telephone network security and the capn crunch whistle in the 1960s and early 1970s

of 19/19
Telephone Network Security and the “Cap’n Crunch” whistle in the 1960’s and early 1970’s

Post on 29-Mar-2015




1 download

Embed Size (px)


  • Slide 1

Telephone Network Security and the Capn Crunch whistle in the 1960s and early 1970s Slide 2 Overview The telephone network topology. Telephone switch signaling protocols. What is Phone Phreaking? Hacking the telephone network of the 1960s and 1970s. What was done to fix the problem. Slide 3 The Telephone Network of the 1960s and early 1970s Primary function of a telephone network is to connect telephones together. Not feasible to connect every user to every other user directly. A network is needed. Hierarchical Network. Slide 4 Hierarchical Network Slide 5 Lowest level end users connected to local exchange. Next level up local exchanges connected to the primary trunk exchanges. Next level up the primary trunk exchanges connected to the secondary trunk exchanges. Can extend to as many levels as needed. Slide 6 Signaling Signaling is the means by which routing information is sent to switches. Two main types of signaling. Local-loop signaling Interoffice signaling Signals were sent on the same line that was used to transmit voice. Slide 7 Signaling Cont. In order to reduce the probability that a human voice will mimic switch signals, special tone pairs were used. Slide 8 Local-Loop Signaling User picks up a telephone and dials a number. Two types Rotary Push Button The switch at the local exchange routes the number. Slide 9 Push Button Local Loop Signaling Slide 10 Phone Phreaking Phreaking 1. The art and science of cracking the phone network (so as, for example, to make free long-distance calls.) 2. By extension, security-cracking in any other context (especially, but not exclusively, on communication networks) Slide 11 Interoffice Signaling A different signaling protocol is needed to prevent a user from sending signals to switches downstream. Slide 12 Interoffice Signaling Slide 13 The Blue Box Codes for interoffice signaling were published in a Bell Labs journal article. A box with 7 buttons could be built to route a call anywhere in the world! The first device confiscated by the phone company was blue. Steve Wozniak was in the Blue Box business. Slide 14 A Blue Box Device Slide 15 How to make a free phone call Phone Local Exch. Account. System Primary Exch. Secondary Exch. Primary Exch. Local Exch. Phone 1(800)555-5555 KP-187-ST KP-07-STKP-095-ST KP-252-0011-ST Ring Slide 16 Was the telephone system a secure network? The routing signals are sent over the same lines that carry voice signals (in-band). Cost must have been a factor. Not only free calls Bouncing calls between switches (untraceable) Flooding the network (Denial of service) Slide 17 How was it fixed? By 1976 virtually all interoffice trunks were converted to a new type of signaling Common Channel Interoffice Signaling Interoffice signals sent over separate lines. Slide 18 Benefits of CCIS Reduces call time set up. Eliminates false customer simulated in-band signaling. Send data out of band, parallel to the voice circuit. Slide 19 What about the Capn!?!