To expose a security flaw in an existing paging technology. Exposing security flaws is often the only
way to alert technology users and others as to the risks involved.
Security flaws in any technology should be investigated,
publicly reviewed, discussed and fixed. Within the computer industry,
widely accepted and acclaimed mechanisms for exposing vulnerabilities
and alerting the public exist (i.e., Bugtrack, Risks Digest, etc.).
Commonly-available technology, when used by the White House, can
potentially endanger the President and those around him. This
administration's stance on limiting encryption weakens their own security
capabilities.
First and foremost, myself. My name is
Pamela Finkel. I am a hacker
who uses her real name. I am listed as the Chief Organizer on
the masthead of the current (Summer 1997) issue of 2600
Magazine. I have been a volunteer for this organization
since 1994's Hackers On Planet Earth conference. I receive no
financial renumeration for my volunteer efforts. I was instrumental
in organizing the Beyond HOPE conference held August 8-10, 1997
at the Puck Building in New York City.
I am also the president of a small
computer consulting firm which
contracts to several of the nation's largest corporations here
in New York City. I almost always disclose my affiliation with
2600 Magazine to my clients, often before signing any contracts
(and sometimes even during my first interview). I feel very strongly
that by staying informed about technology and 'hacker' issues,
I can help protect my clients' best interests. My clients usually
agree and look forward to my input.
I was approached at a hobbyist's convention called Trenton Computer Festival, in person. The person handed me a floppy disk and made it clear they did not want to be identified.
2600 Magazine often receives unsolicited, anonymous article submissions.
I printed the information I found on the floppy disk and gave
it to the magazine's editor, Emmanuel Goldstein. I also sorted
the data by pager 'capcode' (to see who got what pages in an organized
fashion). The information has not yet been printed in 2600 Magazine,
mostly because articles applicable to the Beyond HOPE conference
took up most of the Summer 1997 issue. I do not work on the editorial
staff of the magazine, nor do I speak for them. I do not know
whether the editorial staff plans to include this transcript in
the next (Fall 1997) issue.
I do know that many people in the on-line community are convinced
that we do not have First Amendment protection unless and
until the story and transcript are printed by an established publisher.
Hence my quest to publish this information.
I believe the White House Communications Agency page transmissions captured by my source to have been intercepted during a Volunteerism event some time in April, 1997 in Philadelphia. The actual dates and times of this event can be confirmed independently. I also believe (from press coverage of the event) that all of the former Presidents of the United States currently living (except Reagan) were also at the event. This should be easily confirmable by viewing news station tape archives.
Earlier versions of this web page contained a major factual error. The WHCA paging system does *not* use POCSAG (Post Office Code Systems Advisory Group), but rather GOLAY--an older signalling method largely abondoned by commercial paging carriers. GOLAY (not an acronym) is the name of the scientist who invented it. The paging log prefixes all begin with a "G", rather than a "P" or "F"--indicating the intercepted messages were in GOLAY format as opposed to POCSAG or FLEX.
Universal Radio manufactures three excellent universal decoders that will decode GOLAY as well as numerous other digital radio signals. Their M-1200 was demonstrated at HOPE in 1994. Universal Electronic can be reached at (800)431-3939.
WirelessNOW and Inside Paging are great resources
Unfortunately, you'll have to look for Brad Dye's POCSAG resources on your own, as he asked me to un-link. 8-(
Hardware Requirements
Software Requirements
Skill Requirements