A Compilation of Phreaking Evidence from 2004-2011 - 25 pages .pdf (download)
Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. They are often mistakenly lumped in with criminal phone hackers. It is also a mistake to think that this was only a 1970's - 1980's phenomena.
Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. They are often mistakenly lumped in with criminal phone hackers. It is also a mistake to think that this was only a 1970's - 1980's phenomena.
• PABX/PBX hacking (phreaking) is common. It's organized crime and big business.
• Telephone systems everywhere are targets and telecommunications bandits know how to gain access to your phone system by reconfiguring it to route their own calls through it.
• Phreakers can hack phone systems, voicemail boxes and PINs in a few seconds to gain illegal access to your extensions.
• Most toll fraud is generated after hours and on holidays when it's least likely to be detected.
• Phreakers can gain the most by routing expensive international calls through private phone systems.
• Terrorist organisations use telecommunications fraud to generate funds by illegally gaining access to private phone systems and then re-selling the service.
• Many businesses leave their phone systems completely unprotected.
• You will end up paying the bill after they've hijacked your phone system and extensions to make illegal calls anywhere they choose - often at a huge cost... (more)
Ask your counterespionage consultant to look into this for you. Specifying the correct controls, procedures and security hardware to protect your communications is their specialty.
Don't have a counterespionage consultant?!?! Contact me for a referral.
Ask your counterespionage consultant to look into this for you. Specifying the correct controls, procedures and security hardware to protect your communications is their specialty.
Don't have a counterespionage consultant?!?! Contact me for a referral.