BELTON — An unknown number of hackers attacked the Bell County phone system last week and rang up potentially thousands of dollars in fraudulent charges.
Jim Chandler, director of Bell County’s technological services department, told the Bell County Commissioners Court on Monday that on two separate occasions hackers were able to exploit weaknesses in the county’s phone system to enable them to place outgoing calls that appeared to be coming from, and be billed to, Bell County.
kAmx? E96 7:CDE 2EE24< E96 924<6CD E2C86E65 2 H62< A2DDH@C5 @? 2? 6IE6?D:@? :? E96 #@25 2?5 qC:586 s6A2CE>6?E[ r92?5=6C D2:5] p A2CE @7 E96 AC@3=6> H2D E96 >:?:>2= A2DDH@C5 C6BF:C6>6?ED 4FCC6?E=J :? A=246 7@C E96 4@F?EJ’D A9@?6 DJDE6>]k^Am
kAm“!2DDH@C5D @? E96 A9@?6 DJDE6> @?=J ?665 E@ 36 36EH66? 7@FC 2?5 D6G6? 492C24E6CD =@?8[” r92?5=6C D2:5] “%9:D A2DDH@C5 H2D @?=J 7@FC 492C24E6CD =@?8 2?5 E92E’D @?=J `[___ A@DD:3=6 4@>3:?2E:@?D]”k^Am
kAm~?46 E96J 82:?65 2446DD E@ E96 A9@?6’D 2FE@>2E65 >6?F DJDE6>[ E96 924<6CD H6C6 23=6 E@ 24E:G2E6 E96 C6>@E6 5:2= 762EFC6[ H9:49 2==@H65 E96> E@ C@FE6 :?E6C?2E:@?2= 42==D 7C@> 2 E9:C5 A2CEJ ?F>36C E9C@F89 E96 q6== r@F?EJ DH:E493@2C5] qJ C@FE:?8 E96 42==D E9C@F89 q6== r@F?EJ’D A9@?6 DJDE6>[ 2== @7 E96 C6=6G2?E 492C86D H@F=5 36 3:==65 E@ E96 4@F?EJ]k^Am
kAmpD r92?5=6C 6IA=2:?65 E96 2EE24< E@ E96 4@>>:DD:@?6CD[ E96J K6C@65 :? @? E96 >@DE @3G:@FD BF6DE:@? @7 H9J H6C6 E96 762EFC6D E96C6 E@ 36 6IA=@:E65 :? E96 7:CDE A=246]k^Am
kAmr92?5=6C D2:5 E92E E96 C6>@E6 5:2= 762EFC6 2?5 :?E6C?2E:@?2= 42==:?8 42A23:=:E:6D 925 366? 6?23=65 J62CD 367@C6 96 H2D 9:C65 2?5 E92E @?46 E96 924< H2D 56E64E65 3J p%U2>Aj%’D 7C2F5 56A2CE>6?E[ E96J H6C6 5:D23=65]k^Am
kAmw6 2=D@ E@=5 E96 4@>>:DD:@?6CD E92E 2== @7 E96 42==D H6C6 23@FE `_ D64@?5D :? =6?8E9]k^Am
kAm“xE H2D =:<6 D@>6@?6 H2D 5:2=:?8 ?F>36CD[ 4@??64E:?8 2?5 92?8:?8 FA[” r92?5=6C D2:5]k^Am
kAm(9:=6 E9:D EJA6 @7 2EE24< :D ?6H :? q6== r@F?EJ[ :E’D @?6 @7 E96 >@DE 4@>>@? EJA6D @7 A9@?6 7C2F5 :? E96 H@C=5] z?@H? 2D AC:G2E6 3C2?49 6I492?86 7C2F5[ 3642FD6 :E E2C86ED E96 E6=6A9@?6 6I492?86 7@C @?6 A2CE:4F=2C 3FD:?6DD @C @77:46[ E96D6 2EE24<D 4@DE &]$] 4@>A2?:6D 3:==:@?D @7 5@==2CD A6C J62C]k^Am
kAmp? ~4E@36C C6A@CE 7C@> E96 r@>>F?:42E:@? uC2F5 r@?EC@= pDD@4:2E:@?[ 2 4@>>F?:42E:@? D64FC:EJ @C82?:K2E:@?[ 6DE:>2E6D E92E E@E2= A9@?6 7C2F5 4@DED 4@>>F?:42E:@?D 4@>A2?:6D >@C6 E92? Sc_ 3:==:@? 2??F2==J] !C:G2E6 3C2?49 6I492?86 924<:?8 2=@?6 4@DE E6=64@> 42CC:6CD Sc]ca 3:==:@? =2DE J62C]k^Am
kAmp =2C86 A2CE @7 E96 C62D@? 7@C E96 9:89 4@DE @7 AC:G2E6 3C2?49 6I492?86 924<:?8 :D E96 2EE24< :D C6=2E:G6=J 62DJ E@ 6I64FE6]k^Am
kAmy6??:76C $962C6C[ 2? uqx DA@<6DH@>2?[ D2:5 E92E AC:G2E6 3C2?49 6I492?86 7C2F5 “:D >@C6 4@>>@? E92? J@F H@F=5 E9:?<]”k^Am
kAmu@C $62? qC@H?[ 2 5:C64E@C @7 ?6EH@C< @A6C2E:@?D H:E9 `d J62CD :? E96 E6=64@>>F?:42E:@?D :?5FDECJ[ A9@?6 7C2F5 :D 2== E@@ 4@>>@?]k^Am
kAm“&A E@ `_ A6C46?E @7 E96 42==D E92E 2C6 8@:?8 @? 2E 2?J 8:G6? E:>6 2C6 7C2F5F=6?E[” qC@H? D2:5] w6 D2:5 E92E :? 9:D 6IA6C:6?46[ >F=E:A=6 D9@CE\5FC2E:@? =@?8 5:DE2?46 42==D[ =:<6 E9@D6 q6== r@F?EJ 6IA6C:6?465[ 2C6 E96 92==>2C< @7 2 “4@??64E 492C86 D42>]”k^Am
kAm“r@>A2?:6D :? $@FE9 p7C:42 2?5 $@FE9 p>6C:42 H:== 492C86 E96D6 C62==J 9:89 766D E@ 4@??64E E@ 2 A9@?6 ?F>36C[ =:<6 S`_ 2 42==[” qC@H? D2:5] “p?5 E96J 86E 2 =@E @7 4@??64E:@?D :? 2 D9@CE E:>6 2?5 E96? D6?5 E96 3:==D E@ &]$] 42CC:6CD]”k^Am
kAms:2?6 qC2?5@?[ p%U2>Aj%’D D6?:@C AF3=:4 C6=2E:@?D >2?286C 7@C }@CE9 2?5 r6?EC2= %6I2D[ D2:5 E92E 2 3FD:?6DD H9@D6 6BF:A>6?E 92D 366? 4@>AC@>:D65 3J 2 AC:G2E6 3C2?49 6I492?86 2EE24< “4@F=5 A@E6?E:2==J 92G6 E9@FD2?5D @7 5@==2CD :? 7C2F5F=6?E 42==D 492C865 E@ E96:C 244@F?E H:E9:? 2 D9@CE A6C:@5 @7 E:>6]”k^Am
kAmw@H6G6C[ H96? 2 AC:G2E6 3C2?49 6I492?86 2EE24< :D FD65 :? 4@?;F?4E:@? H:E9 2 4@??64E 492C86 D42>[ :E’D ?@E F?4@>>@? 7@C D>2==\ E@ >65:F>\D:K65 3FD:?6DD6D E@ D66 A9@?6 3:==D :? E96 “E6?D @7 E9@FD2?5D @7 5@==2CD C2?86[” qC@H? D2:5]k^Am
kAm“%96 H@CDE x’G6 6G6C D66? H2D 2 Saag[___ A9@?6 3:== 7@C D:I 9@FCD H@CE9 @7 7C2F5[” qC@H? D2:5] p 9F86 A6C46?E286 @7 E96 AC@3=6> :D E96 2EE:EF56 A6@A=6 92G6 E@H2C5 E96:C A9@?6 DJDE6>]k^Am
kAm“!9@?6 DJDE6>D 2C6?’E 4962A[” qC@H? D2:5] “p?5 A6@A=6 FD6 E96> F?E:= E96J =:E6C2==J 5@?’E H@C< 2?J>@C6] p?5 2?J 324<5@@CD E92E H6C6 E96C6 `_ @C `a J62CD 28@ 2C6 DE:== E96C6]”k^Am
kAm|@DE “=6824J A9@?6 DJDE6>D[” E9@D6 E92E DE:== C6=J @? AC:G2E6 3C2?49 6I492?86D :?DE625 @7 FD:?8 G@:46 @G6C x?E6C?6E AC@E@4@=D[ “5@?’E 92G6 E96 C6A@CE:?8 42A24:EJ E@ E6== 2 FD6C :7 D@>6E9:?8 :D 8@:?8 HC@?8[” 96 D2:5]k^Am
kAmu@C qC@H?[ E96 H@CDE\42D6 D46?2C:@ :D 2 =6824J DJDE6> 4@FA=65 H:E9 2? 2FE@>2E65 8C66E:?8]k^Am
kAm“x7 J@FC A9@?6 :D 2?DH6C65 H:E9 2? 2FE@>2E65 8C66E:?8 A6@A=6 4@F=5 36 42==:?8[ 6?E6C:?8 2 3F?49 @7 4@56D[ 92?8:?8 FA[ 5@:?8 :E 282:? 2?5 ?@ @?6 H@F=5 <?@H[” qC@H? D2:5]k^Am
kAmxE’D 2 D:EF2E:@? E92E r92?5=6C :D H@C<:?8 E@ 86E q6== r@F?EJ @FE @7] w6 E@=5 4@>>:DD:@?6CD 96 925 C646:G65 2 “G6CJ 288C6DD:G6 3:5” 7C@> r:D4@ DJDE6>D E@ C6A=246 E96 4@F?EJ’D 6?E:C6 A9@?6 DJDE6> 2D H6== 2D 255 G:56@ 42A23:=:E:6D E@ 2== @7 E96 5:DEC:4E 4@FCED 2?5 4@F?EJ 4@FCED 2E =2H]k^Am
kAm“x DE:== 92G6 E@ 8@ E9C@F89 E96 DA64:7:4D 2?5 D66 H9:49 762EFC6D H6 ?665 2?5 H9:49 H6 5@?’E[” r92?5=6C D2:5] “qFE :E’D DF3DE2?E:2==J =6DD E92? E96 S`]d >:==:@? x E9@F89E :E H2D 8@:?8 E@ 36]”k^Am