Phone Phreakers

Phone Phreakers

Phreaking is a slang term – now a common part of technology nomenclature – which is used to describe the activity of a subculture of people who study, experiment with, or explore (and yes, exploit) telecommunications equipment and public telephone networks. With the computerization of telephone networks, Phone Phreaking has become inseparably linked with computer hacking – often referred to as H/P Culture, or hacking/phreaking.


No alt text provided for this image

While the ultimate goal in phreaking eventually turned out to be – let’s just say it – toll fraud, by way of  “tripping” or “tricking” a telephony network into providing free long-distance and international calls or to tap phone lines, it should be noted that early phone phreaks were motivated by learning about the telephone network and how it operated.

 

In his Phone Phreak blog: historyofphonephreaking.org, Phil Lapsley admits that Phone Phreakers pointed out to him: “We didn’t have anyone to call.” Lapsley further explains: “Think about it: if you’re a typical teenage kid in the late 1950’s or early 60’s, it’s not like you have a far-flung network of long-distance buddies to call. “


While free calling is a tangible payoff, it becomes evident – the more research one does into the topic – that the mere “sport” of phreaking; the actual execution of new and intriguing ways of manipulating a system -- and the acclaim and notoriety which goes along with it – is actual, calculable reward in and of itself.


While the exact origins of phone phreaking are a little hazy, it is believed that phreak-like experimentation began with a widespread deployment of automatic switches on telephone networks – namely with AT & T, which began introducing automatic switches for long distance and some trunking carriers in the mid to late 1950’s. The automatic switches used tone dialing, a form of in-band signaling, and included some tones which were strictly and exclusively for internal telephone company use. When it was understood – among the growing community of those wishing to hack into public telephone networks – that the frequency for internal use was precisely 2600 hz, automatic switches became vulnerable and ripe for attack.


No alt text provided for this image

The discovery of that perfect frequency came about accidentally in 1957 by a blind seven year old boy named Joe Engessia, who was blessed with perfect pitch, and who discovered quite by chance, that by whistling the fourth note above middle C (a frequency of 2600 hz), he could stop a dialed phone recording. (It bears noting that – apparently – a large percentage of early phone phreaks were blind, or at least sight impaired, although with the cloaked nature of their identities, the actual number is unknown.) Engressia – unaware of what he had done – called the phone company to ask why the recordings had stopped. Unable to furnish him with an answer, the phone company likely didn’t give his query much thought until phreaking picked up momentum.


No alt text provided for this image

A man code-named “Bill from New York” discovered that a recorder he owned could also play the 2600 hz tone with the same effect, and an early legendary phreaker named John Draper (whom I had the singularly surreal experience of sitting next to at lunch at an Astricon conference) discovered that the free whistles given out in Cap’n Crunch cereal boxes also, coincidentally, emitted the 2600 hz tone, earning him the now-legendary nickname “Cap’n Crunch”. The replication – or matching – of the 2600 hz tone allowed control of SF (single frequency) phone systems, and it was further discovered that a long whistle would reset the line followed by a group pf whistles (a short tone for “1”, two for “2”, and so on…) Different specially-designed signal boxes – named different colors (and yet not necessarily painted those colors) were intended for various different phreak approaches: a “black box” would enable free calls made from any home phone, a “red box” for making free calls on any payphone, and the infamous “blue box” provided complete control of the telephone system.

John Draper, aka: Cap n' Crunch


That was single frequency. The most common signalling on long distance networks became multi-frequency controls. What those specific frequencies were was largely unknown until 1964, until Bell Systems themselves, in essence, gave away the “keys to the kingdom” by publishing the information in a Bell Systems Technical Journal, describing the methods and frequencies used for inter-office signalling. The journal was intended for the company’s engineers; it soon made its way onto various college campuses and into the hands of those with a penchant for experimentation.


No alt text provided for this image

In 1971, Esquire Magazine introduced phreaking to the masses with the article “Secrets of The Little Blue Box” – which made mention of soon-to-be-phreaks and future Apple founders Steve Wozniak and Steve Jobs. But it was an article which appeared in the June 1972 issue of Ramparts Magazine entitled “How to Build a Phone Phreak’s Box” which touched off a firestorm of interest in phreaking – and even went so far as to include a simple schematic on how to construct your own “black box” used to make and receive free long distance calls.


Eventually, North American phone companies replaced their hardware, as a measure to move forward with digital switching systems (Common Channel Interoffice Signalling), thus eliminating old-school phreaking practices – new systems use separate lines for signalling which phreaks couldn’t get to. Classic phreaking with the 2600 hz tone continued to work in more remote locations into the 1980’s, but was of little use in North America by the 1990’s. The was the end of an era – Phil Lapsley says it best: “(Phone Phreaks) listened to clicks and clunks and beeps and boops to figure out how calls were routed, They read obscure telephone company technical journals. They learned how to impersonate operators and other telephone company personnel. They dug through telephone company trash bins to find “secret” documents. They solved puzzles.”


There are few things more satisfying that the fortress of the giant telcos being circumnavigated, and there’s something intriguing about the resourcefulness, the hucksterism, and the full-on charlatanism required to turn technology back on its makers and “stick it to the man.”



(Note: Phil Lapsley went on to publish a book on his vast knowledge of Phone Phreaking, called “Exploding the Phone”, available here on Amazon: https://amzn.to/2lYF1SN It is beautifully written, and well worth the read.)

Allison Smith a telephone/AI voice heard on platforms globally. theivrvoice.com, @voicegal




Lewis De Payne

Intelligent Healthcare Analytics Corporation

4y

Interesting article, though I wonder if people who could manipulate the entire phone system in the late 70's and 80's really did exist. Some of them, given their social engineering skills, were probably also really good at manipulating the press.

Gerrit Hurter

Digium Certified Asterisk Professional , Trainer and Call Center Software developer at Voipmagic.

4y

Some still use these passwords in VOIP , user 100 with password 100 , be warned! ;)

Great article, and great memories.  It's rare that I get to literally say "got the t-shirt," so this is one I'll never get rid of.  Aside from the technical attacks, you'd be surprised how far you could get into a central office, even a major one, by wearing a hardhat and carrying a clipboard and butt set. https://i.imgur.com/Y4BHGoj.jpg

Alex Boyd

General Labourer as Sub Contractor (plumbing industry)

4y

or the default password 0000......... :)

Like
Reply
Robert DuWors

Digital Substrate Architect with insight from being there.

4y

Oh yeah. True pioneers of the obnoxious!

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics