home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Unsorted BBS Collection
/
thegreatunsorted.tar
/
thegreatunsorted
/
texts
/
cell_nfo
/
upt.001
< prev
next >
Wrap
Text File
|
2001-02-10
|
5KB
|
92 lines
Unphamiliar Territory and its users present...
Frequently Asked Questions about CELLULAR/RADIO TECHNOLOGY
This 'magazine' is taken from posts on Forum 5 at Unphamiliar Territory and
is the property of the poster and the sysop, Invalid Media. Although not
much information is in this textfile, it does have some of the answers to
many of the questions people had/have about cellular phreaking.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
From Bootleg:
OK-to really get cellular phreaking off the ground, what we need to do
is start a library of software from the eproms of each cellular model
in existance. Anybody with access to an eprom burner should read their
cellulars (OK - Maybe not THEIR cellular, someone elses. hehe) eprom
& up the file along with the make,model, & any other pertinent info.
That will give the programming wizards here a chance to reprogram the
file. Shouldn't take long once we start as more & more people will want
on the bandwagon.
Nuff Said,
Bootleg
-----------------------------------------------------------------------------
From Digital Hitler:
cloning:
copying an active cell phone's esn/min/nam info into another cell phone, thus
using that phone's info for about a months worth of phone usage.
tumbler phone:
cell phone that is modified to watch other cell phones, thus constantly
copying hundreds of esn/min/nam info into an internal memory bank. every time
the phone is used, it pulls a valid esn out of the internal memory, then uses
that esn for one phone call. after the call is completed, it discards the esn
and goes to the next one. there are many variations on this theme, but that
is the basic one...
-----------------------------------------------------------------------------
From Video Vindicator:
DH was right about the differences, so I really won't go into that.. The main
thing I one to point out is theat the phones don't need to be the same model.
Since you are reprogreamming the NAME -AND- ESN you can make the cell-site
believe the phone is from any manufacture you want. As for the Tumbler, it
is simply spitting out what it captures on the reverse control channel, so
calls made are spread across shitloads of cellular customers... Making it a
total nightmare to stop. I was talking to one of my fiends in GTE's mobile
security division, and he told me that they have only caught one person for
making a phone like that and he was selling them for 200,000! Kinda pricy,
and they were not even true tumbler phones, since they only changed the NAM
(from the forward control channel). Kinda easy to track down a phone that
uses the same ESN and different NAM's. Anyways, even if this was a rampant
abuse (whichit is not to my knowledge), they would downplay it as much as
possible.
One other avenue open to reprogramming is to use the settings of a test
phone or a company employee's pair, since the carrier usually pays for this
phones calls. An example of this is I was scanning reverse channels the
other day and captured one that was like 123-123-1234 for the phone number,
and then a standard NAM... At first I thought this must be an error, but the
same phone continued to make several more calls in my area, thus verifying
the information I had received. After consulting with my friend I discovered
this is what is refered to as a '0 cycle account', or one that the billing in
not recorded on.... Very interesting. From what I was able to gather, all 0
cycle accounts are strange numbers like that, althoug h they still recieve
calls as a normal phone can and do have a normal dial-in number.
The easiest way to find these would be to monitor the forward control
channel, and use a wardialer on the cellular prefix you were interested in,
then as it makes requests for the cell to respond you would see a different
number from the one you dialed on the 0 cycle account....
-----------------------------------------------------------------------------
From: Capt. Zap
As to the security of cellular phones, there is none. But now at&t is
offering a new voice encryption unit for the phones to cut down on the
monitoring of the calls. Fat chance, with all the other units out there that
do not have the encryption feature, it should be 5 years before they make a
real impact on thoses of us who listen to the calls. They claim that the
units will use a DES for the voice, well thats been blown to hell anyway, and
there should be no problem. The one thing that will really piss off law
enforcement is the fact that all the dealers out there will now have them.
-----------------------------------------------------------------------------
Editorial Comments:
Although this isn't a release I would like to share a few of the comments
posted on this field of the underground with the rest of the crowd. For a
good start I would recommend reading Bootleg's fairly long (and somewhat
repetitious) textfile that he passed out at HoHoCon'93. If you were fortunate
enough to go to this meeting then you have it on disk but if not then it can
be grabbed as FREECELL.ZIP on many of the better underground boards.
-----------------------------------------------------------------------------
eof - upt001