"Seven."
That was helpful. Now to find seven digits. Anthrax looked across the street at the fish and chips shop. No numbers there. Then a car licence plate caught his eye. He read off the first three digits, then plucked the last four numbers from another car"s plate.
"Thank you. Putting your call through, Mr Baker."
A valid number! What amazing luck. Anthrax milked that number for all it was worth. Called party lines. Called phreakers" bridges. Access fed the obsession.
Then he gave the number to a friend in Adelaide, to call overseas. But when that friend read off the code, the operator jumped in.
"YOU"RE NOT MR BAKER!"
Huh? "Yes I am. You have my code."
"You are definitely not him. I know his voice."
The friend called Anthrax, who laughed his head off, then called into Dialcom and changed his code! It was a funny incident. Still, it reminded him how much safer it was working by himself.
Living in the country was hard for a hacker and Anthrax became a phreaker out of necessity, not just desire. Almost everything involved a long-distance call and he was always searching for ways to make calls for free. He noticed that when he called certain 008 numbers--free calls--the phone would ring a few times, click, and then pause briefly before ringing some more. Eventually a company representative or answering service picked up the call. Anthrax had read about diverters, devices used to forward calls automatically, in one of the many telecommunications magazines and manuals he was constantly reading. The click suggested the call was going through a diverter and he guessed that if he punched in the right tones at the right moment, he could make the call divert away from a company"s customer service agent. Furthermore, any line trace would end up at the company.
Antrax collected some 008 numbers and fiddled with them. He discovered that if he punched another number in very quickly over the top of the ringing--just after the click--he could make the line divert to where he wanted it to go. He used the 008 numbers to ring phone conferences around the world, where he hung out with other phreakers, particularly Canadians such as members of the Toronto-based UPI or the Montreal group, NPC, which produced a phreakers" manual in French. The conversation on the phreaker"s phone conferences, or phone bridges as they are often called, inevitably turned to planning a prank. And those Canadian guys knew how to prank!
Once, they rang the emergency phone number in a major Canadian city.
Using the Canadian incarnation of his social engineering accents, Anthrax called in a "police officer in need of a.s.sistance". The operator wanted to know where. The phreakers had decided on the Blue Ribbon Ice-Cream Parlour. They always picked a spot within visual range of at least one member, so they could see what was happening.
In the split second of silence which followed, one of the five other phreakers quietly eavesdropping on the call coughed. It was a short, sharp cough. The operator darted back on the line.
"Was that A GUN SHOT? Are you SHOT? h.e.l.lo? John?" The operator leaned away from her receiver for a moment and the phreakers heard her talking to someone else in the background. "Officer down."
Things moved so fast when pranking. What to do now?
"Ah, yeah. Yeah." It was amazing how much someone squeezing laughter back down his oesophagus can sound like someone who has been shot.
"John, talk to me. Talk to me," the operator pleaded into the phone, trying to keep John alert.
"I"m down. I"m down," Anthrax strung her along.
Anthrax disconnected the operator from the conference call. Then the phreaker who lived near the ice-cream parlour announced the street had been blocked off by police cars. They had the parlour surrounded and were anxiously searching for an injured fellow officer. It took several hours before the police realised someone had played a mean trick on them.
However, Anthrax"s favourite prank was Mr McKenny, the befuddled southern American hick. Anthrax had selected the phone number at random, but the first prank was such fun he kept coming back for more.
He had been ringing Mr McKenny for years. It was always the same conversation.
"Mr McKenny? This is Peter Baker. I"d like my shovel back, please."
"I don"t have your shovel."
"Yeah, I lent it to you. Lent it to you like two years ago. I want it back now."
"I never borrowed no shovel from you. Go away."
"You did. You borrowed that shovel of mine. And if you don"t give it back I"m a gonna come round and get it myself. And you won"t like it.
Now, when you gonna give me that shovel back?"
"d.a.m.n it! I don"t have your G.o.dd.a.m.n shovel!"
"Give me my shovel!"
"Stop calling me! I"ve never had your friggin" shovel. Let me be!"
Click.
Nine in the morning. Eight at night. Two a.m. There would be no peace for Mr McKenny until he admitted borrowing that shovel from a boy half his age and half a world away.
Sometimes Anthrax pranked closer to home. The Trading Post, a weekly rag of personals from people selling and buying, served as a good place to begin. Always the innocent start, to lure them in.
"Yes, sir, I see you advertised that you wanted to buy a bathtub."
Anthrax put on his serious voice. "I have a bathtub for sale."
"Yeah? What sort? Do you have the measurements, and the model number?"
And people thought phreakers were weird.
"Ah, no model number. But its about a metre and a half long, has feet, in the shape of claws. It"s older style, off-white. There"s only one problem." Anthrax paused, savouring the moment.
"Oh? What"s that?"
"There"s a body in it."
Like dropping a boulder in a peaceful pond.
The list on System X had dial-up modem numbers, along with usernames and pa.s.sword pairs for each address. These usernames were not words like "jsmith" or "jdoe", and the pa.s.swords would not have appeared in any dictionary. 12[AZ63. K5M82L. The type of pa.s.swords and usernames only a computer would remember.
This, of course, made sense, since a computer picked them out in the first place. It generated them randomly. The list wasn"t particularly user-friendly. It didn"t have headers, outlining what each item related to. This made sense too. The list wasn"t meant to be read by humans.
Occasionally, there were comments in the list. Programmers often include a line of comment in code, which is delineated in such a way that the computer skips over the words when interpreting the commands.
The comments are for other programmers examining the code. In this case, the comments were places. Fort Green. Fort Myers. Fort Ritchie.
Dozens and dozens of forts. Almost half of them were not on the mainland US. They were in places like the Philippines, Turkey, Germany, Guam. Places with lots of US military presence.
Not that these bases were any secret to the locals, or indeed to many Americans. Anthrax knew that anyone could discover a base existed through perfectly legal means. The vast majority of people never thought to look. But once they saw such a list, particularly from the environment of a military computer"s bowels, it tended to drive the point home. The point being that the US military seemed to be everywhere.
Anthrax logged out of System X, killed all his connections and hung up the phone. It was time to move on. Routing through a few out-of-the-way connections, he called one of the numbers on the list.
The username-pa.s.sword combination worked. He looked around. It was as he expected. This wasn"t a computer. It was a telephone exchange. It looked like a NorTel DMS 100.
Hackers and phreakers usually have areas of expertise. In Australian terms, Anthrax was a master of the X.25 network and a king of voice mailbox systems, and others in the underground recognised him as such.
He knew Trilogues better than most company technicians. He knew Meridian VMB systems better than almost anyone in Australia. In the phreaking community, he was also a world-cla.s.s expert in Aspen VMB systems. He did not, however, have any expertise in DMS 100s.
Anthrax quickly hunted through his hacking disks for a text file on DMS 100s he had copied from an underground BBS. The pressure was on.
He didn"t want to spend long inside the exchange, maybe only fifteen or twenty minutes tops. The longer he stayed without much of a clue about how the thing operated, the greater the risk of his being traced. When he found the disk with the text file, he began sorting through it while still on-line at the telephone exchange. The phreakers" file showed him some basic commands, things which let him gently prod the exchange for basic information without disturbing the system too much. He didn"t want to do much more for fear of inadvertently mutilating the system.
Although he was not an authority on DMS 100s, Anthrax had an old hacker friend overseas who was a real genius on NorTel equipment. He gave the list to his friend. Yes, the friend confirmed it was indeed a DMS 100 exchange at a US military base. It was not part of the normal telephone system, though. This exchange was part of a military phone system.