+ 1-888-787-5890  
   + 1-302-351-4405  
 
 
 
 

Essay/Term paper: Cellular phreaking

Essay, term paper, research paper:  Law

Free essays available online are good but they will not follow the guidelines of your particular writing assignment. If you need a custom term paper on Law: Cellular Phreaking, you can hire a professional writer here to write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written essays will pass any plagiarism test. Our writing service will save you time and grade.


Cellular Phreaking

The cellular/mobile phone system is one that is perfectly set up to be
exploited by phreaks with the proper knowledge and equipment. Thanks to
deregulation, the regional BOC's (Bell Operating Companies) are scattered
and do not communicate much with each other. Phreaks can take advantage of
this by pretending to be mobile phone customers whose "home base" is a city
served by a different BOC, known as a "roamer". Since it is impractical
for each BOC to keep track of the customers of all the other BOC's, they
will usually allow the customer to make the calls he wishes, often with a
surcharge of some sort.

The bill is then forwarded to the roamer's home BOC for collection.
However, it is fairly simple (with the correct tools) to create a bogus ID
number for your mobile phone, and pretend to be a roamer from some other
city and state, that's "just visiting". When your BOC tries to collect for
the calls from your alleged "home BOC", they will discover you are not a
real customer; but by then, you can create an entirely new electronic
identity, and use that instead.
How does the cellular system know who is calling, and where they are?
When a mobile phone enters a cell's area of transmission, it transmits its
phone number and its 8 digit ID number to that cell, who will keep track of
it until it gets far enough away that the sound quality is sufficiently
diminished, and then the phone is "handed off" to the cell that the customer
has walked or driven into. This process continues as long as the phone has
power and is turned on. If the phone is turned off (or the car is), someone
attempting to call the mobile phone will receive a recording along the
lines of "The mobile phone customer you have dialed has left the vehicle
or driven out of the service area." When a call is made to a mobile phone,
the switching equipment will check to see if the mobile phone being called is
"logged in", so to speak, or present in one of the cells. If it is, the
call will then act (to the speaking parties) just like a normal call - the
caller may hear a busy tone, the phone may just ring, or the call may be
answered.
How does the switching equipment know whether or not a particular
phone is authorized to use the network? Many times, it doesn't. When a
dealer installs a mobile phone, he gives the phone's ID number (an 8 digit
hexadecimal number) to the local BOC, as well as the phone number the BOC
assigned to the customer. Thereafter, whenever a phone is present in one
of the cells, the two numbers are checked - they should be registered to
the same person. If they don't match, the telco knows that an attempted
fraud is taking place (or at best, some transmission error) and will not
allow calls to be placed or received at that phone. However, it is
impractical (especially given the present state of deregulation) for the
telco to have records of every cellular customer of every BOC. Therefore,
if you're going to create a fake ID/phone number combination, it will need
to be "based" in an area that has a cellular system (obviously), has a
different BOC than your local area does, and has some sort of a "roamer"
agreement with your local BOC.

How can one "phreak" a cellular phone? There are three general areas
when phreaking cellular phones; using one you found in an unlocked car
(or an unattended walk-about model), modifying your own chip set to look
like a different phone, or recording the phone number/ID number combinations
sent by other local cellular phones, and using those as your own. Most
cellular phones include a crude "password" system to keep unauthorized
users from using the phone - however, dealers often set the password
(usually a 3 to 5 digit code) to the last four digits of the customer's
mobile phone number. If you can find that somewhere on the phone, you're
in luck. If not, it shouldn't be TOO hard to hack, since most people
aren't smart enough to use something besides "1111", "1234", or whatever.
If you want to modify the chip set in a cellular phone you bought
(or stole), there are two chips (of course, this depends on the model and
manufacturer, yours may be different) that will need to be changed - one
installed at the manufacturer (often epoxied in) with the phone's ID
number, and one installed by the dealer with the phone number, and possible
the security code. To do this, you'll obviously need an EPROM burner
as well as the same sort of chips used in the phone (or a friendly and
unscrupulous dealer!). As to recording the numbers of other mobile phone
customers and using them; as far as I know, this is just theory... but it
seems quite possible, if you've got the equipment to record and decode it.
The cellular system would probably freak out if two phones (with valid
ID/phone number combinations) were both present in the network at once,
but it remains to be seen what will happen.



 

Other sample model essays:

Censorship Freedom or Suppression ? Government censorship can be looked at as a blessing or an unneeded burden. I personally feel that all censorship is completely unnecessary and should be found...
CENSORSHIP The freedom to read is essential to the democratic way of life. But today, that freedom is under attack. Private groups and public authorities everywhere are working to remove ...
Law / Cercla
Who is responsible for cleanup under CERCLA? What is CERCLA? The Comprehensive Environmental Response, Compensation, and Liability Act ( CERCLA ) 1) The purpose of CERCLA is to make owner...
There are many problems facing today's society. One of the problems is the violent condition that surrounds the lives of children in America. We are awarded of the violence among ou...
Keep Our Water Clean The Clean Water Act has made advances to our society that have helped our environment to flourish with life. The objective of the Act when it was enacted in 1972 was to r...
Commercial Vices The commercial vices are gambling, prostitution, and drugs. The appeals of the commercial...
Legal System and Method Question: Critically evaluate the development of common law principles applicable to the defence of provocation in criminal law from the decision in Mancini v DPP [1942] ...
It's late at night, and you're home all alone. You double checked to make sure all of the doors were locked and made sure all of the windows were closed. It's been a quiet night, but for some odd...
COMMUNITY-BASED POLICING: LAW ENFORCEMENT FOR THE TWENTIETH CENTURY by KONSTANTINOS I. KORIAS. ENGLISH COMPOSITION PROFESSOR CHU...
The computer has evolved a great deal since its creation over a third of a century ago. The uses of the computer now seem endless. Unfortunately some of those uses include computer crimes. This ...
Experience with Dream Essay - Reliable and great customer service. Quality of work - High quality of work.
, ,
Dream Essay - Very reliable and great customer service. Encourage other to try their service. Writer 91463 - Provided a well written Annotated Bibliography with great deal of detail per th
, ,
it is always perfect
, ,
The experience with Dream Essay is stress free. Service is excellent and forms various forms of communication all help with customer service. Dream Essay is customer oriented. Writer 17663
, ,
Only competent & proven writers
Original writing — no plagiarism
Our papers are never resold or reused, period
Satisfaction guarantee — free unlimited revisions
Client-friendly money back guarantee
Total confidentiality & privacy
Guaranteed deadlines
Live Chat & 24/7 customer support
All academic and professional subjects
All difficulty levels
12pt Times New Roman font, double spaced, 1 inch margins
The fastest turnaround in the industry
Fully documented research — free bibliography guaranteed
Fax (additional info): 866-332-0244
Fax (additional info): 866-308-7123
Live Chat Support
Need order related assistance?—Click here to submit a inquiry
© Dreamessays.com. All Rights Reserved.
Dreamessays.com is the property of MEDIATECH LTD