Home > Lucent Technologies > Communications System > Lucent Technologies BCS Products Security Handbook

Lucent Technologies BCS Products Security Handbook

Here you can view all the pages of manual Lucent Technologies BCS Products Security Handbook. The Lucent Technologies manuals for Communications System are available online for free. You can easily download all the documents as PDF.

Page 21

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
About This Document 
Page xxi Lucent Technologies Toll Fraud Crisis Intervention 
Lucent Technologies Toll Fraud Crisis 
Intervention
If you suspect you are being victimized by toll fraud or theft of services and need 
technical support or assistance, call the appropriate Lucent Technologies BCS 
service:
NOTE:
These services are available 24 hours a day, 365 days a year. Consultation 
charges may apply. Intervention services are...

Page 22

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
About This Document 
Page xxii Related Documentation 
nFor assistance with the DEFINITY AUDIX System, call:
800 562-8349
nFor assistance with the MERLIN II, MERLIN LEGEND, MERLIN Plus, 
PARTNER II, PARTNER Plus, or System 25 Communications Systems, or 
their associated voice mail systems or other adjuncts, call:
800 628-2888
NOTE:
The above services may result in an additional charge. Intervention services 
are performed at no charge for...

Page 23

Introduction 
Page 1-1 Background 
1
BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
1
1Introduction
Background
Telecommunications fraud is the unauthorized use of a company’s 
telecommunications service. This type of fraud has been in existence since the 
1950s when Lucent Technologies first introduced Direct Distance Dialing (DDD).
In the 1970s Remote Access became a target for individuals seeking 
unauthorized network access. Now, with the added capabilities of voice mail and...

Page 24

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Introduction 
Page 1-2 Who is the Enemy? 
1
Who is the Enemy?
Hackers and Phreakers
Hackers and “phreakers” (phone freaks) use personal computers, random 
number generators, and password cracking programs to break into even the most 
sophisticated customer premises equipment-based system if it has not been 
adequately secured. Once a hacker penetrates a network and provides 
instructions to toll call sellers, large volumes of...

Page 25

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Introduction 
Page 1-3 What is in a Loss? 
1
after detecting the fraud. However, call sell operators know that the traffic on most 
customer premises equipment-based systems is not monitored.
That is why a calling card on the street sells for $30.00 and a customer premises 
equipment-based system code (called a Montevello) sells for up to $3,000.00.
Drug Dealers
Drug dealers want phone lines that are difficult to trace so they can...

Page 26

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Introduction 
Page 1-4 Known Toll Fraud Activity 
1
nPBX-Based Activity
—Maintenance Port
Maintenance ports are the most recent target of abuse. In this 
scenario, hackers find a PBX maintenance port number with their 
“war dialer,” a device that randomly dials telephone numbers until a 
modem or dial tone is obtained. They then “hack” the user ID and 
password, sometimes just by using the PBX default passwords, to 
enter your system....

Page 27

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Introduction 
Page 1-5 Known Toll Fraud Activity 
1
In the first situation, a hacker dials either 9 or a TAC that allows the 
call to be transferred to the outgoing facilities. In the second 
situation, a hacker typically hacks the mail password and changes it 
along with the greeting. This gives the hacker access to proprietary 
corporate information.
—Automated Attendant
Auto Attendants are used by many companies to augment or 
replace...

Page 28

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Introduction 
Page 1-6 Known Toll Fraud Activity 
1
nNetwork-Based Activities
—Shoulder Surfing
Network hackers use video cameras in airports supposedly to take 
pictures of their family, but they are actually taking pictures of people 
using their calling cards. Hackers may also use an audio tape 
recorder to capture calling card numbers as they are spoken to an 
operator. This technique is known as “Shoulder Surfing.”
—Social...

Page 29

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Introduction 
Page 1-7 Known Toll Fraud Activity 
1
Examples include, but are not limited to the following 800 numbers: 
1 800 COLLECT, 1 800 CALLATT, and 1 800 GETINFO. They could 
also dial 950 carrier access numbers.
Lastly, they can dial various 10xxx carrier access codes. In any 
case, they can still use the PBX to place a fraudulent call. If the PBX 
is not in New York, NY, they can use the calling card. Use of the 
10xxx codes...

Page 30

BCS Products
Security Handbook  
555-025-600  Issue 6
December 1997
Introduction 
Page 1-8 Known Toll Fraud Activity 
1
The fee charged for calling these numbers can range upwards of 
$250 per call. As already stated, the fee is set by the owner of the 
number. Unscrupulous people who own these numbers call around 
the country inserting these numbers into pagers to get the users to 
return the call so that they can collect the fee. Consult your LEC for 
a list of 976-look-alike numbers in your exchange....
Start reading Lucent Technologies BCS Products Security Handbook

Related Manuals for Lucent Technologies BCS Products Security Handbook

All Lucent Technologies manuals