Free Republic
Browse · Search
News/Activism
Topics · Post Article

Mimicking the tones and whistles used by electronic devices to make calls over public telephone lines is called "phreaking." After he was imprisoned for phreaking, hacking and other charges, Mitnick was held incommunicado for several months because someone convinced the court that he was such a skilled "phreaker" that just by whistling into the prison telephone's receiver (with no electronic aids) he could telephone a NORAD computer and initiate a nuclear war.

Mitnick was an odd bird, stole tens of thousands of credit card numbers but only ever lived modestly. Apparently he did the most of it just for the challenge.

1 posted on 07/21/2023 5:55:58 AM PDT by threefinger
[ Post Reply | Private Reply | View Replies ]


To: threefinger

How many times did he launch nukes by whistling into a phone?


2 posted on 07/21/2023 5:58:13 AM PDT by BenLurkin (The above is not a statement of fact. It is either opinion, or satire, or both.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

He was basically a “gray hat” hacker. It seems he rarely did it for financial profit.

It was more the curiosity and fun.


3 posted on 07/21/2023 6:08:35 AM PDT by ConservativeMind (Trump: Befuddling Democrats, Republicans, and the Media for the benefit of the US and all mankind.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger
Shades of Cap'n Crunch and that 2600 Hz whistle.
4 posted on 07/21/2023 6:09:48 AM PDT by budj (Combat vet, second of three generations.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

Good riddance to trash.


5 posted on 07/21/2023 6:13:25 AM PDT by nwrep
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

He was only 59. Maybe he was vaxxed?


7 posted on 07/21/2023 6:29:27 AM PDT by Tom Tetroxide
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

“Police said...”

LOL! They are too dumb to realize that to make a call Mitnick would have to be able to whistle two tones simultaneously. That’s impossible. But Ma Bell told them what to do, and they did it.


9 posted on 07/21/2023 6:40:56 AM PDT by Fresh Wind (Faux News: "We distort, you deride")
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

Nuclear weapons are air-gapped.


12 posted on 07/21/2023 6:55:19 AM PDT by agere_contra
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

I had a colleague who (back in the day) would make long distance calls by whistling into the phone. He knew the phone company signal pitches.
There were also ways to mechanically trick a pay phone to get free local calls....


14 posted on 07/21/2023 7:03:28 AM PDT by Getready (Wisdom is more valuable than gold and harder to find.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

The company I used to work for used his KnowBe4 online computer security training. He introduced each of the videos and narrated most of them.

He was part owner of KnowBe4, provider of an integrated platform for security awareness training and simulated phishing testing,


17 posted on 07/21/2023 7:58:46 AM PDT by Steven Scharf
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger
I was an avid inline skater in San Diego from 1991 to 2000. My favorite spot was Miramar Lake. The road around the lake was a big draw to elite skaters. X Games and world record sprinter Julie Brandt. One afternoon we were favored by the visit of the guy who caught Kevin Mitnick. A few reporters wanted to interview him. Fine. The reporter sat in the trunk of a car with a video camera and did the interview while the guy who caught Mitnick skated behind the car. The skater was Tsutomu Shimomura.
18 posted on 07/21/2023 7:59:03 AM PDT by Myrddin
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

I worked on a Toll Fraud Detection project for Sprint in the late 80’s. On the Sprint team was a hacker they caught. They didn’t arrest him, they hired him and he was our subject matter expert. At the time, many long distance calling services utilized DTMF (dual tone multi-frequency) tones for access and control. Users entered their credentials by using touch tones generated on their phone to access long distance calling. Obviously, cell phones obviated this PITA. Hackers quickly built hand-held devices to simulate these codes and steal long distance service. This guy would analyze reams of DTMF data and would identify new patterns for us to code to. Sprint later told us our project paid for itself the first day it went live. Facetious? Perhaps, but the point was made.

I recall one of our Sprint lines at work got hacked one time and we were billed several thousand dollars for a call to Israel that was several days in duration.


20 posted on 07/21/2023 8:11:10 AM PDT by IamConservative (I was nervous like the third chimp in line for the Ark after the rain started.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: threefinger

He was much like me and many others back then. Compouters were a whole universe to explore and often there were no “rules” about where you could go in this universe so you explored.


21 posted on 07/21/2023 8:14:37 AM PDT by DouglasKC
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson