697 lines
37 KiB
Plaintext
697 lines
37 KiB
Plaintext
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
THE SYNDICATE REPORT
|
||
|
Information Transmittal No. 23
|
||
|
(Part 1 of 2)
|
||
|
Released June 13, 1989
|
||
|
Featuring:
|
||
|
|
||
|
Editor's Note
|
||
|
Telecommunication Events, Conferences, Seminars, and Shows
|
||
|
Phreak Tools V1.1 - Remake of CNA/L Lister
|
||
|
Radio WTSP Hacker Charged With Computer Tampering
|
||
|
The "950" Busts
|
||
|
Hacker Stereotypes and Statistics
|
||
|
Brief Notes from the Report
|
||
|
"Drowning Hackers"
|
||
|
Vocabulary Toni
|
||
|
|
||
|
by The Sensei
|
||
|
Editor Syndicate Report Magazine
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
EXPOSITION: TSR
|
||
|
|
||
|
Once again, The Report accepts outside sources. Anybody can
|
||
|
write/provide information to The Syndicate Report. Articles/Information
|
||
|
may be provided through RADIO WAVES Bulletin Board System 612-471-0060.
|
||
|
Any info such as Busts, Phreaking, Hacking, Data / Telecommunications,
|
||
|
and new developments on any the previous mentioned specialties will be:
|
||
|
accepted, labeled, and given full actual credit to the article/info
|
||
|
provider(s), or writer(s). -- ** All articles have been presented by me
|
||
|
unless shown at the end of the article as the information provider(s),
|
||
|
or writer(s). **
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
EDITOR'S NOTE: TSR
|
||
|
|
||
|
TSR #23, late as usual. Sorry, once again - life is testing me in
|
||
|
many ways, that's why this issue is over a month late. This apology
|
||
|
goes mainly to 'contributing writers,' for their help in this Report.
|
||
|
Reasons: Like I said, I've been busy, and most of the information here
|
||
|
is (unlikeusual) written by others. A lot of the info. is from locals,
|
||
|
and users that call Radio Waves System, since I've not been calling the
|
||
|
usual systems lately. I'm not going to go into a specific topic for my
|
||
|
Editorial this issue, instead I'll just outline a few things of
|
||
|
interest. Just a quick note: Abbie Hoffman, author of "Steal this
|
||
|
Book" "Steal this Urine Test." and other books, is DEAD. I heard about
|
||
|
it on the news a whileback, approx 1.5 months ago, but I didn't get all
|
||
|
the specifics. From what I know he over dosed. Now he's a legend. PC
|
||
|
Pursuit. The format change is complete, and all the old passwords are
|
||
|
dead. June 1st was supposed to be the cut off date, I guess they
|
||
|
finally did something on time. If anyone is still using the old
|
||
|
format, it's probably the new format. I haven't heard too much
|
||
|
information on the new format(s), butthere has been talk of 20 to 30
|
||
|
different formats used by PCP. Although new formats can be made
|
||
|
swiftly and easily to accomodate any abuse. Good luck.
|
||
|
|
||
|
The 4.6 trillion chance of hacking a PCP code is over, now it's
|
||
|
justabout impossible. The only codes you will see now are the ones
|
||
|
hackers have tapped from the "INSIDE of PCP." In TSR #23, Part II, I'm
|
||
|
going to copy a letter I received from a guy in England. ;The Sensei /
|
||
|
TSR Editor
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
TELECOMMUNICATION EVENTS, TSR (c.c 6\9)
|
||
|
CONFERENCES, SEMINARS, AND SHOWS:
|
||
|
|
||
|
This is a list of meetings and shows in this coming month. I'm
|
||
|
providing this list for you and your friends to rob, cheat, and swindle
|
||
|
the angered companies that participate in their events. You are likely
|
||
|
to find your dreams come true in telephone accessories and other
|
||
|
wonderful equipment. Many thing will be on show, so take items as you
|
||
|
please. There could be butt sets, testing equipment, and other things
|
||
|
at your disposal. Remember, their parking lots are usually filled with
|
||
|
BELL* trucks just waiting for you to clean them out.
|
||
|
_____________________________________________________________
|
||
|
|
||
|
June 6-9
|
||
|
Payphone/Op Services Orlando, FL. Buena Vista Palace 713-974-6637
|
||
|
June 7-9
|
||
|
TEXPO '89 San Francisco, CA. Civic Auditorium 415-542-7753
|
||
|
June 11-13
|
||
|
Illinois Telephone Assn. Osage Beach, MO. Tan-Tar Resort 217-525-1044
|
||
|
June 11-14
|
||
|
ICC '89 Boston, MA. Sheraton Boston Hotel 617-466-3506
|
||
|
June 11-14
|
||
|
New York State Telephone Assoc. Lake Geroge, NY. 518-462-6696
|
||
|
June 11-14
|
||
|
ADUC 1989 National Conference Boston, MA. 800-228-9290
|
||
|
June 12-15
|
||
|
BICSI Workshop Lexington, NY. Radisson Plaza Hotel 606-257-3972
|
||
|
June 18-21
|
||
|
Pennsylvania TelephoneHershey, PA. Hershey Hotel 717-238-8311
|
||
|
June 18-21
|
||
|
Arkansas Tel Assoc. Hot Springs, AR. Lake Shore Sheridan 501-375-0086
|
||
|
June 18-22
|
||
|
NENA '89 Long Beach, CA. Hotel Queen Mary 213-596-0144
|
||
|
June 19-21
|
||
|
Videotex Industry Assoc. Ann. Conf. San Francisco, CA. 703-522-0883
|
||
|
June 19-22
|
||
|
NTCA Leadership Conf.San Francisco, CA. Fairmount Hotel 202-298-2300
|
||
|
June 19-23
|
||
|
Fiberoptic Splicing/Termination Sturbridge, MA. 508-347-7133
|
||
|
June 20-22
|
||
|
AFCEA Intl. Convention/ExpoWashington, DC. 703-631-6100
|
||
|
June 20-22
|
||
|
Maine Tel Assoc. Rockport, ME. The Samoset Resort 207-763-9911
|
||
|
June 20-22
|
||
|
UTC Orlando, FL. Buena Vista Palace 301-621-5596
|
||
|
June 24-28
|
||
|
Georgia Tel Assoc. Sandestin Beach, Fl. Sandestin Hilton 404-321-5440
|
||
|
June 26-28
|
||
|
Intelligent Network ConForum Chicago, IL. 312-938-3500
|
||
|
|
||
|
:::: Information provided by Seymour Lecker / TWA ::::
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
PHREAK TOOLS V1.1 - REMAKE OF CNA/L LISTER: TSR (p.f 5\5)
|
||
|
|
||
|
Ever get tired of looking up out-dated CNA listings in text files? Or
|
||
|
did you ever wondered WHO own what prefix on an 1-800/900 exchange? If
|
||
|
you have these problems, then check out PHREAK TOOLS V1.1, formerly
|
||
|
called CNA/L Finder or Lister. Professor Falken, of Minnesota 612, has
|
||
|
reformatted this CNA/L Lister, and renamed it to fit its style. Here's
|
||
|
Falken's latest information about Phreak Tools: "It has a 800/900 WATS
|
||
|
Exchange Reverse Directory and a built in CNAfinder in it. The 800/900
|
||
|
directory, all you do is tell it what exchange youneed and it will tell
|
||
|
you who owns it, and from that you should be able to tell if it's a
|
||
|
safe exchange. The CNA program is the same as the current stand-alone
|
||
|
version, however, all new releases of Automated CNA Finder will be in
|
||
|
Phreak Tools Versions 1.x+ New features to be in upcoming versions are
|
||
|
newer CNA list, with ID codes. Area code/Country code finder, and a
|
||
|
950 port directory listing." (Sent via Radio Waves mail). The latest
|
||
|
version has some hard to get information, and can be found onRadio
|
||
|
Waves BBS at (612) 471-0060, and the 203 area. Currently, only IBM
|
||
|
version 1.1 is available. There has been no further information from
|
||
|
Falken, or Twisted Sector, 408 California, about an Apple version of
|
||
|
Phreak Tools/CNA Lister. News about this in future TSRs, or on Radio
|
||
|
Waves (RW/TSR)
|
||
|
|
||
|
The Author will be taking suggestions, and questions on RW.
|
||
|
:::: Information by Professor Falken / Phortune 500 / 612 ::::
|
||
|
:::: Contributing Writer, Programmer of Phreak Tools ::::
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
RADIO WTSP HACKER CHARGED WITH COMPUTER TAMPERING: TSR (5\11 ny.t)
|
||
|
|
||
|
Michael I. Shapiro and Terry L. Cole, former news executives of WTSP,a
|
||
|
Florida television station in the Tampa area, are charged with
|
||
|
illegally entering the computer system of a rival television
|
||
|
station.Christian Hoyer, an assistant state attorney in Hillsborough
|
||
|
County, who is prosecuting the case, says that Shapiro, working for
|
||
|
WTSP, Channel 10, had previously worked for a rival station, Channel
|
||
|
13. Shapiro is chargedwith using his own microcomputer and a
|
||
|
microcomputer at Channel 10 to break into Channel 13's news computer,
|
||
|
possibly seeking a competitive advantage for Channel 10's newscasts.
|
||
|
The case is unusual because it involves 'media espionage.'
|
||
|
|
||
|
:::: Information Provided by Romeo Andria ::::
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
THE "950" BUSTS: TSR (usr 5\9)
|
||
|
|
||
|
A bust recently went down, May 3rd, 1989. It's called "Beta
|
||
|
Cygnus,"which is in the 602 area code, address 602-234-3376. The
|
||
|
Sysop, Mastermind, did something very foolish to get caught. That's
|
||
|
right, he was hacking 950-1001 and was caught. At the time of his
|
||
|
arrest/capture the attorney general of Arizona had ordered a DNR on his
|
||
|
line, consequently, a listing of all callsgoing to/from his board
|
||
|
number were captured by the Feds. Mastermind's system and hardrive
|
||
|
etc..was retrieved INTACT. Mastermind also kept all INFO-FORMS handy
|
||
|
and un-censored. So if you wereon the board, and left some
|
||
|
confidential information in the information form, the Feds have it now.
|
||
|
Several other 602 boards went down due to the NEWS, Temple of Doom is
|
||
|
down, and the HD is nuked. Valhalla Island did the same.
|
||
|
|
||
|
* More busts are expected to come, since the attorney general made
|
||
|
inferences to others. *
|
||
|
|
||
|
:::: Information by Professor Falken / Phortune 500 / 612 ::::
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
HACKER STEREOTYPES AND STATISTICS: TSR (5\19)
|
||
|
|
||
|
Computer hackers have broken out of their old stereotypes. The
|
||
|
information necessary to commit computer crime is spreading rapidly
|
||
|
through the population as computers are becoming easier to access.
|
||
|
According to a recent report published by the National Center for
|
||
|
Computer Crime Data (NCCCD), 32 percent of the people arrested for
|
||
|
computer crimes are women, 43 percent are minorities and 67 percent are
|
||
|
between the ages of 21 and 35. Former and current employees are far
|
||
|
more likely to breach a company's computer than someone from outside
|
||
|
the company. Seventy percent of all computer crimes involve the theft
|
||
|
of money or services. The NCCCD estimates that computer crimes cost
|
||
|
the US $555 million in 1988. Also, 15 computer-years were lost in down
|
||
|
time and 930 man-years were spent detecting and removing viruses. The
|
||
|
arrest of computer criminals and the laws concerning them are examined.
|
||
|
|
||
|
:::: Information by TS / TSR ::::
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
:::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES :::::::::::::::::::::
|
||
|
|
||
|
// Drowning Hackers // (3\0 d.log)
|
||
|
|
||
|
Computer security is threatened by the nature of a computer's own
|
||
|
configuration, especially stationary networks. Hackers have the
|
||
|
advantage of surprise and a global entry capability. Several security
|
||
|
measures are available to deter unauthorized entry into data files,
|
||
|
although no computer is completely safe from intrusion. 'Drowning' is a
|
||
|
method that hides important information within data that is actually
|
||
|
garbage and not useful. Cost-benefit factors come into play when it
|
||
|
takes more time to sort through files than the sought after information
|
||
|
is worth to begin with. 'Traps' are programs that engage intruders in a
|
||
|
dialogue while the system is being invaded. Meanwhile the hacker is
|
||
|
being tracked down by the computer's security system.
|
||
|
|
||
|
_____________________________________________________________
|
||
|
|
||
|
// FBI Haunted by West German Hackers // (3\0 d.log)
|
||
|
|
||
|
Inattention in pursuing a widely publicized 1988 computer hacking case
|
||
|
involving Marcus Hess is coming back to haunt the FBI, as West German
|
||
|
authorities arrested Hess, along with several other hackers, for
|
||
|
allegedly giving computer information to the Soviets. Hess had earlier
|
||
|
been identified as being involved in the penetration of more than 30
|
||
|
computers at US research laboratories, military installations and
|
||
|
defense contractors. US Air Force Office of Special Investigation
|
||
|
assistant chief of computer crime, Jim Christy, says that the FBI has
|
||
|
been embarrassed into more actively pursuing computer crime and that
|
||
|
the Hess case is a catalyst that has engendered an understanding of the
|
||
|
threat.
|
||
|
|
||
|
_____________________________________________________________
|
||
|
|
||
|
// Hotel Motel Holiday Inn Services // (3\2 u.s.t)
|
||
|
|
||
|
Telesphere International will implement for Concord Hotels of
|
||
|
Cleveland its Telesphere Planned Hotel telecommunication services.
|
||
|
With TPH, Telesphere will provide a package of services utilizing the
|
||
|
company's all digital fiber optic network. Included: High volume WATS,
|
||
|
switched access WATS, hotel flat rate service, international calling
|
||
|
and 900 information service. Telesphere International will provide
|
||
|
credit card and operator-assistedcalling from public pay phones and
|
||
|
hotel lobby phones at Concord Hotels. Callaccounting systems will be
|
||
|
used to manage call activity and monitor line usage.Under the
|
||
|
agreement, Telesphere will provide its TPH services to 11 hotels with
|
||
|
1,400 rooms. The hotels are concentrated in the East but are expanding
|
||
|
westward.
|
||
|
|
||
|
:::: Information by The Curist / 615 ::::
|
||
|
_____________________________________________________________
|
||
|
|
||
|
// Hacker Busted: Steals DEC VMS code // (2\2 m.wk)
|
||
|
|
||
|
Twenty-five-year-old computer hacker Kevin David Mitnick is being held
|
||
|
without bail on charges that include stealing $1 million in software
|
||
|
from DEC, including VMS source code, and causing that firm $4 million
|
||
|
in damages. Mitnick is also charged with unauthorized entry into the
|
||
|
Leeds University campus. [ TS here. Just wondering, this guy appeared
|
||
|
on several systems, including Radio Waves. He positioned himself as an
|
||
|
official...guess we could have learned from him. If there is anymore
|
||
|
information on this articles, send it in. ]
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::::
|
||
|
|
||
|
What "Vocab. Tonic" is, is a list of acronyms and definitions to help
|
||
|
education the ignorant hacker. With an extensive vocabulary, there is
|
||
|
virtually nothing one can't learn. Study on...
|
||
|
|
||
|
CO - Central Office: The building which comprises a switching network
|
||
|
and its control and support equipment. (Trash House)
|
||
|
|
||
|
FX - Foreign Exchange Line: A voice circuit between a remote CO, and a
|
||
|
station.
|
||
|
|
||
|
IOSA - Ignorant Operator Silent Approach: Form of phreaking, relating
|
||
|
to Voice Mail Systems. From 3rd Party Fraud, Part II.
|
||
|
|
||
|
ETS - Electronic Translation Systems: An electronic replacement for
|
||
|
the card translator in 4A Xbar systems. Makes use of SPC 1A Processor.
|
||
|
|
||
|
XBAR - Cross Bar: Old switching system.
|
||
|
|
||
|
SF - Single Frequency: A signaling method for trunks. 2600 Hz is
|
||
|
impressed upon idle trunks.
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
:::::::::::::::::::::: TSR "Quote of the Month" :::::::::::::::::::::::
|
||
|
|
||
|
"Against All Odds, There is Greatness" - TSR
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
|
||
|
TSR will accept additional sponsor/support Systems. If you have a
|
||
|
certain interest in the Report, and wish to provide support to TSR --
|
||
|
Leave your BBS number -- and any other information on RADIO WAVES
|
||
|
Bulletin Board Systems.
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
R A D I O W A V E S
|
||
|
6 1 2 - 4 7 1 - 0 0 6 0
|
||
|
Syndicate Report Support BBS
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
This concludes this Transmittal No. 23 (Part 1 of 2)
|
||
|
Released June 13th, 1989
|
||
|
by The Sensei
|
||
|
Editor of The Syndicate Report
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
THE SYNDICATE REPORT
|
||
|
|
||
|
Information Transmittal No. 23
|
||
|
(Part 2 of 2)
|
||
|
|
||
|
Released June 13, 1989
|
||
|
Featuring:
|
||
|
|
||
|
Editor's Note
|
||
|
"Hacker from England Letter"
|
||
|
|
||
|
The CT2 Phone - Another Abuse Product
|
||
|
|
||
|
Virus Outbreaks Spur Congree To Combat Threat
|
||
|
|
||
|
How To Become A Syndicate Report Support BBS
|
||
|
|
||
|
Credit Card Fraud: Old Techniques Still Work
|
||
|
|
||
|
Brief Notes from the Report
|
||
|
|
||
|
by The Sensei
|
||
|
Editor Syndicate Report Magazine
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
EXPOSITION: TSR
|
||
|
|
||
|
Once again, The Report accepts outside sources. Anybody can
|
||
|
write/provide information to The Syndicate Report. Articles/Information
|
||
|
may be provided through RADIO WAVES Bulletin Board System 612-471-0060.
|
||
|
Any info such as Busts, Phreaking, Hacking, Data / Telecommunications,
|
||
|
and new developments on any the previous mentioned specialties will be:
|
||
|
accepted, labeled, and given full actual credit to the article/info
|
||
|
provider(s), or writer(s). --
|
||
|
|
||
|
** All articles have been presented by me unless shown at the end of
|
||
|
the article as the information provider(s), or writer(s). **
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
EDITOR'S NOTE: TSR
|
||
|
|
||
|
One day I went digging through some of my old letters in the file
|
||
|
cabinet. A lot were from computer people -- this was all normal USPS
|
||
|
Mail. One caught my eye. It was from a guy in England. I forgot I
|
||
|
ever got it, and for good reason, it's post dated May 21, 1986. I
|
||
|
found it interesting...
|
||
|
|
||
|
_____________________________________________________________
|
||
|
|
||
|
My name John Doe
|
||
|
and Address North Hull Estate
|
||
|
HULL
|
||
|
North Humerside
|
||
|
ENGLAND
|
||
|
Phone 0482 XXXXXX
|
||
|
|
||
|
21st May 86
|
||
|
|
||
|
Dear Sensei,
|
||
|
|
||
|
Hello, as you can see, I live about 4200 miles away from you hence
|
||
|
this letter, I'll try to keep it short.
|
||
|
|
||
|
I know that you have, or had a C128 with a Volks 300-1200 modem, I
|
||
|
have a Atmos 48k with D/D and a Voyager 11 modem, giving 1200/1200 and
|
||
|
300/300 baud. I am not 'on-line' at the moment, due to some technical
|
||
|
problem with my cable, but when I am my password is 'xxxx'.
|
||
|
|
||
|
Tell me now if you can, have you heard of a piece of equipment
|
||
|
called a 'phreaker', there is a great lack of information 'over hear'
|
||
|
regarding this machine, but apparently it aids you in your phone bills.
|
||
|
|
||
|
With the limited knowledge available to me, I know your "Bell-Phone"
|
||
|
system works on the 'two-phase' method, this would cause only slight
|
||
|
problems in altering one or two of the part numbers.
|
||
|
|
||
|
If you do know about this machine, I would be greatful to you if you
|
||
|
could let me have details about its construction, part numbers each.
|
||
|
|
||
|
Awair as I am that there will be some cost involved, I am quite
|
||
|
prepared to respond with an agreed 'fee' for any and all information I
|
||
|
can get. Should you be able to send this machine to me via air mail,
|
||
|
or boat, this would prove expenceive from this end, and so I think a
|
||
|
diagramm with part numbers, the best option.
|
||
|
|
||
|
Anyway Sensei, I seem to be 'rabbiting' a bit, so I think I'll close
|
||
|
now, iff youcan get some free time, would you simply 'drop me a line'
|
||
|
to say that you have received my letter.
|
||
|
|
||
|
Many thanks.
|
||
|
|
||
|
Yours sincerely,
|
||
|
|
||
|
John Doe
|
||
|
|
||
|
_____________________________________________________________
|
||
|
|
||
|
Interesting, eh? When I first read this, I laughed. This guy
|
||
|
thinks a 'phreaker' is a machine. I thought it was a person. Well, I
|
||
|
tried to call the guy with the number, via MCI (love that service), and
|
||
|
I got no answer. Back in '86 about this time, there was a lot of
|
||
|
paranoia about busts. I thought this was some guy from England trying
|
||
|
to find out about phreaking, thus do some busting or whatever. I never
|
||
|
responded.
|
||
|
|
||
|
Some of my readers are overseas, so if this person is reading this,
|
||
|
write me again. I'm not sure how this person got all the information
|
||
|
about me then. I did have a C128, with other computers. Maybe it was
|
||
|
an overseas commie system. Who knows.
|
||
|
|
||
|
These types of responses are rare -- via USPS. Usually it's all
|
||
|
through networking/email etc. But I'm thinking about posting a
|
||
|
READER'S RESPONSE COLLUMN in future TSRs. I do get many bits of
|
||
|
information from the readers, so if I get a lot on a particular month
|
||
|
-- I'll post more. Send those responses in! Via Radio Waves.
|
||
|
|
||
|
The Sensei/TSR '89
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
THE CT2 PHONE - ANOTHER ABUSE PRODUCT: TSR (p.f 5/5)
|
||
|
|
||
|
British Telecom, has made a cordless phone that's really portable.
|
||
|
It's called the CT2 and weighs only 2.7 ounces. You bring it with you
|
||
|
wherever you go, and when you are within reach of one of the base units
|
||
|
popularly called " PhonePoints ", you can make calls. These
|
||
|
PhonePoints/base units are permanently installed at popular locations
|
||
|
such as airports, bus/train stations, shopping malls, and grocery
|
||
|
stores. The CT2 is expected to cost about as much as a regular
|
||
|
phortress phone call ($0.25), which makes it much more affordable than
|
||
|
a cellular phone.
|
||
|
|
||
|
The CT2's base unit has a range of 200 meters from its antennae. The
|
||
|
technology is based on ISDN ( Integrated Services Digital Network )
|
||
|
instead of the current analog technology. The CT2 works in this
|
||
|
matter, 1) Once you are in range of any of the CT2's base units (200
|
||
|
meters) you turn the phone to the TALK position. 2) At this time the
|
||
|
telephone scans the 40 channels designated for it's use. The channels
|
||
|
are in the 864 Mhz to 868 Mhz range, which is a step above the current
|
||
|
Cellular frequencies (810 Mhz to 830 Mhz). 3) The phone sends out its
|
||
|
owners billing information and authorization code etc. 4) The
|
||
|
PhonePoint checks the users billing info and ID code with a central
|
||
|
computer, and if everything matches up, you get a dialtone.
|
||
|
|
||
|
:::: THE ABUSE ::::
|
||
|
|
||
|
The process of scanning and locking onto the first available frequency
|
||
|
is called FDMA ( frequency division multiple access ), British Telecom
|
||
|
claims this " avoids the cross-talk interference " common in most
|
||
|
cellular phones currently. The PhonePoint/CT2 system is to be deployed
|
||
|
sometime within the next 2 years, for an approximate price of $275 per
|
||
|
phone & access fees. At this time, it makes me wonder if they will
|
||
|
encrypt the data going back & forth. If not, they could have major
|
||
|
abuse to the system, just think what a person with a portable scanner
|
||
|
could do? All he'd have to do is scan the 860 Mhz range and listen to
|
||
|
peoples billing info and/or conversations, the information gathering
|
||
|
possibilities are unlimited.
|
||
|
|
||
|
:::: Information by Professor Falken / Phortune 500 / 612 ::::
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
VIRUS OUTBREAKS SPUR CONGRESS TO COMBAT THREAT TSR (i.w. 6\9)
|
||
|
|
||
|
Concerned by press reports and stung by its own outbreak, The U.S.
|
||
|
Congress has begun talking about ways to combat computer viruses.
|
||
|
|
||
|
FBI Director William Sessions warned last week that no current statutes
|
||
|
specifically address viruses, particularly those where damage is
|
||
|
limited to lost time instead of data and where the virus maker's
|
||
|
motive is unclear.
|
||
|
|
||
|
"Viruses are easy to create and propagate, require little expertise,
|
||
|
and may by nearly impossible to prevent or detect," Sessions told the
|
||
|
Senate on Technology and the Law.
|
||
|
|
||
|
Sessions said the FBI is developing behavior profiles of computer
|
||
|
hackers in an effort to combat viruses but noted that the FBI has only
|
||
|
conducted two criminal investigations of viruses so far. [ TS here --
|
||
|
Only two cases? Damn, I thought the FBI was a little more informed
|
||
|
about viruses than that! One almost pulls down an entire network, yet,
|
||
|
no one on their staff can understand one completely. So, all you virus
|
||
|
spreadors better get hopping before the law strikes back. ]
|
||
|
|
||
|
Bill introduced is called the Computer Virus Eradication Act of 1989.
|
||
|
By Wally Herger of Calif.
|
||
|
|
||
|
The reason, according to Herger's press secretary Mahan, is three
|
||
|
different House offices were infected by a virus through a computer
|
||
|
bulletin board network shortly before an earlier version of Herger's
|
||
|
bill was introduced in May 1988.
|
||
|
|
||
|
If viruses persist, "out networks could be consumed by mutual
|
||
|
suspicion," testified Clifford Stoll, a scientist at the
|
||
|
Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass.
|
||
|
"Networks could become so bureaucratic no one could use them anymore,"
|
||
|
he said. "Cleaning up after viruses may be cheaper than preventing
|
||
|
them." Stoll helped track down a West German hacker who broke into
|
||
|
various unclassified military computer in this country. "Catching this
|
||
|
spy took over a year of full-time effort," he said. "While he was
|
||
|
reaching into out computer, I lost a year of astronomy research. Much
|
||
|
worse, a thief was stealing information from out nation's computers."
|
||
|
|
||
|
[ What, was he required to track this guy down for an entire year? I
|
||
|
really feel sorry for him. He could have just asked some local BBS
|
||
|
kids -- he would have gotten further, quicker. -TS ]
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
HOW TO BECOME A SYNDICATE REPORT TSR (tsr 6\13)
|
||
|
SUPPORT BULLETIN BOARD SYSTEM:
|
||
|
|
||
|
At the end of each TSR Information Transmittal, you'll see a message
|
||
|
something like...
|
||
|
|
||
|
"TSR will accept additional sponsor/support Systems. If you have a
|
||
|
certain interest in the Report, and wish to provide support to TSR --
|
||
|
Leave your BBS number -- and any other information on RADIO WAVES
|
||
|
Bulletin Board Systems."
|
||
|
|
||
|
Many users/sysops, after reading TSRs, ask, "How can I (or whomever)
|
||
|
become a TSR Support BBS"? Well, knowing that not everyone reads every
|
||
|
bit of data in a magazine, I'll write about in now. This article has a
|
||
|
heading at the beginning of TSR and some substantial space, so people
|
||
|
should understand now.
|
||
|
|
||
|
Number one, if you like The Syndicate Report, you're already half way
|
||
|
to having a TSR support system. When I look over possible TSR support
|
||
|
BBSs, I look for what interests me in the BBS. It should favor certain
|
||
|
hobbyists such as: hackers, phreaks, pirates, thrashers, etc. If you
|
||
|
don't you might as well forget it -- since I probably won't call the
|
||
|
system anyway to upload it regularly, nor anyone else.
|
||
|
|
||
|
But, if you have those qualities with a good piece of
|
||
|
software/hardware, then just leave your phone number and BBS name, and
|
||
|
any login/new user info to me in feedback/mail on Radio Waves
|
||
|
612-471-0060. I'll reply back to you within a few days, no longer than
|
||
|
a week. In that time, I'll probably be checking out your system.
|
||
|
|
||
|
Most of the systems that do support TSR are ones that I've been calling
|
||
|
for a while, and I've picked.
|
||
|
|
||
|
What I usually require a BBS to have, is a transfer area dedicated to
|
||
|
The Syndicate Report for easy up/downloading. Also, if there is an
|
||
|
intense demand, a sub-board may erect. Usually sub-boards only appear
|
||
|
on highly active hack orientated systems.
|
||
|
|
||
|
So, if you wish to become a TSR support BBS, get a hold on me and leave
|
||
|
any BBS information. Thank you for your support.
|
||
|
|
||
|
;The Sensei / TSR
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
CREDIT CARD FRAUD; OLD TECHNIQUES STILL WORK: TSR (strs 6\13)
|
||
|
|
||
|
Credit card fraud is doing very nicely, thank you. And, in some
|
||
|
degree, that is a result of poor retail procedures and policies, says
|
||
|
Limited Credit Services, Inc. and U.S. Secret Service agent Perry.
|
||
|
|
||
|
One of the most serious internal fraud problems retailers are facing
|
||
|
has not abated over the last several years. Or, as the SS puts it:
|
||
|
"The Nigerians are still alive an well. I hate to keep beating up on
|
||
|
them, but they're responsible, probably, for about 50% of everybody's
|
||
|
fraud."
|
||
|
|
||
|
The Assoc. of Credit Card Investigators' latest bulletin states: 'There
|
||
|
are now an estimated 30k to 50k Nigerians in the U.S. and an estimated
|
||
|
75% to 90% of this group participates in fraudulent activity.' "
|
||
|
|
||
|
The security asserts: "It is amazing they have changed their techniques
|
||
|
very little and are still able to get away with it." They're getting
|
||
|
away with it to a large extent by going into establishments as
|
||
|
employees. Especially in the personnel departments -- that's where they
|
||
|
want to work. They can get access to the information and they're off
|
||
|
to the races. Employers assume they put these people into entry level
|
||
|
jobs and they're not going to do anything. But they want entry level,
|
||
|
low profile jobs, like a factory environment, almost. And a lot of
|
||
|
credit card operations are like factory environments. One they're in,
|
||
|
keying in payments, for example, they have the customer's back account
|
||
|
number, where the checks are drawn. Most of the time there's a
|
||
|
statement header that says what the person's credit line is, what the
|
||
|
balance is.
|
||
|
|
||
|
[ More Credit Card Technique Information in TSR #24. ]
|
||
|
|
||
|
:::: Information by Credit Card Carny / 407 ::::
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES ::::::::::::::::::::
|
||
|
|
||
|
// Pizza Hut Uses Central Number //
|
||
|
|
||
|
Telecommunications advances are helping Pizza Hut deliver pizzas
|
||
|
faster. National Telecom's Automatic Call Distributor allows several
|
||
|
shops in an area use a single number. Incoming calls are
|
||
|
automatically routed to the shop nearest the caller's location. The
|
||
|
system also features management information capability, helping store
|
||
|
managers monitor service. If you have more information on this
|
||
|
technology, dial Radio Waves now.
|
||
|
_____________________________________________________________
|
||
|
|
||
|
// One in 10 to use fiber by 2001 //
|
||
|
|
||
|
Telecommunications industry experts estimate that 10 percent of all
|
||
|
American homes will be connected by fiber optics in the year 2001. A
|
||
|
University of Southern California survey reported in Communications
|
||
|
Week's current issue predicted 10 million Americans work from their
|
||
|
homes in 2001 and would need the communications capability offered by
|
||
|
fiber optics.
|
||
|
|
||
|
:::: Information Provided by Celtic Phrost / 713 ::::
|
||
|
_____________________________________________________________
|
||
|
|
||
|
// UK Law fails to snare Hackers //
|
||
|
|
||
|
United Kingdom companies have no laws to protect them from
|
||
|
unauthorized access to computer files. Existing laws refer to
|
||
|
fraudulent tampering with programs. Proposals for new legislation from
|
||
|
the Scottish and English Law Commissions are not expected to change the
|
||
|
situation in the next two years. Two communications tappers who broke
|
||
|
into the Duke of Edinburgh's mailbox on British Telecom's Prestel
|
||
|
service have been fined 1,350 pounds sterling for electronic forgery.
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
TSR will accept additional sponsor/support Systems. If you have a
|
||
|
certain interest in the Report, and wish to provide support to TSR --
|
||
|
Leave your BBS number -- and any other information on RADIO WAVES
|
||
|
Bulletin Board Systems.
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
The Black Market :: 408-741-5443 ------- Lanatic Labs :: 415-278-7421
|
||
|
Login: Zeppelin New User: Bong P/H System
|
||
|
|
||
|
Tiamat's Temple :: 612-731-0296 ------- Hysteria Prl :: 612-557-2811
|
||
|
P/H-Files Unix!Proline System
|
||
|
|
||
|
RADIO WAVES System :: 612-471-0060
|
||
|
- Syndicate Report Support BBS -
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
This concludes this Transmittal No. 23
|
||
|
(Part 2 of 2)
|
||
|
|
||
|
Released June 13th, 1989
|
||
|
|
||
|
by The Sensei
|
||
|
Editor of The Syndicate Report
|
||
|
|
||
|
_______________________________________________________________________
|
||
|
_______________________________________________________________________
|
||
|
|
||
|
-= EOF =-
|
||
|
|