Date: Sat, 25 Jul 92 12:26:17 MDT
From: Lazlo Nibble <
[email protected]>
Subject: File 2--Re: 2600 and Bellcore flap
> ...Article details how, after following 4 steps, any line is suspectible
> to secret monitoring. One document obtained by 2600 said: "There is no
> proof the hacker community knows about the vulnerability."
They may not have proof of it, but the first time I heard about Busy
Line Verification was in '84 or '85 and there's at least one person I
knew in the computer underground at the time who I had reason to
believe when he said he'd used it. Its existance is certainly no
secret to anyone who's messed around with the workings of the phone
system -- the codes that activate BLV were (and probably still are) a
sort of Holy Grail for telcom hackers.
Downloaded From P-80 International Information Systems 304-744-2253