• wpscan

    From LU9DCE@21:5/101 to BBSRT on Fri Jul 5 09:40:08 2019

    Weld Pond sends you..........


    "HACKERS SCAN AIRWAVES FOR CONVERSATIONS""Eavesdroppers tap into
    Private Calls" by Mark Lewyn Aug 14, 1992 Washington Post

    On the first day of the Soviet coup against Mikhail Gorbachev in
    August 1991, Vice President Quayle placed a call to Sen. John
    Danforth (R-Mo.) and assessed the tense, unfolding drama. It turned
    out not to be a private conversation. At the time, Quayle was
    aboard a government jet, flying to Washington from California. As
    he passed over Amarillo, Tex., his conversation, transmitted from
    the plane to Danforth's phone, was picked up by an eavesdropper
    using electronic "scanning" gear that searches the airwaves for
    radio or wireless telephone transmissions and then locks onto them.
    The conversations contained no state secrets -- the vice president
    observed that Gorbachev was all but irrelevant and Boris Yeltsin
    had become the man to watch. But it remains a prized catch among
    the many conversations overheard over many years by one of a
    steadily growing fraternity of amateur electronics eavesdroppers
    who listen in on all sorts of over-the-air transmissions, ranging
    from Air Force One communications to cordless car-phone talk. One
    such snoop overheard a March 1990 call placed by Peter Lynch, a
    well-known mutual fund executive in Boston, discussing his
    forthcoming resignation, an event that later startled financial
    circles. Another electronic listener over- see heard the chairman
    of Popeye's Fried Chicken disclose plans for a 1988 takeover bid
    for rival Church's Fried Chicken. Calls by President Bush and a
    number of Cabinet officers have been intercepted. The recording of
    car-phone calls made by Virginia Gov. L. Douglas Wilder (D),
    intercepted by a Virginia Beach restaurant owner and shared with
    Sen. Charles Robb (D-Va.), became a 'cause celebre' in Virginia
    politics. Any uncoded call that travels via airwaves, rather than
    wire, can be picked up, thus the possibilities have multiplied
    steadily with the growth of cellular phones in cars and cordless
    phones in homes and offices. About 41 percent of U.S. households
    have cordless phones and the number is expected to grow by nearly
    16 million this year, according to the Washington-based Electronics
    Industry Association. There are 7.5 million cellular telephone
    subscribers, a technology that passes phone calls over the air
    through a city from one transmission "cell" to the next. About
    1,500 commercial airliners now have air-to-ground phones --roughly
    half the U.S. fleet. So fast-growing is this new form of electronic
    hacking that has its own magazines, such as Monitoring Times. "The
    bulk of the people doing this aren't doing it maliciously," said
    the magazine's editor, Robert Grove, who said he has been
    questioned several times by federal agents, curious about the
    hackers' monitoring activities. But some experts fear the potential
    for mischief. The threat to businesses from electronic
    eavesdropping is "substantial," said Thomas S. Birney III,
    president of Cellular Security Group, a Massachusetts-based
    consulting group. Air Force One and other military and government
    aircraft have secure satellite phone links for sensitive
    conversations with the ground, but because these are expensive to
    use and sometimes not operating, some calls travel over open
    frequencies. Specific frequencies, such as those used by the
    President's plane, are publicly available and are often listed in
    "scanners" publications and computer bulletin boards. Bush, for
    example, was accidentally overheard by a newspaper reporter in 1990
    while talking about the buildup prior to the Persian Gulf War with
    Sen. Robert Byrd (D-W.Va.). The reporter, from the Daily Times in
    Gloucester, Mass., quickly began taking notes and the next day,
    quoted Bush in his story under the headline, "Bush Graces City
    Airspace." The vice president's chief of staff, William Kristol,
    was overheard castigating one staff aide as a "jerk" for trying to
    reach him at home. Some eavesdroppers may be stepping over the
    legal line, particularly if they tape record such conversations.
    The Electronic Communications Privacy Act prohibits intentional
    monitoring, taping or distribution of the content of most
    electronic, wire or private oral communications. Cellular phone
    calls are explicitly protected under this act. Local laws often
    also prohibit such activity. However, some lawyers said that under
    federal law, it is legal to intercept cordless telephone
    conversations as well as conversations on an open radio channel.
    The government rarely prosecutes such cases because such
    eavesdroppers are difficult to catch. Not only that, it is hard to
    win convictions against "listening Toms," lawyers said, because
    prosecutors must prove the eavesdropping was intentional. "Unless
    they prove intent they are not going to win," said Frank
    Terranella, general counsel for the Association of North American
    Radio Clubs in Clifton, N.J. "It's a very tough prosecution for
    them." To help curb eavesdropping, the House has passed a measure
    sponsored by Rep. Edward J. Markey (D-Mass.), chairman of the House telecommunications and finance subcommittee, that would require the
    Federal Communications Commission to outlaw any scanner that could
    receive cellular frequencies. The bill has been sent to the
    Senate. But there are about 10 million scanners in use, industry
    experts report, and this year sales of scanners and related
    equipment such as antennas will top $100 million. Dedicated
    scanners, who collect the phone calls of high-ranking government
    officials the way kids collect baseball cards, assemble basements
    full of electronic gear. In one sense, the electronic eavesdroppers
    are advanced versions of the ambulance chasers who monitor police
    and fire calls with simpler scanning equipment and then race to the
    scene of blazes and accidents for a close look. But they also have
    a kinship with the computer hackers who toil at breaking into
    complex computer systems and rummaging around others' files and
    software programs. One New England eavesdropper has four scanners,
    each one connected to its own computer, with a variety of
    scanners, each one connected to its own computer, with a variety of
    frequencies programmed. When a conversation appears on a
    pre-selected frequency, a computer automatically locks in on the
    frequency to capture it. He also keeps a scanner in his car, for
    entertainment along the road. He justifies his avocation with a
    seemingly tortured logic. "I'm not going out and stealing these
    signals." he said. "They're coming into my home, right through my
    windows."


    [End of the article. There was no identification of who "Mark Lewyn" is,
    or who he works for, or his journalistic credentials. The only
    thing for sure is that he is not a staff writer for the newspaper,
    since the byline for the paper's own writers is "Washington Post
    Staff Writer."]

    --- Mystic BBS v1.12 A43 (Linux/32)
    * Origin: HAMRADIO telnet lu9dce.dynu.com (21:5/101)