A journey of 1,000 miles begins with a single step -- and so it was that law professor Susan Drummond's long, strange trip into the world of wireless security, where she learned that a terrorist organization had appropriated Ted Rogers' cellphone number, was launched by the arrival of a phone bill for $12,237.60.
Ms. Drummond, who had just returned from a month-long trip to Israel, went numb as she looked at the stupefying figure, which was more than 160 times higher than her typical monthly bill of about $75. The Rogers Wireless bill included a five-page list of calls charged to her phone, almost all of them to foreign countries that included Pakistan, Libya, Syria, India and Russia.
Ms. Drummond quickly determined what had happened: Someone had stolen her phone while she was away. She called Rogers Wireless, which told her there was nothing it could do, and she would have to pay the entire amount.
"I was shocked," she said. "Who wouldn't be?"
Since making that call to Rogers last August, Ms. Drummond and her partner, Harry Gefen, have been researching the cellphone giant, yielding some unexpected discoveries, among them that the phones of senior Rogers executives, including Mr. Rogers himself, were repeatedly "cloned" by terrorist groups that used them to make thousands of overseas calls.
That bit of information came out at a conference Mr. Gefen attended in September, where he spoke with Cindy Hopper, a manager in Rogers security department, who told him that the phones of top Rogers executives had been the target of repeated cloning by a group linked to Hezbollah. (Cloning involves the duplication of a cellphone's identity by capturing its number and encrypted security code.)
Speaking into Mr. Gefen's tape recorder -- and unaware that he was an aggrieved customer -- Ms. Hopper said terrorist groups had identified senior cellphone company officers as perfect targets, since the company was loath to shut off their phones for reasons that included inconvenience to busy executives and, of course, the public-relations debacle that would take place if word got out.
"They were cloning the senior executives repeatedly, because everyone was afraid to cut off Ted Rogers' phone," Ms. Hopper says on the tape.
"They were using actually a pretty brilliant psychology. Nobody wants to cut off Ted Rogers' phone or any people that are directly under Ted Rogers, so they took their scanners to our building, like our north building, where our senior top, top, top executives are. They took their scanners there and also to Yorkville, where there are a lot of high rollers and like it would be a major PR blunder to shoot first and ask questions later. . . . Nobody wants to shut off Ted. Even if he is calling Iran, Syria, Lebanon, and Kuwait."
Ms. Hopper also told Mr. Gefen what he had come to suspect -- that Rogers has automated security systems that alert them to radical changes in calling patterns like the ones that Ms. Drummonds' phone had undergone.
Armed with this knowledge, Ms. Drummond is pursuing legal action against the cellphone giant, charging that the company can easily spot a fraud-in-progress, yet "lets the meter run."
"There's a lot they don't want people to know," Ms. Drummond says. "They're afraid that people will lose faith in the system."
Ms. Drummond, who teaches law at Osgoode Hall, is suing Rogers in small claims court, and has filed hundreds of pages of documents to support her charges that the company is profiting from crime by failing to shut down stolen or cloned cellphones.
"There's more at stake here than money," she says.
But as the battle between Ms. Drummond and Rogers Wireless mounts, so do the charges. Each month, the company has added late fees to the outstanding balance (according to Ms. Drummond, the interest rate works out to 26 per cent annually). Rogers now wants a total of $14,141.00.
Ms. Drummond and Mr. Gefen, a technology journalist, have spent the past several months researching cellphone security. Mr. Gefen, who describes himself as "curious by nature," hit pay dirt in September when he attended the Toronto Fraud Forum, an annual conference for security experts.
He decided to go after noticing that one of the speakers was Cindy Hopper, a manager in Rogers fraud and security department, who was scheduled to give a speech titled "Using Cellphone Records to Investigate Fraud, Insurance Claims and Crime."