Date: Sat, 25 Jul 92 12:26:17 MDT
From: Lazlo Nibble <[email protected]>
Subject: File 2--Re: 2600 and Bellcore flap

> ...Article details how, after following 4 steps, any line is suspectible
> to secret monitoring. One document obtained by 2600 said:  "There is no
> proof the hacker community knows about the vulnerability."

They may not have proof of it, but the first time I heard about Busy
Line Verification was in '84 or '85 and there's at least one person I
knew in the computer underground at the time who I had reason to
believe when he said he'd used it.  Its existance is certainly no
secret to anyone who's messed around with the workings of the phone
system -- the codes that activate BLV were (and probably still are) a
sort of Holy Grail for telcom hackers.

Downloaded From P-80 International Information Systems 304-744-2253