Knowledge

Phreaking

Source 📝

1165:
would close, they would program the call diverting equipment to answer all calls, pick up another phone line, call their answering service, and bridge the two lines together. This gave the appearance to the caller that they were directly forwarded to the company's answering service. The switching equipment would typically reset the line after the call had hung up and timed out back to dial tone, so the caller could simply wait after the answering service had disconnected, and would eventually get a usable dial tone from the second line. Phreakers recognized the opportunity this provided, and they would spend hours manually dialing businesses after hours, attempting to identify faulty diverters. Once a phreaker had access to one of these lines, they could use it for one of many purposes. In addition to completing phone calls anywhere in the world at the businesses' expense, they could also dial
1152:
7-digit card. While this is almost easy enough for people to do manually, computers made the task far easier. "Code hack" programs were developed for computers with modems. The modems would dial the long-distance access number, enter a random calling card number (of the proper number of digits), and attempt to complete a call to a computer bulletin board system (BBS). If the computer connected successfully to the BBS, it proved that it had found a working card number, and it saved that number to disk. If it did not connect to the BBS in a specified amount of time (usually 30 or 60 seconds), it would hang up and try a different code. Using this method, code hacking programs would turn up hundreds (or in some cases thousands) of working calling card numbers per day. These would subsequently be shared amongst fellow phreakers.
768:
possible ways. Depending on continent and country, one click with a following interval can be either "one" or "zero" and subsequent clicks before the interval are additively counted. This renders ten consecutive clicks being either "zero" or "nine", respectively. Some exchanges allow using additional clicks for special controls, but numbers 0-9 now fall in one of these two standards. One special code, "flash", is a very short single click, possible but hard to simulate. Back in the day of rotary dial, technically identical phone sets were marketed in multiple areas of the world, only with plugs matched by country and the dials being bezeled with the local standard numbers.
1148:, both of whom had only recently entered the marketplace. At the time, there was no way to switch a phone line to have calls automatically carried by non-AT&T companies. Customers of these small long-distance operations would be required to dial a local access number, enter their calling card number, and finally enter the area code and phone number they wish to call. Because of the relatively lengthy process for customers to complete a call, the companies kept the calling card numbers short – usually 6 or 7 digits. This opened up a huge vulnerability to phone phreaks with a computer. 891: 2602: 1463: 1170:
fraud to occur. By 1993, call forwarding was offered to nearly every business line subscriber, making these diverters obsolete. As a result, hackers stopped searching for the few remaining ones, and this method of toll fraud died. Many (different type) of diverters still exist and are actively "phreaked" in the United States as of 2020. It is rare to find a diverter solely used for Answering Service forwarding anymore, but the many other types such as phone-company test numbers and remote PBX DISAs are still used as diverters.
878:
individual basis, and later within groups as they discovered each other in their travels. "Evan Doorbell", "Ben" and "Neil" formed a group of phreaks, known as "Group Bell". Bernay initiated a similar group named the "Mark Bernay Society". Both Bernay and Evan received fame amongst today's phone phreakers for internet publications of their collection of telephone exploration recordings. These recordings, conducted in the 1960s, 1970s, and early 1980s are available at Mark's website
1013: 1259: 645:. By re-creating the signaling tones, phreaks could switch calls from the phone handset while avoiding long-distance calling charges which were common then. These fees could be significant, depending on the time, duration and destination of the call. To ease the creation of the routing tones, electronic tone generators known as 1192:
for communication with one another until the rightful owners discover the intrusion and wipe them off. Voice mailboxes also provide a safe phone number for phreaks to give out to one another as home phone numbers and personal cellular numbers would allow the phreak's identity (and home address) to be
1155:
There was no way for these small phone companies to identify the culprits of these hacks. They had no access to local phone company records of calls into their access numbers, and even if they had access, obtaining such records would be prohibitively expensive and time-consuming. While there was some
1151:
6-digit calling card numbers only offer 1 million combinations. 7-digit numbers offer just 10 million. If a company had 10,000 customers, a person attempting to "guess" a card number would have a good chance of doing so correctly once every 100 tries for a 6-digit card and once every 1000 tries for a
877:
The second generation of phreaks arose at this time, including New Yorkers "Evan Doorbell", "Ben Decibel" and Neil R. Bell and Californians Mark Bernay, Chris Bernay, and "Alan from Canada". Each conducted their own independent exploration and experimentation of the telephone network, initially on an
721:
to help them explore the network and make free phone calls, hanging out on early conference call circuits and "loop arounds" to communicate with one another and writing their own newsletters to spread information. Phreaking was especially prevalent in universities, where it began spreading much like
700:
pitch used in phone signalling systems in the United States. Phone phreaks experimented with dialing around the telephone network to understand how the phone system worked, engaging in activities such as listening to the pattern of tones to figure out how calls were routed, reading obscure telephone
1090:
was forced into divestiture. During this time, exploration of telephone networks diminished, and phreaking focused more on toll fraud. Computer hackers began to use phreaking methods to find the telephone numbers for modems belonging to businesses, which they could exploit later. Groups then formed
873:
in an article describing the methods and frequencies used for inter-office signalling. The journal was intended for the company's engineers; however, it found its way to various college campuses across the United States. With this one article, the Bell System accidentally gave away the "keys to the
767:
By rapidly clicking the hook for a variable number of times at roughly 5 to 10 clicks per second, separated by intervals of roughly one second, the caller can dial numbers as if they were using the rotary dial. The pulse counter in the exchange counts the pulses or clicks and interprets them in two
1200:
The popularity of the Internet in the mid-1990s, along with the better awareness of voice mail by business and cell phone owners, made the practice of stealing voice mailboxes less popular. To this day bridges are still very popular with phreakers yet, with the advent of VoIP, the use of telephone
1164:
Another method of obtaining free phone calls involves the use of "diverters". Call forwarding was not an available feature for many business phone lines in the late 1980s and early 1990s, so they were forced to buy equipment that could do the job manually between two phone lines. When the business
980:
TAP developed into a major source for subversive technical information among phreaks and hackers all over the world. TAP ran from 1973 to 1984, with Al Bell handing over the magazine to "Tom Edison" in the late 1970s. TAP ended publication in 1984 due mostly to a break-in and arson at Tom Edison's
957:
YIPL believes that education alone cannot affect the System, but education can be an invaluable tool for those willing to use it. Specifically, YIPL will show you why something must be done immediately in regard, of course, to the improper control of the communication in this country by none other
759:
Possibly one of the first phreaking methods was switch-hooking, which allows placing calls from a phone where the rotary dial or keypad has been disabled by a key lock or other means to prevent unauthorized calls from that phone. It is done by rapidly pressing and releasing the switch hook to open
729:
Before 1984, long-distance telephone calls were a premium item in the United States, with strict regulations. In some locations, calling across the street counted as long distance. To report that a phone call was long-distance meant an elevated importance because the calling party is paying by the
1187:
as ways to network and keep in touch over the telephone. They usually appropriate unused boxes that are part of business or cellular phone systems. Once a vulnerable mailbox system is discovered, word would spread around the phreak community, and scores of them would take residence on the system.
1169:
phone sex/entertainment numbers, as well as use the line to harass their enemies without fear of being traced. Victimized small businesses were usually required to foot the bill for the long-distance calls, as it was their own private equipment (not phone company security flaws) that allowed such
1081:
and others interested in the technology, and served as a medium for previously scattered independent phone phreaks to share their discoveries and experiments. This not only led to unprecedented collaboration between phone phreaks, but also spread the notion of phreaking to others who took it upon
1196:
Phreakers also use "bridges" to communicate live with one another. The term "bridge" originally referred to a group of telephone company test lines that were bridged together giving the effect of a party-line. Eventually, all party-lines, whether bridges or not, came to be known as bridges if
775:
capable exchange, can also be exploited by a tone dialer that generates the DTMF tones used by modern keypad units. These signals are now very uniformly standardized worldwide. It is notable that the two methods can be combined: Even if the exchange does not support DTMF, the key lock can be
810:
which causes a telephone switch to think the call had ended, leaving an open carrier line, which can be exploited to provide free long-distance, and international calls. At that time, long-distance calls were more expensive than local calls.
826:(a frequency of 2637.02 Hz) would stop a dialed phone recording. Unaware of what he had done, Engressia called the phone company and asked why the recordings had stopped. Joe Engressia is considered to be the father of phreaking. 1156:
advancement in tracking down these code hackers in the early 1990s, the problem did not completely disappear until most long-distance companies were able to offer standard 1+ dialing without the use of an access number.
2383: 953:, writers included a "shout-out" to all of the phreakers who provided technological information for the newsletter: "We at YIPL would like to offer thanks to all you phreaks out there." In the last issue, YIPL stated: 1959: 1888: 1273: 2014: 1178:
Before the BBS era of the 1980s phone phreaking was more of a solitary venture as it was difficult for phreaks to connect with one another. In addition to communicating over BBSs phone phreaks discover
1323:, David Lightman (Matthew Broderick), uses a pull-tab from an aluminum can, found on the ground at a truck stop, to make a free long-distance call via payphone to his friend (Ally Sheedy). 680:
system which uses out-of-band signaling for call control (and which is still in use to this day), therefore rendering blue boxes obsolete. Phreaking has since become closely linked with
829:
Other early phreaks, such as "Bill from New York" (William "Bill" Acker 1953-2015), began to develop a rudimentary understanding of how phone networks worked. Bill discovered that a
914:. This article featured Engressia and John Draper prominently, synonymising their names with phreaking. The article also attracted the interest of other soon-to-be phreaks, such as 751:
The tone system in the United States has been almost entirely replaced, but in some countries, in addition to new systems, the tone system is still available, for example in Italy.
1082:
themselves to study, experiment with, or exploit the telephone system. This was also at a time when the telephone company was a popular subject of discussion in the US, as the
1269: 863:(MF) controls. The slang term for these tones and their use was "Marty Freeman". The specific frequencies required were unknown to the general public until 1954, when the 1967: 1934: 1892: 2024: 760:
and close the subscriber circuit, simulating the pulses generated by the rotary dial. Even most current telephone exchanges support this method, as they need to be
744:
In the UK the situation was rather different due to the difference in technology between the American and British systems, the main difference being the absence of
664:
The blue box era came to an end with the ever-increasing use of digital telephone networks which allowed telecommunication companies to discontinue the use of
845:(SF) controls. One can sound a long whistle to reset the line, followed by groups of whistles (a short tone for a "1", two for a "2", etc.) to dial numbers. 2307: 594:
of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term
776:
circumvented by switch-hooking, and the tone dialer can be then used to operate automated DTMF controlled services that can not be used with rotary dial.
1113:(a combination of the words phreak and hack) began circulation among BBSes, and focused on hacking, phreaking, and other related technological subjects. 841:
cereal boxes also produced a 2600 Hz tone when blown (providing his nickname, "Captain Crunch"). This allows control of phone systems that work on
290: 1833: 672:(CCS), through which dialing information was sent on a separate channel that was inaccessible to the telecom customer. By the 1980s, most of the 1441:, a character named Phreak can be found, who then can give the player an "orange box" that can be used to hack telephones throughout the metro. 1634: 1414:, Leslie Romero is described as being the best phreaker in the 'game', himself adding that he practically invented the practice of phreaking. 2065:"Youth International Party Line (YIPL) / Technological American Party (TAP), New York FBI files 100-NY-179649 and 117-NY-2905 (3.2 Mbytes)" 995:" used to make free long-distance phone calls, and included a very short parts list that could be used to construct one. AT&T forced 1245:
hacking. In 2015, Pakistani officials arrested a prominent phreaker who had amassed more than $ 50 million from PBX hacking activities.
570: 2321: 2071: 1405:, "Mr. C" uses phreaking techniques to disrupt prison security systems so he can make a private phone call without being overheard. 2492: 31:
This article is about the manipulation of telephone call routing. For the use of telephone technology to steal information, see
1124:. Phreaking as a subculture saw a brief dispersion in fear of criminal prosecution in the 1990s, before the popularity of the 1701: 400: 2261: 1691: 2182: 2151: 1718: 1345:, the hacker known as "Rat" uses phreaking to give Doctor Josh Keyes unlimited long-distance for life to prove his skills. 745: 1988: 1798: 859:
While single-frequency worked on certain phone routes, the most common signaling on the then long-distance network was
94: 2370: 999:
to pull all copies from shelves, but not before numerous copies were sold and many regular subscribers received them.
1666: 1594: 1140:
gave rise to many small companies intent on competing in the long-distance market. These included the then-fledgling
1052: 673: 2465: 2440: 2282: 2214: 874:
kingdom", and the intricacies of the phone system were at the disposal of people with a knowledge of electronics.
1213:(MF) phreaking in the lower 48 United States occurred on June 15, 2006, when the last exchange in the contiguous 111: 1350: 1034: 563: 1450:
Hashida Itaru is implied to use phreaking to hack an IBN5100 by requesting a gum wrapper in his supplies list.
1332:, one of a group of hackers is a phreak nicknamed "Whistler", presumably because he was able to replicate the 1526: 1292: 1128:
initiated a reemergence of phreaking as a subculture in the US and spread phreaking to international levels.
869: 830: 706: 503: 300: 183: 173: 806:, and included some tones which were for internal telephone company use. One internal-use tone is a tone of 2549: 2326: 210: 198: 17: 2428: 1396:, there is a character nicknamed "The Phantom Phreak" or "Phreak" for short, who specializes in phreaking. 2485: 2096: 285: 1845: 2342: 1478: 1423:, phreaking is referenced as a clue to find the Jade Key - a series of clues in OASIS to win a fortune. 1288: 1222: 1078: 1030: 842: 522: 260: 2630: 854: 734: 556: 305: 2453: 1217:
to use a "phreakable" MF-signalled trunk replaced the aging (yet still well kept) N2 carrier with a
981:
residence in 1983. Cheshire Catalyst then took over running the magazine for its final (1984) year.
1284: 1100: 669: 481: 440: 410: 360: 1960:""Secrets of the Little Blue Box": The 1971 article about phone hacking that inspired Steve Jobs" 1509: 1380: 1242: 1137: 1023: 991:(June 1972) increased interest in phreaking. This article published simple schematic plans of a " 677: 220: 733:
Some phreaking consists of techniques to evade long-distance charges, which is criminalized as "
2478: 1747: 1184: 1104: 1070: 761: 475: 58: 54: 1116:
In the early 1990s, groups like Masters of Deception and Legion of Doom were shut down by the
2584: 2577: 2563: 2514: 992: 823: 791: 714: 642: 50: 2521: 2064: 1585: 1375: 1328: 1092: 710: 599: 493: 435: 355: 39: 8: 2542: 2374: 1489: 1087: 985: 718: 638: 470: 295: 205: 43: 1193:
discovered. This is especially important given that phone phreaks are breaking the law.
2625: 2387: 1815:"Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell" 1121: 905: 795: 723: 2415: 2606: 1814: 1794: 1791:
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
1697: 1590: 1536: 1531: 1504: 1468: 1384: 1379:, the titular character phreaks a phone from his cell in order to get the address of 1201:
company-owned bridges has decreased slightly in favor of phreaker-owned conferences.
1117: 1066: 962:
In 1973, Al Bell would move YIPL over and start TAP (Technological American Party).
837:
discovered through his friendship with Engressia that the free whistles given out in
803: 665: 465: 428: 395: 1432:, a character uses a flute to phreak a public telephone in order to call for a taxi. 984:
A controversially suppressed article "Regulating the Phone Company In Your Home" in
890: 2397: 2391: 2239: 1819: 1419: 1280: 445: 146: 70: 1210: 1077:) created an influx of tech-savvy users. These BBSes became popular for computer 970: 860: 838: 738: 702: 681: 225: 116: 85: 2322:"The Inside Story Of How Pakistan Took Down The FBI's Most-Wanted Cybercriminal" 2175: 2144: 1935:"Steve Jobs and Me: He said my 1971 article inspired him. His iBook obsessed me" 2112:
The Cheshire Catalyst is Richard Cheshire, former editor of the TAP Newsletter.
1762: 1722: 1580: 1428: 1392: 923: 819: 534: 365: 318: 248: 129: 106: 2208:"Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack" 66: 2619: 2535: 2501: 2379: 2308:"How Filipino phreakers turned PBX systems into cash machines for terrorists" 1992: 1615: 1556: 1521: 1499: 1214: 1141: 938: 915: 911: 658: 370: 265: 162: 32: 1557:"Phreaking - Definition and synonyms of phreaking in the English dictionary" 2418:
Recordings made in 1990 of voice mail box systems compromised by phreakers.
2019: 1913: 1786: 1659: 1635:"Hung Up Glenpool Has Long-Distance Woes In Making Calls Across the Street" 1494: 1096: 799: 458: 325: 278: 133: 2409: 649:
became a staple of the phreaker community. This community included future
2207: 2097:"SEASON 3 Episode 50 : 'Pa Bell' Vs. Youth International Party Line" 1446: 864: 834: 528: 415: 152: 2286: 2015:"The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking" 1889:"The article that inspired Steve Jobs: "Secrets of the Little Blue Box"" 833:
he owned could also play the tone at 2600 Hz with the same effect.
2570: 2528: 2124: 1401: 1333: 1180: 1037: in this section. Unsourced material may be challenged and removed. 919: 815: 785: 697: 654: 650: 385: 380: 157: 2343:"Why Infinity Train Was Able to Include a 'How To' for an Illegal Act" 1362:
in 1979 as a prank. On October 27, 1980, Finch uses phreaking to hack
910:
magazine published a story called "Secrets of the Little Blue Box" by
668:
for call routing purposes. Instead, telecom companies began employing
2434: 1616:"Phreaking | Telecom Security, History & Techniques | Britannica" 1437: 1410: 1218: 1189: 619: 614: 405: 255: 235: 140: 62: 2240:"W32.Bugbear.B Worm Identified As Targeting Banks | Scoop News" 1867: 1012: 634:
are names used for and by individuals who participate in phreaking.
2556: 2402: 1484: 1341: 1315: 1145: 1125: 1091:
around the BBS hacker/phreaking (H/P) community such as the famous
1083: 899: 737:
fraud". In 1990, the pager cloning technique arose and was used by
693: 646: 499: 230: 178: 2470: 1693:
Prosecutor's Manual for Arrest, Search and Seizure, Third Edition
1367: 1363: 946: 942: 807: 692:
Phreaking began in the 1960s when it was discovered that certain
591: 487: 375: 350: 343: 215: 1358:, main character Harold Finch uses phreaking to call someone in 2457: 2371:
Five Students Psych Bell System, Place Free Long Distance Calls
1515: 1320: 1109: 541: 390: 330: 168: 38:"Phreak" and "Phreaks" redirect here. For the commentator, see 2446: 1204: 1359: 1166: 1074: 904:
In October 1971, phreaking was introduced to the masses when
604: 587: 1237:
systems. In 2011, the government of the Philippines and the
965:
Al Bell was denied opening a bank account under the name of
2461: 2449:- an attempt to catalog all 8/16 bit wardialers and similar 2283:"Telephone World - Sounds & Recordings from Wawina, MN" 1234: 772: 1225:, was run by the Northern Telephone Company of Minnesota. 2423: 1238: 1233:
Recent notable instances of phreaking involve hacking of
2088: 1834:"Bell System Technical Journal, v43: i5 September 1964" 2262:"AT&T sues two over scheme to steal customer data" 949:", mostly involving telephones. In the first issue of 790:
The origins of phone phreaking trace back at least to
1610: 1608: 1606: 1458: 676:(PSTN) in the US and Western Europe had adopted the 701:company technical journals (often obtained through 2405:Large collection of phreaking-related text files. 2259: 1689: 1603: 1241:arrested four hackers for phone phreaking through 814:The tone was discovered in approximately 1957, by 1197:primarily populated by hackers and/or phreakers. 771:Such key-locked telephones, if wired to a modern 618:, and may also refer to the use of various audio 2617: 2437:Large collection of historical phone recordings. 2431:- Australia's oldest and largest phreaking forum 1107:) groups. In 1985, an underground e-zine called 1173: 1660:"Notice to our customers regarding Toll Fraud" 754: 2486: 2012: 1683: 1366:, an action that causes him to be wanted for 564: 2441:Sounds & Recordings of Wawina, Minnesota 818:, a blind seven-year-old boy. Engressia had 2145:"Regulating the Phone Company In Your Home" 1205:End of multi-frequency in the United States 2493: 2479: 637:The term first referred to groups who had 590:term coined to describe the activity of a 571: 557: 1957: 1932: 1886: 1053:Learn how and when to remove this message 1793:. New York: Grove/Atlantic, corporated. 1741: 1739: 1690:John M. Castellano (15 September 2017). 1579: 889: 1785: 1228: 748:, particularly in the 1950s and 1960s. 14: 2618: 2340: 2275: 1745: 1336:signal used in phreaking by whistling. 941:and Al Bell to provide information to 2474: 2205: 2044: 2042: 1760: 1736: 1632: 1589:. McLean, Virginia: IndyPublish.com. 1248: 794:'s implementation of fully automatic 730:minute to speak to the called party. 709:, building electronic devices called 1252: 1065:In the 1980s, the revolution of the 1035:adding citations to reliable sources 1006: 822:, and discovered that whistling the 2500: 2398:The History of Phone Phreaking .org 2341:Childs, Kelvin (12 December 2020). 2048: 1844:(5). September 1964. Archived from 1716: 291:forensics-focused operating systems 27:Hacking of analog telephone network 24: 2454:The Secrets of the Little Pamphlet 2039: 2013:Lapsley, Phil (20 February 2013). 1813:Lapsley, Phil (February 5, 2013). 1283:by removing the content or adding 848: 641:the system of tones used to route 25: 2642: 2369:Bevard, Charles W. (1966-05-31). 2363: 2260:Angela Moscaritolo (2011-03-18). 2023:. theatlantic.com. Archived from 1958:Rosenbaum, Ron (7 October 2011). 1933:Rosenbaum, Ron (7 October 2011). 867:published the information in the 674:public switched telephone network 2600: 2384:"Secrets of the Little Blue Box" 2094: 1914:"Secrets of the Little Blue Box" 1461: 1257: 1011: 1002: 975:Technological Assistance Program 929:1971 also saw the beginnings of 2510: 2334: 2314: 2300: 2253: 2232: 2220:from the original on 2022-10-09 2199: 2188:from the original on 2022-10-09 2168: 2157:from the original on 2022-10-09 2137: 2117: 2077:from the original on 2022-10-09 2057: 2006: 1981: 1951: 1926: 1906: 1880: 1860: 1826: 1807: 1779: 1672:from the original on 2022-10-09 1069:and the popularity of computer 1022:needs additional citations for 112:Hacking of consumer electronics 1754: 1746:Robson, Gary D. (April 2004). 1721:. Modemspy.com. Archived from 1710: 1652: 1626: 1573: 1549: 935:Youth International Party Line 764:with old subscriber hardware. 622:to manipulate a phone system. 13: 1: 2452:Christina Xu. (May 12, 2008) 2285:. Phworld.org. Archived from 1887:Rosenbaum, Ron (2011-10-07). 1838:Bell System Technical Journal 1763:"COMPLETE HISTORY OF HACKING" 1543: 1527:Social engineering (security) 1131: 885: 870:Bell System Technical Journal 779: 2327:International Business Times 2125:"Cheshire's Book - TAP.HTML" 2051:Phreaks, Hackers, and Trolls 1696:. LexisNexis. p. 1346. 1221:. This exchange, located in 1188:They use these systems as a 1174:Voice mail boxes and bridges 1159: 973:, so he changed the name to 967:Technological American Party 958:than bell telephone company. 937:), a publication started by 211:Chaos Communication Congress 7: 2424:Digital Information Society 1891:. Slate.com. Archived from 1761:DELON (February 27, 2008). 1633:Stott, Kim (22 July 1983). 1454: 1373:During the third season of 755:Switch hook and tone dialer 10: 2647: 1748:"The Origins of Phreaking" 1479:2600: The Hacker Quarterly 1223:Wawina Township, Minnesota 897: 852: 783: 746:tone dialing and signaling 726:in the following decades. 687: 523:2600: The Hacker Quarterly 261:List of computer criminals 29: 2597: 2508: 2242:. Scoop.co.nz. 2003-06-09 1767:Hacking | LEMNISCATE 1279:Please help Knowledge to 855:Multi-frequency signaling 1408:In the second season of 670:common-channel signaling 441:Cloud computing security 49:Not to be confused with 1510:Phone Losers of America 1426:In the animated series 1399:In the third season of 977:to get a bank account. 922:, who went on to found 824:fourth E above middle C 221:Hackers on Planet Earth 2403:Textfiles.com / phreak 2176:"Ma Bell vs. Ramparts" 1073:(BBSes) (accessed via 1071:bulletin board systems 960: 895: 798:. These switches used 724:computer hacking would 476:Homebrew Computer Club 2607:Telephones portal 1719:"Phone Call Recorder" 1138:1984 AT&T breakup 969:, since he was not a 955: 893: 2458:Christopher M. Kelty 2049:Coleman, Gabriella. 1989:"Welcome to Woz.org" 1586:The Hacker Crackdown 1281:improve this article 1229:From 2010 to present 1093:Masters of Deception 1088:AT&T Corporation 1031:improve this article 696:could replicate the 600:sensational spelling 494:Masters of Deception 436:Application security 42:. For the band, see 40:Phreak (commentator) 2375:The Harvard Crimson 2310:. 30 November 2011. 2027:on 24 February 2013 1750:. Blacklisted! 411. 1490:Busy line interrupt 1293:independent sources 762:backward compatible 643:long-distance calls 471:Chaos Computer Club 206:Black Hat Briefings 80:Part of a series on 44:Class Action (band) 2206:Lunceford, Brett. 1620:www.britannica.com 1351:Person of Interest 1249:In popular culture 1122:Operation Sundevil 896: 707:social engineering 639:reverse engineered 301:Social engineering 2613: 2612: 2592: 2591: 2443:– Telephone World 2410:audio conferences 2382:. (October 1971) 1848:on March 14, 2012 1703:978-1-63284-068-4 1537:Van Eck phreaking 1532:Software cracking 1505:Telephone tapping 1469:Telephones portal 1390:In the 1995 film 1385:Francis Dolarhyde 1310: 1309: 1118:US Secret Service 1067:personal computer 1063: 1062: 1055: 804:in-band signaling 666:in-band signaling 581: 580: 429:Computer security 396:Keystroke logging 16:(Redirected from 2638: 2631:Telephone crimes 2605: 2604: 2603: 2587: 2580: 2573: 2566: 2559: 2552: 2545: 2538: 2531: 2524: 2517: 2511: 2495: 2488: 2481: 2472: 2471: 2466:All of the Above 2358: 2357: 2355: 2353: 2338: 2332: 2331: 2330:. 30 March 2015. 2318: 2312: 2311: 2304: 2298: 2297: 2295: 2294: 2279: 2273: 2272: 2270: 2269: 2257: 2251: 2250: 2248: 2247: 2236: 2230: 2229: 2227: 2225: 2219: 2212: 2203: 2197: 2196: 2194: 2193: 2187: 2180: 2172: 2166: 2165: 2163: 2162: 2156: 2149: 2141: 2135: 2134: 2132: 2131: 2121: 2115: 2114: 2109: 2107: 2092: 2086: 2085: 2083: 2082: 2076: 2069: 2061: 2055: 2054: 2046: 2037: 2036: 2034: 2032: 2010: 2004: 2003: 2001: 2000: 1991:. Archived from 1985: 1979: 1978: 1976: 1975: 1966:. Archived from 1955: 1949: 1948: 1946: 1945: 1930: 1924: 1923: 1921: 1920: 1910: 1904: 1903: 1901: 1900: 1884: 1878: 1877: 1875: 1874: 1864: 1858: 1857: 1855: 1853: 1830: 1824: 1811: 1805: 1804: 1783: 1777: 1776: 1774: 1773: 1758: 1752: 1751: 1743: 1734: 1733: 1731: 1730: 1725:on 23 March 2019 1714: 1708: 1707: 1687: 1681: 1680: 1678: 1677: 1671: 1664: 1656: 1650: 1649: 1647: 1645: 1630: 1624: 1623: 1612: 1601: 1600: 1577: 1571: 1570: 1568: 1567: 1553: 1471: 1466: 1465: 1464: 1420:Ready Player One 1319:(1983), a young 1305: 1302: 1296: 1261: 1260: 1253: 1058: 1051: 1047: 1044: 1038: 1015: 1007: 945:on how to "beat 843:single frequency 682:computer hacking 573: 566: 559: 446:Network security 147:Hacker Manifesto 86:Computer hacking 77: 76: 74: 47: 36: 21: 2646: 2645: 2641: 2640: 2639: 2637: 2636: 2635: 2616: 2615: 2614: 2609: 2601: 2599: 2593: 2585: 2578: 2571: 2564: 2557: 2550: 2543: 2536: 2529: 2522: 2515: 2504: 2502:Phreaking boxes 2499: 2412:. Textfiles.com 2366: 2361: 2351: 2349: 2339: 2335: 2320: 2319: 2315: 2306: 2305: 2301: 2292: 2290: 2281: 2280: 2276: 2267: 2265: 2258: 2254: 2245: 2243: 2238: 2237: 2233: 2223: 2221: 2217: 2210: 2204: 2200: 2191: 2189: 2185: 2178: 2174: 2173: 2169: 2160: 2158: 2154: 2147: 2143: 2142: 2138: 2129: 2127: 2123: 2122: 2118: 2105: 2103: 2093: 2089: 2080: 2078: 2074: 2067: 2063: 2062: 2058: 2047: 2040: 2030: 2028: 2011: 2007: 1998: 1996: 1987: 1986: 1982: 1973: 1971: 1956: 1952: 1943: 1941: 1931: 1927: 1918: 1916: 1912: 1911: 1907: 1898: 1896: 1885: 1881: 1872: 1870: 1866: 1865: 1861: 1851: 1849: 1832: 1831: 1827: 1812: 1808: 1801: 1784: 1780: 1771: 1769: 1759: 1755: 1744: 1737: 1728: 1726: 1715: 1711: 1704: 1688: 1684: 1675: 1673: 1669: 1662: 1658: 1657: 1653: 1643: 1641: 1631: 1627: 1614: 1613: 1604: 1597: 1581:Sterling, Bruce 1578: 1574: 1565: 1563: 1555: 1554: 1550: 1546: 1541: 1467: 1462: 1460: 1457: 1435:In the PC game 1306: 1300: 1297: 1278: 1274:popular culture 1262: 1258: 1251: 1231: 1211:multi-frequency 1207: 1176: 1162: 1134: 1059: 1048: 1042: 1039: 1028: 1016: 1005: 971:political party 902: 888: 861:multi-frequency 857: 851: 849:Multi frequency 788: 782: 757: 739:law enforcement 703:dumpster diving 690: 577: 548: 547: 517: 509: 508: 461: 451: 450: 431: 421: 420: 346: 336: 335: 321: 311: 310: 281: 271: 270: 251: 241: 240: 226:Security BSides 201: 191: 190: 136: 122: 121: 117:List of hackers 97: 75: 48: 37: 30: 28: 23: 22: 15: 12: 11: 5: 2644: 2634: 2633: 2628: 2611: 2610: 2598: 2595: 2594: 2590: 2589: 2582: 2575: 2568: 2561: 2554: 2547: 2540: 2533: 2526: 2519: 2509: 2506: 2505: 2498: 2497: 2490: 2483: 2475: 2469: 2468: 2450: 2447:WarDialers.org 2444: 2438: 2432: 2426: 2421: 2420: 2419: 2413: 2400: 2395: 2380:Rosenbaum, Ron 2377: 2365: 2364:External links 2362: 2360: 2359: 2333: 2313: 2299: 2274: 2252: 2231: 2198: 2181:. 1972-05-20. 2167: 2136: 2116: 2101:Malicious Life 2087: 2056: 2053:. p. 104. 2038: 2005: 1980: 1950: 1925: 1905: 1879: 1859: 1825: 1806: 1800:978-0802120618 1799: 1789:(2013-11-02). 1778: 1753: 1735: 1709: 1702: 1682: 1651: 1625: 1602: 1595: 1572: 1561:educalingo.com 1547: 1545: 1542: 1540: 1539: 1534: 1529: 1524: 1519: 1512: 1507: 1502: 1497: 1492: 1487: 1482: 1474: 1473: 1472: 1456: 1453: 1452: 1451: 1442: 1433: 1429:Infinity Train 1424: 1415: 1406: 1397: 1388: 1383:to pass on to 1371: 1346: 1337: 1324: 1308: 1307: 1272:references to 1265: 1263: 1256: 1250: 1247: 1230: 1227: 1206: 1203: 1175: 1172: 1161: 1158: 1133: 1130: 1101:Legion of Doom 1061: 1060: 1019: 1017: 1010: 1004: 1001: 924:Apple Computer 898:Main article: 887: 884: 853:Main article: 850: 847: 784:Main article: 781: 778: 756: 753: 689: 686: 579: 578: 576: 575: 568: 561: 553: 550: 549: 546: 545: 538: 535:Nuts and Volts 531: 526: 518: 515: 514: 511: 510: 507: 506: 497: 491: 485: 482:Legion of Doom 479: 473: 468: 462: 457: 456: 453: 452: 449: 448: 443: 438: 432: 427: 426: 423: 422: 419: 418: 413: 408: 403: 398: 393: 388: 383: 378: 373: 368: 363: 358: 353: 347: 342: 341: 338: 337: 334: 333: 328: 322: 319:Practice sites 317: 316: 313: 312: 309: 308: 303: 298: 293: 288: 282: 277: 276: 273: 272: 269: 268: 263: 258: 252: 249:Computer crime 247: 246: 243: 242: 239: 238: 233: 228: 223: 218: 213: 208: 202: 197: 196: 193: 192: 189: 188: 187: 186: 181: 176: 165: 160: 155: 150: 143: 137: 130:Hacker culture 128: 127: 124: 123: 120: 119: 114: 109: 107:Cryptovirology 104: 98: 93: 92: 89: 88: 82: 81: 26: 9: 6: 4: 3: 2: 2643: 2632: 2629: 2627: 2624: 2623: 2621: 2608: 2596: 2588: 2583: 2581: 2576: 2574: 2569: 2567: 2562: 2560: 2555: 2553: 2548: 2546: 2541: 2539: 2537:Vermilion box 2534: 2532: 2527: 2525: 2520: 2518: 2513: 2512: 2507: 2503: 2496: 2491: 2489: 2484: 2482: 2477: 2476: 2473: 2467: 2463: 2459: 2455: 2451: 2448: 2445: 2442: 2439: 2436: 2433: 2430: 2427: 2425: 2422: 2417: 2414: 2411: 2407: 2406: 2404: 2401: 2399: 2396: 2393: 2389: 2385: 2381: 2378: 2376: 2372: 2368: 2367: 2348: 2344: 2337: 2329: 2328: 2323: 2317: 2309: 2303: 2289:on 2013-12-03 2288: 2284: 2278: 2264:. SC Magazine 2263: 2256: 2241: 2235: 2216: 2209: 2202: 2184: 2177: 2171: 2153: 2150:. June 1972. 2146: 2140: 2126: 2120: 2113: 2102: 2098: 2091: 2073: 2066: 2060: 2052: 2045: 2043: 2026: 2022: 2021: 2016: 2009: 1995:on 2018-04-12 1994: 1990: 1984: 1970:on 2011-11-03 1969: 1965: 1961: 1954: 1940: 1936: 1929: 1915: 1909: 1895:on 2011-11-03 1894: 1890: 1883: 1869: 1868:"Phone Trips" 1863: 1847: 1843: 1839: 1835: 1829: 1822: 1821: 1816: 1810: 1802: 1796: 1792: 1788: 1787:Lapsley, Phil 1782: 1768: 1764: 1757: 1749: 1742: 1740: 1724: 1720: 1713: 1705: 1699: 1695: 1694: 1686: 1668: 1661: 1655: 1640: 1636: 1629: 1621: 1617: 1611: 1609: 1607: 1598: 1596:1-4043-0641-2 1592: 1588: 1587: 1582: 1576: 1562: 1558: 1552: 1548: 1538: 1535: 1533: 1530: 1528: 1525: 1523: 1522:Phreaking box 1520: 1518: 1517: 1513: 1511: 1508: 1506: 1503: 1501: 1500:Phone hacking 1498: 1496: 1493: 1491: 1488: 1486: 1483: 1481: 1480: 1476: 1475: 1470: 1459: 1449: 1448: 1444:In the anime 1443: 1440: 1439: 1434: 1431: 1430: 1425: 1422: 1421: 1416: 1413: 1412: 1407: 1404: 1403: 1398: 1395: 1394: 1389: 1386: 1382: 1378: 1377: 1372: 1369: 1365: 1361: 1357: 1353: 1352: 1347: 1344: 1343: 1339:In the movie 1338: 1335: 1331: 1330: 1326:In the movie 1325: 1322: 1318: 1317: 1313:In the movie 1312: 1311: 1304: 1294: 1290: 1286: 1282: 1276: 1275: 1271: 1266:This article 1264: 1255: 1254: 1246: 1244: 1240: 1236: 1226: 1224: 1220: 1216: 1215:United States 1212: 1202: 1198: 1194: 1191: 1186: 1182: 1171: 1168: 1157: 1153: 1149: 1147: 1143: 1139: 1129: 1127: 1123: 1119: 1114: 1112: 1111: 1106: 1105:Erik Bloodaxe 1102: 1098: 1094: 1089: 1085: 1080: 1076: 1072: 1068: 1057: 1054: 1046: 1036: 1032: 1026: 1025: 1020:This section 1018: 1014: 1009: 1008: 1003:Phone hacking 1000: 998: 994: 990: 988: 982: 978: 976: 972: 968: 963: 959: 954: 952: 948: 944: 940: 939:Abbie Hoffman 936: 932: 927: 925: 921: 917: 916:Steve Wozniak 913: 912:Ron Rosenbaum 909: 908: 901: 892: 883: 881: 875: 872: 871: 866: 862: 856: 846: 844: 840: 836: 832: 827: 825: 821: 820:perfect pitch 817: 816:Joe Engressia 812: 809: 805: 801: 797: 793: 787: 777: 774: 769: 765: 763: 752: 749: 747: 742: 740: 736: 731: 727: 725: 720: 716: 712: 708: 704: 699: 695: 685: 683: 679: 675: 671: 667: 662: 660: 659:Steve Wozniak 656: 652: 648: 644: 640: 635: 633: 629: 625: 621: 617: 616: 611: 607: 606: 601: 597: 593: 589: 585: 574: 569: 567: 562: 560: 555: 554: 552: 551: 544: 543: 539: 537: 536: 532: 530: 527: 525: 524: 520: 519: 513: 512: 505: 501: 498: 495: 492: 489: 486: 483: 480: 477: 474: 472: 469: 467: 464: 463: 460: 455: 454: 447: 444: 442: 439: 437: 434: 433: 430: 425: 424: 417: 414: 412: 409: 407: 404: 402: 399: 397: 394: 392: 389: 387: 384: 382: 379: 377: 374: 372: 369: 367: 364: 362: 359: 357: 354: 352: 349: 348: 345: 340: 339: 332: 329: 327: 324: 323: 320: 315: 314: 307: 306:Vulnerability 304: 302: 299: 297: 294: 292: 289: 287: 284: 283: 280: 279:Hacking tools 275: 274: 267: 266:Script kiddie 264: 262: 259: 257: 254: 253: 250: 245: 244: 237: 234: 232: 229: 227: 224: 222: 219: 217: 214: 212: 209: 207: 204: 203: 200: 195: 194: 185: 182: 180: 177: 175: 172: 171: 170: 166: 164: 163:Maker culture 161: 159: 156: 154: 151: 149: 148: 144: 142: 139: 138: 135: 131: 126: 125: 118: 115: 113: 110: 108: 105: 103: 100: 99: 96: 91: 90: 87: 84: 83: 79: 78: 72: 68: 64: 60: 56: 52: 45: 41: 34: 33:Phone hacking 19: 2416:Phreaky Boys 2350:. Retrieved 2346: 2336: 2325: 2316: 2302: 2291:. Retrieved 2287:the original 2277: 2266:. Retrieved 2255: 2244:. Retrieved 2234: 2222:. Retrieved 2201: 2190:. Retrieved 2170: 2159:. Retrieved 2139: 2128:. Retrieved 2119: 2111: 2104:. Retrieved 2100: 2090: 2079:. Retrieved 2059: 2050: 2031:24 September 2029:. Retrieved 2025:the original 2020:The Atlantic 2018: 2008: 1997:. Retrieved 1993:the original 1983: 1972:. Retrieved 1968:the original 1963: 1953: 1942:. Retrieved 1938: 1928: 1917:. Retrieved 1908: 1897:. Retrieved 1893:the original 1882: 1871:. Retrieved 1862: 1850:. Retrieved 1846:the original 1841: 1837: 1828: 1818: 1809: 1790: 1781: 1770:. Retrieved 1766: 1756: 1727:. Retrieved 1723:the original 1712: 1692: 1685: 1674:. Retrieved 1654: 1642:. Retrieved 1638: 1628: 1619: 1584: 1575: 1564:. Retrieved 1560: 1551: 1514: 1495:Novation CAT 1477: 1445: 1436: 1427: 1418: 1417:In the book 1409: 1400: 1391: 1374: 1355: 1349: 1340: 1327: 1314: 1298: 1268:may contain 1267: 1232: 1208: 1199: 1195: 1177: 1163: 1154: 1150: 1135: 1115: 1108: 1097:Phiber Optik 1064: 1049: 1040: 1029:Please help 1024:verification 1021: 996: 986: 983: 979: 974: 966: 964: 961: 956: 950: 934: 930: 928: 906: 903: 879: 876: 868: 858: 839:Cap'n Crunch 828: 813: 802:, a form of 800:tone dialing 789: 770: 766: 758: 750: 743: 732: 728: 691: 663: 653:co-founders 636: 632:phone phreak 631: 627: 623: 613: 609: 603: 602:of the word 595: 583: 582: 540: 533: 521: 516:Publications 361:Trojan horse 326:HackThisSite 145: 101: 18:Phone phreak 2551:Magenta box 2435:Phone Trips 2095:Levi, Ran. 1447:Steins;Gate 1381:Will Graham 1209:The end of 1190:"home base" 1185:party lines 880:Phone Trips 865:Bell System 835:John Draper 715:black boxes 620:frequencies 529:Hacker News 416:Infostealer 199:Conferences 153:Hackerspace 2620:Categories 2572:Silver box 2530:Orange box 2408:See also, 2352:8 February 2293:2013-11-30 2268:2014-07-24 2246:2014-07-24 2192:2019-09-11 2161:2019-09-11 2130:2008-06-21 2081:2013-11-30 1999:2008-06-21 1974:2011-10-12 1944:2011-10-12 1919:2010-09-04 1899:2013-11-30 1873:2008-06-21 1772:2014-12-25 1729:2014-07-24 1676:2014-07-25 1665:. BizFon. 1566:2021-10-17 1544:References 1402:Twin Peaks 1334:2600 hertz 1301:March 2018 1270:irrelevant 1219:T1 carrier 1183:boxes and 1181:voice mail 1132:Toll fraud 920:Steve Jobs 886:Blue boxes 786:2600 hertz 780:2600 hertz 711:blue boxes 655:Steve Jobs 651:Apple Inc. 647:blue boxes 386:Logic bomb 381:Ransomware 158:Hacktivism 2626:Phreaking 2586:Clear box 2579:Black box 2565:Green box 2516:Beige box 2429:AusPhreak 1717:SoftCab. 1583:(2002) . 1438:Underrail 1411:Mr. Robot 1285:citations 1160:Diverters 1043:July 2014 993:black box 719:red boxes 608:with the 584:Phreaking 504:Blue team 496:(defunct) 490:(defunct) 484:(defunct) 478:(defunct) 466:Anonymous 406:Web shell 256:Crimeware 236:Summercon 184:White hat 174:Black hat 167:Types of 141:Hackathon 102:Phreaking 2558:Blue box 2523:Gold box 2390:. – via 2215:Archived 2183:Archived 2152:Archived 2072:Archived 1667:Archived 1485:BlueBEEP 1455:See also 1376:Hannibal 1356:Aletheia 1354:episode 1342:The Core 1329:Sneakers 1316:WarGames 1289:reliable 1126:internet 1084:monopoly 997:Ramparts 989:magazine 987:Ramparts 900:Blue box 894:Blue box 831:recorder 796:switches 792:AT&T 694:whistles 628:phreaker 500:Red team 356:Backdoor 231:ShmooCon 179:Grey hat 2544:Red box 2388:Esquire 2347:CBR.com 2224:25 June 1852:24 June 1393:Hackers 1368:treason 1364:ARPANET 1348:In the 1079:hackers 947:the man 943:Yippies 907:Esquire 808:2600 Hz 698:2600 Hz 688:History 592:culture 488:LulzSec 376:Spyware 351:Rootkit 344:Malware 296:Payload 286:Exploit 216:DEF CON 169:hackers 95:History 1797:  1700:  1644:26 May 1639:NewsOK 1593:  1516:Phrack 1321:hacker 1142:Sprint 1110:Phrack 1099:) and 717:, and 624:Phreak 596:phreak 542:Phrack 459:Groups 391:Botnet 331:Zone-H 63:Phreex 2464:via: 2392:Slate 2218:(PDF) 2211:(PDF) 2186:(PDF) 2179:(PDF) 2155:(PDF) 2148:(PDF) 2106:9 May 2075:(PDF) 2068:(PDF) 1964:Slate 1939:Slate 1820:Wired 1670:(PDF) 1663:(PDF) 1360:Paris 1167:1-900 1075:modem 630:, or 615:phone 612:from 605:freak 598:is a 588:slang 586:is a 366:Virus 134:ethic 71:Freax 69:, or 67:Freex 59:freek 55:freak 2462:UCLA 2456:for 2354:2022 2226:2022 2108:2022 2033:2015 1854:2011 1795:ISBN 1698:ISBN 1646:2013 1591:ISBN 1291:and 1235:VOIP 1144:and 1136:The 951:YIPL 931:YIPL 918:and 773:DTMF 735:toll 657:and 401:HIDS 371:Worm 132:and 51:freq 2373:by 1287:to 1243:PBX 1239:FBI 1146:MCI 1120:'s 1086:of 1033:by 705:), 678:SS7 610:ph- 411:RCE 2622:: 2460:, 2386:. 2345:. 2324:. 2213:. 2110:. 2099:. 2070:. 2041:^ 2017:. 1962:. 1937:. 1842:43 1840:. 1836:. 1817:. 1765:. 1738:^ 1637:. 1618:. 1605:^ 1559:. 926:. 882:. 741:. 713:, 684:. 661:. 626:, 502:/ 65:, 61:, 57:, 53:, 2494:e 2487:t 2480:v 2394:. 2356:. 2296:. 2271:. 2249:. 2228:. 2195:. 2164:. 2133:. 2084:. 2035:. 2002:. 1977:. 1947:. 1922:. 1902:. 1876:. 1856:. 1823:. 1803:. 1775:. 1732:. 1706:. 1679:. 1648:. 1622:. 1599:. 1569:. 1387:. 1370:. 1303:) 1299:( 1295:. 1277:. 1103:( 1095:( 1056:) 1050:( 1045:) 1041:( 1027:. 933:( 572:e 565:t 558:v 73:. 46:. 35:. 20:)

Index

Phone phreak
Phone hacking
Phreak (commentator)
Class Action (band)
freq
freak
freek
Phreex
Freex
Freax
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.