Ghost in the Wires: My Adventures as the World’s Most Wanted Hacker



Download 2,97 Mb.
Pdf ko'rish
bet41/121
Sana05.05.2023
Hajmi2,97 Mb.
#935282
1   ...   37   38   39   40   41   42   43   44   ...   121
Bog'liq
1 - Ghost in the Wires My Adventures as the World\'s Most Wanted Hacker issue 15th Aug 2011 ( PDFDrive )

all three!
I wouldn’t be having any more conversations over
my dad’s phones, that was for sure.
I still needed to know when the taps had been installed, so I could gauge
which of my conversations had been intercepted.


Later, Lewis and I, for kicks, wanted to listen in on some of the other
phones that Pacific Bell was tapping.
There was a hitch: for added security, the boxes wouldn’t start
monitoring a line until a valid PIN, or “personal identification number,” was
entered. I had an idea: it was a long shot, with almost no chance of working,
but I tried it anyway.
First I had to be able to call in to the monitor box at the CO. So I’d call
the CO and tell the frame tech who answered the phone, “I need you to drop
that line because we’re testing.” He’d do it, and Pacific Bell Security’s
connection would then be dropped from the intercept.
I dialed in to the box and began guessing the passwords that might have
been set up by the manufacturer: “1 2 3 4”… nothing. “1 2 3 4 5”…
nothing. All the way up to the last one I figured was worth trying: “1 2 3 4 5
6 7 8.”
Bingo! Incredibly, the people at Pacific Bell Security had never changed
the manufacturer’s default PIN on these boxes.
With that password, I now had a complete technique that would let me
listen in on any of Pacific Bell’s intercepts anywhere in California. If I
found out the Security Department had one of its boxes at the Kester CO,
say, or the Webster CO, I’d get a frame tech to drop the line Pacific Bell
was using to call the monitor box, and then I’d call in to the box myself and
enter the default PIN, which was the same on every box. Then Lewis and I
would listen in and try to figure out who was being intercepted.
We’d do this just for fun, just because we could, sometimes twice or
three times in a week. After we identified the target’s phone number, we’d
call Pacific Bell’s Customer Name and Location (CNL) Bureau, give the
phone number, and get the name of the person being monitored. Once we
were told the phone was listed to the Honorable Somebody-or-Other. A
little research gave me the rest of it: the intercept was on the phone of a
Federal judge.
For Lewis and me, listening to wiretaps was a game, a lark. For Pacific Bell
Security investigators, it was part of the job. But one of the investigators,
Darrell Santos, was in for a surprise. He came in to work one morning, went
to have a listen to what had transpired on the intercepts he had placed on
my dad’s lines, and discovered that all of the Pacific Bell’s electronic


surveillance had stopped in its tracks. There were no audio intercepts;
everything was dead. Santos called the Calabasas frame and asked, “Are
our boxes still working there?”
“Oh, no,” he was told. “Security from Los Angeles called and told us to
disconnect them.”
Santos told the technician, “We don’t do any electronic surveillance out
of Southern California: we do it all out of Northern California. So there’s no
such thing as Los Angeles Security.”
That night Santos flew from his home base in San Francisco to Los
Angeles and reattached all the surveillance boxes himself. To make sure
nobody could be conned into disconnecting them again, he hid the boxes in
the rafters above the racks of switching equipment.
Much later, in an interview for this book, Santos would recall, “This was
a real big deal for us because now it hit home, it was personal. Kevin was
listening to 
our
calls, when we were in the business of trying to listen to 
his
calls. Then he has our intercepts taken down. So it made us really change
how we spoke on the phone and the messages we left. And we had to create
some new ways to cover our tracks because we also had to protect the
integrity of what law enforcement was doing with us, all of their court-
ordered stuff.”
Maybe it was just as well that I didn’t know at the time what headaches I
was causing them—otherwise I might not have been able to squeeze my big
head through a doorway.
And maybe I would have been flattered to know, back then, that
whenever anything like this happened at Pacific Bell, I immediately became
the prime suspect. According to Santos, Kevin Poulsen had been number
one on their internal most wanted list. Once Poulsen was behind bars, the
revised list had a new name at the top: mine. The file they had on me going
all the way back to my juvenile days was as thick as a big-city phone
directory.
Santos said, “There were other hackers out there doing a lot of other
things, but my opinion was that Kevin was the one who everyone was
trying to emulate. I thought Kevin was the mouse and I was the cat, but
sometimes it was the other way around.”
He added, “There were many leads we’d get from corporate security
guys in other companies saying, ‘Hey, we’ve got this case, this guy’s


getting us, do you think it could be Kevin?’ Every time something would
pop up, it was always Kevin they’d suspect.”
As I say, I might’ve been proud to hear some of that back in the day, but
just then I was feeling pretty frustrated. So far my talents hadn’t helped me
uncover any of Eric Heinz’s backstory. Lewis and I had been going around
and around with each other over our doubts concerning him. Sure, he knew
lots of stuff about phone company systems and procedures, even some stuff
Lewis and I hadn’t been aware of. But A, he wasn’t willing to share much
of anything. And B, he was forever asking 
those
kinds of questions, the
kinds hackers just don’t ask one another: “Who are you working with?” and
“What projects have you been doing lately?” and so on.
It was time for us to meet the guy face-to-face and see if getting to know
him a little better would put our suspicions to rest. And if he was for real,
maybe he could even help me learn when those taps had been placed on my
dad’s lines.



Download 2,97 Mb.

Do'stlaringiz bilan baham:
1   ...   37   38   39   40   41   42   43   44   ...   121




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish