About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Phone Phreak Bugs FBI

by Scanman


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

JOHN "CAPTAIN CRUNCH" DRAPER THREE TIME CONVICTED PHONE PHREAK (FRAUD BY WIRE) DISCOVERED WHAT MAY BE THE ULTIMATE PHONE TAPPING METHOD.

"I KNEW THE PHONE COMPANY UTILIZED AN AUTOMATIC VERIFICATION IN MANY AREAS, THIS ALLOWED THE OPERATORS TO GO ACROSS (LISTEN IN) ON ANY LINE IN THEIR AREA TO SEE IF IT WAS IN USE OR OUT OF SERVICE. THERE WAS A SHORT TIME LIMIT WHICH AUTOMATICALLY DISCONNECTED THE OPERATOR AFTER USING THE PROCEDURE.

SOME YEARS AGO I FIGURED OUT HOW TO ACCESS THE AUTO-VERIFY SYSTEM WITH A BLUE BOX, BYPASSING THE HUMAN OPERATOR. THIS WAS POSSIBLE BECAUSE THE PHONE COMPANY HAD INSTALLED A COMMON VERIFY TRUNK THROUGH A NUMBER OF LOCAL TOLL CENTERS.

I DISCOVERED I COULD ACCESS THIS TRUNK BY DIALING A SEVEN DIGIT NUMBER AND THEN A THREE DIGIT ACCESS CODE (WITH THE BLUE BOX). THIS WOULD CONNECT ME TO ANY PHONE LINE FOR AS LONG AS I CHOOSE TO STAY ON THE WIRE. THIS SAME PROCEDURE WAS USED BY TELCO TO VERIFY FOR CONVERSATION AND "CHECK FOR TROUBLE ON THE LINE" A EUPHEMISM FOR LISTENING IN ON AN INTERESTING LINE.

THE IMPLICATIONS OF THIS WERE STAGGERING. I LISTENED TO THE LOCAL FBI'S PRIVATE LINES, THE LOCAL ATTORNEY GENERAL, THE LOCAL CIA, AND EVEN PHONE COMPANY SECURITY AGENTS. AFTER A WHILE THE AUTO VERIFY SYSTEM WOULD ONLY CONNECT TO EACH LINE FOR A SHORT WHILE, BUT I COULD OVERRIDE THIS PROBLEM BY SHOVING A 2600 HZ TONE DOWN THE LINE."

JOHN WAS EVENTUALLY BUSTED BY FBI AGENTS TAPPING HIS PHONE, WHO WERE WELL, SURPRISED TO HEAR THEIR OWN CONVERSATIONS ON JOHN'S LINE! THEY CAME THROUGH THE DOOR AT 2:00 AM ONE MORNING TO HAVE A LITTLE CHAT WITH JOHN ABOUT HIS UNUSUAL TALENT...

WHAT DID THEY TALK ABOUT ON THEIR "SECURE PRIVATE LINES"? "MOSTLY THEIR GOLF GAMES AND THEIR WIVES" WAS JOHN'S COMMENT TO A LOCAL NEWSPAPER.

THE AUTO VERIFY CONCEPT HAS SINCE BEEN PHASED OUT IN MOST AREAS, BUT THE IDEA OF THE PHONE COMPANY INSTALLING AN AUTOMATIC TAP FOR ANY LINE IN THEIR SYSTEM, FROM ANY PHONE IN THEIR SYSTEM, IS A STARTLING ONE INDEED...

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
anyone familiar with ms secure?
how do i hide files in to jpeg
FTP Attackers...
cable tv question
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS