As Published in the August 12,1996 edition of Wireless Week. Reprinted without permission.

Dr. Who's comments are in bold italics.

WIRELESS HACKERS INVADE WEB

INTERNET 'PHREAKS' PUBLISH SECRETS OF CELLULAR, PAGING

by Rickki Lee

Computer hobbyists are uploading instructions on the World Wide Web detailing how to reprogram cellular phones. The information could be used in cloning phones or other fraudulent purposes. True. It could also be used for a number of legitimate purposes For years these hackers, sometimes called "phreaks"-often undergraduate computer science or electronic engineering students- and frustrated, disgruntled engineers and technicians have shared tutorials on cellular's inner secrets. However, much of the data referred to phones that were no longer in use. Just because some models are no longer sold does not mean they are no longer in use. These are the models that turn up at pawn shops, yard sales, etc. that experimenters work with. Recently, Web sites with up-to-date cellular reprogramming have become popular. Some Webmasters have obtained and published programming manuals usually restricted to authorized technical personnel. As a result, Internet providers have restricted server access to some of these sites. Mr. Motorola's site is the only one I am aware of that has had any trouble. And that was a matter a lot more complex than simple cellular "secrets" Perhaps the most famous wireless hacker home in the United States is called RadioPhone, YAY THAT'S ME! a site residing at www.l0pht.com. The site was highlighted in the August issue of Wired. L0PHT was. RadioPhone was not. According to the home page, a Boston-based group of seven hackers formed L0pht Heavy Industries in 1193 for projects in "homebrew electronic development, circuit design and computer security." Recent L0pht "projects" include a POCSAG-protocol paging decoder kit available for $200.00 Incorrect. It costs $90 for an assembled unit, or $60 for a kit. I am disturbed my the mixing of these different projects. While I think the POCSAG project is a nice idea, it has nothing officially to do with my site. L0PHT is not responsible for any of the things appearing on the site. They are providing a service, a web server, for RadioPhone. They act as a home-base for many different hobbyist's projects. In other words, if you have a problem with the information available on RadioPhone, you have a problem with me, Dr. Who, and NOT L0PHT. To avert liability in the potential abuse of L0pht's offerings, the RadioPhone site begins with the warning, "This page is for reference and entertainment only. The programmer, author and site maintainers specifically disclaim responsibility for the use of this information. This information is not intended to be used to defraud cellular service providers!" The site offers programming tips on about 50 phone makers including Motorola Inc., Tandy Corp., Ericsson Inc., Oki telecom, Nokia Mobile Phones Inc. and AT&T Corp. For example, programming information is provided for Motorola's advanced mobile phone serv ice models 2600 4800, 8000, 8500, DPC-550, and MicroTAC Elite. "If you lost the manual and don't know how to use your [M]otorola, do not fret.", the Web site advises. "We have the pinouts for the Motorola Bag Phone's 8-pin...handset connector, as well as its 25- pin...data port, the Elite and the 8000 series handheld 'brick phone' jack too. If you're really hard core and can handle a soldering iron, then take some wir e, connectors and resistors to make a re- programming cable to hook up your phone up to your computer to do neat stuff, including changing your ESN (electronic serial number)." RadioPhone offered another disclaimer in a section on call monitoring. "Listening to cellular conversations is illegal...We do not condone breaking the law." Despite its Web site cautions, RadioPhone claims Motorola and Radio Shack lawyers have requested L0pht to cease publishing copy-righted information. Citing a law passed last year by the Pennsylvania General Assembly, L0pht also said the state has banned a ccess to the site. The law makes it a crime to offer, promote, or advertise the sale of any "unlawful telecommunications device, or plans or instructions for making or assembling the same." Despite its antifraud efforts, the wireless industry has yet to deal with information disseminated over the Internet, said one source at a fraud solutions vendor. "I don't know how much influence the Web site will have," said Phillip Redman, analyst with the Boston-based consultancy the Yankee Group. "Someone already involved with the criminal element will understand the procedures." Finally some one who may have a clue. Yes, the organised crime figures already have this info, and buy, sell, and trade it among each other. The majority of the cellular fraud comes from these call-sell operations and not from hobbyists, for whom the site has been made available for. Mr. Redman seems to see through the hoopla that articles such as this one are trying to create. "Theft is theft, whether you do it on the Internet or the back alley ," said Tim Ayers, vice president of communications or the Cellular Telecommunications Industry Association. This is a meaningless quote. This man sounds like a politician. There is no crime committed here. It is possible for people to use the information on RadioPhone for criminal purposes, but except for the People's Republik of Pennsylvania, the information itself is not illegal to have, and should never be so. As far as being done in an alley, well, I doubt much cloning goes on there, because it is hard to find an electrical outlet in an alley.

The next time someone wants to write about RadioPhone, please do the courtesy of emailing me and asking me for my views. Or at least informing me that you are writing a piece. Thanks.

End of Article

Thanks to Vidiot