| #### PHRACK PRESENTS ISSUE 17 #### | |
| ^*^*^*^ Phrack World News, Part 3 ^*^*^*^ | |
| **** File 12 of 12 **** | |
| +-------------------------------------------------------------------------+ | |
| -[ PHRACK XVII ]----------------------------------------------------------- | |
| "The Code Crackers are Cheating Ma Bell" | |
| Typed by the Sorceress from the San Francisco Chronicle | |
| Edited by the $muggler | |
| The Far Side..........................(415)471-1138 | |
| Underground Communications, Inc.......(415)770-0140 | |
| +-------------------------------------------------------------------------+ | |
| In California prisons, inmates use "the code" to make free telephone calls | |
| lining up everything from gun running jobs to visits from grandma. | |
| In a college dormitory in Tennessee, students use the code to open up a | |
| long-distance line on a pay phone for 12 straight hours of free calls. | |
| In a phone booth somewhere in the Midwest, a mobster uses the code to make | |
| untraceable calls that bring a shipment of narcotics from South America to the | |
| United States. | |
| The code is actually millions of different personal identification numbers | |
| assigned by the nation's telephone companies. Fraudulent use of those codes | |
| is now a nationwide epidemic that is costing America's phone companies more | |
| than $500 million each year. | |
| In the end, most of that cost is passed on to consumers, in the form of higher | |
| phone rates, analysts say. | |
| The security codes range form multidigit access codes used by customers of the | |
| many alternative long-distance companies to the "calling card" numbers | |
| assigned by America Telephone & Telegraph and the 22 local phone companies, | |
| such as Pacific Bell. | |
| Most of the loss comes form the activities of computer hackers, said Rene | |
| Dunn, speaking for U.S. Sprint, the third-largest long-distance company. | |
| These technical experts - frequently bright, if socially reclusive, teenagers | |
| - set up their computers to dial the local access telephone number of one of | |
| the alternative long-distance firms, such as MCI and U.S. Sprint. When the | |
| phone answers, a legitimate customer would normally punch in a secret personal | |
| code, usually five digits, that allows him to make his call. | |
| Hackers, however, have devised computer programs that will keep firing | |
| combinations of numbers until it hits the right combination, much like a | |
| safecracker waiting for the telltale sound of pins and tumblers meshing. | |
| Then the hacker- known in the industry as a "cracker" because he has cracked | |
| the code- has full access to that customer's phone line. | |
| The customer does not realize what has happened until a huge phone bill | |
| arrives at the end of the month. By that time, his access number and personal | |
| code have been tacked up on thousands of electronic bulletin boards throughout | |
| the country, accessible to anyone with a computer, a telephone and a modem, | |
| the device that allows the computer to communicate over telephone lines. | |
| "This is definitely a major problem," said one telephone security expert, who | |
| declined to be identified. "I've seen one account with a $98,000 monthly | |
| bill." | |
| One Berkeley man has battled the telephone cheats since last fall, when his | |
| MCI bill showed about $100 in long-distance calls he had not made. | |
| Although MCI assured him that the problem would be taken care of, the man's | |
| latest bill was 11 pages long and has $563.40 worth of long-distance calls. | |
| Those calls include: | |
| [] A two-hour call to Hyattsville, Maryland, on January 22. A woman who | |
| answered the Hyattsville phone said she had no idea who called her house. | |
| [] Repeated calls to a dormitory telephone at UCLA. The student who answered | |
| the phone there said she did not know who spent 39 minutes talking to her, | |
| or her roommate, shortly after midnight on January 23. | |
| [] Calls to dormitory rooms at Washington State University in Pullman and to | |
| the University of Colorado in Boulder. Men who answered the phones there | |
| professed ignorance of who had called them or of any stolen long-distance | |
| codes. | |
| The Berkeley customer, who asked not to be identified, said he reached his | |
| frustration limit and canceled his MCI account. | |
| The phone companies are pursing the hackers and other thieves with methods | |
| that try to keep up with a technological monster that is linked by trillions | |
| of miles of telephone lines. | |
| The companies sometimes monitor customers' phone bills. If a bill that | |
| averages about $40 or $50 a month suddenly soars to several hundred dollars | |
| with calls apparently placed from all over the country on the same day, the | |
| phone company flags the bill and tries to track the source of the calls. | |
| The FBI makes its own surveillance sweeps of electronic bulletin boards, | |
| looking for stolen code numbers. The phone companies occasionally call up | |
| these boards and post messages, warning that arrest warrants will be coming | |
| soon if the fraudulent practice does not stop. Reputable bulletin boards post | |
| their own warnings to telephone hackers, telling them to stay out. | |
| Several criminal prosecutions are already in the works, said Jocelyne Calia, | |
| the manager of toll fraud for U.S. Sprint. | |
| If the detectives do not want to talk about their methods, the underground is | |
| equally circumspect. "If they (the companies) have effective (prevention) | |
| methods, how come all this is still going on?" asked one computer expert, a | |
| veteran hacker who says he went legitimate about 10 years ago. | |
| The computer expert, who identified himself only as Dr. Strange, said he was | |
| part of the original group of electronic wizards of the early 1970s who | |
| devised the "blue boxes" complex instruments that emulate the tones of a | |
| telephone and allowed these early hackers to break into the toll-free 800 | |
| system and call all over the world free of charge. | |
| The new hacker bedeviling the phone companies are simply the result of the | |
| "technology changing to one of computers, instead of blue boxes" Dr. Strange | |
| said. As the "phone company elevates the odds... the bigger a challenge it | |
| becomes," he said. | |
| A feeling of ambivalence toward the huge and largely anonymous phone companies | |
| makes it easier for many people to rationalize their cheating. A woman in a | |
| Southwestern state who obtained an authorization code from her boyfriend said, | |
| through an intermediary, that she never really thought of telephone fraud as a | |
| "moral issue." "I don't abuse it," the woman said of her newfound telephone | |
| privilege. "I don't use it for long periods of time - I never talk for more | |
| than an hour at a time - and I don't give it out to friends." Besides, she | |
| said, the bills for calls she has been making all over the United States for | |
| the past six weeks go to a "large corporation that I was dissatisfied with. | |
| It's not as if an individual is getting the bills." | |
| There is one place, however, where the phone companies maybe have the upper | |
| hand in their constant war with the hackers and cheats. | |
| In some prisons, said an MCI spokesman, "we've found we can use peer pressure. | |
| Let's say we restrict access to the phones, or even take them out, and there | |
| were a lot of prisoners who weren't abusing the phone system. So the word | |
| gets spread to those guys about which prisoner it was that caused the | |
| telephones to get taken out. Once you get the identification (of the | |
| phone-abusing prisoner) out there, I don't think you have to worry much" the | |
| spokesman said. "There's a justice system in the prisons, too." | |