Entry
Reader's guide
Entries A-Z
Subject index
Hacking, Cracking, and Phreaking
Hacking, cracking, and phreaking are all ways of gaining access to protected or classified channels of information by an unconventional use of communications and information technologies. Phreaking manipulates telephone signaling in order to make free phone calls, while hacking typically involves using a computer and a modem to break into protected systems and networks. Hackers can be classified as white hat (good) or black hat (nefarious). They use a wide variety of programs and technologies, including but not limited to: logic bombs, denial-of-service attacks, password crackers, demon dialers, and sniffers. The term cracking is sometimes used to describe the act of hacking solely for the intention of making a profit or to destroy a system. Typically, only those familiar with hacking and hacker culture will employ the term cracking, whereas mainstream journalism and popular discourse simply uses the term hacking to refer to a wide variety of practices, including cracking.
Phone Phreaking
Phreaking is a way of emulating the 2,600 MHz (megahertz) tones that allows one to make free telephone calls. According to Paul Mungo and Brian Clough, authors of a 1992 book about hackers called Approaching Zero, the term “phreak” comes from a combination of the words phone, free, and freak.
Phone phreaking first began in the 1960s and continued until 1983, when the techniques of phreaking had been made obsolete by new developments in the telephone companies. Some people could whistle in a perfect 2,600 MHz pitch, most notably a blind man named Joe Engressia, who became known as the whistling phreaker. Also, a man named John Draper discovered that a whistle distributed as a prize in Captain Crunch cereal emitted a perfect 2,600 pitch. Draper, who became a very popular phreaker, came to be known as Captain Crunch. However, the most typical way of phreaking involved the use of what was known as a blue box or Mfer, a multifrequency transmitter that allowed the user the same access as a Bell operator. Blue boxes were constructed by phreakers using the 12 tones described in the Bell System Technical System Journal (1954 and 1960). Both Engressia and Draper, who were friends, distributed blue boxes to many blind children so that they could make free phone calls.
Phreaking entered the popular imagination in October 1971, when Esquire featured a story about phreaking entitled “The Secrets of the Little Blue Box.” Phreaking became popular on university campuses, prompting future Apple Computer founders Steve Jobs and Steve Wozniak to make blue boxes long before they built their first Macintosh.
During the 1970s, phreaking had become associated with political radicalism. Abbie Hoffman, leader of the Youth International Party Line (YIPL), became interested in phreaking as a means of resisting telephone monopoly. Hoffman described phreaking as a way of liberating Ma Bell. In 1971, Hoffman and a phreaker known as “Al Bell” began publishing a newsletter called Party Line, which described ways of subverting telephone lines for their own uses. In 1973, Party Line became known as TAP, standing for “technological assistance program.” Hoffman advocated liberating the telephone lines because he believed that taking control of communications systems would be a crucial action for mass revolt. In order to democratize telephony, TAP published many articles from AT&T's technical journals. In the spirit of freedom of information, TAP also published phone numbers for the White House and Buckingham Palace. By the mid-1970s, AT&T revealed that it lost approximately $30 million per year to telephone fraud, including phreaking.
...
- Art, Music, and Performance
- Business and Commerce
- http://Amazon.com
- http://MP3.com
- Business-to-Business
- Cookies
- Customer Relationship Management
- Digital Cash
- Disintermediation
- E-Commerce
- Harold Innis
- Internet Service Providers
- Jakob Nielsen
- Jeff Bezos
- Knowledge Management
- Local Area Network
- Margaret Whitman
- Metrics
- Napster
- Narrowcasting
- Personalization
- Peter Drucker
- Security
- Stephen M. Case
- Steven P. Jobs
- Telecommuting
- Trademark
- Video Conferencing
- William H. Gates, III
- Cyberculture
- “A Manifesto for Cyborgs”
- Neuromancer
- The New Hacker's Dictionary
- The Soul of a New Machine
- Understanding Media: The Extensions of Man
- Allucquère Rosanne Stone
- Avatar
- Blog
- Bruce Sterling
- CommuniTree
- Convergence
- Cyberculture
- Cyberethics
- Cyberfeminism
- Cyberpunk
- Cyberspace
- Cyberwarfare
- Donna J. Haraway
- Electronic Civil Disobedience
- Electronic Democracy
- Electronic Frontier Foundation
- Emoticons
- Esther Dyson
- Gender and New Media
- Habitat
- Hacking, Cracking, and Phreaking
- Hacktivism
- Howard Rheingold
- Instant Messaging
- Interactvity
- John Perry Barlow
- Killer Application
- LambdaMOO
- Marshall McLuhan
- Meme
- Metrics
- Mitchell Kapor
- Nicholas Negroponte
- Online Journalism
- Peer-to-Peer
- Race and Ethnicity and New Media
- Sherry Turkle
- Virtual Community
- William Gibson
- Hacking
- 2600: The Hacker Quarterly
- The New Hacker's Dictionary
- CommuniTree
- Computer Emergency Response Team
- Copyleft
- Cyberculture
- Cyberethics
- Cyberwarfare
- DeCSS
- Electronic Civil Disobedience
- Electronic Frontier Foundation
- Encryption and Cryptography
- Eric Raymond
- Hacking, Cracking, and Phreaking
- Hacktivism
- John Perry Barlow
- Mitchell Kapor
- Richard Stallman
- Security
- Virus
- Legal Topics
- 2600: Hacker Quarterly
- Bernstein vs. the U.S. Department of State
- United States vs. Thomas
- Anonymity
- Carnivore
- Child Online Protection Act and Child Online Privacy Protection Act
- Communications Decency Act
- Copyleft
- Copyright
- DeCSS
- Digital Millennium Copyright Act
- Electronic Civil Disobedience
- Electronic Communications Privacy Act
- Electronic Frontier Foundation
- Hacking, Cracking, and Phreaking
- Linking
- Napster
- Obscenity
- Pamela Samuelson
- Privacy
- Security
- Networks and Networking
- ARPANET
- BITNET
- Broadband
- Browser
- Bulletin Board Systems
- Cellular Telephony
- CommuniTree
- Community Networking
- Distributed Computing
- Firewall
- Freenet (Community Network)
- Freenet (File-Sharing Network)
- Internet
- Internet Appliances
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Internet Relay Chat
- Internet Service Providers
- LISTSERV
- Local Area Network
- Marc Andreessen
- Markup Languages
- Minitel
- MUDs and MOOs
- Napster
- Newsgroups
- Peer-to-Peer
- PLATO
- Satellite Networks
- Short Messaging System
- Telephony
- Tim Berners-Lee
- Usability
- vBNS
- Videotex
- Whole Earth ‘Lectronic Link’
- Wireless Application Protocol
- Wireless Networks
- World Wide Web
- Open-Source Software
- Organizations and Labs
- Association for Computing Machinery
- Computer Emergency Response Team
- Electronic Frontier Foundation
- Institute of Electrical and Electronic Engineers
- Internet Corporation for Assigned Names and Numbers
- Internet Engineering Task Force
- Media Lab, Massachusetts Institute of Technology
- SIGGRAPH
- SRI International
- World Wide Web Consortium
- Xerox Palo Alto Research Center
- People
- Alan Kay
- Alan Turing
- Allucquère Rosanne Stone
- Anita Borg
- Bill Joy
- Brenda Laurel
- Brian Eno
- Bruce Sterling
- Claude Shannon
- Daniel Sandin
- Donna Hoffman
- Donna J. Haraway
- Douglas Englebart
- Edward Tufte
- Eric Raymond
- Esther Dyson
- George Lucas
- Hal Varian
- Hans Moravec
- Harold Innis
- Howard Rheingold
- Ivan Sutherland
- J. C. R. Licklider
- Jakob Nielsen
- Jaron Lanier
- Jeff Bezos
- John Carmack
- John Perry Barlow
- John von Neumann
- Kai Krause
- Laurie Anderson
- Lawrence Lessig
- Manuel Castells
- Marc Andreessen
- Margaret Whitman
- Marshall McLuhan
- Marvin Minsky
- Michael Joyce
- Mitchell Kapor
- Nam June Paik
- Nicholas Negroponte
- Pamela Samuelson
- Pattie Maes
- Peter Drucker
- Raymond Kurzweil
- Richard Stallman
- Robert Moog
- Rodney Brooks
- Seymour Papert
- Sherry Turkle
- Stephen M. Case
- Steven P. Jobs
- Stewart Brand
- Theodor Holm (Ted) Nelson
- Thomas DeFanti
- Tim Berners-Lee
- Vannevar Bush
- Vinton Cerf
- W. Daniel Hillis
- William Gibson
- William H. Gates, III
- Social Issues
- Access
- Anonymity
- Carnivore
- Cyberethics
- Cyberfeminism
- Cyberwarfare
- Digital Divide
- Disposal of Computers
- Education and Computers
- Electronic Civil Disobedience
- Electronic Democracy
- Encryption and Cryptography
- Gender and New Media
- Hacking, Cracking, and Phreaking
- Hacktivism
- Obscenity
- Patent
- Privacy
- Race and Ethnicity and New Media
- Security
- Spam
- Technological Determinism
- Universal Design
- Virtual Community
- Technology
- ARPANET
- Authoring Tools
- Bluetooth
- Broadband
- Browser
- Bulletin Board Systems
- Carnivore
- CAVE
- CD-R, CD-ROM, and DVD
- Cellular Telphony
- Chat
- Codec
- Compression
- Computer-Supported Collaborative Work
- Content Filtering
- Cookies
- DeCSS
- Desktop Video
- Digital Asset Management
- Digital Subscriber Line
- Digital Television
- Distributed Computing
- Emulation
- Encryption and Cryptography
- Expert Systems
- Firewall
- Flash
- Graphical User Interface
- Habitat
- Hypermedia
- Hypertext
- Instant Messaging
- Interactive Television
- Internet
- Internet Appliances
- Internet Relay Chart
- Java
- Linux
- Local Area Network
- Markup Languages
- MIDI
- Minitel
- MP3
- MPEG
- Object-Oriented Programming
- Optical Character Recognition
- Optical Computing and Networking
- Peer-to-Peer
- Personal Digital Assistants
- Photoshop
- Qube
- Robotics
- Satellite Networks
- Shockwave
- Short Messaging System
- Sketchpad
- Software Agents
- Streaming Media
- Telecommuting
- Telephony
- vBNS
- Videoconferencing
- Videotex
- Virus
- Wireless Application Protocol
- Wireless Networks
- World Wide Web
- Writing
- “A Manifesto for Cyborgs”
- “As We May Think”
- “Man-Computer Symbiosis”
- “The Cathedral and the Bazaar”
- 2600: The Hacker Quarterly
- Neuromancer
- The New Hacker's Dictionary
- The Soul of a New Machine
- Understanding Media: The Extensions of Man
- Bruce Sterling
- Cyberpunk
- Electronic Publishing
- Emoticons
- Hypertext
- Michael Joyce
- William Gibson
- Loading...
Get a 30 day FREE TRIAL
-
Watch videos from a variety of sources bringing classroom topics to life
-
Read modern, diverse business cases
-
Explore hundreds of books and reference titles
Sage Recommends
We found other relevant content for you on other Sage platforms.
Have you created a personal profile? Login or create a profile so that you can save clips, playlists and searches