Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
Books Book Reviews

Book Review: Exploding the Phone 64

Posted by samzenpus
from the read-all-about-it dept.
benrothke writes "Phil Lapsley calls his book 'the untold story of the teenagers and outlaws who hacked Ma Bell.' The story is an old one, going back to the early 1960's. Lapsley was able to track down many of the original phone phreaks and get their story. Many of them, even though the years have passed, asked Lapsley not to use their real names." Read below for the rest of Ben's review.
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
author Phil Lapsley. Foreword by Steve Wozniak
pages 416
publisher Grove Press
rating 9/10
reviewer Ben Rothke
ISBN 978-0802120618
summary Fascinating story of the early phone phreaks
While parts of the story have been told before, Lapsley's far-reaching research brings many of the central characters into a single read, resulting in an extremely interesting and engrossing read.

When Alexander Graham Bell created his harmonic telegraph, which would later turn into the telephone, it was like the Internet, built for functionality, with no inherent security controls. Those security vulnerabilities were begging to be found, and when they were discovered by the phone phreaks, it was a wake-up call to AT&T.

Defining a phone phreak is like defining a hacker; it means different things to different people. Lapsley defines it as "someone who loves exploring the telephone system and experimenting with it to understand how it works.

What the phone phreaks did was to spend endless hours dialing different numbers to understand how the inner-workings of the telephone system operated. Meaningless sounds to most people were music to the phreaks as they could determine how calls were routed via these tones.

Many of the phreaks practiced what is today known as social engineering and would impersonate phone company employees and technicians.

The devices that enabled them to make phone calls were called black boxes, blue boxes, and red boxes. The book notes that Steve Wozniak (who wrote the forward to the book) and Steve Jobs sold blue boxes before they started Apple. In fact, Jobs is quoted as saying that if they hadn't built blue boxes, there wouldn't have been an Apple.

The book has many layers to it. One part is an interesting history of the telephone and long-distance communications. It then segues into phone phreaks, who much like early computer hackers, used the phone network as a portal for exploration and hacking. The vast majority of the phone phreaks did it for the thrill, rather than just to make free phone calls.

One of the things the phone phreaks did was to read as much corporate documentation and manuals (obtained both legally and serendipitously) as they could. Lapsley notes that many of the technical documents that the phone company shared were in truth highly confidential.

As AT&T was a monopoly with zero competition, the notion that someone would use their own technical documentation against them was unheard of. Lapsley writes that for reasons of corporate pride, national service and public relations, AT&T felt an obligation to share its latest and greatest technical feats with the public. For that reason, the Bell System Technical Journal was required reading for every phone phreak.

The web site for the book has available many of the technical documents detailed in the book that played a role in the development of phone phreaking.

The book details many similarities between the phone phreaks and the early Internet hackers. While law enforcement stated that Kevin Mitnick could launch missiles via whistling into the phone, law enforcement called the phone phreaks a public menace, mentally unstable, a national threat and much more.

Like early hackers, the phone phreaks showed how engineering insiders are often the last to know what is actually possible with the systems they design. Lapsley noted that part of the problem was pride, in that Bell Labs had created the public telephone switching network, and they didn't want to admit how vulnerable it was. Its engineers were spring-loaded to disbelieve reports to the contrary.

Another advantage the phone phreaks, like hackers, had is that the Bells Labs engineers only looked at the systems as how it was supposed to work. That blinded them to how the system actually did work and how it could be made to do things it was never designed to do,

The results were that they couldn't see the holes in their own network; holes that a blind teenager found. Even when that blind teenage told them of the problem, (the book tells the story of Joe Engressia), they didn't understand it when first described to them.

The book describes another major technical security oversight made by AT&T in 1970 with the introduction of the telephone credit card. Lapsley writes that fraud was epidemic as AT&T's credit card numbering system was a bad joke from a security perspective. The card numbers were easy to guess and highly predictable resulting in millions of dollars of related fraudulent calls.

One of the main recurring characters in the book is John Draper, better known as Captain Crunch. Draper made a lot of money as a legitimate software engineer, but lost it due to his business naiveté and personal demons. Draper had numerous arrests related to phone phreaking and served time in prison.

The book notes that Draper's arrest in 1976 is a textbook case of how not to deal with the FBI when arrested. One of the incredulous things Draper did when he was read his rights was to waive them. While the FBI didn't have a search warrant, he voluntarily allowed them to search his apartment and Volkswagen Van, where incriminating evidence was indeed discovered.

While Draper was later convicted, the book quotes a fascinating observation by a phone company employee in that 90% of the phone phreak and hacker cases, law enforcement in fact had no criminal case. Most of the evidence they had was things they couldn't be prosecuted for. Either there was no legitimate crime on the books or all they had was the phone phreaks confession, but no tangible evidence.

It wasn't just the phone phreaks who were raising havoc on the phone company networks. The book writes of others who used black boxes and blue boxes for free calls. From Mafia bookies, to the Hare Krishna movement making fraudulent long-distance phone calls.

The book closes in 1982 when the US Dept. of Justice and AT&T came to an agreement to break up Ma Bell in the Baby Bells.

Lapsley has a degree in electrical engineering from UC. Berkeley so he as a deep first-hand understanding of the technology he is writing about. He also has the unique ability to write about bland technical topics and make them both engaging and comprehensible. He understands directly the curiosity the phone phreaks had and the passion to understand the inner workings of the phone system.

For a book that ends over 30 years ago, Phil Lapsley does a superb job of writing the story of the glory days of phone phreaking. In 2013, the notion of a domestic long-distance call is for the most not in anyone's lexicon. But making free long-distance calls was the mantra of the phone phreaks.

Exploding the Phoneis the first comprehensive history of the era of phone phreaking and Lapsley has done a masterful job a making the story fascinating and readable.

Reviewed by Ben Rothke.

You can purchase Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell from amazon.com. Slashdot welcomes readers' book reviews (sci-fi included) -- to see your own review here, read the book review guidelines, then visit the submission page.
This discussion has been archived. No new comments can be posted.

Book Review: Exploding the Phone

Comments Filter:
  • Re:Captain Crunch!!! (Score:2, Interesting)

    by Anonymous Coward on Friday June 07, 2013 @02:31PM (#43939929)
    John Draper has, of all things, a Twitter account. [twitter.com] I found it oddly depressing, but I can't quite put my finger on why. Something to do with demystifying old heroes, perhaps.
  • by Anonymous Coward on Friday June 07, 2013 @02:42PM (#43940021)

    The credit card number was not a secret at my high school. It was a phone number + 3 digit code + one letter. Most 3 digit numbers were valid. And the letter was keyed to the middle digit of that code.

    So I remember a valid credit card number was [any valid phone number in the country] + x8x + R. You had to call through an operator, she asked for the number you were calling and the CC number then put the call through. I know kids in my class that were calling Disneyland and asking for prices, making reservations at restaurants across the country, and just pranking random long distance numbers.

Chemist who falls in acid is absorbed in work.

Working...