home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!think.com!ames!lll-winken!telecom-request
- From: stevef@wrq.com (Steve Forrette)
- Newsgroups: comp.dcom.telecom
- Subject: Re: Cellular Scam
- Message-ID: <telecom12.849.4@eecs.nwu.edu>
- Date: 15 Nov 92 21:26:43 GMT
- Sender: Telecom@eecs.nwu.edu
- Organization: Walker Richer & Quinn, Inc., Seattle, WA
- Lines: 19
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 12, Issue 849, Message 4 of 13
-
- In article <telecom12.824.4@eecs.nwu.edu> MPA15AB!RANDY@TRENGA.
- tredydev.unisys.com writes:
-
- > The {L.A. Times} reported that a "hacker" probably sold the serial and
- > phone number combination for a freeway call box to a ring which used
- > it to make 11,733 calls charged to the one phone.
-
- > "I don't think we can tell you what we did to fix it because we don't
- > want it to happen again," a county sokesman said with a laugh.
-
- The fix is pretty obvious, at least if they fixed it properly: They
- did what should have been done in the first place -- flag the call box
- numbers with a special class-of-service that can only call the Highway
- Patrol numbers. Then even if you spoof your phone to match a call
- box's MIN and ESN, it won't do you any good.
-
-
- Steve Forrette, stevef@wrq.com
-