706 lines
45 KiB
Plaintext
706 lines
45 KiB
Plaintext
|
___________________________________________________________________________
|
|||
|
THE SYNDICATE REPORT
|
|||
|
Information Transmittal No. 21
|
|||
|
(Part 1 of 2)
|
|||
|
Released March 2, 1989
|
|||
|
Featuring:
|
|||
|
Editor's Note
|
|||
|
"PCP Hacking Statistics"
|
|||
|
AT&T Works on Making Unix Less Vulnerable
|
|||
|
MCI Mail Rates and Info Change
|
|||
|
AT&T Bellcore & Tiniest Semiconductors Ever
|
|||
|
Common Unix Passwords
|
|||
|
Briefs notes from The Report
|
|||
|
Vocabulary Tonic
|
|||
|
by The Sensei
|
|||
|
Editor Syndicate Report Magazine
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
EXPOSITION: TSR
|
|||
|
Once again, The Report accepts outside sources. Anybody can write/provide
|
|||
|
information to The Syndicate Report. Articles/Information may be provided
|
|||
|
through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
|
|||
|
Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
|
|||
|
on any the previous mentioned specialties will be: accepted, labeled, and
|
|||
|
given full actual credit to the article/info provider(s), or writer(s). --
|
|||
|
** All articles have been presented by me unless shown at the end of the
|
|||
|
article as the information provider(s), or writer(s). **
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
EDITOR'S NOTE: TSR
|
|||
|
" PC PURSUIT HACKING STATISTICS "
|
|||
|
PCP password hackers are welcome tools for virtually all types of
|
|||
|
users: Phreaks, Pirates, Terrorists, system Hackers, etc. PCP has become the
|
|||
|
perfect way to dial long distance with low error ratios, flexibility with ID
|
|||
|
codes/passwords used on other networks and most importantly, safety.
|
|||
|
Telenet is because of the huge number of calls that are handled every day by
|
|||
|
the big networks, keeping track of where every call and connection is made from
|
|||
|
is financially impractical. It is also very easy to disguise your location
|
|||
|
using the network, which makes dial LD even more secure.
|
|||
|
As time and technology interface, code abusing slowly becomes past-time
|
|||
|
reminiscence for busted hackers. In response, PCP becomes the only resource
|
|||
|
for paranoid hackers, alike. Along these lines of paranoia, the need for PCP
|
|||
|
password hackers increases.
|
|||
|
After all the years that PCP has existed, I've only seen 5 PCP password
|
|||
|
hackers. And of the 5 hackers, 3 of these devices were totally useless for
|
|||
|
obvious reasons, upon execution...
|
|||
|
Some of the obviousproblems indicated : No online modem configuring.
|
|||
|
Incomplete documention & Technical Information.
|
|||
|
These apply to the anti-user friendly hacks.
|
|||
|
Inaccurate response detecting positive completion of
|
|||
|
passwords.
|
|||
|
Ineffective random variable password generating.
|
|||
|
...and with all beta programs -- minor bugs.
|
|||
|
With this in mind, I'd like to add some PCP Statistics. PCP
|
|||
|
ID's andPasswords are not easy to get. Format area: PCP12345 and ABCD6789.
|
|||
|
The first thing a hacker considers when using a hacker is, what? PCP ID to
|
|||
|
use. Most are between 10,000 and 40,000. I have never seen an ID over 40,000.
|
|||
|
PCP doesn't disclose annual PCP profits, nor the number of subscribers they
|
|||
|
currently have. Although the number by many hackers is approximated around
|
|||
|
5,000 to 6,000. Keep in mind that businesses use PCP accounts too, in case
|
|||
|
your criticizing that you've never seen 5,500 subscribing hackers. Therefore,
|
|||
|
the change of gaining a valid ID are significantly good.
|
|||
|
Of course, the PCP IDs do not bug hackers. The complexed password scheme
|
|||
|
is the brain parasite. First there is the 4 random letters, then the 4 random
|
|||
|
numbers - joined. In essence, what a hacker is dealing with is 2 passwords
|
|||
|
beyond 1. The LETTERS, and the NUMBERS must match up - not the entire string
|
|||
|
as a whole since the letters stop after 4, then take on an entire new syntax.
|
|||
|
I've seen some passwords that had numbers in the letter positions, and
|
|||
|
vise verse for the letters. Majority however stay in the above listed format.
|
|||
|
If interested in a PC Pursuit password hacker, consider using Phry Code
|
|||
|
Pro., by The Exciter / 612. Latest version can be found on RADIO WAVES.
|
|||
|
;The Sensei / Editor TSR
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
|
|||
|
AT&T WORKS ON MAKING UNIX LESS VULNERABLE:
|
|||
|
TSR (iw 2\11)
|
|||
|
Enhanced security features are being developed for Unix System V.4.1.
|
|||
|
AT&T's vice president stated. His keynotes to the Usenix Tech. Conference in
|
|||
|
California insisted that open, multivendor networks are not centrally more
|
|||
|
susceptible to security violations than proprietary systems.
|
|||
|
Security is on the mind of every Unix user, particularly when Unix-based
|
|||
|
systems are to be used for mission-critical and strategic applications, like
|
|||
|
running a high end workstation.
|
|||
|
|
|||
|
The new version, on Unix, will achieve the National Security Agency's B2
|
|||
|
level of security, and will actually also have some features of the B3 level as
|
|||
|
well. Powerful security tools exist in the current version of Unix V, but have
|
|||
|
often gone unused by administrators because of a lack of quality documentation
|
|||
|
and training. AT&T will also be adding surreal security features to System
|
|||
|
V.4.1., the first revision of the sill unreleased system V.4.0.
|
|||
|
Procrastination seems to be top priority for many software vendors - just look
|
|||
|
at Lotus. Well, Unix won't be very welcome for the Hacking Community, and
|
|||
|
myself.
|
|||
|
The features/improvements include:
|
|||
|
Access methodology beef up
|
|||
|
Maintenance of Data Integrity
|
|||
|
The denial of service
|
|||
|
Hacker/Intruder/Terrorist containments
|
|||
|
...and the execution of the "superuser" status.
|
|||
|
About the "superuser" chop. This is the most popular status, especially
|
|||
|
for hackers, and AT&T takes it out. It did more good than bad in the long run.
|
|||
|
In its place will be a finer distinction in status. There will be a status of
|
|||
|
"superuser" that is only used for mounting the systems. That user will not be
|
|||
|
able to access other "superuser" privileges.
|
|||
|
Control of the front end of system access - password security - will be
|
|||
|
enhanced by the use of "shadow" password files. The files containing the
|
|||
|
password (etc/passwd) have been far to easy to access. So, restricted access
|
|||
|
to files, along with a form of activity audit, which will be used in System
|
|||
|
V.4.1. Actually, the greater sense within the system, including user and group
|
|||
|
IDs, aging information, and a command and log-in audit.
|
|||
|
Editor's suggestions:
|
|||
|
Keeping systems resources in locked rooms/shells, to prevent shaking
|
|||
|
of the shielding of shells/rooms, which can reveal information to external
|
|||
|
devices. AT&T should also use a dedicated printing resource to each high level
|
|||
|
of security - a printer on each label page? Well, that would code a lot of
|
|||
|
|
|||
|
money, but LD services do it all the time, along with personal supervision.
|
|||
|
Then theres Fiber-Optics, and the security advantage there. As printed in THE
|
|||
|
SYNDICATE REPORT #20 (part 2), where an article explains the procedures in
|
|||
|
Tapping Fiber Optic cables. Then again, it's hard to break into a FO cable
|
|||
|
without bringing the system down, with a nice alarm response.
|
|||
|
:::::::::::::: Information written by The Sensei (TSR Editor) :::::::::::::
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
MCI MAIL RATES AND INFO CHANGE: TSR (u.t 2\15)
|
|||
|
Beginning early February 1989 MCI Mail will LOWER the cost of Instant
|
|||
|
Messages and domestic Fax Dispatch. In addition, we will offer FREE 800
|
|||
|
Access, FREE Advanced Service and FREE Shared Lists. MCI's new retail prices
|
|||
|
are as follows:
|
|||
|
:: Instant Messages ::
|
|||
|
0-500 Characters $ .45
|
|||
|
501-2500 Characters $ .75
|
|||
|
2501-7500 Characters $1.00
|
|||
|
Each Additional 7500 Characters $1.00
|
|||
|
:: Domestic Fax Dispatch ::
|
|||
|
First Half Page $ .50
|
|||
|
Each Additional Half Page $ .30
|
|||
|
:: Access ::
|
|||
|
800 Access No Charge
|
|||
|
U.S. tymnet Access $ .25/ Per Minute
|
|||
|
International tymnet Access $ .30/ Per Minute
|
|||
|
:: MCI Mail's new 800 numbers will be ::
|
|||
|
Access Speed 800 Telephone Number
|
|||
|
300, 1200 bps...........................800-234-MAIL
|
|||
|
2400 bps............................... 800-456-MAIL
|
|||
|
Lotus Express & Desktop Express.........800-825-1515
|
|||
|
(up to 2400 bps)
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
AT&T BELLCORE & TINIEST SEMICONDUCTORS EVER: TSR (b.w 2\27)
|
|||
|
As the transistors on computer chips steadily shrivel away toward
|
|||
|
nothingness, scientists are faced with a task much like figuring out how many
|
|||
|
atoms can dance on the head of a pin. Researchers as AT&T Bell Laboratories
|
|||
|
are closing in. They have devised a method of producing the tiniest
|
|||
|
semiconductor crystals ever: clusters containing as few as 100 atoms. They
|
|||
|
are so far too tiny to 'print' with even the wispiest microcircuit. Still,
|
|||
|
they may have practical applications.
|
|||
|
That's because a young polymer chemist, has developed a way to keep the
|
|||
|
clusters from combining into larger clumps, as they otherwise would do. He
|
|||
|
grows each microcrystal inside a minuscule water droplet a thousand times
|
|||
|
smaller than the diameter of a human hair, then replaces the water with organic
|
|||
|
molecu
|
|||
|
|
|||
|
les. "It's like putting the cluster in a little plastic bad," he says.
|
|||
|
The clusters can be 'tuned' for specific jobs because they absorb different
|
|||
|
wavelengths of light as they decrease in size. So they could be used for
|
|||
|
optical switches in future "optoelectronic" chips.
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
COMMON UNIX PASSWORDS: TSR (p.p 2\21)
|
|||
|
|
|||
|
|
|||
|
The subsequent list of words are a list of commonly used passwords, use on
|
|||
|
Unix computer systems. The list also contains syntax from the illustrious UNIX
|
|||
|
Internet Worm on November, 1988. Combine them into a favorable Unix Hacker.
|
|||
|
_____________________________________________________________
|
|||
|
:::::::::::::::::::::::::::::: Unix Passwords ::::::::::::::::::::::::::::::
|
|||
|
_____________________________________________________________
|
|||
|
aaa daniel jester rascal
|
|||
|
academia danny johnny really
|
|||
|
ada dave joseph rebecca
|
|||
|
adrian deb joshua remote
|
|||
|
aerobics debbie judith rick
|
|||
|
airplane deborah juggle reagan
|
|||
|
albany december julia robot
|
|||
|
albatross desperate kathleen robotics
|
|||
|
albert develop kermit rolex
|
|||
|
alex diet kernel ronald
|
|||
|
alexander digital knight rosebud
|
|||
|
algebra discovery lambda rosemary
|
|||
|
alias disney larry roses
|
|||
|
alpha dog lazarus ruben
|
|||
|
alphabet drought lee rules
|
|||
|
ama duncan leroy ruth
|
|||
|
amy easy lewis sal
|
|||
|
analog eatme light saxon
|
|||
|
anchor edges lisa scheme
|
|||
|
andy erenity angerine scott
|
|||
|
arrow elizabeth maggot sex
|
|||
|
arthur ellen magic shark
|
|||
|
asshole emerald malcolm sharon
|
|||
|
athena engine mark shit
|
|||
|
atmosphere engineer markus shiva
|
|||
|
bacchus enterprise marty shuttle
|
|||
|
badass enzyme marvin simon
|
|||
|
bailey euclid master simple
|
|||
|
banana evelyn maurice singer
|
|||
|
bandit extension merlin single
|
|||
|
banks fairway mets smile
|
|||
|
bass felicia michael smiles
|
|||
|
batman fender michelle smooch
|
|||
|
beauty fermat mike smother
|
|||
|
beaver finite minimum snatch
|
|||
|
beethoven flower minsky snoopy
|
|||
|
beloved foolproof mogul soap
|
|||
|
benz football moose socrates
|
|||
|
beowulf format mozart spit
|
|||
|
berkeley forsythe nancy spring
|
|||
|
berlin fourier napoleon subway
|
|||
|
beta fred network success
|
|||
|
beverly friend newton summer
|
|||
|
bumbling george osiris tape
|
|||
|
cardinal gertrude outlaw target
|
|||
|
carmen gibson oxford taylor
|
|||
|
carolina ginger pacific telephone
|
|||
|
caroline gnu painless temptation
|
|||
|
castle golf pam tiger
|
|||
|
cat golfer paper toggle
|
|||
|
celtics gorgeous password tomato
|
|||
|
change graham pat toyota
|
|||
|
charles gryphon patricia trivial
|
|||
|
charming guest penguin unhappy
|
|||
|
charon guitar pete unicorn
|
|||
|
chester hacker peter unknown
|
|||
|
cigar harmony philip urchin
|
|||
|
classic harold phoenix utility
|
|||
|
coffee harvey pierre vicky
|
|||
|
coke heinlein pizza virginia
|
|||
|
collins hello plover warren
|
|||
|
comrade help polynomial water
|
|||
|
computer herbert praise weenie
|
|||
|
condo honey prelude whatnot
|
|||
|
condom horse prince whitney
|
|||
|
cookie imperial protect will
|
|||
|
cooper include pumpkin william
|
|||
|
create ingres puppet willie
|
|||
|
creation innocuous rabbit winston
|
|||
|
_____________________________________________________________
|
|||
|
Paean : The Merc V.4.1. passwd!locator
|
|||
|
Shooting Shark Gfiles : Unix hacker
|
|||
|
The Mentor LOD/H : Pheonix Project 512-441-3088
|
|||
|
TSR Dedicated Field users
|
|||
|
::::::::::::::::::::: Information provided MUltiformly :::::::::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
|
|||
|
|
|||
|
// Bell 900 Battles //
|
|||
|
AT&T, MCI and US Sprint are arming themselves for a new round of competition
|
|||
|
in interactive 900-call services, according to TSR sources. AT&T has been
|
|||
|
hoping for FCC approval of its interactive 900 tariff. MCI has been testing and
|
|||
|
plans to offer a 900 service next month. And US Sprint plans to begin
|
|||
|
customer testing of its service in April '89.
|
|||
|
:::::::::::: Information provided by MPhone / 203 :::::::::::
|
|||
|
_____________________________________________________________
|
|||
|
// NSA Chooses Its Security //
|
|||
|
The National Security Agency has chosen the AT&T security code algorithm
|
|||
|
called Code Excited Linear Predicted. NSA will propose the algorithm be
|
|||
|
adopted as a government-wide standard. Production is shared by AT&T, Motorola
|
|||
|
and GE RCA. The algorithm is a 4,800 bits-per-second coder that checks speech
|
|||
|
patterns.
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
::::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::::
|
|||
|
What "Vocab. Tonic" is, is a list of acronyms and definitions to help
|
|||
|
education the ignorant hacker. With an extensive vocabulary, there is
|
|||
|
virtually nothing one can't learn.
|
|||
|
Study on...
|
|||
|
DS - Digital Switch. A switch in which connections are established by
|
|||
|
operations on digital signals without conversion to analog.
|
|||
|
DSX - A digital cross connect field which can be utilized for DS1 (Digital
|
|||
|
Switch), DS2 or DS3 level cross connections at a digital level
|
|||
|
RPOA - Registered Private Op. Agencies (ID of online system).
|
|||
|
SCC - (or SCCS), Switch Control Center. SCC has overall responsibility for
|
|||
|
the administration and maintenance of BOC Central Offices.
|
|||
|
Responsibilities include installation and maintenance Control Office
|
|||
|
for FG B, C, and D. SCC also handles specific trouble reports.
|
|||
|
TAMS - System where NUIs are checked by a central database when you try to
|
|||
|
connect to an address, on GTE Telenet.
|
|||
|
TD - Terminating Direction. The use of Access Service for the completion of
|
|||
|
a call from an IC (Interexchange Carrier) location to an end user.
|
|||
|
___________________________________________________________________________
|
|||
|
|
|||
|
___________________________________________________________________________
|
|||
|
:::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::
|
|||
|
"They [Hackers] have this need to find the answer."
|
|||
|
To subscribe to the 2600 Magazine send 15$ to:
|
|||
|
2600 Magazine
|
|||
|
P.O. BOX 752
|
|||
|
Middle Island N.Y. 11953
|
|||
|
--Corley, Editor 2600 Magazine
|
|||
|
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
TSR will accept additional sponsor/support Systems. If you have a certain
|
|||
|
interest in the Report, and wish to provide support to TSR -- Leave your BBS
|
|||
|
number -- and any other information on RADIO WAVES Bulletin Board Systems.
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
Pheonix Proj. LODH :: 512-441-3088 --------- Lunatic Labs :: 415-278-7421
|
|||
|
At Login: Any UNIX Default PW P/H System
|
|||
|
HackersDen 2600 #5 :: 612-522-3959 --------- Hack Shack @ :: 214-422-4307
|
|||
|
P/H-Files BBS Login: Any UNIX Default Pass
|
|||
|
RADIO WAVES System :: 612-471-0060
|
|||
|
- Syndicate Report Support BBS -
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
This concludes this Transmittal No. 21
|
|||
|
(Part 1 of 2)
|
|||
|
Released March 2nd, 1989
|
|||
|
by The Sensei
|
|||
|
Editor of The Syndicate Report
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
|
|||
|
THE SYNDICATE REPORT
|
|||
|
Information Transmittal No. 21
|
|||
|
(Part 2 of 2)
|
|||
|
Released March 2, 1989
|
|||
|
Featuring:
|
|||
|
Editor's Note
|
|||
|
"Cyberpunks" Vs. The Media
|
|||
|
|
|||
|
Telecommunications Events, Conferences, Seminars, and Shows
|
|||
|
Software Links Unix System to Atomic Clock
|
|||
|
Briefs notes from The Report
|
|||
|
" Hackers Fail Raiding ATMs "
|
|||
|
by The Sensei
|
|||
|
Editor Syndicate Report Magazine
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
EXPOSITION: TSR
|
|||
|
Once again, The Report accepts outside sources. Anybody can write/provide
|
|||
|
information to The Syndicate Report. Articles/Information may be provided
|
|||
|
through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
|
|||
|
Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
|
|||
|
on any the previous mentioned specialties will be: accepted, labeled, and
|
|||
|
given full actual credit to the article/info provider(s), or writer(s). --
|
|||
|
Special Editor, TS, comments are placed between brackets. Example: [ Hi. ]
|
|||
|
** All articles have been presented by me unless shown at the end of the
|
|||
|
article as the information provider(s), or writer(s). **
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
EDITOR'S NOTE: TSR
|
|||
|
Just a quick note. Just in case many of you don't know...I distribute
|
|||
|
an introduction package at least 3 days every month before actually releasing
|
|||
|
The Syndicate Report. These can be found on the systems listed at the end
|
|||
|
of this part of TSR. ;The Sensei / TSR!612
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
"CYBERPUNKS" VS. THE MEDIA: TSR (s.t 2\27)
|
|||
|
The following article can from a newspaper local to myself. The
|
|||
|
newspaper is the "Star and Tribune." I, The Sensei, usually don't print up
|
|||
|
verbatim copies of articles, but this articles was very interesting and
|
|||
|
entertaining.
|
|||
|
Some of the information presented in insulting to most Hackers/Phreaks,
|
|||
|
etc., so I'm going to comment on parts of the article. Comments will be in
|
|||
|
designated brackets, like this: [ Blah, Blah...Har Har -TS ]
|
|||
|
_____________________________________________________________
|
|||
|
Silicon Valley -- A local Cop patrolling after midnight witnessed an
|
|||
|
unusual sight, even for this center of high technology: Two teenagers
|
|||
|
wedgedin a phone booth, laboring over the keyboard of a laptop computer clipped into
|
|||
|
the telephone line.
|
|||
|
[ This is very humorous for me...I can't help wondering what technique these
|
|||
|
guys are using to access Bell Fone's, heh. ]
|
|||
|
The youths, who were arrested for telephone fraud and computer abuse,
|
|||
|
belong to a shadowy culture of computer vandals committed to illegally entering
|
|||
|
and frequently tampering with the computer networks on which society has come
|
|||
|
to rely.
|
|||
|
Those in this expanding underground -- known as CYBERPUNKS to themselves
|
|||
|
and some social scientists -- have broken into corporate and military computers
|
|||
|
and tampered with telephone billing switching equipment, sometimes altering
|
|||
|
services and monitoring telephone lines. Some have boasted of illicitly
|
|||
|
entering computer used in stock-market trading.
|
|||
|
[ First of all, I protest to the term, "Cyberpunks." No hacker I know of as
|
|||
|
called themselves Cyberpunks. If anyone reading this does, your probably not a
|
|||
|
considered a hacker by most. Second, Social Scientists don't know anything
|
|||
|
about hackers -- they're just another worthless clan of scientists trying to
|
|||
|
shape society as they wish. ]
|
|||
|
[ The newspaper then goes on to refresh our memories about the Morris Jr.
|
|||
|
Unix WORM, haven't we heard enough about his guy. And it was a really
|
|||
|
complicated set of code he set for his so-called CSci Project. ]
|
|||
|
Articles describing how to write viruses have appeared in several
|
|||
|
publications that are widely circulated within the underground. Writing in
|
|||
|
the journal 2600, which says it speaks for the computer underground, an author
|
|||
|
using the pseudonym "The Plague" described how to create a virus.
|
|||
|
"If people's data is destroyed, then so be it," he wrote. "If people
|
|||
|
are stupid enough to accept pirated software, then they deserve to be
|
|||
|
punished," says Plague.
|
|||
|
[ Well, The Plague has it all wrong. Viruses are not ONLY in pirated
|
|||
|
software, my friend, they creep within all types of programs. Your just adding
|
|||
|
to the problem. It's goes against 'Hacker Ethics,' but the information should
|
|||
|
not to suppressed from the hacking community. ]
|
|||
|
The term CYBERPUNK is a reference to a popular science fiction genre
|
|||
|
that deals with an intersecting world of high technology and outlaw society.
|
|||
|
"This is the case of art driving reality," said one Social Scientist at the
|
|||
|
Institute for the Future, Calif. "You have a small group who is actually going
|
|||
|
it, and a large pool that is buying into what they are doing and redefining
|
|||
|
reality."
|
|||
|
[ Yet another scientist froma corrupt institution, making conclusions based
|
|||
|
on a small fraction of neo-hackers. ]
|
|||
|
Cyberpunks often are called HACKERS, but computer scientists are careful
|
|||
|
to note that not all hackers are malicious. The term originally referred to
|
|||
|
researchers who were committed to designing advanced computer hardware and
|
|||
|
software. [ This is the first decent statement I've read. ]
|
|||
|
Another often-heard term is "PHREAKING," which is the illegal use of
|
|||
|
telephone systems.
|
|||
|
"Phreaking is moral," said an 18 year-old hacker who calls himself,
|
|||
|
"Frank Drake" in messages on the bulletin boards. "There is no theft involved.
|
|||
|
It's not theft of services, because this equipment would otherwise be idle."
|
|||
|
[ It's about time these Media-Types informed the public of my favorite hobby,
|
|||
|
Phreaking. And about the definition Frank Drake gave. "Illegal use of Fone
|
|||
|
System." ? Sorry, not all of the uses by phreaks is illegal. More than
|
|||
|
anything, phreaking is basically composed of "Learning about the Bell system,
|
|||
|
along with illegal use." ]
|
|||
|
Computer experts working in the industry who have become involved with
|
|||
|
malicious hackers see them as computer addicts possessed by an antisocial
|
|||
|
obsession. "They're misfits, losers or troubled individuals lacking a sense of
|
|||
|
duty or morals," said a computer researcher at a Silicon Valley institution.
|
|||
|
[ Misfits? Losers? Antisocial individuals? This is another scientist
|
|||
|
shooting his mouth off with little support. The idea of hackers being social
|
|||
|
outcasts, or losers is a common misconception by many. Most malicious computer
|
|||
|
hackers are party animals when given the right conditions. And if one was told
|
|||
|
he is labeled an, "Outcast, Loser etc.", the person talking would get an entire
|
|||
|
new face of the word MALICIOUS. Namely a 99e99 dollar fone bill, credit check
|
|||
|
and unchecked, and maybe a subscription to every magazine on the face of the
|
|||
|
Earth. ]
|
|||
|
In recent years this researcher has offered four underground hackers
|
|||
|
programming jobs to try to channel their energy away from destructive use of
|
|||
|
computers. In each case the experiment ended in failure, the scientists said.
|
|||
|
The researcher asked not to be indentified, and his reason is revealing.
|
|||
|
He fears that the CYBERPUNKS/Hackers are so skilled at tampering with computers
|
|||
|
that they might be able to alter his credit rating or have his electricity
|
|||
|
turned off.
|
|||
|
[ Oh my. Will these guys never learn? Hackers are not stupid "Lab Rats."
|
|||
|
They want a challenge, away from sitting at a computer programming for another
|
|||
|
person. And this scientist is concluding his entire experiment on just a few
|
|||
|
hackers. Yes, his fear of hackers is valid. I am now thinking of ways to find
|
|||
|
out who this guy might be. The credit rating would be no problem, same with
|
|||
|
the electricity. A scientist without electricity, is like a hacker without
|
|||
|
Telenet. ]
|
|||
|
"Every single one of them had deep psychological problems," he said.
|
|||
|
Some members of the hacker underground appear to agree with this psychological
|
|||
|
assessment.
|
|||
|
[ Hah! No comment...for obvious reasons. ]
|
|||
|
"They have this crazed need to find the answer," said Eric Corley, edit
|
|||
|
of 2600 Magazine.
|
|||
|
Corley, whose personal hacking resulted in three brushed with the law
|
|||
|
before he started the publication in 1984, said: "They keep exploring where
|
|||
|
they know they shouldn't go. A true hacker won't stop just because he gets in
|
|||
|
trouble."
|
|||
|
[ Corley is totally correct here, of course. But I think some hackers don't
|
|||
|
stop hacking, because some are just over powered with the need to learn. I
|
|||
|
never stopped hacking after by bust for many reasons. I the primary reason
|
|||
|
was because I'm not a quitter, and I looked back on how much had I learned.
|
|||
|
With the learning, fun followed. ]
|
|||
|
Although computer experts believe the number of outlaw hackers is
|
|||
|
growing, the behavior they exhibit is not new to the high-tech world.
|
|||
|
For example, a computer programmer, John Draper, spent six months in jail
|
|||
|
during the 1970s for illegal use of the telephone network.
|
|||
|
Draper's nickname, "Captain Crunch," derived from his discovery that a
|
|||
|
whistle that came as a prize in a cereal box was tuned to the correct frequency
|
|||
|
to unlawfully manipulate fone company switch gear.
|
|||
|
[ Hmmm. Every hacker knows all this already. At least a true hacker should
|
|||
|
know his/her past. But the thing I can't help wondering is, what was Captain
|
|||
|
Crunch doing with a whistle from the "Captain Crunch cereal" box? And why was
|
|||
|
he blowing it into the fone. Makes me laugh if you think about it. Another
|
|||
|
thing, anyone with two front teeth can blow a 2600 Hz tone whistle. ]
|
|||
|
;The Sensei / TSR!612
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
BUSTING TELEPHONE SOLICITORS: TSR (st.cit 2\27)
|
|||
|
Join to fight telephone solicitors! How you ask? Read on...
|
|||
|
:::: Illustration, Exampling ::::
|
|||
|
"Have you ever off and had a fantasy of going to the library and finding
|
|||
|
out who owns the companies that call YOU, interrupt you, and calling THEM back?
|
|||
|
It makes you happy for a while. Particularly when working 11 to 7 shift, you'd
|
|||
|
think of the companies that had awoken you (using YOUR private fone) at noon."
|
|||
|
"One nurse I know did something like that to a persistent insurance
|
|||
|
salesman. One day she got awake and alert enough to get his name and number
|
|||
|
and promised to call back. She did. At 2 AM, announcing that it was HER
|
|||
|
working day, and she was now awake and would like to discuss the po
|
|||
|
licy....He never called her back." -TS
|
|||
|
:::: Tips Offs to a Fone Scam ::::
|
|||
|
If it sounds too good to be true, it's probably a scam. Some of the most
|
|||
|
popular promotions among telephone con artists include prize offers to get you
|
|||
|
to buy water purifiers or vitamins, magazine subscriptions, PENNY STOCKS,
|
|||
|
precious metals, travel and cellular telephone lottery applications.
|
|||
|
Be skeptical of says such as, "This is the best deal you'll ever find," or
|
|||
|
"Double your money, no risk!"
|
|||
|
|
|||
|
The government, Federal Trade Commission estimates that Americans lose 1$
|
|||
|
billion a year from the deceptive peddling of goods and services over the
|
|||
|
fone. Other organizations say it's much higher. One might suggest lobbying
|
|||
|
for stricter FED laws governing 'telemarketing businesses.'
|
|||
|
:::: Striking Back at 'The Solicitor' ::::
|
|||
|
o Do NOT hang up on telephone solicitors. This just allows them to make
|
|||
|
another call 200 milliseconds later. Listen to them. Ask stupid
|
|||
|
questions. Drag out conversation. Contemplate placing an order, then
|
|||
|
don't. Or start to place an order, then change your mind.
|
|||
|
o After wasting their time as much as possible, cackle insanely and hang
|
|||
|
up. Or give them the raspberry and yell, "Only f00ling!121!!&!"
|
|||
|
o Remember always, that these twits are partially paid on commission.
|
|||
|
The more of their time you waste, the less they are gonna earn.
|
|||
|
Eventually they may quit, and if we're persistent enough, maybe
|
|||
|
someday nobody will WANT to work for these cretins.
|
|||
|
o Why not add "May I speak to your supervisor?" for no good reason...
|
|||
|
o "Just a sec., I'll get my wife, she's really interested in this sort
|
|||
|
of thing..." and leave the phone on the table for 10 minutes...
|
|||
|
o Blow him some nice tones. 1000 Hz is nice.
|
|||
|
o If it's a girl, start to BS with her. Ask her out. Even better, make
|
|||
|
like to you who she is, and your going to strange things to her body.
|
|||
|
90% are ugly college chics, so you might not be able to hang up on one
|
|||
|
with this approach. Use your own judgement.
|
|||
|
o Turn the bell off on the phone, and hook up an answering machine, and
|
|||
|
sleep, sleep.
|
|||
|
:::: Ethics one should abide by ::::
|
|||
|
o Don't go after the lower echelons of the company by terrorizing the
|
|||
|
telemarketer. They have no effect on the company. All you do is ruin
|
|||
|
somebody else's night. With few exceptions, he is just as unhappy
|
|||
|
about bothering you as you are about being interrupted.
|
|||
|
o Lash back at the company, not the peon. He's paid to do that. 4 out
|
|||
|
of 5 people wouldn't do that unless they were paid.
|
|||
|
:::: REMEMBER ::::
|
|||
|
The organizing principal of modern society is, "The only people in contact
|
|||
|
with the public are the ones with no authority". Keeps we, the people,
|
|||
|
fighting with each other while leaving the Bosses free to play power games with
|
|||
|
lives.
|
|||
|
:::::::::::::: Information written by The Sensei / TSR Editor ::::::::::::::
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
TELCOMMUNICATIONS EVENTS, TSR (c.c 2\28)
|
|||
|
CONFERENCES, SEMINARS, and SHOWS:
|
|||
|
This is a list of meetins and show in the up coming month. I'm providing
|
|||
|
this list for you and your friends to rob, cheat, and swindle the angered
|
|||
|
companies that participate in there events. You are likely to find your dreams
|
|||
|
come true in telephone accessories and other wonderful equipment. Many things
|
|||
|
will be on show, so take items as you please. There could be butt sets,
|
|||
|
testing equipment, and other stuff at your disposal. Remember, their parking
|
|||
|
lots are usually filled with BELL trucks, just waiting for you to clean them
|
|||
|
out.
|
|||
|
________________________________________
|
|||
|
Mar. 3-4
|
|||
|
Exchange Carriers of Utah St. George, UT
|
|||
|
Holiday Inn Phone: 801-298-4242
|
|||
|
Mar. 6-8
|
|||
|
Voice '89 Santa Clara, CA
|
|||
|
Convention Center Phone: 713-974-6637
|
|||
|
Mar. 6-10
|
|||
|
MFOC '89 Washington, DC
|
|||
|
Hyatt Crystal City Phone: 800-323-1088
|
|||
|
Mar. 7-9
|
|||
|
REA Telecomm. Eng. & Mgmt. Seminar Minneapolis, MN
|
|||
|
Marriott City Center Phone: 202-382-8663
|
|||
|
Mar. 8-15
|
|||
|
Hannover Fair CeBit '89 Hannover, West Germany
|
|||
|
Hannover Fairgrounds Phone: 609-987-1202
|
|||
|
Mar. 12-15
|
|||
|
Minnesota Telephone Bloo
|
|||
|
mington, MN
|
|||
|
Radisson South Hotel Phone: 612-291-7311
|
|||
|
Mar. 13-16
|
|||
|
Interface '89 New York City, NY
|
|||
|
Javits Conention Center Phone: 617-449-6600
|
|||
|
Mar. 14-17
|
|||
|
Carolina-Virginias Spring Mtg. Releigh, NC
|
|||
|
Marriot Hotel Phone: 919-592-5751
|
|||
|
Mar. 15-16
|
|||
|
InterCom '89 Miami, FL
|
|||
|
Hyatt Regency Hotel Phone: 305-446-5150
|
|||
|
Mar. 19-22
|
|||
|
South Carolina Telephone Charleston, SC
|
|||
|
Omni Hotel Phone: 803-722-4900
|
|||
|
Mar. 19-22
|
|||
|
Entelec '89 New Orleans, LA
|
|||
|
Louisiana Superdome Phone: 504-561-4530
|
|||
|
Mar. 28-30
|
|||
|
TBT West '89 Long Beach, CA
|
|||
|
Long Beach Convention Ctr. Phone: 800-243-6002
|
|||
|
Mar. 29-Apr. 1
|
|||
|
Communications Indonesia Jakarta, Indonesia
|
|||
|
Jakarta Fairgrounds Phone: 301-656-2942
|
|||
|
Well all that's all for this month. For more, read up coming Reports!
|
|||
|
::::::::::::::::::::::::::: Seymour Lecker / TWA ::::::::::::::::::::::::::
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
SOFTWARE LINKS UNIX SYSTEM TO ATOMIC CLOCK: TSR (i.w 2\28)
|
|||
|
Precision Standard Time Inc. recently placed in the public domain
|
|||
|
software that synchronizes nodes on a Unix TCP/IP network to the atomic clock
|
|||
|
that U.S. Government uses to keep official time.
|
|||
|
On Unix networks, a number of time-sensitive applications require
|
|||
|
careful synchronization, both between network elements and in relation to an
|
|||
|
absolute time standard.
|
|||
|
Now inconsistencies need not occur. The software continually
|
|||
|
synchronizes nodes on a network to within 100 milliseconds on the atomic clock
|
|||
|
at the National Institute for Standards and Technology.
|
|||
|
US NO 202-653-0351.
|
|||
|
The software consists of University of Maryland's Time Demon, "ntpd,"
|
|||
|
which implements the Network Time Protocol and synchronizes the host computer
|
|||
|
to Coordinated Universal Time, the international time standard. The software
|
|||
|
can be operated with or without a Time Source radio receiver sold by Precision
|
|||
|
ST. Without an external time standard, however, no provision exists to correct
|
|||
|
inaccuracies caused by the drift of computer calendar clocks or by errors
|
|||
|
introduced in manual clock setting.
|
|||
|
____________________________________________________________________________
|
|||
|
____________________________________________________________________________
|
|||
|
::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
|
|||
|
|
|||
|
// Callers Must be Told the Cost //
|
|||
|
The FCC yesterday ordered 5 companies that charge customers 20% to 80% more
|
|||
|
than AT&T, MCI or Sprint to toe the line. The alternative operators must now
|
|||
|
tell callers how much the call will cost and which company is placing it before
|
|||
|
it goes through. The high rates usually are placed on hotel, airport or
|
|||
|
hospital phones.
|
|||
|
:: UPDATE ::
|
|||
|
As stated above, alternative long-distance operators must: Put a sticker on
|
|||
|
the phone with price information or tell the caller the price verbally; give
|
|||
|
callers an chance to hang up without any charge; offer callers a chance to go
|
|||
|
through AT&T or another phone service. Right now many alternative operators
|
|||
|
stop you from using another carrier.
|
|||
|
_____________________________________________________________
|
|||
|
// Bell Goes To College //
|
|||
|
Bell Atlanticom Systems said yesterday it has signed a contract with the
|
|||
|
College of William and Mary in Williamsburg, Va., for a fully integrated voice
|
|||
|
and data communications system. The campus-wide system will provide resale of
|
|||
|
communications services to students, a management system, and a universal wiring
|
|||
|
plan to provide voice and data transmission.
|
|||
|
The communications system obtained by the College of William and Mary
|
|||
|
yesterday will provide 300 trunks, 3,800 faculty and student lines, 150
|
|||
|
voice/data faculty users and 1,050 host data ports. It includes more than 5,000
|
|||
|
inside wiring runs and several miles of fiber optics. Also included: A 1,000-
|
|||
|
user Aspen Voice Mail System and the Alex-IS Telecommunications Management
|
|||
|
System.
|
|||
|
_____________________________________________________________
|
|||
|
// Hackers Fail Raiding ATMs // TSR
|
|||
|
If authorities hadn't been tipped, a computer hackers could have cracked
|
|||
|
one cash-machine network of more than 14$ million over a single weekend, of
|
|||
|
Feb. 18. Charged in the plot were GTE Corp. consultant Mark Koenig, and 4
|
|||
|
other hackers. Federal Agents said the hackers pulled the personal ATM codes
|
|||
|
from GTE te
|
|||
|
lephone lines. The lines transmit transactions from account at Bank
|
|||
|
of America and thousands of other banks linked to the Plus System, a national
|
|||
|
network of shared ATMs.
|
|||
|
The Hackers put the data in magnetic strips on 5,500 pieces of card board.
|
|||
|
They planned to use the bogus cards to make withdrawals around the country. If
|
|||
|
it were not for a "TIPOFF", authorities wouldn't have known what hit them.
|
|||
|
[ Now this is a sad story. These -hackers- have a chance to break 14 MILLION
|
|||
|
in tax-free cash, and they blow it. I bet one of them bragged about it to a
|
|||
|
girl friend. That's the only way computer hackers get caught...they have to
|
|||
|
see some limelight. ] --TS
|
|||
|
::::::::: Information provided by John "Scij" / 612 :::::::::
|
|||
|
_____________________________________________________________
|
|||
|
// Speaking of ATM Heists... //
|
|||
|
Recently, a crook used a Security Pacific National Bank ATM master card,
|
|||
|
which tapped into virtually all accounts. The heist resulted in a 237,000$ win
|
|||
|
for the hacker. The bank reimbursed depositors but still have not found the
|
|||
|
culprit. Alarmed by the incident, the American Bankers Assoc. plans to urge
|
|||
|
its 13,500 members to strictly limit access to ATM master cards and personal
|
|||
|
indentification codes.
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
:::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::
|
|||
|
"They [Hackers] have this need to find the answer."
|
|||
|
To subscribe to the 2600 Magazine send 15$ to:
|
|||
|
2600 Magazine
|
|||
|
P.O. BOX 752
|
|||
|
Middle Island N.Y. 11953
|
|||
|
--Corley, Editor 2600 Magazine
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
TSR will accept additional sponsor/support Systems. If you have a certain
|
|||
|
interest in the Report, and wish to provide support to TSR -- Leave your BBS
|
|||
|
number -- and any other information on RADIO WAVES Bulletin Board Systems.
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
Pheonix Proj. LODH :: 512-441-3088 --------- Lunatic Labs :: 415-278-7421
|
|||
|
At Login: Any UNIX Default PW P/H System
|
|||
|
Tiamats Temple Pvt :: 612-731-0296 --------- Hack Shack @ :: 214-422-4307
|
|||
|
P/H-Files BBS Login: Any UNIX Default Pass
|
|||
|
RADIO WAVES System :: 612-471-0060
|
|||
|
- Syndicate Report Support BBS -
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
This concludes this Transmittal No. 21
|
|||
|
(Part 2 of 2)
|
|||
|
Released March 2nd, 1989
|
|||
|
by The Sensei
|
|||
|
Editor of The Syndicate Report
|
|||
|
___________________________________________________________________________
|
|||
|
___________________________________________________________________________
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|