The Lunatic's Guide to Hacking Into Anyone's Voicemail
The News of the World, the British tabloid tasked with reporting the news of the world, closed its doors this weekend, in the outfall of a massive phone hacking scandal. Investigators working for the paper are alleged to have hacked into the voicemail boxes of various figures, recording, manipulating and deleting messages, all in the course of gathering the world's news. People who have suffered these intrusions include politicians, British celebrities, real celebrities and most damningly, the victims of crimes. Editors have been arrested, the public has shat and in an attempt to control the scandal, Rupert Murdoch, the owner of the paper, decided to pull the plug on it, depriving the world from its only source of news.And its only source of Hannah Montana stickers. As the dust from this refuses to settle, the great thinkers are debating what this says about Murdoch's media empire and our culture as a whole. Was this a rogue case, or a symptom of a deeper problem? Are journalistic standards still relevant in a world where there's an audience for the results of this kind of investigative research? Should we, as a society, begin self-sterilization immediately, or merely soon?Meanwhile, the readers of Cracked are thinking, This voicemail hacking actually sounds kind of fun. Can Cracked use this incident to teach us something that will further speed society's turn into the ditch? Yes, yes we can.So, out of a desire to get some pageviews, and to create a world capable of gathering its own news, I've published the following guide on how to hack into anyone's voicemail system. I'm trusting you guys to use this only on unliked celebrities or unsympathetic victims of crimes. If Ben Affleck gets bitten by a dog is what I'm thinking.To illustrate this article, I will be hacking in to the voicemail of the famous Food Network chef Rachel Ray. While conducting research for a book I'm writing, How to Creep On the Stars of the Food Network, I ended up leaving 28 messages on her voicemail system. The content of these messages are both troubling and deeply erotic, and I've since decided they should remain a private matter best heard only by me and my fevered brain. The deletion of these voicemails will be the goal of the remainder of this column. Oh Rachel. I meant everything I said, but no court must ever know what specifically that was.
PIN GuessingThe simplest and often most effective technique to hack into someone's voicemail system is to simply guess their PIN. The default PINs assigned to each voicemail box are the best places to start -- due to sloping foreheads and the time constraints of today's busy eating-lifestyles, many users don't reset the default PINs. Simple PINs like 1111, 1234 are also good guesses, as are the last four digits of your target's phone number. If you have access to your target's naked body, check them carefully for any tattoos of four digit numbers. Example:Using the phone number for Ms. Ray which I obtained earlier through treachery, I logged into the AT&T voicemail service and attempted to log in to her voicemail box using all the obvious PIN numbers. None of them worked, so I then tried 3866, or EVOO, which is the word Rachel Ray made up to describe olive oil because of this thing with how her brain works. That also didn't work, but it made me feel like I was getting inside her mind a bit, which was a harrowing experience. I had uncovered one of the first dangers of hacking -- getting in too deep.
Social EngineeringSocial engineering is the term for tricking someone into providing access to a secure system. Computer nerds came up with the term because they imagined it to be like hacking a person's brain, except instead of a person it's a low level customer support person, and instead of a brain, it's a mushy cellular mass which is incapable of giving a fuck.In the case of hacking into someone's voicemail, this is as simple as calling customer support and asking to reset the PIN of your target's voicemail box. By claiming to be your target, and that you've forgotten her PIN, and the answer to her secret question, and then crying a bit, you get the weary, underpaid CSR to relent and reset the PIN.Example:I called AT&T customer support, and after waiting on hold for several weeks, I finally got through to a CSR. I then tried to navigate through the steps necessary to reset her voicemail PIN, an act which required pretending to be Rachel Ray herself ...
"No of course this is my real voice. No one could talk like that all the time."
Just Stand Really CloseIf you know where your target likes to speak on the phone, you could simply try standing very close to that spot while they're using their phone, so you can see them enter their PIN. Keep in mind that if your target is a busy celebrity, who does a lot of walking and talking, you'll have to consider a way to surreptitiously keep pace with them.
Swordfish ItThere's always the possibility of doing "real" computer hacking on the voicemail system. To do this, you'll need a mainframe, and a GUI, and a BIOS and eight keyboards, and a T1 line and some other things. Get all those things, put them in a heap in the middle of your living room, and then call the Geek Squad, who should be able to help you with the rest.Example:Fuck Best Buy. That's all I have to say about that. That's all anyone ever needs to say about anything. That tree there was still alive until this Best Buy was built.
Dummy PhoneBy replacing your target's phone with a duplicate, you can record them entering their PIN and then divert them to a dummy mailbox which doesn't contain any voicemails of you promising to make them happy. To do this, you'll need excellent sleight-of-hand skills as well as an exact copy of your target's phone (many phone manufacturers make large quantities of nearly identical phones these days).
With an AxeA simple steel-headed fire axe is capable of hacking into many things, like the side door of the AT&T data center off 4th and Elm, as well as the objections of the wan folk who dwell within, and even the case of the servers which house the hard drive containing your target's voicemail messages. This is hacking in its most prototypical sense, and will make you feel like a bigger person, and also a bit, ironically enough, like a dwarf. "Dwarf dwarf dwarf dwarf. Dwarf dwarf dwarf. Axe!" __
And check out more from Bucholz in Justin Bieber's Favorite Knife Fighting Techniques and An Interview With James Cameron's Avatar About 'Avatar'.