


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
=

                            Phile 1.9 of 1.14
           
                        A notice to All Phreakers
                        -------------------------
                         Written By - The Jedi


    In this time and age, phreaking is becoming more and more difficult. I 
can remember a time when there was such an abundance of codes, all you had to
do was set up your favorite code hacking program and wait a couple of
minutes.
There was never a worry about getting busted and people often posted dozens of
codes at a time. Now that Sprint and MCI are starting to catch on to things by
extending the length of codes and such, its harder to get them and more 
dangerous if you get caught. Everyone decent phreaker knows this already, its
no big secret. But, while the art of phreaking hasn't really changed much in 
the past few years, the techniques that these companies are using to catch 
phreakers has! I'm writing this article to warn those who hack out codes 
extensively.
    Working for a Fortress Phone Company does have it's advantages. I've 
managed to read a couple of magazines about fortress phones and the companies
that use them. I recently stumbled across an article concerning long-distance
communication fraud entitled "Fraud Prevention- Taking The Offensive". Since 
what I've read in the article was news to me, I figured that a few people out
there might also be interested. 
    It seems that one company has devised a way of disguising good codes
while
someone is hacking them in real-time! The following is taken from that 
article:

      "We have written software in our DCO-CS [Digital Central Office-Carrier
   Switch] that can detect when one of these hackers is at work by recognizing
   the patterns they frequently use..... Usually a hacker will hit one code, 
   two codes, three codes, etc. - they usually follow some sort of pattern".
      "By using their computers to perform a set of mathematical procedures, 
   or algorithms, hackers have been able to determine authorized calling
codes.
   We use the algorithms to figure out what he's dailed so far and then 
   determine where he's going next"
      "If he's going to what we know is a good code, then we will make it look
   like a bad code for his call only. If he does hit that good code, he won't
   be able to get through."
      "If he's using a random pattern with his off code, he's probably using 
   either the same number he's calling to, which we can monitor by watching 
   the successive call to that same number, or we can monitor the fact that 
   he's hitting 'x' number of bad off codes in a row."

   As of now, the only company that using this method is Sprint but from what
I see, it's getting popular. 19 People have been arrested recently by 
employing this system.


BEWARE:
-------

1 - First of all, it'll make good codes look bad - Making every phreaker run 
    in circles, never finding a decent code.
2 - It works in real-time. That is, you're constantly being monitored.
3 - It gives a printout of all the information which CAN BE USED AS EVIDENCE 
    IN COURT.
4 - While it's not always possible for them to get the originating phone 
    number, they sometimes get help from the connecting carrier. Which means 
    my friends, the bbs that you're calling to hack to. 


My Suggestions:
---------------

1 - First of all, make the calls as random as possible. Using a code hacker 
    that hacks codes in sequencial order is out of the question!!
2 - Don't make too many attempts at one time. The less you hack at a given 
    time, the less you are suspected of phreaking.
3 - Use multiple extenders and target carriers.
4 - Don't use the same good code to often. If you do, at least don't call the
    same place 100 times! The person that owns that code will report the 
    activity and they'll catch up with the person you're calling to.
5 - Stay away from Sprint. They're really good at this shit, don't mess around
    with them unless you know what you're doing. Try to stick with hacking 
    codes from the newer, less sophisticated companies that don't employ this
    system.


    If you stick to those general rules, you shouldn't have too much trouble.
Even the company that makes this system [Stromberg-Carlson Co.] admits that 
it's impossible to stop phreaking altogether. Those of you that are new to 
phreaking and stuff like it, educate yourselves BEFORE you dive into it. 
Remember, we're all in this together, if you get busted calling a 
pirate/hack/phreak/anarchy bbs. They'll get a hold of the user list and posts
and bust everyone on the system. Don't ever rat on anyone!!!
    Well, thats about it for me. Look for my new text files out soon on 
fortress phones.And call...
                            <== The Jedi ===>
  
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

DOWNLOADED FROM P-80 SYSTEMS 304-744-2253

Downloaded From P-80 International Information Systems 304-744-2253 12yrs+
