What is Phreaking?
Phreaking, is a commonly misused term, and is frequently confused with hacking.
What is phreaking? One of the greatest mysteries in the modern hacker space is how to explain why so many brilliant and otherwise sane people believe that somehow phreaking itself is cool and a legitimate thing for their kids to be interested in.
What is Phone Phreaking?
Phone Phreaking, the practice of tricking a telephone carrier into supplying free or otherwise "unfair" telephone service to a calling party, is the original root of the hacker-activist idea of "Unfair" in Hacker Culture. It's the idea that through the practice of technological tactics, activists can gain some competitive advantage over their enemies by seeing to it that the rules of society are bent to favor the activist, to the benefit of everyone in general.
There are lots of different kinds of phreaking; like hacking in general, there's a lot of bad rep because some people are pretending to be evil. Those who are actually doing it are generally not known as evil, and the good guys don't really get a good name. For the most part, when we talk about phreaking, we talk about cracking telephone systems, messing with modem jammers, and making tapes. There is a relatively large community of crackers that has nothing to do with hackers or cracking or piracy or anything of the sort.
This is a fine place to start. We don't want to overwhelm you, but the section below has some detail and background that will help give you a firm grasp on the history of phreaking and how you can implement it into your computer security. We have created an overview page with more in-depth details on phreaking, and you can skip straight to it if you wish. We also suggest reading the post on baudot decoding.
Hardware and Software manipulation
Phreaking is a form of eavesdropping or intrusion that allows the user to manipulate the hardware and software of a computer or network. There is no definitive definition of phreaking, which means there is no hard and fast "technique" that is required to be a "phreak". Phreaking involves just about anything, but it is a term that tends to be used to describe electronic communication using methods of eavesdropping. Today, phreaking may sometimes be used interchangeably with other forms of computer hacking. However, it is possible for people with no hacking experience to engage in these activities, and some of these activities can be dangerous.
What were phreaking's roots?
Phreaking came from radio. In its purest form, phreaking was the practice of trying to intercept signals being sent on the radio by radio amateurs and sending them back at them in the form of audio beeps. If an amateur radio operator was going to place a call, he or she would call a prefix in the format of CW. This prefix would then be repeated, or "baudot" into the airwaves to be intercepted by the receiving station. When the stations being called were unable to receive the call, they would take the "baudot" data, or the beeps, and play it back to their own station. The listening stations would simply replay the signal.
What made phreaking illegal?
In 1985, radio equipment manufacturers, frustrated with amateur radio enthusiasts bypassing their security and communicating via the medium, began producing radios that were deliberately vulnerable to remote control. Called "broadband radios", these radios allowed the operator to "baudot" control signals and send them to the victim's machine (by which we mean the person's computer). At this point, the authorities stepped in and banned their manufacture and sale.
What were the goals of phreaking?
Aside from simply being a hobby, phreaking was the goal of those who were involved. It was considered very risky, because it involved the use of computer hacking techniques and led to the compromise of computer systems. However, it was also considered to be more than simply a novelty; many people were able to break into computer systems and see things that could not otherwise be obtained.
The term "phreaking", or technically "carrier tapping", is generally used to refer to any non-continuous piece of equipment that has the ability to pick up signals from another device. This term comes from the practice of "carrier hopping", in which a home stereo could detect the signal from another device. The connotation of "hacking" is an unfortunate necessity. The term's more positive applications range from ethical or anti-copying in the online environment, the less targeted information collection and the secure phone networks, to the more, well, secret and clandestine nature of a huge chunk of the amateur hacker community. For my part, phreaking strikes me as a badge of honor. It is a defiant act of defense and intelligence in our technology-obsessed culture, an act of rejection of the prevailing power relations in society and of the dominant culture's subservience to the State. It is also an act of rebellion against the establishment, which tries to equate everything with security.