Phone System
Alpha Version - Computer and Society -
IKI40000
Abstract
Computers and the Internet can offer great benefits to society. However they can also present
opportunities for crime, much of it just traditional crime using new technology tools. Most people has
known or familiar to computer crime such as Hacking and Cracking. Just as hacking, phone phreaking
became a word meaning "Using computers for evil purposes" and eventually "any evil use of
technology". Phone phreak known as phreaker, a hacker of the telephone system. A phreak, (or a
phreaker) is someone who wants to learn about the telephone system. A phreaker explores the telephone
system. Some are just electronic voyagers who want to understand how telecom structure works. Others
exploit vulnerabilities in the system to get free long-distance service, re-route calls, change phone
numbers, or eavesdrop on conversations [7]. This digital product describes the phreaking activities which
attack vulnerabilities of phone system.At the beginning, explained about definition of phreaking and its
history. Through of this digital paper you can open your mind about phreaking, how to do it, who did it,
why its illegal, the impact of it and other information about it. This paper also explains how to avoid this
kind of attack to your phone system whether your home phone or celular phone. You will be aware about
this phreaking thing, before somebody or anybody that you know be attacked.
1. Introduction
Most people has known or familiar to computer crime such as Hacking and Cracking. Hacking is known
as an act of penetrating computer systems to gain knowledge about the system and how it works [4]. This
activity is illegal because it demands free access to all data, in order to get it. Cracking is a serious form
of hacking, the cracker has intention to damage the system or destroy data. This activity may cause
considerable or even irreparable damage for the victim. But Hacking and cracking are not only attacking
computer system, there is another crime that attack phone system that is known by phreaking. Phreaking
can be described as using a computer or other device to trick a phone system. Typically, phreaking is
used to make free calls or to have calls charged to a different account.
Just as hacking, phone phreaking became a word meaning "Using computers for evil purposes" and
eventually "any evil use of technology". Phone phreak known as phreak, a hacker of the telephone
system. A phreak, (or a phraker) is someone who wants to learn about the telephone system. Some
people who claim to be phreaks are thieves who do nothing but rip off long distance service. They use
mischievous and mostly illegal ways in order to not pay for some sort of telecommunications bill, order,
transfer, or other service. It often involves usage of highly illegal boxes and machines in order to defeat
1
Phreaking, The Nightmare For The Phone System
the security that is set pu to avoid this sort of happening. The cellular/ mobile phone system is one that is
perfectly set up to be exploited by phreaks with the proper knowledge and equipment. Phreaks can attack
cellular phone in three general areas; using that in an unlocked car (or an unattended walk-about model),
modifying the chip set to look like a different phone, or recording the phone number/ID number
combinations sent by other local cellular phones, and using it.
2
Phreaking, The Nightmare For The Phone System
backs of cars, which move from cell to cell in the local phone system, retailing stolen long-distance
service, like some kind of demented electronic version of the neighborhood ice-cream truck.
3.4. Others
Cellular phone-calls, cordless phones, and ship-to- shore telephony can all be monitored by various
forms of radio. This kind of passive monitoring is spreading explosively today. Technically
eavesdropping on other people’s cordless and cellular phone-calls is the fastest- growing area in
phreaking today. This practice strongly appeals to the lust for power and conveys gratifying sensations of
technical superiority over the eavesdropping victim. Monitoring is rife with all manner of tempting evil
mischief. Simple prurient snooping is by far the most common activity. But credit-card numbers
unwarily spoken over the phone can be recorded, stolen and used. And tapping people’s phone-calls
(whether through active telephone taps or passive radio monitors) does lend itself conveniently to
activities like blackmail, industrial espionage, and political dirty tricks.
It should be repeated that telecommunications fraud, the theft of phone service, causes vastly greater
monetary losses than the practice of entering into computers by stealth.
3
Phreaking, The Nightmare For The Phone System
4. How It Works
4.2. Boxes
These are boxes that take advantage of holes in the phone system [1]:
• Black Box: Makes it seem to the phone company that the phone was never picked up.
• Blue Box: Emits a 2600hz tone that allows someone to do such thing as stack a trunk line, kick the
operator off line, and others.
• Red Box: Simulates the noise of a quarter, nickel, or dime being dropped into a payphone.
• Cheese Box: Turns home phone into a pay phone to throw off traces (a red box is usually needed in
order to call out.)
• Clear Box: Gives a dial tone on some of the old SxS payphones without putting in a coin. into phone
lines and extract by eavesdropping, or crossing wires, etc.
• Beige Box - Basically the way to connect in to someone else’s phone line from anywhere that you can
get to the wires. People used these to eavesdrop, or to run up other peoples bills. Others were done like
calling and harassing operators (from other peoples phones) to get their phones shut off.
• Purple Box: Makes all calls made out from our house seem to be local calls.
The most easy box and practical box is the beige box.
4.3. ANI
This stands for Automatic Number Identification. This is a number that ussually dialed and it tells what
line someone are on. It is very useful when messing around in a can. Because the phone lines are not
labeled.
4
Phreaking, The Nightmare For The Phone System
much voltage is on the line, if it is below 48 volts then it knows that person are talking to someone else.
If it detects 48 volts then it sends a voltage charge down the line(this makes the bell ring)[1]. One box
called the Black Box was very useful. It was just a resistor connected to the phone. When someone
called, they would be connected to our line and the ringing they heard was actually ours. When we
picked up the phone the voltage dropped below the 48 volts and the ringing stopped. What the resistor
did was not let the voltage drop far enough. The phone would still ring (all we had to do was turn the
ringer off) because the phone company thought we hadn’t picked up the phone yet. But since the phone
company connected the person to our line before we even picked up, we could talk to the person and the
phone company still thought that the phone was ringing so nobody would get billed. This no longer
works because the phone company made it so that the caller is not connected until the voltage reaches the
correct point. So there is not known a way to get around this anymore. Today the ring we hear is just a
simulated sound that the phone company sends down our line. If we have our hands touching the green
and red wires when someone calls that line we will get a little shock.
5. Tehnique
Below is phreaking tricks that ussually done in America and UK :
1. Using one that found in an unlocked car or an unattended walk about model
2. Modifying the chip set to look like a different phone
5
Phreaking, The Nightmare For The Phone System
3. Recording the phone number or ID number combinations sent by other local cellular phones, and
using those as our own.
Most cellular phones include a crude "password" system to keep unauthorized users from using the
phone - however, dealers often set the password (usually a 3 to 5 digit code) to the last four digits of the
customer’s mobile phone number. Sometime someone can find that somewhere on the phone. If not, it
shouldn’t be too hard to hack, since most people aren’t smart enough to use something besides "1111",
"1234", or whatever. A cellular phone can be phreaked by modify the chip. There are two chips, this
depends on the model and manufacturer that will need to be changed - one installed at the manufacturer
(often epoxied in) with the phone’s ID number, and one installed by the dealer with the phone number,
and possible the security code. To do this, an EPROM burner is required as well as the same sort of chips
used in the phone . As to recording the numbers of other mobile phone customers and using them.
1. Get a hold of the phonecard and some video tape, a pencil, sellotape and some sand paper. (and six
thousand tons of sticky back plastic).
2. Place a strip of video tape over the back of the card, at the top this is where the credit details are
stored.
3. Sand paper some pencil lead onto the video tape, and then sellotape the whole lot onto the phone
card.
4. Place the card into the card payphone, and hopefully the pencil graphite and video tape’s magnetic
field should confuse the phone and should be able to call for free.
6
Phreaking, The Nightmare For The Phone System
6. The Nightmare
The victim caused by phreaking activities will be classified in 2 object :
7
Phreaking, The Nightmare For The Phone System
Take a peek about definition of phreak.Phreak is The action of using mischevious and mostly illegal
ways in order to not pay for some sort of tele- communications bill, order, transfer, or other service. It
often involves usage of highly illegal boxes and machines in order to defeat the security that is set up to
avoid this sort of happening. [fr’eaking].[5]
From definition above, we can look at a glance the deep impact of phreaking activities.it create many
disadvantage not only for customer but the telecommunication service provider itself. It will become
serious trouble with nonfinancial and financial loss. It is awfully nightmare.
Early phreaking techniques used 2600 hz tone generator to create the same tone that indicating if the user
has hung up the phone. It can can be implemented with small electronic circuits,called blue box. Blue
box will making the tones, so the user can stop the billing system while still connect and do the
conversation by phone,definitely it is free of charge.not only that he/she can get illegal access to exploit
all the services from telecommunication operator Another techique can be done on coin-phone
system.By pressing the return button, we can get back our coin that has been deposited into the
coin-phone.it can be implemented by another hardware called red box.
The device called black box can fool the telecommunication system company into thinking that we don’t
answer one call, so the people who call to us can get free of charge. Other technique to cut the phone bill
is done by using brown boxes as a relays so we can set up our calling into local call. We can only call to
our partner in local area as a middle medium to conduct long distance conversation with the others.
Not only those above, in the worst case, the user can got operator privileges and and do lots of other
damaging things that the phone company don’t approve. It’s a truly nighmare for the phone company as a
service provider.They will suffer a financial loss and will decrease customer satisfaction then slowly
create bad images in customer view. In the other side, on the customer perspective the phreaking
activities also bring negative impact to us. On the one time, perhaps we get big surprise with our bill
caused by the amount of our debt significantly increase and not proportional to our use. It’s the one of
many things that bad phreaker can do. He/she can get access to any services by run up other peoples
bills. Phreakers also can use the another ’boxes’ to eavesdrop our conversations,its really harmfull if the
topic of conversation is the information that must be privacy. With the scarlet box, phreakers can make
bad connections and dropout to somenone’s phone.With the busy box, phreakers can cause our lines
always on busy state so no one can call in and the victims him/her self can make call out.
One thing that enough annoying to us,if in our phone line we hear the notclear (noise) sound when we
online.Likewise, by using blast box, phreakers can make noise to blow our ear drum by amplifier of
noise tone
Those cases that describe above, will make nuisances in our activities that using telecommunicatin
services. We are as customers, definitely want to get the best services from our providers.If it is not
reached, perhaps it also become nighmare to us, and slowly but surely we can get uncomfortable feel in
our future life.
8
Phreaking, The Nightmare For The Phone System
9
Phreaking, The Nightmare For The Phone System
TELECOM make it a point to document every security risk, whether it’s a break-in on their system, a
bug in an operating system, or some new information found on a BBS (Bulletin Board System). These
detections are often published in TELECOM literature in an attempt to educate all of the employees of
the telephone company.
10
Phreaking, The Nightmare For The Phone System
investigating authorities have to get the obvious evidence. These proofs, related with telecom crime
could be found in the form of digital information
In digital system, included telecommunication system, essential information is recorded digitally in the
hystory which representing list of activities that was done before and who the persons that have done
those activities. This information in different ways can become the key role to collect evidences related
with the crime which may be happen.
Those information will be the nightmares for the criminal, because of the information that is stored
within the telecom network and the information systems of the telecom can be very useful for tracing,
detecting and convicting the criminal..But, are these information can be accessed freely?
In fact, every customers(subscribers) have the sensitive data that’s prevented by the telecommunicatin
provider to forbide some ones have access to this data. Information that relates directly or indirectly to an
identity of person may be treated as sensitive data and all regulation concerning of those data reserved by
the personal data legislation. It asserts that these information cannot be accessed freely. The use of such
sensitive information for crime-investigating purposes may then be in conflict with the personal data
legislation and telecom-legilation , although the information has been permitted to process for such
purposes according to the other legislations. This conflict may be solved by refer to Telecom Secrecy and
its exception.
According to personal data legislation,telecom operator is obliged to keep information about subscribers
and telecommunications secret .Without given permission, the telecom operator may not uncover such
information. Its one of agreements to protect subcriber privacy in the telecomunication sector.Those
principles called The Telecom Secrecy.
The telecom secrecy relates to information about subscriber, such as telephone numbers, names and
addresses, and others information. The history of our activities when making the calls, such as the phone
numbers we have been dialed are also part of Telecom Secrecy. The telecom secrecy refers to authorized
legislation,i.e. personal data legislation and telecom legislation , so that illegal disclosure of the
information will constitute a crime.
Nevertheless,there are exceptions for this case. Such as [2]:
- Consent by the subscriber
If the subscribers that have been protected by the telecom secrecy ask to the operator for giving access to
someones that have been pointed, then the telecom operator is no longer obliged to keep those secrets. If
in the following time the subscriber may request back to forbid someones access him/her data, then the
telecom operator is obliged to keep the actual information secret anymore
-Obligation by law
In the certain situations, The telecom operators are forced by law to assist different authorities in getting
access to certain information. For Example, permmission given to expertise from telecom operator to
assist crime investigating authorities (Ex, policeman) to be able to access the right kind of information .
Usually, Only the crime-investing authorities are allowed to access information and only in cases
regarding severe crimes.
Ultimately, there’s a need to syncronize telecom legislation with other legislation to overcome telecom
crime.Otherwise, This could cause considerable difficulties in a situation where an authority has been
given rightfull authority to access the information by a certain legislation , but the telecom operator is
obliged to keep secretly the information according to the telecom secrecy and if they disclousure those
information, the operator may be supposed conducting a breach of secrecy.
11
Phreaking, The Nightmare For The Phone System
The conditions that describe above are only a little bit of many cases that occurred in telecommunication
area.The more detail about the regulation of telecommunication in Indonesia, arranged in
UNDANG-UNDANG NOMOR REPUBLIK INDONESIA NO 36 TAHUN 1999 TENTANG
TELEKOMUNIKASI that legitimized by president of Indonesia previously, B.J Habibie [10]. Detailed
explanation about some sections in that UU, describe again in peraturan pemerintah.For example there is
Peraturan Pemerintah that regulate about customs and manners to uncover the privacy data of customer
in the special cases, such as to conduct crime investagion (obligation by law)).[10]
Our government have settled hard sanction to all the people who have broken or tried breaking the rule in
the telecommunication area.Based on UU Telekomunikasi,law breaker will be charged with the amount
of money and placed in the jail. [10]
There are many argument about legality of phreaking, until now it still become vague. There are not
effective measures to assures that the phreakers absolutely always do phreaking to conduct crime. What’s
about the phreaker who phreaks only for enhance their knowledge without exploit vulnerabilities in the
system.Are they still regarded as A perpetrator. Do we still prosecute the phreaker that explores the
telephone system with the intention to become an electronic voyeurs who want to understand how
telecom structure works.Once again, if we use positive thinking, perhaps there is nothing efforts to
improve system telecommunication without the effect of phreaking activities. The phone companies will
become much wiser because phreaks have helped teaching them the flaws, so they must improve their
phone systems and added many more services as well.There are many issues concerning about legalities
of phreaking, and it still remains the questionable issues.
12
Phreaking, The Nightmare For The Phone System
9. Conclusion
Phreaking is a kind of illegal action that must be stopped. Although their purpose is good such as
13
Phreaking, The Nightmare For The Phone System
extending knowledge, but the impact is make the company and the people suffered. Goverment in every
country have power to protect the citizen from phone fraud. Protection can be done by build the law
about phreaking. This law have to be strict and known by public. So that mass socialization needed, not
only socializing about the law existence but also the knowledge about the phreaking itself. In the end, it’s
hoped that people would have awareness about this crime. However telecommunication company have
the greatest part to protect them. Phreakers knowledge time to time is getting genius, they can easily find
the way to do phreak while the TELECOM (Telecommunication Company) technology is still left
behind, especially in the developing countries. In that case, the TELECOM have to be more aware and
do some research to omit or lessen the phone service vulnerabilities. There should be a good
communication between telecommunication company in each country in case of exchange knowledge
about telecommunication security.
Reference
[1] Bruce Sterling, 1994, THE HACKER CRACKDOWN Law and Disorder on the Electronic Frontier:
First Edition, Edisi Pertama, Bantam Books, Texas.
[2] Conny Larson, 2000, TELECOM CRIME The Masters Programme in Information Technology and
Law, http://www.juridicum.su.se/iri/masterIT/Course_A/teach/Telecom%20%Crime.pdf
(http://www.juridicum.su.se/iri/masterIT/Course_A/teach/Telecom %20%Crime.pdf).
[4] Revelation Loa, THE ULTIMATE BEGINNER’S GUIDE TO HACKING AND PHREAKING Part 1,
http://www.apocalypseonline.com/security/text/tubhp1.asp.
14