text stringlengths 0 1.99k |
|---|
In a phone booth somewhere in the Midwest, a mobster uses the code to make |
untraceable calls that bring a shipment of narcotics from South America to the |
United States. |
The code is actually millions of different personal identification numbers |
assigned by the nation's telephone companies. Fraudulent use of those codes |
is now a nationwide epidemic that is costing America's phone companies more |
than $500 million each year. |
In the end, most of that cost is passed on to consumers, in the form of higher |
phone rates, analysts say. |
The security codes range form multidigit access codes used by customers of the |
many alternative long-distance companies to the "calling card" numbers |
assigned by America Telephone & Telegraph and the 22 local phone companies, |
such as Pacific Bell. |
Most of the loss comes form the activities of computer hackers, said Rene |
Dunn, speaking for U.S. Sprint, the third-largest long-distance company. |
These technical experts - frequently bright, if socially reclusive, teenagers |
- set up their computers to dial the local access telephone number of one of |
the alternative long-distance firms, such as MCI and U.S. Sprint. When the |
phone answers, a legitimate customer would normally punch in a secret personal |
code, usually five digits, that allows him to make his call. |
Hackers, however, have devised computer programs that will keep firing |
combinations of numbers until it hits the right combination, much like a |
safecracker waiting for the telltale sound of pins and tumblers meshing. |
Then the hacker- known in the industry as a "cracker" because he has cracked |
the code- has full access to that customer's phone line. |
The customer does not realize what has happened until a huge phone bill |
arrives at the end of the month. By that time, his access number and personal |
code have been tacked up on thousands of electronic bulletin boards throughout |
the country, accessible to anyone with a computer, a telephone and a modem, |
the device that allows the computer to communicate over telephone lines. |
"This is definitely a major problem," said one telephone security expert, who |
declined to be identified. "I've seen one account with a $98,000 monthly |
bill." |
One Berkeley man has battled the telephone cheats since last fall, when his |
MCI bill showed about $100 in long-distance calls he had not made. |
Although MCI assured him that the problem would be taken care of, the man's |
latest bill was 11 pages long and has $563.40 worth of long-distance calls. |
Those calls include: |
[] A two-hour call to Hyattsville, Maryland, on January 22. A woman who |
answered the Hyattsville phone said she had no idea who called her house. |
[] Repeated calls to a dormitory telephone at UCLA. The student who answered |
the phone there said she did not know who spent 39 minutes talking to her, |
or her roommate, shortly after midnight on January 23. |
[] Calls to dormitory rooms at Washington State University in Pullman and to |
the University of Colorado in Boulder. Men who answered the phones there |
professed ignorance of who had called them or of any stolen long-distance |
codes. |
The Berkeley customer, who asked not to be identified, said he reached his |
frustration limit and canceled his MCI account. |
The phone companies are pursing the hackers and other thieves with methods |
that try to keep up with a technological monster that is linked by trillions |
of miles of telephone lines. |
The companies sometimes monitor customers' phone bills. If a bill that |
averages about $40 or $50 a month suddenly soars to several hundred dollars |
with calls apparently placed from all over the country on the same day, the |
phone company flags the bill and tries to track the source of the calls. |
The FBI makes its own surveillance sweeps of electronic bulletin boards, |
looking for stolen code numbers. The phone companies occasionally call up |
these boards and post messages, warning that arrest warrants will be coming |
soon if the fraudulent practice does not stop. Reputable bulletin boards post |
their own warnings to telephone hackers, telling them to stay out. |
Several criminal prosecutions are already in the works, said Jocelyne Calia, |
the manager of toll fraud for U.S. Sprint. |
If the detectives do not want to talk about their methods, the underground is |
equally circumspect. "If they (the companies) have effective (prevention) |
methods, how come all this is still going on?" asked one computer expert, a |
veteran hacker who says he went legitimate about 10 years ago. |
The computer expert, who identified himself only as Dr. Strange, said he was |
part of the original group of electronic wizards of the early 1970s who |
devised the "blue boxes" complex instruments that emulate the tones of a |
telephone and allowed these early hackers to break into the toll-free 800 |
system and call all over the world free of charge. |
The new hacker bedeviling the phone companies are simply the result of the |
"technology changing to one of computers, instead of blue boxes" Dr. Strange |
said. As the "phone company elevates the odds... the bigger a challenge it |
becomes," he said. |
A feeling of ambivalence toward the huge and largely anonymous phone companies |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.