|  |  Running numbers is not only fun; it's a moral imperative![Phreak credo]
 
  A Phreak is the one who does phreaking. Phreaking is the art 
                and science of cracking the phone network (so as, for example, 
                to make free long-distance calls). It means also security-cracking 
                in any other context (especially, but not exclusively, on communications 
                networks).   At one time phreaking was a semi-respectable activity among 
                hackers; there was a gentleman's agreement that phreaking as an 
                intellectual game and a form of exploration was OK, but serious 
                theft of services was taboo. There was significant crossover between 
                the hacker community and the hard-core phone phreaks who ran semi-underground 
                networks of their own through such media as the legendary "TAP 
                Newsletter". This ethos began to break down in the mid-1980s as 
                wider dissemination of the techniques put them in the hands of 
                less responsible phreaks. Around the same time, changes in the 
                phone network made old-style technical ingenuity less effective 
                as a way of hacking it, so phreaking came to depend more on overtly 
                criminal acts such as stealing phone-card numbers. The crimes 
                and punishments of gangs like the `414 group' turned that game 
                very ugly. A few old-time hackers still phreak casually just to 
                keep their hand in, but most these days have hardly even heard 
                of `blue boxes' or any of the other paraphernalia of the great 
                phreaks of yore.  
  This is from "A Postmodern Interpretation of the Computer 
                Underground" by Gordon Meyer and Jim Thomas:   Phreaking broadly refers to the practice of using either technology 
                or telephone credit card numbers (called "codez") to avoid long 
                distance charges. Phreaking attained public visibility with the 
                revelation of the exploits of John "Cap'n Crunch" Draper, the 
                "father of phreaking" (Rosenbaum, 1971). Although phreaking and 
                hacking each require different skills, phreaks and hackers tend 
                to associate on same boards. Unlike hackers, who attempt to master 
                a computer system and its command and security structure, phreaks 
                struggle to master telecom (tele-communica- tions) technology: 
                
                 The phone system is the most interesting, fascinating thing 
                  that I know of. There is so much to know. Even phreaks have 
                  their own areas of knowledge. There is so much to know that 
                  one phreak could know something fairly important and the next 
                  phreak not. The next phreak might know 10 things that the first 
                  phreak doesn't though. It all depends upon where and how they 
                  get their info. I myself would like to work for the telco, doing 
                  something interesting, like programming a switch. Something 
                  that isn't slave labor bullshit. Something that you enjoy, but 
                  have to take risks in order to participate unless you are lucky 
                  enough to work for Bell/ AT&T/any telco. To have legal access 
                  to telco things, manuals, etc. would be great (message log, 
                  1988).   Early phreaking methods involved electro-mechanical devices 
                that generated key tones or altered phone line voltages to trick 
                the mechanical switches of the phone company into connecting calls 
                without charging, but the advent of computerized telephone switching 
                systems largely made these devices obsolete. In order to continue 
                their practice, phreaks have had to learn hacking skills in order 
                to obtain access to telephone company computers and software. 
                Access to telecom information takes several forms, and the possesion 
                of numbers for "loops" and "bridges," while lying in a grey area 
                of law, further enhances the reputation and status of a phreak. 
                P/hackers can utilize "loop lines" to limit the number of eavesdroppers 
                on their conversations. Unlike bridges, which connect an unlimited 
                number of callers simultaneously, loops are limited to just two 
                people at a time[6]. A "bridge" is a technical name for what is 
                commonly known as a "chat line" or "conference system." Bridges 
                are familiar to the public as the pay-per-minute group conversation 
                systems advertised on late night television. Many bridge systems 
                are owned by large corporations that maintain them for business 
                use during the day. While the numbers to these systems are not 
                public knowledge, many of them have been discovered by phreaks 
                who then utilize the systems at night. Phreaks are skilled at 
                arranging for a temporary, private bridge to be created via ATT's 
                conference calling facilities. This provides a helpful information 
                sharing technique among a self-selected group of phreak/hackers: 
                
                 Bridges can be extremely useful means of distributing information 
                  as long as the {phone} number is not known, and you don't have 
                  a bunch of children online testing out their DTMF. The last 
                  great discussion I participated with over a bridge occurred 
                  about 2 months ago on an AT&T Quorum where all we did was engineer 
                  3/way {calls} and restrict ourselves to purely technical information. 
                  We could have convinced the Quorum operators that we were AT&T 
                  technicians had the need occurred. Don't let the kids ruin all 
                  the fun and convenience of bridges. Lameness is one thing, practicality 
                  is another (DC, message log, 1988).   Phreaks recognize their precarious legal position, but see no 
                other way to "play the game:"   
                 Phreaking involves having the dedication to commit yourself 
                  to learning as much about the phone system/ network as possible. 
                  Since most of this information is not made public, phreaks have 
                  to resort to legally questionable means to obtain the knowledge 
                  they want (TP2, message log, 1988).   Little sympathy exists among experienced phreaks for "teleco 
                ripoff." "Carding," or the use of fraudulent credit cards, is 
                anathema to phreaks, and not only violates the phreaking ethic, 
                but is simply not the goal of phreaking:   
                 Credit card fraud truly gives hacking a bad name. Snooping 
                  around a VAX is just electronic voyeurism. . .carding a new 
                  modem is just flat out blue-collar crime. It's just as bad as 
                  breaking into a house or kicking a puppy! {This phreak} does 
                  everything he can (even up to turning off a number) to get credit 
                  information taken off a BBS. {This phreak} also tries to remove 
                  codes from BBSes. He doesn't see code abuse in the same light 
                  as credit card fraud, (although the law does), but posted codes 
                  are the quickest way to get your board busted, and your computer 
                  confiscated. Peo- ple should just find a local outdial to wherever 
                  they want to call and use that. If you only make local calls 
                  from an outdial, it will never die, you will keep out of trouble, 
                  and everyone will be happy (PHRACK, 3(28): Phile 2).   Experienced phreaks become easily angered at novices and "lamerz" 
                who engage in fraud or are interested only in "leeching" (obtaining 
                something for nothing):   
                 Sub ->Carding From ->JB (#208) To ->ALL Date ->02/10/xx 02:22:00 
                  PM What do you people think about using a parents card number 
                  for carding? For instance, if I had a friend order and receive 
                  via next day air on my parents card, and receive it at my parents 
                  house while we were on vacation. Do you think that would work? 
                  Cuz then, all that we have to do is to leave the note, and have 
                  the bud pick up the packages, and when the bill came for over 
                  $1500, then we just say... 'Fuck you! We were on vacation! Look 
                  at our airline tickets!' I hope it does... Its such a great 
                  plan! Sub ->Reply to: Carding From -> (xxx) To -> X Date ->02/11xx 
                  03: 16:00 AM NO IT'S NOT A GREAT IDEA! WHERE'S YOUR SENSE OF 
                  RESPONSIBILITY TO YOUR FAMILY? ARE THEY ALL IN AGREEMENT WITH 
                  YOU? WOULD YOU WANT ANYONE TO USE YOUR PRIVATE STUFF IN ILLEGAL 
                  (AND IMMORAL) ACTIVITIES WITHOUT YOUR KNOWLEDGE? DIDJA EVER 
                  HEAR ABOUT TRUST BETWEEN FAMILY MEMBERS? IF YOU'RE GOING TO 
                  BE A THIEF (AND THAT'S NOT NEAT LIKE JAMES BOND IN THE MOVIES), 
                  TAKE THE RISKS ONLY UPON YOURSELF! Sub ->Carding From -> (#208) 
                  To -> (#47) Date ->02/12/xx 11: 18:00 AM Why not? We have a 
                  law that says that we have the right to refuse payment to credit 
                  cards if there are fraudulent charges. All we do and it is settled.... 
                  what is so bad about it? I'm going for it! Sub ->Reply to: Carding 
                  From -> (xxx) To ->J.B. Date ->02/13/xx 02:08:00 AM APPARENTLY 
                  YOU MISSED THE MAIN POINTS I TRIED TO MAKE TO YOU . . . YOU'RE 
                  A THIEF AND A LIAR, AND ARE BETRAYING THE TRUST OF YOUR FAMILY 
                  AS WELL AS INVOLVING THEM IN YOUR RISK WITHOUT THEIR KNOWLEDGE. 
                  THAT MEANS YOU ARE A FAIRLY SCUMMY INDIVIDUAL IF YOU GO THROUGH 
                  WITH IT! NOW AS TO YOUR "DEFENCE" ABOUT $50 MAXIMUMS AND ERRONEOUS 
                  BILLINGS.. LAW MAKES A CLEAR DISTINCTION ABOUT THEFT BY FRAUD 
                  (OF WHICH YOU WOULD BE GUILTY). AND IN A LARGER SENSE, YOUR 
                  THEFT JUST MAKES IT MORE COSTLY FOR YOU YOU AND EVERYBODY ELSE 
                  TO GET CREDIT, AND DO BUSINESS WITH CREDIT CARDS. YOU'RE GOING 
                  TO DO WHATEVER YOU DO ANYWAY.....DON'T LOOK FOR ANY APPROVAL 
                  IN THIS DIRECTION.   Ironically, experienced phreaks are not only offended by such 
                disregard of law, but also feel that "rip-off artists" have no 
                information to share and only increase the risk for the "techno-junkies." 
                Message boards reflect hostility toward apprehended "lamerz" with 
                such comments as "I hope they burn him," or "the lamer probably 
                narked {turned informant} to the pheds {law enforcement agents}." 
                Experienced phreaks also post continual re- minders that some 
                actions, because of their illegality, are simply unacceptable: 
                
                 It should be pointed out however, that should any of you crack 
                  any WATS EXTENDER access codes and attempt to use them, you 
                  are guilty of Theft of communications services from the company 
                  who owns it, and Bell is very willing and able to help nail 
                  you! WATS EXTENDERS can get you in every bit as much trouble 
                  as a Blue Box should you be caught.   Ex-phreaks, especially those who are no longer defined by law 
                as juveniles, often attempt to caution younger phreaks from pursuing 
                phreaking:   
                 ZA1: One thing to consider, also, is that the phone co. knows 
                  where the junction box is for all of the lines that you are 
                  messing with and if they get enough complaints about the bills, 
                  they may start to check things out (I hope your work is neat). 
                  I would guess that the odds are probably against this from happening 
                  though, because when each of the people call to complain, they'll 
                  probably get a different person from the oth- ers. This means 
                  that someone at Ma Bell has to notice that all of the complaints 
                  are coming from the same area...I don't think anybody there 
                  really cares that much about their job to really start noticing 
                  things like that...anyway, enjoy!!! My guess is that you're 
                  under-age. Anyway, so if they catch you, they won't do anything 
                  to you anyway. ZB1: Yeah I am a minor (17 years old) I just 
                  hope that they don't cause I would like to not have a criminal 
                  or juvenile record when I apply to college. Also if they do 
                  come as I said in the other message if there are no wires they 
                  can't prove shit. Also as I said I only hook up after 6 p.m. 
                  The phone company doesn't service people after 6 p.m. Just recently 
                  (today) I hooked up to an empty line. No wires were leading 
                  from the two plugs to somebody house but I got a dial tone. 
                  How great. Don't have to worry about billing somebody else. 
                  But I still have to disconnect cause the phone bills should 
                  be coming to the other people pretty soon. HEHEHEHE ZX1: Be 
                  cool on that, especially if you're calling other boards. Easiest 
                  way for telecom security to catch you is match the number called 
                  to the time called, call the board, look at users log or messages 
                  for hints of identity, then work from there. If you do it too 
                  much to a pirate board, they can (and have successfully) pressured 
                  the sysop to reveal the identity under threat of prosecution. 
                  They may or may not be able to always trace it back, but remember: 
                  Yesterday's phreaks are today's telecom security folk. AND: 
                  IT'S NOT COOL TO PHREAK TO A PIRATE BOARD...draws attention 
                  to that board and screws it up for everybody. So, be cool phreaking....there's 
                  safer ways. ZC2: Be cool, Wormburger. They can use all sorts 
                  of stuff for evidence. Here's what they'd do in Ill. If they 
                  suspected you, they'd flag the phone lines, send somebody out 
                  during the time you're on (or they suspect you're on) and nail 
                  you. Don't want to squelch a budding phreak, but you're really 
                  taking an unnecessary chance. Most of us have been doing stuff 
                  for some time, and just don't want to see you get nailed for 
                  something. There's some good boards with tips on how to phreak, 
                  and if you want the numbers, let me know. We've survived to 
                  warn you because we know the dangers. If you don't know what 
                  ESS is, best do some quick research (P/h message log, 1988). 
                  In sum, the attraction of phreaking and its attendant lifestyle 
                appear to center on three fundamental characteristics: The quest 
                for knowledge, the belief in a higher ideological purpose of opposition 
                to potentially dangerous technological control, and the enjoyment 
                of risk-taking. In a sense, CU participants consciously create 
                dissonance as a means of creating social meaning in what is perceived 
                as an increasingly meaningless world (Milovanovic and Thomas, 
                1989). Together, phreaks and hackers have created an overlapping 
                culture that, whatever the legality, is seen by participants as 
                a legitimate enterprise in the new "techno-society."  
 |  |