Agents of the Revolution
  • Content count

  • Joined

  • Last visited

  • Days Won


jfalcon last won the day on March 10 2018

jfalcon had the most liked content!

Community Reputation

8 Neutral

About jfalcon

  • Rank
    Hakker addict
  • Birthday 02/24/1974

Contact Methods

  • ICQ

Profile Information

  • Location
    Living within the ether

Recent Profile Visitors

6,037 profile views
  1. Adding another from NANPA - the toll-free (800/877/etc) carrier list and which carriers claims what. 800855_Assignments.pdf
  2. What's the fax line count? Don't forget there is SCADA systems out there using modems along with alarm systems and other dialup infrastructure. Just because the BBS is gone, doesn't mean that it's not worth scanning. I guess the key phrase is to be `selective`.
  3. Most do, yes. But it's touch and go in detection. Hardware works better than software of course but software like Warvox has tone detection at the core of it's detection logic.
  4. Ironically, this seems to have come up in a recent Telephreak meeting of the minds last weekend. So some thoughts and comments: First, iWar does *not* do VoIP. It only does VoIP dialing and Signal Analysis (same as WarVox)... the rest is up to you. There is no modem software built into iWar. So out of the box, you could have iWar call and have it interpret certain tones. Warvox does essentially the same thing but with a web front end and prettier pictures. That said, during last weekend, the topic was discussed and what it would take to do regular scanning of the PSTN at scale. Essentially a scan of the entire US/Canada phone network in a frequency to be useful. Ideally, we would want to record every call and have it available for future analysis as the only true way of mapping those goodies would be to just listen, try to do some machine learning to identify and match across the entire dataset. Due to the latency involved, it seems impossible. But is it? Maybe I'm looking for a sanity test. Recording would involve playing the beeping tone on our side while we listen to the other to keep in compliance with telephone recording laws and that pesky one-party/two-party duality. Also, recently, I came across a piece of software that fills in the piece that was left out of SpanDSP for use with an analog modem. It doesn't hit the faster speeds like V32bis or V90 but I'm not trying for speed. I haven't tried it yet so I'm not going to post a link to something that could be bunk. But I'm hoping it does. Lastly, CID/CNAM: So lots of providers out there offer it, but also noticed there are lots of apps and websites that are also doing the same thing for free. Like okcaller and other. Along with Telcodata and what's left of Bell's Mind data (who really should come back to us - we miss you) that should assist in weeding out what not to call. Since there are more mobile/VoIP lines than old fashion landlines (i would think now), that should reduce the scope of what needs to be scanned regularly - especially if it's been identified in an earlier scan as a voice/human line, then maybe only bother them once a year. So, am I insane for considering this? Is this possible? Could it be done and be turned into a public database? Could it be done on a global scale? I mention all of this in the name of historical network cartography and not as a hacker looking for a toy company...
  5. I'm not sure if you considered this, but you may want to consider bonding the two interfaces to a hosted machine. Then when an ISP gets cut by a backhoe, you're still rocking at the same IP address. Additionally, you would also get a nice boost in speed. Considering that congress has passed legislation on selling our network habits to 3rd parties, I think VPN and VPS providers are going to be in a growth period for a while.
  6. The emulation is very rudimentary. It basically creates a virtual serial port to the DOS side and ties it to some Telnet code (listener and client). https://sourceforge.net/p/dosbox/code-0/3843/tree/dosbox/trunk/src/hardware/serialport/softmodem.cpp It's likely that THC-SCAN is using hardware handshaking (RTS/CTS) that the emulation doesn't accomplish.
  7. We have DID's posted on our IRC channel. SIP/IAX of course still works. We don't offer voicemail anymore for many reasons.
  8. Sorry about that. The system is available via SIP/IAX but all the info on the website regarding DID's are probably toasted. I'll talk to Gid about updating that information. We ended up losing the old system and the backups we had weren't current enough so when we rebuilt, we decided to remove voicemail services (mostly for legal/privacy reasons). As for DID's, we have/had the one DID from IPKall that's posted in 2600net/#telephreak but I can add some more in. Behind the scenes: We're cooking up something new for a new era. It involves WebRTC and other fun stuff. Beave is still around but he's a very busy person now with life and all that. So the best would be to flag down one of the known TP crew somewhere or PM me direct here and I'll get the message.
  9. IAXModem just wraps the SpanDSP fax components. It presents itself to Linux as a ttyS device. Then it feeds in and out of Hylafax. I assume you would just point everyone to Hylafax and let it do the processing/sending/receiving in a centralized location. You wouldn't really need to do a fax line to every branch office. There is little point when you can get DID's in just about every location in the world. Outbound, you'd be better off using the best least cost routing across different VoIP providers or POTS/ISDN lines.
  10. Not to get off of my topic, but I did get ahold of a .dsk for The Cat's Meow, which I think was meant for the AppleCat. Sadly no Apple II emulators seem to have any networking emulation. It wouldn't help. The AppleCat is a very unique modem and the way old school 8-bit machines usually are not "Hayes Compatible" unless it spoke RS-232.
  11. I think it's all in how you use it. For instance, as part of the 2600/Telephreak group at Defcon, we've ran a pager network on 70cm for the weekend. There are those who do P25/MotoTrbo digital radio. If I was a little less lazy, I'd be more on HF or finish my satellite tracker project and monkey with satellites. It's all how you choose to use your ticket. You mentioned school crosswalk group - maybe take it further an volunteer to help in communications for 5k runs or the whole emcom thing. You can even legally use amplifiers with 802.11 hardware on certain frequencies with your ham ticket. I understand where you're coming from tho. When I lived in a different state than where I am now, there was the old-fogie "club" repeater who would get pissy when you used it after 10pm or there was the "other" repeater which was setup as an alternative to running simplex. Most of those guys were cb'ers who went "legit" with their power. Now that I live in a big city again, I have dozens of repeaters at my fingertips and I would say that 95% of them are people who I probably would keep at arms length. Friends that I do socialize with who also have a ham ticket either have the wrong class of ticket (most of the problem) for the range needed or we lack the setup to bridge the distance (usually antenna related). There's nothing wrong with having just the technician ticket. But it is limited intentionally. Upgrading my license was one of the first things I did once the newness of repeaters and ht radios wore off. After all, now it's just another written test to upgrade. Back then, I had to learn morse code at a sufficient speed. One of these days, I'll train my brain to hear words instead of letters.... GPRS/FRS has it's place and a lot more leeway in terms of content. But I still find amateur radio to be a lot more flexible in what you can do with the radio art. You will always find assholes that will stake their claim to any given frequency or spectrum - even when they know damn well that no allocated frequency is for exclusive use. I just remind them of the regs and tell them that the frequency is in use. Them trying to cause interference just makes them look petty and causes them to be put in a actionable position for a NAL from the FCC.
  12. Or you can do what I'm doing and get a old modem terminal server (Portmaster or Cisco AS5300), write some scripts to go massive parallel and find a VoIP provider that let's you really load up on channels. There is a version of iWar that does talk to rfc2217 modem pools, but it's also just as easy to write one in a scripting language that sends the results back to a database. Sometime this winter, I'll hook up the applecat I got a couple years back and see what it can do and video the results. Might be interesting how well it works since it supposedly could detect bells and whistles and other interesting things.
  13. First: Are you sure you're being hacked and not just paranoid (stress, drug or mentally induced)? I've worked for clients in the past who were 'concerned' with their privacy just as much as you or even myself and others on here. And at the end of the day, there was nothing to report except for some minor spyware due to some of their web browsing habits. But it's easy to be bombarded with un-truths and sensationalized accounts of "hacking" which are usually stories of fiction. Second: What you see on TV shows like 24, CSI or Person of Interest are greatly over exaggerated examples of "what if" cases. Technology in many cases isn't at that level, nor is there that great a consolidation of information - barring Governments - who have unlimited resources compared to private interests. Third: Why you? Why would someone from India target you specifically? Have you contacted Law Enforcement or the FBI? Coming to the hackers here will not likely garner you anything more than friendly advice as it's also illegal for us to hack them back in a "direct" manner. Fourth: You say you are experiencing electric shocks. Is it from the same piece of hardware? I have an old first generation MacBook Pro that does the same thing when charging. Not greatly painful but about like licking a 9v battery if touched in the right place. But when I unplug it from the charger, the shocking stops. The reason is because it's a very beat up laptop that's been dropped countless times. Not because someone has invaded my computer and told it to shock me. Consumer products wouldn't last long on the market without legal action if they could remotely trigger harm to the user. Fifth: Regarding phones. It is possible some application on your phone does have spyware. There are programs out there that run anti-virus/anti-spyware scans on your phone to ensure your phone doesn't have one of those applications. Additionally, phone os makers like Android and Apple scan and check new programs and updates for just such security violations before a program is allowed onto their respective stores. Between the two methods, the likelihood is greatly less than you think for a computer virus or spyware installation. Sixth: The only constant in the situation you presented is you. What are you doing to have them reacquire you? Like when a person goes into the Witness Protection Program, they are not allowed to go back to their old lives and old habits. But if they are reacquiring you, how are they doing that? What are you continuing to repeat for them to find you? Seventh: Consider befriending a geek. Someone who knows technologies capabilities - preferably in the administrations/operations or security field. They may not know everything, but I bet they know enough to determine what is a threat and what isn't which I think is what you really need... a person to work with you personally to calm your fears and has a good idea how it all works. Good luck and hope you find the help you need.
  14. You might want to check into cheap VoIP providers outside the US where it passes garbage for the ANI/CPN. Some even have unlimited US dialing.
  15. You can get DID's with more than one SIP/IAX channel so that your asterisk can just fork that portion of the dialplan. Check with your VSP.