Date: Sat, 25 Jul 92 12:26:17 MDT From: Lazlo Nibble Subject: File 2--Re: 2600 and Bellcore flap > ...Article details how, after following 4 steps, any line is suspectible > to secret monitoring. One document obtained by 2600 said: "There is no > proof the hacker community knows about the vulnerability." They may not have proof of it, but the first time I heard about Busy Line Verification was in '84 or '85 and there's at least one person I knew in the computer underground at the time who I had reason to believe when he said he'd used it. Its existance is certainly no secret to anyone who's messed around with the workings of the phone system -- the codes that activate BLV were (and probably still are) a sort of Holy Grail for telcom hackers. Downloaded From P-80 International Information Systems 304-744-2253