Updated: 24.11.2002; 12:09:25 Uhr.
disLEXia
lies, laws, legal research, crime and the internet
        

Saturday, May 12, 2001

Police frequencies and fake calls (Re: Hutto, RISKS-21.39)

I am a volunteer Field Coordinator for the New Mexico State Police (District 11). The Albuquerque Metropolitan area (District 5 SP) has been plagued by problems like this, but from cell phones and FRS (Family Radio Service) radios, not on police frequencies. Even so, police frequencies are nothing special.

The quote "The police department's emergency radio system uses two sets of security identification codes and a computer to prevent unauthorized access." sounds like media hype to make it sound like something special was done. All police frequencies are well known, they are available from the FCC web page. The "identification codes" are most likely the sub-audible tones which tell the repeater how to process the signal. These are also well known. If I were to take my radio to Denver, I could probably be operating on their frequencies within a matter of minutes.

The "modification" of the radio is also media hype. Almost any radio, except those purchased from Tandy, can be modified without any effort. You open the back of the radio, and (in most major brands) you will see a single copper wire amongst preprinted circuit boards. Anyone want to guess what happens if you cut the wire? The FCC laws require commercial radios to be fixed frequency. These laws were made for crystal radios, and shouldn't be on the books anymore. Most manufacturers make one radio, and just pack and wire it differently in different cases for different applications.

The computer is most likely just the data link between the cars and the dispatcher that uploads and downloads information to the in car computers.

As for bogus radio calls, we have had a veritable plague of fake distress calls from FRS radios and cell phones. Most cell phones will call 911 without a service provider or SIM card, which allows anonymous untraceable crank calls. SAR teams and emergency personnel have responded to crashed airplanes, automobile accidents, lost hikers, and lots more. They solved this problem by asking for a phone number that they can call to verify the callers identity. One real hiker was saved because he refered us to the car company that he rented his car from. A woman "lost in the mountains" was ignored because she wouldn't give her name, a name of a friend or relative, or a phone number where anyone who knew her could be contacted. [Schlake (William Colburn) via risks-digest Volume 21, Issue 41]
0:00 # G!

More on that college network/spam (tls, RISKS-21.39)

In RISKS-21.39, of 11-May-2001, your correspondent, tls@panix.com, discussed the problems with the way a local university had recently set up an open 802.11 (wireless) network.

He commented that while this was an arguably defensible decision for a university, he was quite concerned about its potential use by spammers. To quote him:

> The RISK? Their campus mail-handling machines will relay mail to > any inside or outside destination if it's received from an address > "inside" their campus network. The network architecture they've > chosen for their wireless deployment dictates that anyone can walk > onto their (large, urban) campus, or even just park his car outside, > and spam away freely with hundreds of megabits per second of > bandwidth to most points on the Internet.

Having tried exactly what tls@panix.com describes (except that I sat in an air-conditioned van and only sent some test messages...). I can confirm that this university's mail servers work as he fears.

Furthermore, any mail coming through them will have an envelope indicating it came from a well known and trusted source. Meaning not only would people be more likely to let it through their filters (whether computerized or the Mark One Eyeball method of glancing at the "from" and "subject" line), but they're also far more likely to open it.

Meaning this type of service can easily be used to spread all sorts of nastiness. And not just limited to e-mail viruses and trojans.

Getting back to spamming: this system doesn't block outgoing "port 25" access, meaning a spammer could set up their own mail server and pseudo-anonymously engage in all sorts of socially deviant activities.

The RISK? If you leave your front door open on the Internet, you're leaving everyone else's front door ajar. [danny burstein via risks-digest Volume 21, Issue 41]
0:00 # G!


Maximillian Dornseif, 2002.
 
May 2001
Sun Mon Tue Wed Thu Fri Sat
    1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31    
Apr   Jun

Search


Subsections of this WebLog


Subscribe to "disLEXia" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.