropper to hear
|
||
only bits of a message.
|
||
Phreakers can overcome this problem with a device that can track a
|
||
specific call as it is passed from one frequency to another.
|
||
Among the simplest of phreaker scams is misuse of calling card numbers.
|
||
Card numbers are easily obtained, sometimes by peaking over a user's
|
||
shoulder at a busy location, like an airport.
|
||
Once taken, numbers are listed on computer bulletin boards. That
|
||
results in long distance charges far excess of a card's allowable limite as it
|
||
is used simultaneously by phreakers in the United States, Canada and Europe,
|
||
Cloutte said.
|
||
International data bases, used by major credit card companies to keep
|
||
track of stolen numbers, do not yet exist for calling cards, he said.
|
||
"All countries aren't in one pool," he said.
|
||
|
||
===============================================================================
|
||
|
||
CULPRITIS GET A THRILL IN SNUBBING AUTHORITY
|
||
By Leslie Papp
|
||
TORONTO STAR
|
||
|
||
Youth, electronics genius and an obsessive need to thumb a nose at
|
||
authority bind "fone phreakers" throughout North America and Europe, expects
|
||
say.
|
||
"It's almost like a disease," said Jack Cloutte, head of Bell Canada
|
||
security in Ontario. "It can be addictive.
|
||
Computer and electronics whiz kids get a deep psychological thrill out
|
||
of stealing telecommunications (Yeah right, I phreak because I get my jolies
|
||
out of doing it, yeah right! If the fucking cost of calling long distance
|
||
were lower they wouldn't have such a problem! -Tla), he said. It is a way of
|
||
realizing a Dungeons And Dragons style fantasy, matching their powers against
|
||
police and Bell investigators in a secret battle of wits.
|
||
"Some are good," Cloutte said with a hint of admiration. But most are
|
||
not quite normal.
|
||
"A lot of people into this are kind of strange," (Ok, this is another
|
||
stupid statement said made by this guy. He's starting to piss me off! -Tla)
|
||
he said. They're very bright, but somehow out of sync with society.
|
||
"They get a charge of beating the system. You can compare it to an
|
||
athlete who gets a charge out of winning a big game." Cloutte said.
|
||
"It can be become a real obsession. Sometimes they can't stop."
|
||
Most phreakers don't see themselves as criminals. Usually they gain no
|
||
profit from what they do and consider their invasions a game of high tech hide
|
||
and seek, hurting only Bell and fat cat corporations.
|
||
But phreakers aren't simply pranksters, said John Kuhn, a CNCP
|
||
Telecommunications strategic planner.
|
||
They are twisted individuals, he said. "There's a criminal element to
|
||
their psyche making them want to wreck something that's orderly." (Oh no, this
|
||
guy is stupid he doesn't know a slightest thing why we are doing it. I think
|
||
Bell and the other corporations deserve to get ripped! -Tla)
|
||
|
||
You may distrubute this file freely but may not change any part of this file in
|
||
whole or part without the written or verbal concent of the author.
|
||
|
||
===============================================================================
|
||
Call These Great Upi Boards!
|
||
===============================================================================
|
||
Node Number Board Name Sysop Baud
|
||
===============================================================================
|
||
Hq 416-Upi-Home The Northern Phreaker's Alliance The Lost Avenger 12/24
|
||
1 416-Upi-Nde1 The Shining Realm FrosT BitE 12/24
|
||
2 514-Upi-Nde2 The Order Of Kamikaze Tomcat 12/24
|
||
===============================================================================
|
||
01-17-90/001 Copywrite 1990 By The Lost Avenger-All Rights Reserved
|
||
|
||
|
||
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+
|