home *** CD-ROM | disk | FTP | other *** search
-
- Phile 1.9 of 1.14
-
- A notice to All Phreakers
- -------------------------
- Written By - The Jedi
-
-
- In this time and age, phreaking is becoming more and more difficult. I
- can remember a time when there was such an abundance of codes, all you had to
- do was set up your favorite code hacking program and wait a couple of
- minutes.
- There was never a worry about getting busted and people often posted dozens of
- codes at a time. Now that Sprint and MCI are starting to catch on to things by
- extending the length of codes and such, its harder to get them and more
- dangerous if you get caught. Everyone decent phreaker knows this already, its
- no big secret. But, while the art of phreaking hasn't really changed much in
- the past few years, the techniques that these companies are using to catch
- phreakers has! I'm writing this article to warn those who hack out codes
- extensively.
- Working for a Fortress Phone Company does have it's advantages. I've
- managed to read a couple of magazines about fortress phones and the companies
- that use them. I recently stumbled across an article concerning long-distance
- communication fraud entitled "Fraud Prevention- Taking The Offensive". Since
- what I've read in the article was news to me, I figured that a few people out
- there might also be interested.
- It seems that one company has devised a way of disguising good codes
- while
- someone is hacking them in real-time! The following is taken from that
- article:
-
- "We have written software in our DCO-CS [Digital Central Office-Carrier
- Switch] that can detect when one of these hackers is at work by recognizing
- the patterns they frequently use..... Usually a hacker will hit one code,
- two codes, three codes, etc. - they usually follow some sort of pattern".
- "By using their computers to perform a set of mathematical procedures,
- or algorithms, hackers have been able to determine authorized calling
- codes.
- We use the algorithms to figure out what he's dailed so far and then
- determine where he's going next"
- "If he's going to what we know is a good code, then we will make it look
- like a bad code for his call only. If he does hit that good code, he won't
- be able to get through."
- "If he's using a random pattern with his off code, he's probably using
- either the same number he's calling to, which we can monitor by watching
- the successive call to that same number, or we can monitor the fact that
- he's hitting 'x' number of bad off codes in a row."
-
- As of now, the only company that using this method is Sprint but from what
- I see, it's getting popular. 19 People have been arrested recently by
- employing this system.
-
-
- BEWARE:
- -------
-
- 1 - First of all, it'll make good codes look bad - Making every phreaker run
- in circles, never finding a decent code.
- 2 - It works in real-time. That is, you're constantly being monitored.
- 3 - It gives a printout of all the information which CAN BE USED AS EVIDENCE
- IN COURT.
- 4 - While it's not always possible for them to get the originating phone
- number, they sometimes get help from the connecting carrier. Which means
- my friends, the bbs that you're calling to hack to.
-
-
- My Suggestions:
- ---------------
-
- 1 - First of all, make the calls as random as possible. Using a code hacker
- that hacks codes in sequencial order is out of the question!!
- 2 - Don't make too many attempts at one time. The less you hack at a given
- time, the less you are suspected of phreaking.
- 3 - Use multiple extenders and target carriers.
- 4 - Don't use the same good code to often. If you do, at least don't call the
- same place 100 times! The person that owns that code will report the
- activity and they'll catch up with the person you're calling to.
- 5 - Stay away from Sprint. They're really good at this shit, don't mess around
- with them unless you know what you're doing. Try to stick with hacking
- codes from the newer, less sophisticated companies that don't employ this
- system.
-
-
- If you stick to those general rules, you shouldn't have too much trouble.
- Even the company that makes this system [Stromberg-Carlson Co.] admits that
- it's impossible to stop phreaking altogether. Those of you that are new to
- phreaking and stuff like it, educate yourselves BEFORE you dive into it.
- Remember, we're all in this together, if you get busted calling a
- pirate/hack/phreak/anarchy bbs. They'll get a hold of the user list and posts
- and bust everyone on the system. Don't ever rat on anyone!!!
- Well, thats about it for me. Look for my new text files out soon on
- fortress phones.And call...
- <== The Jedi ===>
-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- =
-