1165:
would close, they would program the call diverting equipment to answer all calls, pick up another phone line, call their answering service, and bridge the two lines together. This gave the appearance to the caller that they were directly forwarded to the company's answering service. The switching equipment would typically reset the line after the call had hung up and timed out back to dial tone, so the caller could simply wait after the answering service had disconnected, and would eventually get a usable dial tone from the second line. Phreakers recognized the opportunity this provided, and they would spend hours manually dialing businesses after hours, attempting to identify faulty diverters. Once a phreaker had access to one of these lines, they could use it for one of many purposes. In addition to completing phone calls anywhere in the world at the businesses' expense, they could also dial
1152:
7-digit card. While this is almost easy enough for people to do manually, computers made the task far easier. "Code hack" programs were developed for computers with modems. The modems would dial the long-distance access number, enter a random calling card number (of the proper number of digits), and attempt to complete a call to a computer bulletin board system (BBS). If the computer connected successfully to the BBS, it proved that it had found a working card number, and it saved that number to disk. If it did not connect to the BBS in a specified amount of time (usually 30 or 60 seconds), it would hang up and try a different code. Using this method, code hacking programs would turn up hundreds (or in some cases thousands) of working calling card numbers per day. These would subsequently be shared amongst fellow phreakers.
768:
possible ways. Depending on continent and country, one click with a following interval can be either "one" or "zero" and subsequent clicks before the interval are additively counted. This renders ten consecutive clicks being either "zero" or "nine", respectively. Some exchanges allow using additional clicks for special controls, but numbers 0-9 now fall in one of these two standards. One special code, "flash", is a very short single click, possible but hard to simulate. Back in the day of rotary dial, technically identical phone sets were marketed in multiple areas of the world, only with plugs matched by country and the dials being bezeled with the local standard numbers.
1148:, both of whom had only recently entered the marketplace. At the time, there was no way to switch a phone line to have calls automatically carried by non-AT&T companies. Customers of these small long-distance operations would be required to dial a local access number, enter their calling card number, and finally enter the area code and phone number they wish to call. Because of the relatively lengthy process for customers to complete a call, the companies kept the calling card numbers short – usually 6 or 7 digits. This opened up a huge vulnerability to phone phreaks with a computer.
891:
2602:
1463:
1170:
fraud to occur. By 1993, call forwarding was offered to nearly every business line subscriber, making these diverters obsolete. As a result, hackers stopped searching for the few remaining ones, and this method of toll fraud died. Many (different type) of diverters still exist and are actively "phreaked" in the United States as of 2020. It is rare to find a diverter solely used for
Answering Service forwarding anymore, but the many other types such as phone-company test numbers and remote PBX DISAs are still used as diverters.
878:
individual basis, and later within groups as they discovered each other in their travels. "Evan
Doorbell", "Ben" and "Neil" formed a group of phreaks, known as "Group Bell". Bernay initiated a similar group named the "Mark Bernay Society". Both Bernay and Evan received fame amongst today's phone phreakers for internet publications of their collection of telephone exploration recordings. These recordings, conducted in the 1960s, 1970s, and early 1980s are available at Mark's website
1013:
1259:
645:. By re-creating the signaling tones, phreaks could switch calls from the phone handset while avoiding long-distance calling charges which were common then. These fees could be significant, depending on the time, duration and destination of the call. To ease the creation of the routing tones, electronic tone generators known as
1192:
for communication with one another until the rightful owners discover the intrusion and wipe them off. Voice mailboxes also provide a safe phone number for phreaks to give out to one another as home phone numbers and personal cellular numbers would allow the phreak's identity (and home address) to be
1155:
There was no way for these small phone companies to identify the culprits of these hacks. They had no access to local phone company records of calls into their access numbers, and even if they had access, obtaining such records would be prohibitively expensive and time-consuming. While there was some
1151:
6-digit calling card numbers only offer 1 million combinations. 7-digit numbers offer just 10 million. If a company had 10,000 customers, a person attempting to "guess" a card number would have a good chance of doing so correctly once every 100 tries for a 6-digit card and once every 1000 tries for a
877:
The second generation of phreaks arose at this time, including New
Yorkers "Evan Doorbell", "Ben Decibel" and Neil R. Bell and Californians Mark Bernay, Chris Bernay, and "Alan from Canada". Each conducted their own independent exploration and experimentation of the telephone network, initially on an
721:
to help them explore the network and make free phone calls, hanging out on early conference call circuits and "loop arounds" to communicate with one another and writing their own newsletters to spread information. Phreaking was especially prevalent in universities, where it began spreading much like
700:
pitch used in phone signalling systems in the United States. Phone phreaks experimented with dialing around the telephone network to understand how the phone system worked, engaging in activities such as listening to the pattern of tones to figure out how calls were routed, reading obscure telephone
1090:
was forced into divestiture. During this time, exploration of telephone networks diminished, and phreaking focused more on toll fraud. Computer hackers began to use phreaking methods to find the telephone numbers for modems belonging to businesses, which they could exploit later. Groups then formed
873:
in an article describing the methods and frequencies used for inter-office signalling. The journal was intended for the company's engineers; however, it found its way to various college campuses across the United States. With this one article, the Bell System accidentally gave away the "keys to the
767:
By rapidly clicking the hook for a variable number of times at roughly 5 to 10 clicks per second, separated by intervals of roughly one second, the caller can dial numbers as if they were using the rotary dial. The pulse counter in the exchange counts the pulses or clicks and interprets them in two
1200:
The popularity of the
Internet in the mid-1990s, along with the better awareness of voice mail by business and cell phone owners, made the practice of stealing voice mailboxes less popular. To this day bridges are still very popular with phreakers yet, with the advent of VoIP, the use of telephone
1164:
Another method of obtaining free phone calls involves the use of "diverters". Call forwarding was not an available feature for many business phone lines in the late 1980s and early 1990s, so they were forced to buy equipment that could do the job manually between two phone lines. When the business
980:
TAP developed into a major source for subversive technical information among phreaks and hackers all over the world. TAP ran from 1973 to 1984, with Al Bell handing over the magazine to "Tom Edison" in the late 1970s. TAP ended publication in 1984 due mostly to a break-in and arson at Tom Edison's
957:
YIPL believes that education alone cannot affect the System, but education can be an invaluable tool for those willing to use it. Specifically, YIPL will show you why something must be done immediately in regard, of course, to the improper control of the communication in this country by none other
759:
Possibly one of the first phreaking methods was switch-hooking, which allows placing calls from a phone where the rotary dial or keypad has been disabled by a key lock or other means to prevent unauthorized calls from that phone. It is done by rapidly pressing and releasing the switch hook to open
729:
Before 1984, long-distance telephone calls were a premium item in the United States, with strict regulations. In some locations, calling across the street counted as long distance. To report that a phone call was long-distance meant an elevated importance because the calling party is paying by the
1187:
as ways to network and keep in touch over the telephone. They usually appropriate unused boxes that are part of business or cellular phone systems. Once a vulnerable mailbox system is discovered, word would spread around the phreak community, and scores of them would take residence on the system.
1169:
phone sex/entertainment numbers, as well as use the line to harass their enemies without fear of being traced. Victimized small businesses were usually required to foot the bill for the long-distance calls, as it was their own private equipment (not phone company security flaws) that allowed such
1081:
and others interested in the technology, and served as a medium for previously scattered independent phone phreaks to share their discoveries and experiments. This not only led to unprecedented collaboration between phone phreaks, but also spread the notion of phreaking to others who took it upon
1196:
Phreakers also use "bridges" to communicate live with one another. The term "bridge" originally referred to a group of telephone company test lines that were bridged together giving the effect of a party-line. Eventually, all party-lines, whether bridges or not, came to be known as bridges if
775:
capable exchange, can also be exploited by a tone dialer that generates the DTMF tones used by modern keypad units. These signals are now very uniformly standardized worldwide. It is notable that the two methods can be combined: Even if the exchange does not support DTMF, the key lock can be
810:
which causes a telephone switch to think the call had ended, leaving an open carrier line, which can be exploited to provide free long-distance, and international calls. At that time, long-distance calls were more expensive than local calls.
826:(a frequency of 2637.02 Hz) would stop a dialed phone recording. Unaware of what he had done, Engressia called the phone company and asked why the recordings had stopped. Joe Engressia is considered to be the father of phreaking.
1156:
advancement in tracking down these code hackers in the early 1990s, the problem did not completely disappear until most long-distance companies were able to offer standard 1+ dialing without the use of an access number.
2383:
953:, writers included a "shout-out" to all of the phreakers who provided technological information for the newsletter: "We at YIPL would like to offer thanks to all you phreaks out there." In the last issue, YIPL stated:
1959:
1888:
1273:
2014:
1178:
Before the BBS era of the 1980s phone phreaking was more of a solitary venture as it was difficult for phreaks to connect with one another. In addition to communicating over BBSs phone phreaks discover
1323:, David Lightman (Matthew Broderick), uses a pull-tab from an aluminum can, found on the ground at a truck stop, to make a free long-distance call via payphone to his friend (Ally Sheedy).
680:
system which uses out-of-band signaling for call control (and which is still in use to this day), therefore rendering blue boxes obsolete. Phreaking has since become closely linked with
829:
Other early phreaks, such as "Bill from New York" (William "Bill" Acker 1953-2015), began to develop a rudimentary understanding of how phone networks worked. Bill discovered that a
914:. This article featured Engressia and John Draper prominently, synonymising their names with phreaking. The article also attracted the interest of other soon-to-be phreaks, such as
751:
The tone system in the United States has been almost entirely replaced, but in some countries, in addition to new systems, the tone system is still available, for example in Italy.
1082:
themselves to study, experiment with, or exploit the telephone system. This was also at a time when the telephone company was a popular subject of discussion in the US, as the
1269:
863:(MF) controls. The slang term for these tones and their use was "Marty Freeman". The specific frequencies required were unknown to the general public until 1954, when the
1967:
1934:
1892:
2024:
760:
and close the subscriber circuit, simulating the pulses generated by the rotary dial. Even most current telephone exchanges support this method, as they need to be
744:
In the UK the situation was rather different due to the difference in technology between the
American and British systems, the main difference being the absence of
664:
The blue box era came to an end with the ever-increasing use of digital telephone networks which allowed telecommunication companies to discontinue the use of
845:(SF) controls. One can sound a long whistle to reset the line, followed by groups of whistles (a short tone for a "1", two for a "2", etc.) to dial numbers.
2307:
594:
of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term
776:
circumvented by switch-hooking, and the tone dialer can be then used to operate automated DTMF controlled services that can not be used with rotary dial.
1113:(a combination of the words phreak and hack) began circulation among BBSes, and focused on hacking, phreaking, and other related technological subjects.
841:
cereal boxes also produced a 2600 Hz tone when blown (providing his nickname, "Captain Crunch"). This allows control of phone systems that work on
290:
1833:
672:(CCS), through which dialing information was sent on a separate channel that was inaccessible to the telecom customer. By the 1980s, most of the
1441:, a character named Phreak can be found, who then can give the player an "orange box" that can be used to hack telephones throughout the metro.
1634:
1414:, Leslie Romero is described as being the best phreaker in the 'game', himself adding that he practically invented the practice of phreaking.
2065:"Youth International Party Line (YIPL) / Technological American Party (TAP), New York FBI files 100-NY-179649 and 117-NY-2905 (3.2 Mbytes)"
995:" used to make free long-distance phone calls, and included a very short parts list that could be used to construct one. AT&T forced
1245:
hacking. In 2015, Pakistani officials arrested a prominent phreaker who had amassed more than $ 50 million from PBX hacking activities.
570:
2321:
2071:
1405:, "Mr. C" uses phreaking techniques to disrupt prison security systems so he can make a private phone call without being overheard.
2492:
31:
This article is about the manipulation of telephone call routing. For the use of telephone technology to steal information, see
1124:. Phreaking as a subculture saw a brief dispersion in fear of criminal prosecution in the 1990s, before the popularity of the
1701:
400:
2261:
1691:
2182:
2151:
1718:
1345:, the hacker known as "Rat" uses phreaking to give Doctor Josh Keyes unlimited long-distance for life to prove his skills.
745:
1988:
1798:
859:
While single-frequency worked on certain phone routes, the most common signaling on the then long-distance network was
94:
2370:
999:
to pull all copies from shelves, but not before numerous copies were sold and many regular subscribers received them.
1666:
1594:
1140:
gave rise to many small companies intent on competing in the long-distance market. These included the then-fledgling
1052:
673:
2465:
2440:
2282:
2214:
874:
kingdom", and the intricacies of the phone system were at the disposal of people with a knowledge of electronics.
1213:(MF) phreaking in the lower 48 United States occurred on June 15, 2006, when the last exchange in the contiguous
111:
1350:
1034:
563:
1450:
Hashida Itaru is implied to use phreaking to hack an IBN5100 by requesting a gum wrapper in his supplies list.
1332:, one of a group of hackers is a phreak nicknamed "Whistler", presumably because he was able to replicate the
1526:
1292:
1128:
initiated a reemergence of phreaking as a subculture in the US and spread phreaking to international levels.
869:
830:
706:
503:
300:
183:
173:
806:, and included some tones which were for internal telephone company use. One internal-use tone is a tone of
2549:
2326:
210:
198:
17:
2428:
1396:, there is a character nicknamed "The Phantom Phreak" or "Phreak" for short, who specializes in phreaking.
2485:
2096:
285:
1845:
2342:
1478:
1423:, phreaking is referenced as a clue to find the Jade Key - a series of clues in OASIS to win a fortune.
1288:
1222:
1078:
1030:
842:
522:
260:
2630:
854:
734:
556:
305:
2453:
1217:
to use a "phreakable" MF-signalled trunk replaced the aging (yet still well kept) N2 carrier with a
981:
residence in 1983. Cheshire
Catalyst then took over running the magazine for its final (1984) year.
1284:
1100:
669:
481:
440:
410:
360:
1960:""Secrets of the Little Blue Box": The 1971 article about phone hacking that inspired Steve Jobs"
1509:
1380:
1242:
1137:
1023:
991:(June 1972) increased interest in phreaking. This article published simple schematic plans of a "
677:
220:
733:
Some phreaking consists of techniques to evade long-distance charges, which is criminalized as "
2478:
1747:
1184:
1104:
1070:
761:
475:
58:
54:
1116:
In the early 1990s, groups like
Masters of Deception and Legion of Doom were shut down by the
2584:
2577:
2563:
2514:
992:
823:
791:
714:
642:
50:
2521:
2064:
1585:
1375:
1328:
1092:
710:
599:
493:
435:
355:
39:
8:
2542:
2374:
1489:
1087:
985:
718:
638:
470:
295:
205:
43:
1193:
discovered. This is especially important given that phone phreaks are breaking the law.
2625:
2387:
1815:"Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell"
1121:
905:
795:
723:
2415:
2606:
1814:
1794:
1791:
Exploding the Phone: The Untold Story of the
Teenagers and Outlaws who Hacked Ma Bell
1697:
1590:
1536:
1531:
1504:
1468:
1384:
1379:, the titular character phreaks a phone from his cell in order to get the address of
1201:
company-owned bridges has decreased slightly in favor of phreaker-owned conferences.
1117:
1066:
962:
In 1973, Al Bell would move YIPL over and start TAP (Technological
American Party).
837:
discovered through his friendship with
Engressia that the free whistles given out in
803:
665:
465:
428:
395:
1432:, a character uses a flute to phreak a public telephone in order to call for a taxi.
984:
A controversially suppressed article "Regulating the Phone Company In Your Home" in
890:
2397:
2391:
2239:
1819:
1419:
1280:
445:
146:
70:
1210:
1077:) created an influx of tech-savvy users. These BBSes became popular for computer
970:
860:
838:
738:
702:
681:
225:
116:
85:
2322:"The Inside Story Of How Pakistan Took Down The FBI's Most-Wanted Cybercriminal"
2175:
2144:
1935:"Steve Jobs and Me: He said my 1971 article inspired him. His iBook obsessed me"
2112:
The Cheshire Catalyst is Richard Cheshire, former editor of the TAP Newsletter.
1762:
1722:
1580:
1428:
1392:
923:
819:
534:
365:
318:
248:
129:
106:
2208:"Building Hacker Collective Identity One Text Phile at a Time: Reading Phrack"
66:
2619:
2535:
2501:
2379:
2308:"How Filipino phreakers turned PBX systems into cash machines for terrorists"
1992:
1615:
1556:
1521:
1499:
1214:
1141:
938:
915:
911:
658:
370:
265:
162:
32:
1557:"Phreaking - Definition and synonyms of phreaking in the English dictionary"
2418:
Recordings made in 1990 of voice mail box systems compromised by phreakers.
2019:
1913:
1786:
1659:
1635:"Hung Up Glenpool Has Long-Distance Woes In Making Calls Across the Street"
1494:
1096:
799:
458:
325:
278:
133:
2409:
649:
became a staple of the phreaker community. This community included future
2207:
2097:"SEASON 3 Episode 50 : 'Pa Bell' Vs. Youth International Party Line"
1446:
864:
834:
528:
415:
152:
2286:
2015:"The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking"
1889:"The article that inspired Steve Jobs: "Secrets of the Little Blue Box""
833:
he owned could also play the tone at 2600 Hz with the same effect.
2570:
2528:
2124:
1401:
1333:
1180:
1037: in this section. Unsourced material may be challenged and removed.
919:
815:
785:
697:
654:
650:
385:
380:
157:
2343:"Why Infinity Train Was Able to Include a 'How To' for an Illegal Act"
1362:
in 1979 as a prank. On October 27, 1980, Finch uses phreaking to hack
910:
magazine published a story called "Secrets of the Little Blue Box" by
668:
for call routing purposes. Instead, telecom companies began employing
2434:
1616:"Phreaking | Telecom Security, History & Techniques | Britannica"
1437:
1410:
1218:
1189:
619:
614:
405:
255:
235:
140:
62:
2240:"W32.Bugbear.B Worm Identified As Targeting Banks | Scoop News"
1867:
1012:
634:
are names used for and by individuals who participate in phreaking.
2556:
2402:
1484:
1341:
1315:
1145:
1125:
1091:
around the BBS hacker/phreaking (H/P) community such as the famous
1083:
899:
737:
fraud". In 1990, the pager cloning technique arose and was used by
693:
646:
499:
230:
178:
2470:
1693:
Prosecutor's Manual for Arrest, Search and Seizure, Third Edition
1367:
1363:
946:
942:
807:
692:
Phreaking began in the 1960s when it was discovered that certain
591:
487:
375:
350:
343:
215:
1358:, main character Harold Finch uses phreaking to call someone in
2457:
2371:
Five Students Psych Bell System, Place Free Long Distance Calls
1515:
1320:
1109:
541:
390:
330:
168:
38:"Phreak" and "Phreaks" redirect here. For the commentator, see
2446:
1204:
1359:
1166:
1074:
904:
In October 1971, phreaking was introduced to the masses when
604:
587:
1237:
systems. In 2011, the government of the Philippines and the
965:
Al Bell was denied opening a bank account under the name of
2461:
2449:- an attempt to catalog all 8/16 bit wardialers and similar
2283:"Telephone World - Sounds & Recordings from Wawina, MN"
1234:
772:
1225:, was run by the Northern Telephone Company of Minnesota.
2423:
1238:
1233:
Recent notable instances of phreaking involve hacking of
2088:
1834:"Bell System Technical Journal, v43: i5 September 1964"
2262:"AT&T sues two over scheme to steal customer data"
949:", mostly involving telephones. In the first issue of
790:
The origins of phone phreaking trace back at least to
1610:
1608:
1606:
1458:
676:(PSTN) in the US and Western Europe had adopted the
701:company technical journals (often obtained through
2405:Large collection of phreaking-related text files.
2259:
1689:
1603:
1241:arrested four hackers for phone phreaking through
814:The tone was discovered in approximately 1957, by
1197:primarily populated by hackers and/or phreakers.
771:Such key-locked telephones, if wired to a modern
618:, and may also refer to the use of various audio
2617:
2437:Large collection of historical phone recordings.
2431:- Australia's oldest and largest phreaking forum
1107:) groups. In 1985, an underground e-zine called
1173:
1660:"Notice to our customers regarding Toll Fraud"
754:
2486:
2012:
1683:
1366:, an action that causes him to be wanted for
564:
2441:Sounds & Recordings of Wawina, Minnesota
818:, a blind seven-year-old boy. Engressia had
2145:"Regulating the Phone Company In Your Home"
1205:End of multi-frequency in the United States
2493:
2479:
637:The term first referred to groups who had
590:term coined to describe the activity of a
571:
557:
1957:
1932:
1886:
1053:Learn how and when to remove this message
1793:. New York: Grove/Atlantic, corporated.
1741:
1739:
1690:John M. Castellano (15 September 2017).
1579:
889:
1785:
1228:
748:, particularly in the 1950s and 1960s.
14:
2618:
2340:
2275:
1745:
1336:signal used in phreaking by whistling.
941:and Al Bell to provide information to
2474:
2205:
2044:
2042:
1760:
1736:
1632:
1589:. McLean, Virginia: IndyPublish.com.
1248:
794:'s implementation of fully automatic
730:minute to speak to the called party.
709:, building electronic devices called
1252:
1065:In the 1980s, the revolution of the
1035:adding citations to reliable sources
1006:
822:, and discovered that whistling the
2500:
2398:The History of Phone Phreaking .org
2341:Childs, Kelvin (12 December 2020).
2048:
1844:(5). September 1964. Archived from
1716:
291:forensics-focused operating systems
27:Hacking of analog telephone network
24:
2454:The Secrets of the Little Pamphlet
2039:
2013:Lapsley, Phil (20 February 2013).
1813:Lapsley, Phil (February 5, 2013).
1283:by removing the content or adding
848:
641:the system of tones used to route
25:
2642:
2369:Bevard, Charles W. (1966-05-31).
2363:
2260:Angela Moscaritolo (2011-03-18).
2023:. theatlantic.com. Archived from
1958:Rosenbaum, Ron (7 October 2011).
1933:Rosenbaum, Ron (7 October 2011).
867:published the information in the
674:public switched telephone network
2600:
2384:"Secrets of the Little Blue Box"
2094:
1914:"Secrets of the Little Blue Box"
1461:
1257:
1011:
1002:
975:Technological Assistance Program
929:1971 also saw the beginnings of
2510:
2334:
2314:
2300:
2253:
2232:
2220:from the original on 2022-10-09
2199:
2188:from the original on 2022-10-09
2168:
2157:from the original on 2022-10-09
2137:
2117:
2077:from the original on 2022-10-09
2057:
2006:
1981:
1951:
1926:
1906:
1880:
1860:
1826:
1807:
1779:
1672:from the original on 2022-10-09
1069:and the popularity of computer
1022:needs additional citations for
112:Hacking of consumer electronics
1754:
1746:Robson, Gary D. (April 2004).
1721:. Modemspy.com. Archived from
1710:
1652:
1626:
1573:
1549:
935:Youth International Party Line
764:with old subscriber hardware.
622:to manipulate a phone system.
13:
1:
2452:Christina Xu. (May 12, 2008)
2285:. Phworld.org. Archived from
1887:Rosenbaum, Ron (2011-10-07).
1838:Bell System Technical Journal
1763:"COMPLETE HISTORY OF HACKING"
1543:
1527:Social engineering (security)
1131:
885:
870:Bell System Technical Journal
779:
2327:International Business Times
2125:"Cheshire's Book - TAP.HTML"
2051:Phreaks, Hackers, and Trolls
1696:. LexisNexis. p. 1346.
1221:. This exchange, located in
1188:They use these systems as a
1174:Voice mail boxes and bridges
1159:
973:, so he changed the name to
967:Technological American Party
958:than bell telephone company.
937:), a publication started by
211:Chaos Communication Congress
7:
2424:Digital Information Society
1891:. Slate.com. Archived from
1761:DELON (February 27, 2008).
1633:Stott, Kim (22 July 1983).
1454:
1373:During the third season of
755:Switch hook and tone dialer
10:
2647:
1748:"The Origins of Phreaking"
1479:2600: The Hacker Quarterly
1223:Wawina Township, Minnesota
897:
852:
783:
746:tone dialing and signaling
726:in the following decades.
687:
523:2600: The Hacker Quarterly
261:List of computer criminals
29:
2597:
2508:
2242:. Scoop.co.nz. 2003-06-09
1767:Hacking | LEMNISCATE
1279:Please help Knowledge to
855:Multi-frequency signaling
1408:In the second season of
670:common-channel signaling
441:Cloud computing security
49:Not to be confused with
1510:Phone Losers of America
1426:In the animated series
1399:In the third season of
977:to get a bank account.
922:, who went on to found
824:fourth E above middle C
221:Hackers on Planet Earth
2403:Textfiles.com / phreak
2176:"Ma Bell vs. Ramparts"
1073:(BBSes) (accessed via
1071:bulletin board systems
960:
895:
798:. These switches used
724:computer hacking would
476:Homebrew Computer Club
2607:Telephones portal
1719:"Phone Call Recorder"
1138:1984 AT&T breakup
969:, since he was not a
955:
893:
2458:Christopher M. Kelty
2049:Coleman, Gabriella.
1989:"Welcome to Woz.org"
1586:The Hacker Crackdown
1281:improve this article
1229:From 2010 to present
1093:Masters of Deception
1088:AT&T Corporation
1031:improve this article
696:could replicate the
600:sensational spelling
494:Masters of Deception
436:Application security
42:. For the band, see
40:Phreak (commentator)
2375:The Harvard Crimson
2310:. 30 November 2011.
2027:on 24 February 2013
1750:. Blacklisted! 411.
1490:Busy line interrupt
1293:independent sources
762:backward compatible
643:long-distance calls
471:Chaos Computer Club
206:Black Hat Briefings
80:Part of a series on
44:Class Action (band)
2206:Lunceford, Brett.
1620:www.britannica.com
1351:Person of Interest
1249:In popular culture
1122:Operation Sundevil
896:
707:social engineering
639:reverse engineered
301:Social engineering
2613:
2612:
2592:
2591:
2443:– Telephone World
2410:audio conferences
2382:. (October 1971)
1848:on March 14, 2012
1703:978-1-63284-068-4
1537:Van Eck phreaking
1532:Software cracking
1505:Telephone tapping
1469:Telephones portal
1390:In the 1995 film
1385:Francis Dolarhyde
1310:
1309:
1118:US Secret Service
1067:personal computer
1063:
1062:
1055:
804:in-band signaling
666:in-band signaling
581:
580:
429:Computer security
396:Keystroke logging
16:(Redirected from
2638:
2631:Telephone crimes
2605:
2604:
2603:
2587:
2580:
2573:
2566:
2559:
2552:
2545:
2538:
2531:
2524:
2517:
2511:
2495:
2488:
2481:
2472:
2471:
2466:All of the Above
2358:
2357:
2355:
2353:
2338:
2332:
2331:
2330:. 30 March 2015.
2318:
2312:
2311:
2304:
2298:
2297:
2295:
2294:
2279:
2273:
2272:
2270:
2269:
2257:
2251:
2250:
2248:
2247:
2236:
2230:
2229:
2227:
2225:
2219:
2212:
2203:
2197:
2196:
2194:
2193:
2187:
2180:
2172:
2166:
2165:
2163:
2162:
2156:
2149:
2141:
2135:
2134:
2132:
2131:
2121:
2115:
2114:
2109:
2107:
2092:
2086:
2085:
2083:
2082:
2076:
2069:
2061:
2055:
2054:
2046:
2037:
2036:
2034:
2032:
2010:
2004:
2003:
2001:
2000:
1991:. Archived from
1985:
1979:
1978:
1976:
1975:
1966:. Archived from
1955:
1949:
1948:
1946:
1945:
1930:
1924:
1923:
1921:
1920:
1910:
1904:
1903:
1901:
1900:
1884:
1878:
1877:
1875:
1874:
1864:
1858:
1857:
1855:
1853:
1830:
1824:
1811:
1805:
1804:
1783:
1777:
1776:
1774:
1773:
1758:
1752:
1751:
1743:
1734:
1733:
1731:
1730:
1725:on 23 March 2019
1714:
1708:
1707:
1687:
1681:
1680:
1678:
1677:
1671:
1664:
1656:
1650:
1649:
1647:
1645:
1630:
1624:
1623:
1612:
1601:
1600:
1577:
1571:
1570:
1568:
1567:
1553:
1471:
1466:
1465:
1464:
1420:Ready Player One
1319:(1983), a young
1305:
1302:
1296:
1261:
1260:
1253:
1058:
1051:
1047:
1044:
1038:
1015:
1007:
945:on how to "beat
843:single frequency
682:computer hacking
573:
566:
559:
446:Network security
147:Hacker Manifesto
86:Computer hacking
77:
76:
74:
47:
36:
21:
2646:
2645:
2641:
2640:
2639:
2637:
2636:
2635:
2616:
2615:
2614:
2609:
2601:
2599:
2593:
2585:
2578:
2571:
2564:
2557:
2550:
2543:
2536:
2529:
2522:
2515:
2504:
2502:Phreaking boxes
2499:
2412:. Textfiles.com
2366:
2361:
2351:
2349:
2339:
2335:
2320:
2319:
2315:
2306:
2305:
2301:
2292:
2290:
2281:
2280:
2276:
2267:
2265:
2258:
2254:
2245:
2243:
2238:
2237:
2233:
2223:
2221:
2217:
2210:
2204:
2200:
2191:
2189:
2185:
2178:
2174:
2173:
2169:
2160:
2158:
2154:
2147:
2143:
2142:
2138:
2129:
2127:
2123:
2122:
2118:
2105:
2103:
2093:
2089:
2080:
2078:
2074:
2067:
2063:
2062:
2058:
2047:
2040:
2030:
2028:
2011:
2007:
1998:
1996:
1987:
1986:
1982:
1973:
1971:
1956:
1952:
1943:
1941:
1931:
1927:
1918:
1916:
1912:
1911:
1907:
1898:
1896:
1885:
1881:
1872:
1870:
1866:
1865:
1861:
1851:
1849:
1832:
1831:
1827:
1812:
1808:
1801:
1784:
1780:
1771:
1769:
1759:
1755:
1744:
1737:
1728:
1726:
1715:
1711:
1704:
1688:
1684:
1675:
1673:
1669:
1662:
1658:
1657:
1653:
1643:
1641:
1631:
1627:
1614:
1613:
1604:
1597:
1581:Sterling, Bruce
1578:
1574:
1565:
1563:
1555:
1554:
1550:
1546:
1541:
1467:
1462:
1460:
1457:
1435:In the PC game
1306:
1300:
1297:
1278:
1274:popular culture
1262:
1258:
1251:
1231:
1211:multi-frequency
1207:
1176:
1162:
1134:
1059:
1048:
1042:
1039:
1028:
1016:
1005:
971:political party
902:
888:
861:multi-frequency
857:
851:
849:Multi frequency
788:
782:
757:
739:law enforcement
703:dumpster diving
690:
577:
548:
547:
517:
509:
508:
461:
451:
450:
431:
421:
420:
346:
336:
335:
321:
311:
310:
281:
271:
270:
251:
241:
240:
226:Security BSides
201:
191:
190:
136:
122:
121:
117:List of hackers
97:
75:
48:
37:
30:
28:
23:
22:
15:
12:
11:
5:
2644:
2634:
2633:
2628:
2611:
2610:
2598:
2595:
2594:
2590:
2589:
2582:
2575:
2568:
2561:
2554:
2547:
2540:
2533:
2526:
2519:
2509:
2506:
2505:
2498:
2497:
2490:
2483:
2475:
2469:
2468:
2450:
2447:WarDialers.org
2444:
2438:
2432:
2426:
2421:
2420:
2419:
2413:
2400:
2395:
2380:Rosenbaum, Ron
2377:
2365:
2364:External links
2362:
2360:
2359:
2333:
2313:
2299:
2274:
2252:
2231:
2198:
2181:. 1972-05-20.
2167:
2136:
2116:
2101:Malicious Life
2087:
2056:
2053:. p. 104.
2038:
2005:
1980:
1950:
1925:
1905:
1879:
1859:
1825:
1806:
1800:978-0802120618
1799:
1789:(2013-11-02).
1778:
1753:
1735:
1709:
1702:
1682:
1651:
1625:
1602:
1595:
1572:
1561:educalingo.com
1547:
1545:
1542:
1540:
1539:
1534:
1529:
1524:
1519:
1512:
1507:
1502:
1497:
1492:
1487:
1482:
1474:
1473:
1472:
1456:
1453:
1452:
1451:
1442:
1433:
1429:Infinity Train
1424:
1415:
1406:
1397:
1388:
1383:to pass on to
1371:
1346:
1337:
1324:
1308:
1307:
1272:references to
1265:
1263:
1256:
1250:
1247:
1230:
1227:
1206:
1203:
1175:
1172:
1161:
1158:
1133:
1130:
1101:Legion of Doom
1061:
1060:
1019:
1017:
1010:
1004:
1001:
924:Apple Computer
898:Main article:
887:
884:
853:Main article:
850:
847:
784:Main article:
781:
778:
756:
753:
689:
686:
579:
578:
576:
575:
568:
561:
553:
550:
549:
546:
545:
538:
535:Nuts and Volts
531:
526:
518:
515:
514:
511:
510:
507:
506:
497:
491:
485:
482:Legion of Doom
479:
473:
468:
462:
457:
456:
453:
452:
449:
448:
443:
438:
432:
427:
426:
423:
422:
419:
418:
413:
408:
403:
398:
393:
388:
383:
378:
373:
368:
363:
358:
353:
347:
342:
341:
338:
337:
334:
333:
328:
322:
319:Practice sites
317:
316:
313:
312:
309:
308:
303:
298:
293:
288:
282:
277:
276:
273:
272:
269:
268:
263:
258:
252:
249:Computer crime
247:
246:
243:
242:
239:
238:
233:
228:
223:
218:
213:
208:
202:
197:
196:
193:
192:
189:
188:
187:
186:
181:
176:
165:
160:
155:
150:
143:
137:
130:Hacker culture
128:
127:
124:
123:
120:
119:
114:
109:
107:Cryptovirology
104:
98:
93:
92:
89:
88:
82:
81:
26:
9:
6:
4:
3:
2:
2643:
2632:
2629:
2627:
2624:
2623:
2621:
2608:
2596:
2588:
2583:
2581:
2576:
2574:
2569:
2567:
2562:
2560:
2555:
2553:
2548:
2546:
2541:
2539:
2537:Vermilion box
2534:
2532:
2527:
2525:
2520:
2518:
2513:
2512:
2507:
2503:
2496:
2491:
2489:
2484:
2482:
2477:
2476:
2473:
2467:
2463:
2459:
2455:
2451:
2448:
2445:
2442:
2439:
2436:
2433:
2430:
2427:
2425:
2422:
2417:
2414:
2411:
2407:
2406:
2404:
2401:
2399:
2396:
2393:
2389:
2385:
2381:
2378:
2376:
2372:
2368:
2367:
2348:
2344:
2337:
2329:
2328:
2323:
2317:
2309:
2303:
2289:on 2013-12-03
2288:
2284:
2278:
2264:. SC Magazine
2263:
2256:
2241:
2235:
2216:
2209:
2202:
2184:
2177:
2171:
2153:
2150:. June 1972.
2146:
2140:
2126:
2120:
2113:
2102:
2098:
2091:
2073:
2066:
2060:
2052:
2045:
2043:
2026:
2022:
2021:
2016:
2009:
1995:on 2018-04-12
1994:
1990:
1984:
1970:on 2011-11-03
1969:
1965:
1961:
1954:
1940:
1936:
1929:
1915:
1909:
1895:on 2011-11-03
1894:
1890:
1883:
1869:
1868:"Phone Trips"
1863:
1847:
1843:
1839:
1835:
1829:
1822:
1821:
1816:
1810:
1802:
1796:
1792:
1788:
1787:Lapsley, Phil
1782:
1768:
1764:
1757:
1749:
1742:
1740:
1724:
1720:
1713:
1705:
1699:
1695:
1694:
1686:
1668:
1661:
1655:
1640:
1636:
1629:
1621:
1617:
1611:
1609:
1607:
1598:
1596:1-4043-0641-2
1592:
1588:
1587:
1582:
1576:
1562:
1558:
1552:
1548:
1538:
1535:
1533:
1530:
1528:
1525:
1523:
1522:Phreaking box
1520:
1518:
1517:
1513:
1511:
1508:
1506:
1503:
1501:
1500:Phone hacking
1498:
1496:
1493:
1491:
1488:
1486:
1483:
1481:
1480:
1476:
1475:
1470:
1459:
1449:
1448:
1444:In the anime
1443:
1440:
1439:
1434:
1431:
1430:
1425:
1422:
1421:
1416:
1413:
1412:
1407:
1404:
1403:
1398:
1395:
1394:
1389:
1386:
1382:
1378:
1377:
1372:
1369:
1365:
1361:
1357:
1353:
1352:
1347:
1344:
1343:
1339:In the movie
1338:
1335:
1331:
1330:
1326:In the movie
1325:
1322:
1318:
1317:
1313:In the movie
1312:
1311:
1304:
1294:
1290:
1286:
1282:
1276:
1275:
1271:
1266:This article
1264:
1255:
1254:
1246:
1244:
1240:
1236:
1226:
1224:
1220:
1216:
1215:United States
1212:
1202:
1198:
1194:
1191:
1186:
1182:
1171:
1168:
1157:
1153:
1149:
1147:
1143:
1139:
1129:
1127:
1123:
1119:
1114:
1112:
1111:
1106:
1105:Erik Bloodaxe
1102:
1098:
1094:
1089:
1085:
1080:
1076:
1072:
1068:
1057:
1054:
1046:
1036:
1032:
1026:
1025:
1020:This section
1018:
1014:
1009:
1008:
1003:Phone hacking
1000:
998:
994:
990:
988:
982:
978:
976:
972:
968:
963:
959:
954:
952:
948:
944:
940:
939:Abbie Hoffman
936:
932:
927:
925:
921:
917:
916:Steve Wozniak
913:
912:Ron Rosenbaum
909:
908:
901:
892:
883:
881:
875:
872:
871:
866:
862:
856:
846:
844:
840:
836:
832:
827:
825:
821:
820:perfect pitch
817:
816:Joe Engressia
812:
809:
805:
801:
797:
793:
787:
777:
774:
769:
765:
763:
752:
749:
747:
742:
740:
736:
731:
727:
725:
720:
716:
712:
708:
704:
699:
695:
685:
683:
679:
675:
671:
667:
662:
660:
659:Steve Wozniak
656:
652:
648:
644:
640:
635:
633:
629:
625:
621:
617:
616:
611:
607:
606:
601:
597:
593:
589:
585:
574:
569:
567:
562:
560:
555:
554:
552:
551:
544:
543:
539:
537:
536:
532:
530:
527:
525:
524:
520:
519:
513:
512:
505:
501:
498:
495:
492:
489:
486:
483:
480:
477:
474:
472:
469:
467:
464:
463:
460:
455:
454:
447:
444:
442:
439:
437:
434:
433:
430:
425:
424:
417:
414:
412:
409:
407:
404:
402:
399:
397:
394:
392:
389:
387:
384:
382:
379:
377:
374:
372:
369:
367:
364:
362:
359:
357:
354:
352:
349:
348:
345:
340:
339:
332:
329:
327:
324:
323:
320:
315:
314:
307:
306:Vulnerability
304:
302:
299:
297:
294:
292:
289:
287:
284:
283:
280:
279:Hacking tools
275:
274:
267:
266:Script kiddie
264:
262:
259:
257:
254:
253:
250:
245:
244:
237:
234:
232:
229:
227:
224:
222:
219:
217:
214:
212:
209:
207:
204:
203:
200:
195:
194:
185:
182:
180:
177:
175:
172:
171:
170:
166:
164:
163:Maker culture
161:
159:
156:
154:
151:
149:
148:
144:
142:
139:
138:
135:
131:
126:
125:
118:
115:
113:
110:
108:
105:
103:
100:
99:
96:
91:
90:
87:
84:
83:
79:
78:
72:
68:
64:
60:
56:
52:
45:
41:
34:
33:Phone hacking
19:
2416:Phreaky Boys
2350:. Retrieved
2346:
2336:
2325:
2316:
2302:
2291:. Retrieved
2287:the original
2277:
2266:. Retrieved
2255:
2244:. Retrieved
2234:
2222:. Retrieved
2201:
2190:. Retrieved
2170:
2159:. Retrieved
2139:
2128:. Retrieved
2119:
2111:
2104:. Retrieved
2100:
2090:
2079:. Retrieved
2059:
2050:
2031:24 September
2029:. Retrieved
2025:the original
2020:The Atlantic
2018:
2008:
1997:. Retrieved
1993:the original
1983:
1972:. Retrieved
1968:the original
1963:
1953:
1942:. Retrieved
1938:
1928:
1917:. Retrieved
1908:
1897:. Retrieved
1893:the original
1882:
1871:. Retrieved
1862:
1850:. Retrieved
1846:the original
1841:
1837:
1828:
1818:
1809:
1790:
1781:
1770:. Retrieved
1766:
1756:
1727:. Retrieved
1723:the original
1712:
1692:
1685:
1674:. Retrieved
1654:
1642:. Retrieved
1638:
1628:
1619:
1584:
1575:
1564:. Retrieved
1560:
1551:
1514:
1495:Novation CAT
1477:
1445:
1436:
1427:
1418:
1417:In the book
1409:
1400:
1391:
1374:
1355:
1349:
1340:
1327:
1314:
1298:
1268:may contain
1267:
1232:
1208:
1199:
1195:
1177:
1163:
1154:
1150:
1135:
1115:
1108:
1097:Phiber Optik
1064:
1049:
1040:
1029:Please help
1024:verification
1021:
996:
986:
983:
979:
974:
966:
964:
961:
956:
950:
934:
930:
928:
906:
903:
879:
876:
868:
858:
839:Cap'n Crunch
828:
813:
802:, a form of
800:tone dialing
789:
770:
766:
758:
750:
743:
732:
728:
691:
663:
653:co-founders
636:
632:phone phreak
631:
627:
623:
613:
609:
603:
602:of the word
595:
583:
582:
540:
533:
521:
516:Publications
361:Trojan horse
326:HackThisSite
145:
101:
18:Phone phreak
2551:Magenta box
2435:Phone Trips
2095:Levi, Ran.
1447:Steins;Gate
1381:Will Graham
1209:The end of
1190:"home base"
1185:party lines
880:Phone Trips
865:Bell System
835:John Draper
715:black boxes
620:frequencies
529:Hacker News
416:Infostealer
199:Conferences
153:Hackerspace
2620:Categories
2572:Silver box
2530:Orange box
2408:See also,
2352:8 February
2293:2013-11-30
2268:2014-07-24
2246:2014-07-24
2192:2019-09-11
2161:2019-09-11
2130:2008-06-21
2081:2013-11-30
1999:2008-06-21
1974:2011-10-12
1944:2011-10-12
1919:2010-09-04
1899:2013-11-30
1873:2008-06-21
1772:2014-12-25
1729:2014-07-24
1676:2014-07-25
1665:. BizFon.
1566:2021-10-17
1544:References
1402:Twin Peaks
1334:2600 hertz
1301:March 2018
1270:irrelevant
1219:T1 carrier
1183:boxes and
1181:voice mail
1132:Toll fraud
920:Steve Jobs
886:Blue boxes
786:2600 hertz
780:2600 hertz
711:blue boxes
655:Steve Jobs
651:Apple Inc.
647:blue boxes
386:Logic bomb
381:Ransomware
158:Hacktivism
2626:Phreaking
2586:Clear box
2579:Black box
2565:Green box
2516:Beige box
2429:AusPhreak
1717:SoftCab.
1583:(2002) .
1438:Underrail
1411:Mr. Robot
1285:citations
1160:Diverters
1043:July 2014
993:black box
719:red boxes
608:with the
584:Phreaking
504:Blue team
496:(defunct)
490:(defunct)
484:(defunct)
478:(defunct)
466:Anonymous
406:Web shell
256:Crimeware
236:Summercon
184:White hat
174:Black hat
167:Types of
141:Hackathon
102:Phreaking
2558:Blue box
2523:Gold box
2390:. – via
2215:Archived
2183:Archived
2152:Archived
2072:Archived
1667:Archived
1485:BlueBEEP
1455:See also
1376:Hannibal
1356:Aletheia
1354:episode
1342:The Core
1329:Sneakers
1316:WarGames
1289:reliable
1126:internet
1084:monopoly
997:Ramparts
989:magazine
987:Ramparts
900:Blue box
894:Blue box
831:recorder
796:switches
792:AT&T
694:whistles
628:phreaker
500:Red team
356:Backdoor
231:ShmooCon
179:Grey hat
2544:Red box
2388:Esquire
2347:CBR.com
2224:25 June
1852:24 June
1393:Hackers
1368:treason
1364:ARPANET
1348:In the
1079:hackers
947:the man
943:Yippies
907:Esquire
808:2600 Hz
698:2600 Hz
688:History
592:culture
488:LulzSec
376:Spyware
351:Rootkit
344:Malware
296:Payload
286:Exploit
216:DEF CON
169:hackers
95:History
1797:
1700:
1644:26 May
1639:NewsOK
1593:
1516:Phrack
1321:hacker
1142:Sprint
1110:Phrack
1099:) and
717:, and
624:Phreak
596:phreak
542:Phrack
459:Groups
391:Botnet
331:Zone-H
63:Phreex
2464:via:
2392:Slate
2218:(PDF)
2211:(PDF)
2186:(PDF)
2179:(PDF)
2155:(PDF)
2148:(PDF)
2106:9 May
2075:(PDF)
2068:(PDF)
1964:Slate
1939:Slate
1820:Wired
1670:(PDF)
1663:(PDF)
1360:Paris
1167:1-900
1075:modem
630:, or
615:phone
612:from
605:freak
598:is a
588:slang
586:is a
366:Virus
134:ethic
71:Freax
69:, or
67:Freex
59:freek
55:freak
2462:UCLA
2456:for
2354:2022
2226:2022
2108:2022
2033:2015
1854:2011
1795:ISBN
1698:ISBN
1646:2013
1591:ISBN
1291:and
1235:VOIP
1144:and
1136:The
951:YIPL
931:YIPL
918:and
773:DTMF
735:toll
657:and
401:HIDS
371:Worm
132:and
51:freq
2373:by
1287:to
1243:PBX
1239:FBI
1146:MCI
1120:'s
1086:of
1033:by
705:),
678:SS7
610:ph-
411:RCE
2622::
2460:,
2386:.
2345:.
2324:.
2213:.
2110:.
2099:.
2070:.
2041:^
2017:.
1962:.
1937:.
1842:43
1840:.
1836:.
1817:.
1765:.
1738:^
1637:.
1618:.
1605:^
1559:.
926:.
882:.
741:.
713:,
684:.
661:.
626:,
502:/
65:,
61:,
57:,
53:,
2494:e
2487:t
2480:v
2394:.
2356:.
2296:.
2271:.
2249:.
2228:.
2195:.
2164:.
2133:.
2084:.
2035:.
2002:.
1977:.
1947:.
1922:.
1902:.
1876:.
1856:.
1823:.
1803:.
1775:.
1732:.
1706:.
1679:.
1648:.
1622:.
1599:.
1569:.
1387:.
1370:.
1303:)
1299:(
1295:.
1277:.
1103:(
1095:(
1056:)
1050:(
1045:)
1041:(
1027:.
933:(
572:e
565:t
558:v
73:.
46:.
35:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.