=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Phile 1.9 of 1.14 A notice to All Phreakers ------------------------- Written By - The Jedi In this time and age, phreaking is becoming more and more difficult. I can remember a time when there was such an abundance of codes, all you had to do was set up your favorite code hacking program and wait a couple of minutes. There was never a worry about getting busted and people often posted dozens of codes at a time. Now that Sprint and MCI are starting to catch on to things by extending the length of codes and such, its harder to get them and more dangerous if you get caught. Everyone decent phreaker knows this already, its no big secret. But, while the art of phreaking hasn't really changed much in the past few years, the techniques that these companies are using to catch phreakers has! I'm writing this article to warn those who hack out codes extensively. Working for a Fortress Phone Company does have it's advantages. I've managed to read a couple of magazines about fortress phones and the companies that use them. I recently stumbled across an article concerning long-distance communication fraud entitled "Fraud Prevention- Taking The Offensive". Since what I've read in the article was news to me, I figured that a few people out there might also be interested. It seems that one company has devised a way of disguising good codes while someone is hacking them in real-time! The following is taken from that article: "We have written software in our DCO-CS [Digital Central Office-Carrier Switch] that can detect when one of these hackers is at work by recognizing the patterns they frequently use..... Usually a hacker will hit one code, two codes, three codes, etc. - they usually follow some sort of pattern". "By using their computers to perform a set of mathematical procedures, or algorithms, hackers have been able to determine authorized calling codes. We use the algorithms to figure out what he's dailed so far and then determine where he's going next" "If he's going to what we know is a good code, then we will make it look like a bad code for his call only. If he does hit that good code, he won't be able to get through." "If he's using a random pattern with his off code, he's probably using either the same number he's calling to, which we can monitor by watching the successive call to that same number, or we can monitor the fact that he's hitting 'x' number of bad off codes in a row." As of now, the only company that using this method is Sprint but from what I see, it's getting popular. 19 People have been arrested recently by employing this system. BEWARE: ------- 1 - First of all, it'll make good codes look bad - Making every phreaker run in circles, never finding a decent code. 2 - It works in real-time. That is, you're constantly being monitored. 3 - It gives a printout of all the information which CAN BE USED AS EVIDENCE IN COURT. 4 - While it's not always possible for them to get the originating phone number, they sometimes get help from the connecting carrier. Which means my friends, the bbs that you're calling to hack to. My Suggestions: --------------- 1 - First of all, make the calls as random as possible. Using a code hacker that hacks codes in sequencial order is out of the question!! 2 - Don't make too many attempts at one time. The less you hack at a given time, the less you are suspected of phreaking. 3 - Use multiple extenders and target carriers. 4 - Don't use the same good code to often. If you do, at least don't call the same place 100 times! The person that owns that code will report the activity and they'll catch up with the person you're calling to. 5 - Stay away from Sprint. They're really good at this shit, don't mess around with them unless you know what you're doing. Try to stick with hacking codes from the newer, less sophisticated companies that don't employ this system. If you stick to those general rules, you shouldn't have too much trouble. Even the company that makes this system [Stromberg-Carlson Co.] admits that it's impossible to stop phreaking altogether. Those of you that are new to phreaking and stuff like it, educate yourselves BEFORE you dive into it. Remember, we're all in this together, if you get busted calling a pirate/hack/phreak/anarchy bbs. They'll get a hold of the user list and posts and bust everyone on the system. Don't ever rat on anyone!!! Well, thats about it for me. Look for my new text files out soon on fortress phones.And call... <== The Jedi ===> =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-