588 lines
38 KiB
Plaintext
588 lines
38 KiB
Plaintext
![]() |
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
THE SYNDICATE REPORT
|
|||
|
Information Transmittal No. 20
|
|||
|
(Part 1 of 1)
|
|||
|
Released January 31, 1989
|
|||
|
Featuring:
|
|||
|
Editor's Note
|
|||
|
Telenet / PC Pursuit Price Hike
|
|||
|
Phone Fraud Techniques
|
|||
|
Information Age Attacks
|
|||
|
Unix Hacker Caught at LLNL
|
|||
|
Briefs notes from The Report
|
|||
|
Vocabulary Tonic
|
|||
|
by The Sensei
|
|||
|
Editor Syndicate Report Magazine
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
EXPOSITION: TSR
|
|||
|
Once again, The Report accepts outside sources. Anybody can write/provide
|
|||
|
information to The Syndicate Report. Articles/Information may be provided
|
|||
|
through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
|
|||
|
Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
|
|||
|
on any the previous mentioned specialties will be: accepted, labeled, and
|
|||
|
given full actual credit to the article/info provider(s), or writer(s). --
|
|||
|
** All articles have been presented by me unless shown at the end of the
|
|||
|
article as the information provider(s), or writer(s). **
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
EDITOR'S NOTE: TSR
|
|||
|
A New-Year is upon us, 1989. The final year of the decade. Only
|
|||
|
ten more and we turn over another Century. Just think, only a few decades back
|
|||
|
the World had no wonderful high speed Computers, no means of Telecommunications
|
|||
|
via Computer, and not even a fraction of the amount of data being exchange over
|
|||
|
systems - a few decades back. Technology will have multiplied 4 times by the
|
|||
|
year 2000. I for one feel like I'm still in the Dark Ages. I'd like to be
|
|||
|
born around the year 2100 or 2150. Around that time, computers will be as
|
|||
|
common as the person - and probably more valuable to an extent.
|
|||
|
One bad point though: Phreaking and Hacking in the year 2100 would be
|
|||
|
in toto termination. In other words, suicide. Hackers, Crackers, Breakers,
|
|||
|
Phreakers, Terrorists - whatever you want to call'em are already talking about
|
|||
|
the end of phreaking and hacking. It's just a matter of time.
|
|||
|
You know what I really get tired of hearing? Bad news about 2 things.
|
|||
|
1) The United States falling apart, and 2) Phreak/Hack world crumbling. And
|
|||
|
WHAT did I just report as an opinion?
|
|||
|
"The end of the Phreak/Hack soon." I've tried to turned myself away from
|
|||
|
writing depressing editorial opinions, but I've learned its basically
|
|||
|
impossible! Something that I never find myself writing, something like:
|
|||
|
"Hackers/Phreaks break into Government Bank and get rich...no suspects have
|
|||
|
been found." I'm babbling here, I'll have to edit half of this out... On
|
|||
|
with the Report #20.
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
|
|||
|
TELENET / PCP PURSUIT PRICE HIKE: TSR (pc!p 1\2)
|
|||
|
This bit of news is probably all over the nation by now, but PCP is
|
|||
|
hanging itself - trying to get users to pay more $$ CASH. Here's a transcript
|
|||
|
from the 'C PURSUIT' Telenet accessible PCP Line:
|
|||
|
Here is a summary of the price change:
|
|||
|
o Monthly Charge. The new fixed charge is $30 per month.
|
|||
|
o Cap on Free Usage. Your $30 per month will now pay for up
|
|||
|
to 30 monthly hours of non-prime time usage. Using the full
|
|||
|
30 hours in one month amounts to an hourly rate of only
|
|||
|
$1.00 -- more than 85% less than you would pay with the most
|
|||
|
popular long distance discount service. Only a small
|
|||
|
fraction of you will even be affected by this cap.
|
|||
|
o Over Cap Rate. Non-prime time usage, above the 30 hour cap,
|
|||
|
will be billed at $4.50 per hour, which is about half of the
|
|||
|
next lowest rate in the market place.
|
|||
|
o Second Tier Rates. There will be a second level of rates
|
|||
|
for those who use the service at business levels. When your
|
|||
|
total monthly usage exceeds 60 hours, both prime time and
|
|||
|
non-prime time rates will increase for those hours in excess
|
|||
|
of 60, as follows:
|
|||
|
PRIME TIME 2nd tier rate: $ 14.00 /hr
|
|||
|
Non-Prime 2nd tier rate: $ 7.50 /hr
|
|||
|
....other changes are included, although the information is
|
|||
|
changing a lot - log into the PCP Via telenet to check all
|
|||
|
the latest info.
|
|||
|
The new pricing scheme goes into effect May. 1st, raises the monthly PC
|
|||
|
Pursuit charge to 30$, with a limit of 30 hours of service per month for
|
|||
|
that price, according to Peter Naleszkiewicz, Telenet's product manager
|
|||
|
for outdial services. After 30 hours, the cost of service rises to 4.50$
|
|||
|
per hour, with another jump to $7.50 per hour coming at 60 hours per
|
|||
|
month.
|
|||
|
A Note from Mr. Naleszkiewicz
|
|||
|
"The service was far more popular that we ever expected it to be,"
|
|||
|
Naleszkiewicz said. "Thirty hours per month is significantly more than the
|
|||
|
average use of the service, so most users will see only a five dollar per
|
|||
|
month increase. But it's not the average PC Pursuit user that concerns
|
|||
|
Telenet, according to Phil Sih, prez of Portal Communications CO. of
|
|||
|
Cupertino, Calif. "We have a population of heavy Pursuit users on out 10$
|
|||
|
per month online service," Sih said. "Some of these people are using
|
|||
|
Pursuit 200 to 300 hours per month. You didn't have to be a rocket
|
|||
|
scientist to see this change coming."
|
|||
|
|
|||
|
::::::::::::::::: Information Provided by KM / 'C Pursuit' :::::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
|
|||
|
PHONE FRAUD TECHNIQUES:
|
|||
|
TSR (usr 1\3)
|
|||
|
|
|||
|
%&%&%&%&%&%&%&%&%&%&%&%&%
|
|||
|
%Phone Fraud, Part III%
|
|||
|
%&%&%&%&%&%&%&%&%&&&%&%&%
|
|||
|
|
|||
|
Well in Part Three, I will discuss a part of phone fraud you
|
|||
|
very rarely see used, The Outside line, How you can get it and where.
|
|||
|
A very interesting thing I ran upon when I was hacking around
|
|||
|
on a PBX. I thought, How easy would it be to get a operator to
|
|||
|
give you an outside line from a hospital. In fact, I found it to be
|
|||
|
very simple, this is what ya do:
|
|||
|
You call your nearest hospital and when the switchboard
|
|||
|
operator answers ask her to send you to Radiology, (Doesn't really
|
|||
|
matter ask for any department) And when the department you asked for
|
|||
|
answers, tell them that you have made a mistake and that you would
|
|||
|
like to be transferred to the switchboard. You then will get sent
|
|||
|
back to the main switchboard but this time once the operator
|
|||
|
answers say, "Yes, This is Dr. Jones, I'm having trouble getting
|
|||
|
an outside line, Could give me an outside line please". Then most
|
|||
|
likely you will hear a Dial Tone! Now you can screw everything
|
|||
|
up and call Alliance, or anything your heart desires.
|
|||
|
The reason must call and get transferred to a different department
|
|||
|
before asking for the outside line is that if you just
|
|||
|
call up and ask for an outside line, the operator will see that
|
|||
|
your are on a Incoming Trunk, (If you don't know what that means,
|
|||
|
she'll simply tell you thatyour not in the hospital, but outside)
|
|||
|
But you see, once you get transferred, then again transferred back
|
|||
|
it looks like you're inside the hospital - so, it's more of a good
|
|||
|
chance of getting the outside line.
|
|||
|
I hope this File helps you out. Direct all questions to TSR #21/TS
|
|||
|
::::::::::::::::::: Information Written by The Synergist :::::::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
INFORMATION AGE ATTACKS: TSR (fbs 1\30)
|
|||
|
Solicitors hit you at night with so many phone solicitations that you
|
|||
|
shelled out the extra bucks for an unlisted numbers, among other annoying
|
|||
|
reasons. Then they got through with random dialers. So you bought an
|
|||
|
answering machine. And now they've invaded your computer and your fax machine
|
|||
|
with junk mail. Is there no peace?
|
|||
|
This is the information age that the futurists talked about, the day
|
|||
|
when telephone technology, fax machines and electronic mail would make
|
|||
|
communications cheap and plentiful. Too plentiful. Says Lotus Corp.,:
|
|||
|
"It's a well-known phenomenon in large corporations that when you come back
|
|||
|
from a long weekend you'll find 50 pieces of electronic mail in your mailbox,
|
|||
|
spend hours going though it, and end up with most of it being stuff you don't
|
|||
|
want to see." LOTUS protects itself at home and with an unpublished telephone
|
|||
|
number, and opts for a public electronic mail address for his computer. Yet
|
|||
|
the unwanted messages still come through.
|
|||
|
WITH THIS, we have what could perhaps be called as a "War of Access",
|
|||
|
fought on the battleground of chips and software. Everyone, it seems, is
|
|||
|
screaming for your attention. Among the callers' weapons are electronic white
|
|||
|
pages, power dialers that can do 20k calls a day, and systems that hunt down
|
|||
|
unpublished fax numbers. Defensive strategies? These include PBX switchboards
|
|||
|
with software to route unwanted calls into answering machines and call blockers
|
|||
|
that reject calls from specific unwanted numbers. Tomorrow's strategies will
|
|||
|
include software that filters out sales pitches from electronic mail by looking
|
|||
|
for telltale words like "insurance" and "financial planner."
|
|||
|
While senders are spending more to reach out, some receivers are
|
|||
|
spending more not to be touched. Survey Sampling, a Fairfield, Conn researched
|
|||
|
firm, says 28% of all U.S. household have an unlisted number. LA is 56%
|
|||
|
unlisted. NEW JERSEY BELL, which already charges customers $12.50 a year for
|
|||
|
the privilege of not having their numbers published, is offering another
|
|||
|
defense this year, CALLER ID, in some parts of its territory. For 78.00$ a
|
|||
|
year plus a onetime charge of 60.00$ for a readout device, a residential
|
|||
|
customer sees the number of the caller when his phone rings. If he recognizes
|
|||
|
the number, he pickes up; if he doesn't, he might ignore the call or maybe let
|
|||
|
an answering machine get it. Then again, he can send it to the police or the
|
|||
|
Bell company to follow up annoying charges. This privilege, CLID, is fast
|
|||
|
sweeping the country...and becoming a necessity for prank/obscene phone
|
|||
|
calls. The Northern Bell is next in line for the feature.
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
UNIX HACKER CAUGHT AT LLNL: TSR (i.w 1\15)
|
|||
|
A remote caller who had repeatedly broken through the network security
|
|||
|
at Lawrence Livermore National Laboratories has been detected and contacted by
|
|||
|
LLNL officials.
|
|||
|
The vulnerability of Unix networks to unauthorized intrusions has become
|
|||
|
a serious concern at the federal level, where a number of agencies are trying
|
|||
|
to standardize upon the use of Unix-based networks. The concern has prompted
|
|||
|
the establishment of a national crisis center for network break-ins, called the
|
|||
|
Computer Emergency Response Team.
|
|||
|
According to an LLNL document obtained by TSR, the most recent LLNL
|
|||
|
intruder gained access to the system by way of Internet computers at the
|
|||
|
University of Washington and Stanford University. Because of the remote
|
|||
|
accessibility of these computers through e Internet, however, it is possible
|
|||
|
that these computers were not the point of origin. Once the intruder gained
|
|||
|
access to the LLNL computers, he achieved "superuser" status, which permitted
|
|||
|
access to every nonclassified file at LLNL, the document states.
|
|||
|
This opportunity could have resulted in widespread destruction of
|
|||
|
unclassified data, but no files are known to have been damaged, according to
|
|||
|
officials. The intruder used a "cracker's dictionary" to obtain a small list
|
|||
|
of old and existing passwords, the document states. He also created the
|
|||
|
capability to reenter the system by giving himself an account number and his
|
|||
|
own password to make it appear that he was a legitimate user.
|
|||
|
"Our security people have been in touch with the intruder, and we have
|
|||
|
been assured that there will be no further intrusions from that source," said
|
|||
|
Ron Teunis, an LLNL spokesman. Teunis also said the matter had been turned
|
|||
|
over to the FBI for further investigation, and the intruder could be prosecuted
|
|||
|
for federal computer-security laws. Officials at LLNL said that fixes have
|
|||
|
been created to guard against the particular methods used in the Dec 3rd to 10
|
|||
|
intrusions.
|
|||
|
The intruder had broken into the unclassified portion of LLNL's node of
|
|||
|
the Internet system on at least 10 occasions between December 3 and 10,
|
|||
|
according to a document released by LLNL. The intruder exploited one of the
|
|||
|
known weaknesses in the Unix systems running on many LLNL's computers.
|
|||
|
::::::::::::::::::::: Information by The Sensei / TSR ::::::::::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
|
|||
|
... TID BITS ON BELL ...
|
|||
|
// Bell Atlantic Offers Email //
|
|||
|
Bell Atlantic and Telenet Com Corp., the US Sprint data communications
|
|||
|
company, have announced a strategic alliance that enables Bell Atlantic to
|
|||
|
enter the email business, pending regulatory approval by the FCC. The
|
|||
|
agreement is the first between a regional Bell operating co and an enhanced
|
|||
|
service provider for email service, and capitalizes on the ability of local
|
|||
|
exchange carriers to provide information services. Until recently, telephone
|
|||
|
companies subject to the Modified Final Judgment, the consent decree that
|
|||
|
resulted in the break-up of AT&T, were not allowed to provide such services.
|
|||
|
_____________________________________________________________
|
|||
|
|
|||
|
// AT&T, BellSouth Offer Cable TV //
|
|||
|
AT&T and BellSouth Corp. will be ushers, of sorts, for callers who want to
|
|||
|
order specific pay-per-view cable TV programs, reports Communications Week.
|
|||
|
The companies will use their respective equipment to furnish order-taking
|
|||
|
services for special pay-per-view cable broadcasts, such as first-run movies or
|
|||
|
livesporting events. Normally, cable TV phone operators handle the requests.
|
|||
|
_____________________________________________________________
|
|||
|
|
|||
|
// Phone Co's Reaching Overseas //
|
|||
|
The lure of overseas cable investments continues to draw the interest of U.S.
|
|||
|
cable operators and an increasing number of telephone companies. BellSouth, Bell
|
|||
|
Atlantic and GTE are on the prowl for foreign cable holdings, Broadcasting
|
|||
|
magazine says. Pacific Telesis and US West already have United Kingdom holdings.
|
|||
|
|
|||
|
::::::::::::::::::Information Provided by Delta #5 / 606 ::::::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
::::::::::::::::::::::::::::::VOCABULARY TONIC::::::::::::::::::::::::::::::
|
|||
|
This is the second in a series of Vocabulary Tonic sections. I decided
|
|||
|
to do this for a few reasons.
|
|||
|
|
|||
|
1) If a person has an extensive vocabulary,there are practically no limits to
|
|||
|
what he/she can learn.
|
|||
|
2) It's a nice idea from a Technical. book I read occasionally. And lastly,
|
|||
|
4) It gives The Report a bit more spice. The acronyms/words presented will
|
|||
|
relate to Telecommunications in one way or another, and only telcom. An
|
|||
|
average of 15 acronyms/words will appear monthly - along with The Report.
|
|||
|
|
|||
|
ISDN - Integrated Services Digital Network: A planned hierarchy of digital
|
|||
|
switching and transmission systems. Final phase of modern day switches.
|
|||
|
AIS - Automatic Intercept System: System employing an audio-response unit
|
|||
|
under control of a processor to automatically provide pertinent info to
|
|||
|
callers routed to intercept.
|
|||
|
ESB - Emergency Service Bureau: A centralized agency to which 911 "Universal"
|
|||
|
emergency calls are routed.
|
|||
|
ADU - Automatic Dialing Unix: A device which automatically generates a
|
|||
|
predetermined set of dialing digits.
|
|||
|
FACS - Facility Assignment and Control System: Mechanizes the service order
|
|||
|
assignment process.
|
|||
|
CAROT- Centralized Automatic Reporting on Trunks: This takes transmission and
|
|||
|
trunk measurements. Does routine tests and forwards results to work
|
|||
|
control locations.
|
|||
|
TASC - Telecommunications Alarm Surveillance and Control: Provides centralized
|
|||
|
surveillance of telecom equipment.
|
|||
|
|
|||
|
EC - Exchange Carrier: A company engaged in the business of furnishing
|
|||
|
access service in a franchised territory. (ie; US Sprint, MCI, AT&T)
|
|||
|
AC - Access Code: A uniform set digit code assigned by an Exchange Carrier
|
|||
|
to an individual customer.
|
|||
|
Gateway - A network element that permits communication between two
|
|||
|
organizationally or technically dissimilar networks.
|
|||
|
PJ - Phrase Jitter: The unwanted phase variations of a signal. Garble, or
|
|||
|
Garbage online.
|
|||
|
3TS - 3-Tone Slope: The difference in loss between 1004 Hz and 404 Hz and
|
|||
|
2804 Hz (AKA Attenuation Distortion).
|
|||
|
PAD - Packet Assembler/Disassembler: Information passed though an Information
|
|||
|
Service, translated to the computer's specifications. (ie; baud
|
|||
|
differences, computer emulations, and protocol handshaking).
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
TSR will accept additional sponsor/support Systems. If you have a certain
|
|||
|
interest in the Report, and wish to provide support to TSR -- Leave your BBS
|
|||
|
number -- also any other information on RADIO WAVES Bulletin Board System.
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
|
|||
|
The End System TSR :: 915-821-1856 --------- Lunatic Labs :: 415-278-7421
|
|||
|
At Login: Any UNIX Default PW P/H System
|
|||
|
|
|||
|
PlaydoLand Systems :: 612-522-3959 --------- The Outlet @ :: 313-261-6141
|
|||
|
P/H-Files BBS Private P/H Newuser:Kenwood
|
|||
|
|
|||
|
Radio Waves System :: 612-471-0060
|
|||
|
|
|||
|
|
|||
|
* #1 Syndicate Support BBS *
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
|
|||
|
This concludes this Transmittal No. 20
|
|||
|
(Part 1 of 1)
|
|||
|
Released January 31st, 1989
|
|||
|
by The Sensei
|
|||
|
Editor of The Syndicate Report
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
THE SYNDICATE REPORT
|
|||
|
Information Transmittal No. 20
|
|||
|
(Part 2 of 2)
|
|||
|
Released January 31, 1989
|
|||
|
Featuring:
|
|||
|
Editor's Note
|
|||
|
How to Tap Fiber-Optic Cable
|
|||
|
Toll Fraud Literally on the Home
|
|||
|
Cracker's Love a Challenge
|
|||
|
Modems Annexed, ISDN In
|
|||
|
Briefs notes from The Report
|
|||
|
"CLID Going National"
|
|||
|
by The Sensei
|
|||
|
Editor Syndicate Report Magazine
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
EXPOSITION:
|
|||
|
TSR
|
|||
|
Once again, The Report accepts outside sources. Anybody can write/provide
|
|||
|
information to The Syndicate Report. Articles/Information may be provided
|
|||
|
through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
|
|||
|
Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
|
|||
|
on any the previous mentioned specialties will be: accepted, labeled, and
|
|||
|
given full actual credit to the article/info provider(s), or writer(s). --
|
|||
|
** All articles have been presented by me unless shown at the end of the
|
|||
|
article as the information provider(s), or writer(s). **
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
HOW TO TAP FIBER-OPTIC CABLE: TSR (i.w 1\21)
|
|||
|
|
|||
|
Fiber Optic networks, long touted for their immunity from snooping by
|
|||
|
foreign governments or local competitors, no longer offer the total security
|
|||
|
they once did, according to the experts who say that, given enough resources,
|
|||
|
any network can now be tapped.
|
|||
|
"Five years ago, I would have said that FO networks were totally secure,
|
|||
|
but that's no longer true," stated Northern Telecom. According to Northern
|
|||
|
Telecom, tapping a FO cable requires stripping the cable's plastic outer
|
|||
|
sheathing and gaining access to the glass fibers within. "When we enter a
|
|||
|
fiber bundle, we have instruments that detect whether a given fiber is carrying
|
|||
|
a signal before we cut it," North Telecom stated. "A tap could be
|
|||
|
accomplished in much the same way."
|
|||
|
Tapping an optical fiber relies on a macrobending effect. Bending a
|
|||
|
fiber 180 degrees around an 1/8-inch radius forces the contained light signal
|
|||
|
to go around a tighter bend than it's capable of traversing without some loss
|
|||
|
of light. This light loss can be detected and, given the right equipment,
|
|||
|
demultiplexed and decoded.
|
|||
|
"Our test instruments that clamps on the fiber show the escaping signal
|
|||
|
has a 30-dB dynamic range," Telecom said. "That's a signal level a thousand
|
|||
|
times stronger than background noise and easily capable of being demultiplexed.
|
|||
|
It's not an easy task, but it can be done."
|
|||
|
Given the reality that fiber can be tapped, Telecom said one security
|
|||
|
effort could be to detect the 3-dB signal loss on the fiber bundle that would
|
|||
|
typically accompany such a tapping. "Most fiber systems have a 10-dB window
|
|||
|
before an alarm sounds, so you either have to preattenuate the system so that a
|
|||
|
3-dB loss causes the alarm to sound or get some finer method of measurement."
|
|||
|
Other security measures suggested by Telecom include the use of air-core
|
|||
|
cables, which have pressurized air inside them. "If they cut through the cable
|
|||
|
to get to the fiber, air pressure is lost and an alarm sounds," Telecom says.
|
|||
|
Even steel or iron pipes ought to be pressurized for true security, and anyone
|
|||
|
who goes to the trouble of tapping fiber isn't going to be deterred by a little
|
|||
|
iron."
|
|||
|
There is a significant security advantage to fiber over other media,
|
|||
|
according to Northern Telecom. With coax (Coaxial Cable), or twisted pair
|
|||
|
(Normal Tele-lines), you can take the signals right out of the air. Sure you
|
|||
|
can tap a fiber-optic cable, but it's hard to do and fairly easy detected.
|
|||
|
First the bad guys have to get to the cable, which is usually in a secure run,
|
|||
|
and then they have to get the data, which is nearly always encrypted.
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
TOLL FRAUD LITERALLY ON THE HOME: TSR (z.b 1\25)
|
|||
|
According to Dennis E. Love, a northern California inventor and
|
|||
|
entrepreneur, telephone utility companies throughout the United States are
|
|||
|
unwittingly promoting telephone toll fraud by installing a new telephone line
|
|||
|
demarcation device on all new construction and every time a service is made.
|
|||
|
Love said the new device has an easily accessible standard phone jack
|
|||
|
that is located on the outside of the home and provides the opportunity for
|
|||
|
anyone to plug in a standard telephone and make calls that would be charged to
|
|||
|
the phone bill of the person whose phone line was attached to the new device.
|
|||
|
Love said he has evidence that this toll fraud is already occurring in
|
|||
|
California and that Pacific Bell, California's largest phone utility, is
|
|||
|
attempting to minimize the situation by denying that the problem exists.
|
|||
|
It should be noted that by California law, it is not against the law to
|
|||
|
engage in this toll fraud activity. If a person engaging in toll fraud were
|
|||
|
caught red-handed, he could only be charged with trespassing, even if the cost
|
|||
|
of the phone call was as great as that amount set to delineate grand theft.
|
|||
|
the only recourse for the victim would be a civil suit.
|
|||
|
Love said the whole thing started when the Federal Communications
|
|||
|
Commission deregulated portions of the telephone industry and broke up AT&T.
|
|||
|
At that time the FCC ruled that the first standard phone jack would serve as
|
|||
|
the demarcation point separating customer and phone utility responsibility.
|
|||
|
The device that the phone utilities are using, and that has been
|
|||
|
installed on about 400,000 homes in California to date, is manufactured by
|
|||
|
SIECOR U.S.A. and has a standard modular jack that serves as the first
|
|||
|
modular jack in the house. Unfortunately, it also provides a convenient way
|
|||
|
to commit telephone toll fraud.
|
|||
|
The FCC said that the SIECOR device submitted to the FCC meets the
|
|||
|
required specifications. The California Public Utilities Commission (CPUC),
|
|||
|
ordered Pacific Bell to go ahead with the SIECOR device. At that time the
|
|||
|
CPUC had not considered the toll fraud issue in making that order.
|
|||
|
Love said he has developed a device, the Station Release Breaker, or SRB,
|
|||
|
which satisfies all of the FCC requirements. In addition, it is well
|
|||
|
protected from the weather and does not allow for toll fraud.
|
|||
|
Love said he presented his device to the CPUC but has been waiting for
|
|||
|
over two years for a decision while the SIECOR device is being installed at an
|
|||
|
alarming rate.
|
|||
|
Love is currently forming a nationwide coalition, among consumer advocacy
|
|||
|
groups, against the installation of any device that uses a modular jack
|
|||
|
accessible to anyone that desires to use it.
|
|||
|
TURN, a San Francisco-based consumer group headed by Silvia Siegle, has
|
|||
|
thrown their support in Love's corner, as has UCAN, a San Diego-based consumer
|
|||
|
group headed by Mike Shames.
|
|||
|
|
|||
|
In an effort to save the phone customers astronomical costs in toll fraud
|
|||
|
as well as the $1.1 billion that it will cost to retrofit the state of
|
|||
|
Calif., Love and his new-found supporters intend to file an emergency motion
|
|||
|
with the CPUC enjoining Pacific, General, and other utilities in the state
|
|||
|
from further installation of this "bothersome jack" until a decision is
|
|||
|
reached by the CPUC on the toll fraud issues.
|
|||
|
Love said it is not important to him that his device be the one used but
|
|||
|
that some device that allows the customers to test, diagnose, and re-establish
|
|||
|
their own phone service without the encouragement of toll fraud be approved.
|
|||
|
Love asked, "What would it be like to have every home in America with a jack
|
|||
|
on the outside so that whoever desired to do so could walk right up and plug
|
|||
|
in? Think about it."
|
|||
|
|
|||
|
::::::::::::::: Information provided by Euclidean Wave / 415 :::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
CRACKER'S LOVE A CHALLENGE: TSR (i.w 1\28)
|
|||
|
The only truly secure network is on that's locked up and physically
|
|||
|
isolated from the rest of the world. Short of that, "network security" becomes
|
|||
|
a relative term rather than an absolute one -- trading off the advantage of
|
|||
|
security against the problems it brings. In some cases, organizations
|
|||
|
deliberately limit the amount of system security, saying that having too much
|
|||
|
security simply sets up a challenge for hackers.
|
|||
|
The organizations most likely to use such a minimalist approach are
|
|||
|
universities. Universities have a large number of hackers as users -- the type
|
|||
|
of user most likely to look upon breaking through a security system as a
|
|||
|
problem to be solved, without malicious intent. And universities are dedicated
|
|||
|
to spreading information and thus have a philosophical difficulty with keeping
|
|||
|
it locked up. While such openness is less common in a nonacademic environment,
|
|||
|
it nevertheless exists. "Anyone in the world can dial in and get on my
|
|||
|
system," David Parks (AKA) Tom E Hawk who runs four BBS's California.
|
|||
|
"The more open my systems have been, the fewer problems I've had with hackers."
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
MODEMS ANNEXED, ISDN IN: TSR (fbs 1\30)
|
|||
|
|
|||
|
When Dennis Hayes started his Atlanta-based HayesMicrocomputer Products
|
|||
|
in 1977 on a borrowed dining room table, the future seemed boundless. Hayes
|
|||
|
and his partner, Dale Heatherington, spent their evenings soldering together
|
|||
|
personal computer modems -- devices that allow computers to communicate via
|
|||
|
telephone lines. By 1984 privately held Hayes Microcomputer Products was
|
|||
|
commanding 55% of the personal computer modem market, with sales of more than
|
|||
|
100$ million. The expression "Hayes compatible" is now as standard in the PC
|
|||
|
modem as "IBM compatible" in the PC business.
|
|||
|
Hayes didn't invent modems. They date back to the '60s, as complicated,
|
|||
|
cranky devices that had to be taken apart and rewire every time their phone
|
|||
|
numbers and software changed. Hayes, who started his career installing these
|
|||
|
models all over rural Georgia for electric utility cooperatives, knew he could
|
|||
|
do better. He changed data communications forever by giving users the ability
|
|||
|
to control a modem with their software instead of a screwdriver.
|
|||
|
What about the danger that the so-called Integrated Services Digital
|
|||
|
Network (ISDN) will obviate the need for modems? Hayes swears he isn't going
|
|||
|
to sit back and watch modems turn into the buggy whips of the 21st Century.
|
|||
|
Instead, he is working on an ISDN circuit board that will plug into a PC,
|
|||
|
enabling it to support a telephone call, data communications and video
|
|||
|
transmission all at the same time. Explains Hayes: "Soon a modem will come to
|
|||
|
mean any device which connects a computer to the phone line - analog or
|
|||
|
digital." And he expects to remain "king of modems" in the broader sense, as
|
|||
|
he did of modems in the narrower sense.
|
|||
|
:::::::::::::::::: Information provided by The Teknition :::::::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
|
|||
|
THOMAS COVENANT CRACKED BY THE FEDERAL COMPUTER CRIME UNIT:
|
|||
|
Recently, about 3 weeks ago, the infamous Thomas Covenant was cracked by
|
|||
|
the FBI Computer Crime Unit. Apparently,the FBI caught TC completely off
|
|||
|
guard, thus found some sensitive information including: Hacking documents,
|
|||
|
PW's and Accounts, and other lists of information.
|
|||
|
In response, Digital Logic's Data Service and Phoenix Project will down
|
|||
|
for approximately 1-2 months to wait for the scene to blow over. The Ronz, who
|
|||
|
is another witnessed hacker, tells that Digital Data Logic Service (DLDS) has
|
|||
|
been packed up and buried inside of a Nuclear Waste Dumping Ground.
|
|||
|
As for Phoenix Project, its been taken down, but TSR is not sure of the
|
|||
|
total details. Anyways, it is hoped that this bust won't take too many systems
|
|||
|
down. From what The Ronz says, the FBI and "other" government agencies are
|
|||
|
going on a mass crackdown (as usual) in late January, which happens to be
|
|||
|
happening now according to sources. So far nothing has happened to TC, but
|
|||
|
only time will tell...
|
|||
|
-- UPDATE! ON TC BUST --
|
|||
|
Well about the Thomas Covenant bust, the whole ordeal is featured in
|
|||
|
Phrack Issue #23. Thisis the current story...
|
|||
|
TC was busted boxing (wire tapping) on his junction box in his apartment
|
|||
|
basement. He hooked into a certain line and, and he over heard a guy arguing
|
|||
|
with his wife. Unfortunately, this guy was a dangerous NSA (National Security
|
|||
|
Agency) employee. The NSA Agent had a measurable amount of equipment on his
|
|||
|
line to detect if it was being tapped. The NSA Agent prompted the police to
|
|||
|
catch Thomas Covenant in the fraudulent act. In turn, the cops turned upside
|
|||
|
down his apartment and seized PW files and other unknown bits of information.
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
THE WASP - BUSTED BY FEDS
|
|||
|
The WASP- who was hacking government computers (Defense related items) was
|
|||
|
caught by a line trace. The Federal Agents picked him up along with some
|
|||
|
highly illegal information. The Feds were also are looking for LOD namely Lex
|
|||
|
Luthor, and Phase Jitter relating to the bust. Lex talked with the Feds
|
|||
|
via code, and the air was cleared with the Feds, and with LOD.
|
|||
|
:::::::::::::::: Source on Busts by Professor Falken / 612 :::::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
|
|||
|
... TID BITS ON BELL ...
|
|||
|
|
|||
|
// Service Tells 'Who is Ringin' // New Jersey Bell Telephone
|
|||
|
has decided to offer a service that will allow customers to determine if a
|
|||
|
phone call is for them - without picking up the phone. How to know: Different
|
|||
|
ring patterns. The service may start next month. Monthly fee: $4.50 for homes,
|
|||
|
6.50$ for offices.
|
|||
|
_____________________________________________________________
|
|||
|
// Service Helps Social Security //
|
|||
|
MCI has created an 800 toll-free number program to help the Social Security
|
|||
|
Administration add about 6 million more beneficiaries by the 21st century. IN
|
|||
|
magazine says the MCI Advanced 800 Service and Menu Routing Service will take
|
|||
|
an estimated 50 million calls this year from people in the USA and Canada.
|
|||
|
_____________________________________________________________
|
|||
|
|
|||
|
// New Jersey Bell - CLID //
|
|||
|
New Jersey Bell is introducing Caller ID, CLID, which produces an output of
|
|||
|
the callers Telephone Number on LCD Screens. The customer may block out phone
|
|||
|
prankers or annoying advertisers via CLID. The callers get a central-office
|
|||
|
recording telling them to buzz off. Currently 6 calls maybe blocked at one
|
|||
|
time only, with a price. If a 60.00$ device can capture phone number data from
|
|||
|
the phone line for display, another device could sit between a telephone line
|
|||
|
and a personal computer, trapping and storing incoming phone numbers.
|
|||
|
Both NJ Bell, and Nynex offer are offering the services nationally.
|
|||
|
::::::::::::: Information provided by The Sensei ::::::::::::
|
|||
|
_____________________________________________________________
|
|||
|
// Frequent Fliers Phone Flagging //
|
|||
|
An MCI-Northwest Airlines promotion started last September "has met and
|
|||
|
exceeded our expectations," says MCI's Brian Thompson. MCI and Northwest
|
|||
|
offered frequent fliers one mile for every $1 of calls. But other long-
|
|||
|
distance companies aren't rushing in. Sprint says the company is looking into
|
|||
|
the idea. AT&T says it has no plans for a similar program.
|
|||
|
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
:::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::
|
|||
|
"Watch that 'sed' editor - it can invoke a chain reaction"
|
|||
|
- SysAdmin, New York
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
TSR will accept additional sponsor/support Systems. If you have a certain
|
|||
|
interest in the Report, and wish to provide support to TSR -- Leave your BBS
|
|||
|
number -- also any other information on RADIO WAVES Bulletin Board System.
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
The End System TSR :: 915-821-1856 --------- Lunatic Labs :: 415-278-7421
|
|||
|
At Login: Any UNIX Default PW P/H System
|
|||
|
|
|||
|
PlaydoLand Systems :: 612-522-3959 --------- The Outlet @ :: 313-261-6141
|
|||
|
P/H-Files BBS Private P/H Newuser:Kenwood
|
|||
|
|
|||
|
Radio Waves System :: 612-471-0060
|
|||
|
* #1 Syndicate Support BBS *
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
|
|||
|
This concludes this Transmittal No. 20
|
|||
|
(Part 2 of 2)
|
|||
|
Released January 31st, 1989
|
|||
|
by The Sensei
|
|||
|
Editor of The Syndicate Report
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
|
|||
|
|