by nols on 12/2/16, 1:47 PM with 107 comments
by Guest98123 on 12/2/16, 3:05 PM
So, I used the phone card, and tried to call someone about an apartment that looked great. According to the advertisement, it was a woman that owned the apartment and she had an extra bedroom she was renting. I called, and a man answered. It went like this...
Him: Hello
Me: Hi, I was calling about your apartment for rent online.
// Dogs barking in the background fairly loudly.
Him: Sorry, what was your name?
Me: John Doe
Him: It's difficult to hear, could you hold on a moment?
Me: Sure
// He puts down the phone, and it sounds like he's taking the dogs outside or to another room. In the background a TV is playing. I'm getting annoyed, but he finally returns 4 or 5 minutes later.
Him: Are you still there?
Me: Yes
// A woman starts talking to him from inside the house.
Him: Sorry, just give me one more moment.
// He starts talking and arguing with her. I wait two minutes, then hang up.
After the call, I was frustrated. The apartment sounded great online, but what a nightmare; dogs barking, people yelling at each other, and they wasted 10 minutes of my time. So, I moved on, and tried calling others. Sometimes I'd get through to the person, sometimes I'd get errors about not being able to reach the number. Fast forward a week, I changed my plans, and started looking at apartments in another Australian city, hundreds of kilometers from the first. I call for an apartment, and guess what I hear? That's right, the same recording from above. Now, I was confused. I didn't even expect it was a recording the first time. But, how was I getting the recording from a completely different number, in a different city? I called back, because I was getting curious at that point. To my surprise, someone answered the second time, and it was actually the person from the advertisement I was trying to call. It became obvious at that moment that someone in the middle was hijacking calls, and trying to keep people on the line as long as possible.
by wpietri on 12/2/16, 2:56 PM
It made me long for some sort of professional association that kept track of naughty uses of technology. It's easy to think only about the happy path. But there are all sorts of unsavory people out there: abusers, mobsters, thieves, authoritarian governments. Once I know how they think, I can defend against them. But keeping up with how they think has always been a challenge for me.
by MichaelGG on 12/2/16, 2:59 PM
Margins in telecom can be super thin. Diverting, say, 1% of traffic to fake answering could mean increasing profits by 10%. If the scammer doesn't go overboard, users won't complain. They'll just say "the wires got crossed" and redial.
by djsumdog on 12/2/16, 7:44 PM
If you dial via a calling card, everything goes through their proxy before being handed off.
I've run into problems with services like Telegram not accepting my Google Voice number (my own real US number) and the recent NIST recommendations also state not to use SMS as 2-factor verification (citing VoIP concerns).
We have TLS/LetsEncrypt/etc to verify we're talking to who we think we're talking to on the Internet, but phone networks come from a previous era.
I worked for a telcom once in one country where if they no longer held a phone number (it got ported to another network), we just send it to all the other providers. The network that currently held the number would relay it and the others dropped it. I actually wrote the job to actually compare the ported number list and only forward to the right destination. Telecom is janky as shit.
by nwilkens on 12/2/16, 5:26 PM
https://www.mnxsolutions.com/security/i-accidentally-recorde...
by rm_-rf_slash on 12/2/16, 2:49 PM
by acveilleux on 12/2/16, 3:28 PM
The free phone conference services are terminated at tiny little telcos that charge a much higher than normal fee for a north american long distance and the fee is split between the conference service operator and the telco (which may or may not be the same.)
Some of these services cannot be dialed via some VOIP providers (like Google Talk) for that reason.
by z0r on 12/2/16, 8:23 PM
by at-fates-hands on 12/2/16, 3:08 PM
Most of the hackers I know gave up on Phreaking once hacking became popular in their circles. To me, there will always be something more fascinating about the telephone infrastructure.
by ikeboy on 12/2/16, 3:30 PM
by telesilla on 12/2/16, 11:27 PM
by chrischen on 12/3/16, 12:14 AM
by spraak on 12/2/16, 4:49 PM
by OliverJones on 12/2/16, 8:21 PM
by hipaulshi on 12/2/16, 5:21 PM
by nashashmi on 12/2/16, 5:04 PM
My phone call [to a disconnected number] never actually made it to Cuba. The fraudsters make money because the last carrier simply pretends that it connected to Cuba when it actually connected me to the audiobook recording. So it charges Cuban rates to the previous carrier, which charges the preceding carrier, which charges the preceding carrier, and the costs flow upstream to my telecom carrier. The fraudsters siphoning money from the telecommunications system could be anywhere in the world.
by codewiz on 12/2/16, 7:44 PM