This refers to telephone fraud where the victim is invariably the telephone company. Phreakers use a range of techniques such as phone card hacking to gain access to long distance networks without charge. With the more recent advent of VoIP and mobile networks, the focus of the phreakers has changed but still involves fraud and telephones.
Phreaking is still widely misunderstood in the business community according to Wick Hill who recommends the use of such tools as Control Phreak from Callista to protect their VoIP networks from toll fra
Jim Doherty of CipherOptics explains the importance of having data protection at the heart of an IT security strategy to prevent criminals gaining access to it after it has left the perimeter defences.