953 lines
47 KiB
Plaintext
953 lines
47 KiB
Plaintext
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
|
|
THE SYNDICATE REPORT
|
|
|
|
Information Transmittal No. 21
|
|
(Part 1 of 2)
|
|
|
|
Released March 2, 1989
|
|
Featuring:
|
|
|
|
Editor's Note
|
|
"PCP Hacking Statistics"
|
|
|
|
AT&T Works on Making Unix Less Vulnerable
|
|
MCI Mail Rates and Info Change
|
|
|
|
AT&T Bellcore & Tiniest Semiconductors Ever
|
|
|
|
Common Unix Passwords
|
|
|
|
Briefs notes from The Report
|
|
|
|
Vocabulary Tonic
|
|
|
|
by The Sensei
|
|
Editor Syndicate Report Magazine
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
EXPOSITION: TSR
|
|
|
|
Once again, The Report accepts outside sources. Anybody can
|
|
write/provide information to The Syndicate Report.
|
|
Articles/Information may be provided through RADIO WAVES Bulletin Board
|
|
System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data /
|
|
Telecommunications, and new developments on any the previous mentioned
|
|
specialties will be: accepted, labeled, and given full actual credit to
|
|
the article/info provider(s), or writer(s). --
|
|
|
|
** All articles have been presented by me unless shown at the end of
|
|
the article as the information provider(s), or writer(s). **
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
EDITOR'S NOTE: TSR
|
|
|
|
" PC PURSUIT HACKING STATISTICS "
|
|
|
|
PCP password hackers are welcome tools for virtually all types of
|
|
users: Phreaks, Pirates, Terrorists, system Hackers, etc. PCP has
|
|
become the perfect way to dial long distance with low error ratios,
|
|
flexibility with ID codes/passwords used on other networks and most
|
|
importantly, safety. Telenet is because of the huge number of calls
|
|
that are handled every day by the big networks, keeping track of where
|
|
every call and connection is made from is financially impractical. It
|
|
is also very easy to disguise your location using the network, which
|
|
makes dial LD even more secure.
|
|
|
|
As time and technology interface, code abusing slowly becomes past-time
|
|
reminiscence for busted hackers. In response, PCP becomes the only
|
|
resource for paranoid hackers, alike. Along these lines of paranoia,
|
|
the need for PCP password hackers increases.
|
|
|
|
After all the years that PCP has existed, I've only seen 5 PCP password
|
|
hackers. And of the 5 hackers, 3 of these devices were totally
|
|
useless for obvious reasons, upon execution...
|
|
|
|
Some of the obvious
|
|
problems indicated : No online modem configuring.
|
|
|
|
Incomplete documention & Technical Information.
|
|
These apply to the anti-user friendly hacks.
|
|
|
|
Inaccurate response detecting positive completion
|
|
of passwords.
|
|
|
|
Ineffective random variable password generating.
|
|
|
|
...and with all beta programs -- minor bugs.
|
|
|
|
With this in mind, I'd like to add some PCP Statistics. PCP ID's and
|
|
Passwords are not easy to get. Format area: PCP12345 and ABCD6789.
|
|
|
|
The first thing a hacker considers when using a hacker is, what? PCP
|
|
ID to use. Most are between 10,000 and 40,000. I have never seen an
|
|
ID over 40,000. PCP doesn't disclose annual PCP profits, nor the number
|
|
of subscribers they currently have. Although the number by many
|
|
hackers is approximated around 5,000 to 6,000. Keep in mind that
|
|
businesses use PCP accounts too, in case your criticizing that you've
|
|
never seen 5,500 subscribing hackers. Therefore, the change of gaining
|
|
a valid ID are significantly good.
|
|
|
|
Of course, the PCP IDs do not bug hackers. The complexed password
|
|
scheme is the brain parasite. First there is the 4 random letters,
|
|
then the 4 random numbers - joined. In essence, what a hacker is
|
|
dealing with is 2 passwords beyond 1. The LETTERS, and the NUMBERS
|
|
must match up - not the entire string as a whole since the letters stop
|
|
after 4, then take on an entire new syntax.
|
|
|
|
I've seen some passwords that had numbers in the letter positions, and
|
|
vise verse for the letters. Majority however stay in the above listed
|
|
format.
|
|
|
|
If interested in a PC Pursuit password hacker, consider using Phry Code
|
|
Pro., by The Exciter / 612. Latest version can be found on RADIO
|
|
WAVES.
|
|
|
|
;The Sensei / Editor TSR
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
AT&T WORKS ON MAKING UNIX LESS VULNERABLE: TSR (iw 2\11)
|
|
|
|
Enhanced security features are being developed for Unix System V.4.1.
|
|
AT&T's vice president stated. His keynotes to the Usenix Tech.
|
|
Conference in California insisted that open, multivendor networks are
|
|
not centrally more susceptible to security violations than proprietary
|
|
systems.
|
|
|
|
Security is on the mind of every Unix user, particularly when
|
|
Unix-based systems are to be used for mission-critical and strategic
|
|
applications, like running a high end workstation.
|
|
|
|
The new version, on Unix, will achieve the National Security Agency's
|
|
B2 level of security, and will actually also have some features of the
|
|
B3 level as well. Powerful security tools exist in the current version
|
|
of Unix V, but have often gone unused by administrators because of a
|
|
lack of quality documentation and training. AT&T will also be adding
|
|
surreal security features to System V.4.1., the first revision of the
|
|
sill unreleased system V.4.0. Procrastination seems to be top priority
|
|
for many software vendors - just look at Lotus. Well, Unix won't be
|
|
very welcome for the Hacking Community, and myself. The
|
|
features/improvements include:
|
|
|
|
Access methodology beef up
|
|
Maintenance of Data Integrity
|
|
The denial of service
|
|
Hacker/Intruder/Terrorist containments
|
|
...and the execution of the "superuser" status.
|
|
|
|
About the "superuser" chop. This is the most popular status,
|
|
especially for hackers, and AT&T takes it out. It did more good than
|
|
bad in the long run. In its place will be a finer distinction in
|
|
status. There will be a status of "superuser" that is only used for
|
|
mounting the systems. That user will not be able to access other
|
|
"superuser" privileges.
|
|
|
|
Control of the front end of system access - password security - will be
|
|
enhanced by the use of "shadow" password files. The files containing
|
|
the password (etc/passwd) have been far to easy to access. So,
|
|
restricted access to files, along with a form of activity audit, which
|
|
will be used in System V.4.1. Actually, the greater sense within the
|
|
system, including user and group IDs, aging information, and a command
|
|
and log-in audit.
|
|
|
|
Editor's suggestions:
|
|
|
|
Keeping systems resources in locked rooms/shells, to prevent shaking of
|
|
the shielding of shells/rooms, which can reveal information to external
|
|
devices. AT&T should also use a dedicated printing resource to each
|
|
high level of security - a printer on each label page? Well, that
|
|
would code a lot of money, but LD services do it all the time, along
|
|
with personal supervision. Then theres Fiber-Optics, and the security
|
|
advantage there. As printed in THE SYNDICATE REPORT #20 (part 2),
|
|
where an article explains the procedures in Tapping Fiber Optic cables.
|
|
Then again, it's hard to break into a FO cable without bringing the
|
|
system down, with a nice alarm response.
|
|
|
|
:::::::::::: Information written by The Sensei (TSR Editor) :::::::::::
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
|
|
MCI MAIL RATES AND INFO CHANGE: TSR (u.t 2\15)
|
|
|
|
Beginning early February 1989 MCI Mail will LOWER the cost of Instant
|
|
Messages and domestic Fax Dispatch. In addition, we will offer FREE
|
|
800 Access, FREE Advanced Service and FREE Shared Lists. MCI's new
|
|
retail prices are as follows:
|
|
|
|
:: Instant Messages ::
|
|
|
|
0-500 Characters $ .45
|
|
501-2500 Characters $ .75
|
|
2501-7500 Characters $1.00
|
|
Each Additional 7500 Characters $1.00
|
|
|
|
:: Domestic Fax Dispatch ::
|
|
|
|
First Half Page $ .50
|
|
Each Additional Half Page $ .30
|
|
|
|
:: Access ::
|
|
|
|
800 Access No Charge
|
|
U.S. tymnet Access $ .25/ Per Minute
|
|
International tymnet Access $ .30/ Per Minute
|
|
|
|
:: MCI Mail's new 800 numbers will be ::
|
|
|
|
Access Speed 800 Telephone Number
|
|
|
|
300, 1200 bps...........................800-234-MAIL
|
|
2400 bps............................... 800-456-MAIL
|
|
Lotus Express & Desktop Express.........800-825-1515
|
|
(up to 2400 bps)
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
AT&T BELLCORE & TINIEST SEMICONDUCTORS EVER: TSR (b.w 2\27)
|
|
|
|
As the transistors on computer chips steadily shrivel away toward
|
|
nothingness, scientists are faced with a task much like figuring out
|
|
how many atoms can dance on the head of a pin. Researchers as AT&T
|
|
Bell Laboratories are closing in. They have devised a method of
|
|
producing the tiniest semiconductor crystals ever: clusters containing
|
|
as few as 100 atoms. They are so far too tiny to 'print' with even the
|
|
wispiest microcircuit. Still, they may have practical applications.
|
|
|
|
That's because a young polymer chemist, has developed a way to keep the
|
|
clusters from combining into larger clumps, as they otherwise would
|
|
do. He grows each microcrystal inside a minuscule water droplet a
|
|
thousand times smaller than the diameter of a human hair, then replaces
|
|
the water with organic molecules. "It's like putting the cluster in a
|
|
little plastic bad," he says. The clusters can be 'tuned' for specific
|
|
jobs because they absorb different wavelengths of light as they
|
|
decrease in size. So they could be used for optical switches in future
|
|
"optoelectronic" chips.
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
COMMON UNIX PASSWORDS: TSR (p.p 2\21)
|
|
|
|
The subsequent list of words are a list of commonly used passwords,
|
|
use on Unix computer systems. The list also contains syntax from the
|
|
illustrious UNIX Internet Worm on November, 1988. Combine them into a
|
|
favorable Unix Hacker.
|
|
|
|
_____________________________________________________________
|
|
|
|
:::::::::::::::::::::::::::: Unix Passwords :::::::::::::::::::::::::::
|
|
_____________________________________________________________
|
|
|
|
aaa daniel jester rascal
|
|
academia danny johnny really
|
|
ada dave joseph rebecca
|
|
adrian deb joshua remote
|
|
aerobics debbie judith rick
|
|
airplane deborah juggle reagan
|
|
albany december julia robot
|
|
albatross desperate kathleen robotics
|
|
albert develop kermit rolex
|
|
alex diet kernel ronald
|
|
alexander digital knight rosebud
|
|
algebra discovery lambda rosemary
|
|
alias disney larry roses
|
|
alpha dog lazarus ruben
|
|
alphabet drought lee rules
|
|
ama duncan leroy ruth
|
|
amy easy lewis sal
|
|
analog eatme light saxon
|
|
anchor edges lisa scheme
|
|
andy erenity angerine scott
|
|
arrow elizabeth maggot sex
|
|
arthur ellen magic shark
|
|
asshole emerald malcolm sharon
|
|
athena engine mark shit
|
|
atmosphere engineer markus shiva
|
|
bacchus enterprise marty shuttle
|
|
badass enzyme marvin simon
|
|
bailey euclid master simple
|
|
banana evelyn maurice singer
|
|
bandit extension merlin single
|
|
banks fairway mets smile
|
|
bass felicia michael smiles
|
|
batman fender michelle smooch
|
|
beauty fermat mike smother
|
|
beaver finite minimum snatch
|
|
beethoven flower minsky snoopy
|
|
beloved foolproof mogul soap
|
|
benz football moose socrates
|
|
beowulf format mozart spit
|
|
berkeley forsythe nancy spring
|
|
berlin fourier napoleon subway
|
|
beta fred network success
|
|
beverly friend newton summer
|
|
bumbling george osiris tape
|
|
cardinal gertrude outlaw target
|
|
carmen gibson oxford taylor
|
|
carolina ginger pacific telephone
|
|
caroline gnu painless temptation
|
|
castle golf pam tiger
|
|
cat golfer paper toggle
|
|
celtics gorgeous password tomato
|
|
change graham pat toyota
|
|
charles gryphon patricia trivial
|
|
charming guest penguin unhappy
|
|
charon guitar pete unicorn
|
|
chester hacker peter unknown
|
|
cigar harmony philip urchin
|
|
classic harold phoenix utility
|
|
coffee harvey pierre vicky
|
|
coke heinlein pizza virginia
|
|
collins hello plover warren
|
|
comrade help polynomial water
|
|
computer herbert praise weenie
|
|
condo honey prelude whatnot
|
|
condom horse prince whitney
|
|
cookie imperial protect will
|
|
cooper include pumpkin william
|
|
create ingres puppet willie
|
|
creation innocuous rabbit winston
|
|
_____________________________________________________________
|
|
|
|
Paean : The Merc V.4.1. passwd!locator
|
|
Shooting Shark Gfiles : Unix hacker
|
|
The Mentor LOD/H : Pheonix Project 512-441-3088
|
|
TSR Dedicated Field users
|
|
|
|
::::::::::::::::::: Information provided Multiformly ::::::::::::::::::
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES:::::::::::::::::::::
|
|
|
|
// Bell 900 Battles //
|
|
|
|
AT&T, MCI and US Sprint are arming themselves for a new round of
|
|
competition in interactive 900-call services, according to TSR sources.
|
|
AT&T has been hoping for FCC approval of its interactive 900 tariff.
|
|
MCI has been testing and plans to offer a 900 service next month. And
|
|
US Sprint plans to begin customer testing of its service in April '89.
|
|
|
|
:::::::::::: Information provided by MPhone / 203 :::::::::::
|
|
_____________________________________________________________
|
|
|
|
// NSA Chooses Its Security //
|
|
|
|
The National Security Agency has chosen the AT&T security code
|
|
algorithm called Code Excited Linear Predicted. NSA will propose the
|
|
algorithm be adopted as a government-wide standard. Production is
|
|
shared by AT&T, Motorola and GE RCA. The algorithm is a 4,800
|
|
bits-per-second coder that checks speech patterns.
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::
|
|
|
|
What "Vocab. Tonic" is, is a list of acronyms and definitions to help
|
|
education the ignorant hacker. With an extensive vocabulary, there is
|
|
virtually nothing one can't learn. Study on...
|
|
|
|
DS - Digital Switch. A switch in which connections are established by
|
|
operations on digital signals without conversion to analog.
|
|
|
|
DSX - A digital cross connect field which can be utilized for DS1
|
|
(Digital Switch), DS2 or DS3 level cross connections at a digital level
|
|
|
|
RPOA - Registered Private Op. Agencies (ID of online system).
|
|
|
|
SCC - (or SCCS), Switch Control Center. SCC has overall
|
|
responsibility for the administration and maintenance of BOC Central
|
|
Offices. Responsibilities include installation and maintenance Control
|
|
Office for FG B, C, and D. SCC also handles specific trouble reports.
|
|
|
|
TAMS - System where NUIs are checked by a central database when you
|
|
try to connect to an address, on GTE Telenet.
|
|
|
|
TD - Terminating Direction. The use of Access Service for the
|
|
completion of a call from an IC (Interexchange Carrier) location to an
|
|
end user.
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
:::::::::::::::::::::::: TSR "Quote of the Month" :::::::::::::::::::::
|
|
|
|
"They [Hackers] have this need to find the answer."
|
|
|
|
To subscribe to the 2600 Magazine send 15$ to:
|
|
2600 Magazine
|
|
P.O. BOX 752
|
|
Middle Island N.Y. 11953
|
|
|
|
Corley, Editor 2600 Magazine
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
TSR will accept additional sponsor/support Systems. If you have a
|
|
certain interest in the Report, and wish to provide support to TSR --
|
|
Leave your BBS number -- and any other information on RADIO WAVES
|
|
Bulletin Board Systems.
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
Pheonix Proj. LODH :: 512-441-3088 ----- Lunatic Labs :: 415-278-7421
|
|
At Login: Any UNIX Default PW P/H System
|
|
|
|
HackersDen 2600 #5 :: 612-522-3959 ----- Hack Shack @ :: 214-422-4307
|
|
P/H-Files BBS Login: Any UNIX Default Pass
|
|
|
|
RADIO WAVES System :: 612-471-0060
|
|
- Syndicate Report Support BBS -
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
This concludes this Transmittal No. 21
|
|
(Part 1 of 2)
|
|
|
|
Released March 2nd, 1989
|
|
|
|
by The Sensei
|
|
Editor of The Syndicate Report
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
|
|
|
|
THE SYNDICATE REPORT
|
|
|
|
Information Transmittal No. 21
|
|
(Part 2 of 2)
|
|
|
|
Released March 2, 1989
|
|
Featuring:
|
|
|
|
Editor's Note
|
|
|
|
"Cyberpunks" Vs. The Media
|
|
|
|
|
|
|
|
Telecommunications Events, Conferences, Seminars, and Shows
|
|
|
|
Software Links Unix System to Atomic Clock
|
|
|
|
Briefs notes from The Report
|
|
" Hackers Fail Raiding ATMs "
|
|
|
|
by The Sensei
|
|
Editor Syndicate Report Magazine
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
EXPOSITION: TSR
|
|
|
|
Once again, The Report accepts outside sources. Anybody can
|
|
write/provide information to The Syndicate Report.
|
|
Articles/Information may be provided through RADIO WAVES Bulletin Board
|
|
System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data /
|
|
Telecommunications, and new developments on any the previous mentioned
|
|
specialties will be: accepted, labeled, and given full actual credit to
|
|
the article/info provider(s), or writer(s). --
|
|
|
|
Special Editor, TS, comments are placed between brackets.
|
|
Example: [ Hi. ]
|
|
|
|
** All articles have been presented by me unless shown at the end of
|
|
the article as the information provider(s), or writer(s). **
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
EDITOR'S NOTE: TSR
|
|
|
|
Just a quick note. Just in case many of you don't know...I distribute
|
|
an introduction package at least 3 days every month before actually
|
|
releasing The Syndicate Report. These can be found on the systems
|
|
listed at the end of this part of TSR.
|
|
|
|
;The Sensei / TSR!612
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
"CYBERPUNKS" VS. THE MEDIA: TSR (s.t 2\27)
|
|
|
|
The following article can from a newspaper local to myself. The
|
|
newspaper is the "Star and Tribune." I, The Sensei, usually don't
|
|
print up verbatim copies of articles, but this articles was very
|
|
interesting and entertaining.
|
|
|
|
Some of the information presented in insulting to most Hackers/Phreaks,
|
|
etc., so I'm going to comment on parts of the article. Comments will
|
|
be in designated brackets, like this: [ Blah, Blah...Har Har -TS ]
|
|
|
|
_____________________________________________________________
|
|
|
|
Silicon Valley -- A local Cop patrolling after midnight witnessed an
|
|
unusual sight, even for this center of high technology: Two teenagers
|
|
wedged in a phone booth, laboring over the keyboard of a laptop
|
|
computer clipped into the telephone line.
|
|
|
|
[ This is very humorous for me...I can't help wondering what technique
|
|
these guys are using to access Bell Fone's, heh. ]
|
|
|
|
The youths, who were arrested for telephone fraud and computer abuse,
|
|
belong to a shadowy culture of computer vandals committed to illegally
|
|
entering and frequently tampering with the computer networks on which
|
|
society has come to rely.
|
|
|
|
Those in this expanding underground -- known as CYBERPUNKS to
|
|
themselves and some social scientists -- have broken into corporate and
|
|
military computers and tampered with telephone billing switching
|
|
equipment, sometimes altering services and monitoring telephone lines.
|
|
Some have boasted of illicitly entering computer used in stock-market
|
|
trading.
|
|
|
|
[ First of all, I protest to the term, "Cyberpunks." No hacker I know
|
|
of as called themselves Cyberpunks. If anyone reading this does, your
|
|
probably not a considered a hacker by most. Second, Social Scientists
|
|
don't know anything about hackers -- they're just another worthless
|
|
clan of scientists trying to shape society as they wish. ]
|
|
|
|
[ The newspaper then goes on to refresh our memories about the Morris
|
|
Jr. Unix WORM, haven't we heard enough about his guy. And it was a
|
|
really complicated set of code he set for his so-called CSci Project. ]
|
|
|
|
Articles describing how to write viruses have appeared in several
|
|
publications that are widely circulated within the underground.
|
|
Writing in the journal 2600, which says it speaks for the computer
|
|
underground, an author using the pseudonym "The Plague" described how
|
|
to create a virus.
|
|
|
|
"If people's data is destroyed, then so be it," he wrote. "If people
|
|
are stupid enough to accept pirated software, then they deserve to be
|
|
punished," says Plague.
|
|
|
|
[ Well, The Plague has it all wrong. Viruses are not ONLY in pirated
|
|
software, my friend, they creep within all types of programs. Your
|
|
just adding to the problem. It's goes against 'Hacker Ethics,' but the
|
|
information should not to suppressed from the hacking community. ]
|
|
|
|
The term CYBERPUNK is a reference to a popular science fiction genre
|
|
that deals with an intersecting world of high technology and outlaw
|
|
society. "This is the case of art driving reality," said one Social
|
|
Scientist at the Institute for the Future, Calif. "You have a small
|
|
group who is actually going it, and a large pool that is buying into
|
|
what they are doing and redefining reality."
|
|
|
|
[ Yet another scientist from a corrupt institution, making conclusions
|
|
based on a small fraction of neo-hackers. ]
|
|
|
|
Cyberpunks often are called HACKERS, but computer scientists are
|
|
careful to note that not all hackers are malicious. The term
|
|
originally referred to researchers who were committed to designing
|
|
advanced computer hardware and software.
|
|
|
|
[ This is the first decent statement I've read. ]
|
|
|
|
Another often-heard term is "PHREAKING," which is the illegal use of
|
|
telephone systems.
|
|
|
|
"Phreaking is moral," said an 18 year-old hacker who calls himself,
|
|
"Frank Drake" in messages on the bulletin boards. "There is no theft
|
|
involved. It's not theft of services, because this equipment would
|
|
otherwise be idle."
|
|
|
|
[ It's about time these Media-Types informed the public of my favorite
|
|
hobby, Phreaking. And about the definition Frank Drake gave.
|
|
"Illegal use of Fone System." ? Sorry, not all of the uses by phreaks
|
|
is illegal. More than anything, phreaking is basically composed of
|
|
"Learning about the Bell system, along with illegal use." ]
|
|
|
|
Computer experts working in the industry who have become involved with
|
|
malicious hackers see them as computer addicts possessed by an
|
|
antisocial obsession. "They're misfits, losers or troubled individuals
|
|
lacking a sense of duty or morals," said a computer researcher at a
|
|
Silicon Valley institution.
|
|
|
|
[ Misfits? Losers? Antisocial individuals? This is another scientist
|
|
shooting his mouth off with little support. The idea of hackers being
|
|
social outcasts, or losers is a common misconception by many. Most
|
|
malicious computer hackers are party animals when given the right
|
|
conditions. And if one was told he is labeled an, "Outcast, Loser
|
|
etc.", the person talking would get an entire new face of the word
|
|
MALICIOUS. Namely a 99e99 dollar fone bill, credit check and
|
|
unchecked, and maybe a subscription to every magazine on the face of
|
|
the Earth. ]
|
|
|
|
In recent years this researcher has offered four underground hackers
|
|
programming jobs to try to channel their energy away from destructive
|
|
use of computers. In each case the experiment ended in failure, the
|
|
scientists said.
|
|
|
|
The researcher asked not to be indentified, and his reason is
|
|
revealing. He fears that the CYBERPUNKS/Hackers are so skilled at
|
|
tampering with computers that they might be able to alter his credit
|
|
rating or have his electricity turned off.
|
|
|
|
[ Oh my. Will these guys never learn? Hackers are not stupid "Lab
|
|
Rats." They want a challenge, away from sitting at a computer
|
|
programming for another person. And this scientist is concluding his
|
|
entire experiment on just a few hackers. Yes, his fear of hackers is
|
|
valid. I am now thinking of ways to find out who this guy might be.
|
|
The credit rating would be no problem, same with the electricity. A
|
|
scientist without electricity, is like a hacker without Telenet. ]
|
|
|
|
"Every single one of them had deep psychological problems," he said.
|
|
Some members of the hacker underground appear to agree with this
|
|
psychological assessment.
|
|
|
|
[ Hah! No comment...for obvious reasons. ]
|
|
|
|
"They have this crazed need to find the answer," said Eric Corley, edit
|
|
of 2600 Magazine.
|
|
|
|
Corley, whose personal hacking resulted in three brushed with the law
|
|
before he started the publication in 1984, said: "They keep exploring
|
|
where they know they shouldn't go. A true hacker won't stop just
|
|
because he gets in trouble."
|
|
|
|
[ Corley is totally correct here, of course. But I think some hackers
|
|
don't stop hacking, because some are just over powered with the need to
|
|
learn. I never stopped hacking after by bust for many reasons. I the
|
|
primary reason was because I'm not a quitter, and I looked back on how
|
|
much had I learned. With the learning, fun followed. ]
|
|
|
|
Although computer experts believe the number of outlaw hackers is
|
|
growing, the behavior they exhibit is not new to the high-tech world.
|
|
For example, a computer programmer, John Draper, spent six months in
|
|
jail during the 1970s for illegal use of the telephone network.
|
|
|
|
Draper's nickname, "Captain Crunch," derived from his discovery that a
|
|
whistle that came as a prize in a cereal box was tuned to the correct
|
|
frequency to unlawfully manipulate fone company switch gear.
|
|
|
|
[ Hmmm. Every hacker knows all this already. At least a true hacker
|
|
should know his/her past. But the thing I can't help wondering is,
|
|
what was Captain Crunch doing with a whistle from the "Captain Crunch
|
|
cereal" box? And why was he blowing it into the fone. Makes me laugh
|
|
if you think about it. Another thing, anyone with two front teeth can
|
|
blow a 2600 Hz tone whistle. ]
|
|
|
|
;The Sensei / TSR!612
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
BUSTING TELEPHONE SOLICITORS: TSR (st.cit 2\27)
|
|
|
|
Join to fight telephone solicitors! How you ask? Read on...
|
|
|
|
:::: Illustration, Exampling ::::
|
|
|
|
"Have you ever off and had a fantasy of going to the library and
|
|
finding out who owns the companies that call YOU, interrupt you, and
|
|
calling THEM back? It makes you happy for a while. Particularly when
|
|
working 11 to 7 shift, you'd think of the companies that had awoken you
|
|
(using YOUR private fone) at noon."
|
|
|
|
"One nurse I know did something like that to a persistent insurance
|
|
salesman. One day she got awake and alert enough to get his name and
|
|
number and promised to call back. She did. At 2 AM, announcing that
|
|
it was HER working day, and she was now awake and would like to discuss
|
|
the policy....He never called her back." -TS
|
|
|
|
:::: Tips Offs to a Fone Scam ::::
|
|
|
|
If it sounds too good to be true, it's probably a scam. Some of the
|
|
most popular promotions among telephone con artists include prize
|
|
offers to get you to buy water purifiers or vitamins, magazine
|
|
subscriptions, PENNY STOCKS, precious metals, travel and cellular
|
|
telephone lottery applications.
|
|
|
|
Be skeptical of says such as, "This is the best deal you'll ever
|
|
find," or "Double your money, no risk!"
|
|
|
|
The government, Federal Trade Commission estimates that Americans lose
|
|
1$ billion a year from the deceptive peddling of goods and services
|
|
over the fone. Other organizations say it's much higher. One might
|
|
suggest lobbying for stricter FED laws governing 'telemarketing
|
|
businesses.'
|
|
|
|
:::: Striking Back at 'The Solicitor' ::::
|
|
|
|
o Do NOT hang up on telephone solicitors. This just allows them to
|
|
make another call 200 milliseconds later. Listen to them. Ask
|
|
stupid questions. Drag out conversation. Contemplate placing an
|
|
order, then don't. Or start to place an order, then change your
|
|
mind.
|
|
|
|
o Try wasting their time as much as possible, cackle insanely and
|
|
hang up. Or give them the raspberry and yell, "Only
|
|
f00ling!121!!&!"
|
|
|
|
o Remember always, that these twits are partially paid on commission.
|
|
The more of their time you waste, the less they are gonna earn.
|
|
Eventually they may quit, and if we're persistent enough, maybe
|
|
someday nobody will WANT to work for these cretins.
|
|
|
|
o Why not add "May I speak to your supervisor?" for no good reason...
|
|
|
|
o "Just a sec., I'll get my wife, she's really interested in this
|
|
sort of thing..." and leave the phone on the table for 10
|
|
minutes...
|
|
|
|
o Blow him some nice tones. 1000 Hz is nice.
|
|
|
|
o If it's a girl, start to BS with her. Ask her out. Even better,
|
|
make like to you who she is, and your going to strange things to
|
|
her body. 90% are ugly college chics, so you might not be able to
|
|
hang up on one with this approach. Use your own judgement.
|
|
|
|
o Turn the bell off on the phone, and hook up an answering machine,
|
|
and sleep, sleep.
|
|
|
|
:::: Ethics one should abide by ::::
|
|
|
|
o Don't go after the lower echelons of the company by terrorizing the
|
|
telemarketer. They have no effect on the company. All you do is
|
|
ruin somebody else's night. With few exceptions, he is just as
|
|
unhappy about bothering you as you are about being interrupted.
|
|
|
|
o Lash back at the company, not the peon. He's paid to do that. 4
|
|
out of 5 people wouldn't do that unless they were paid.
|
|
|
|
:::: REMEMBER ::::
|
|
|
|
The organizing principal of modern society is, "The only people in
|
|
contact with the public are the ones with no authority". Keeps we,
|
|
the people, fighting with each other while leaving the Bosses free to
|
|
play power games with lives.
|
|
|
|
:::::::::::: Information written by The Sensei / TSR Editor :::::::::::
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
TELCOMMUNICATIONS EVENTS, TSR (c.c 2\28)
|
|
CONFERENCES, SEMINARS, and SHOWS:
|
|
|
|
This is a list of meetins and show in the up coming month. I'm
|
|
providing this list for you and your friends to rob, cheat, and
|
|
swindle the angered companies that participate in there events. You
|
|
are likely to find your dreams come true in telephone accessories and
|
|
other wonderful equipment. Many things will be on show, so take items
|
|
as you please. There could be butt sets, testing equipment, and other
|
|
stuff at your disposal. Remember, their parking lots are usually
|
|
filled with BELL trucks, just waiting for you to clean them out.
|
|
|
|
________________________________________
|
|
|
|
Mar. 3-4
|
|
Exchange Carriers of Utah St. George, UT
|
|
Holiday Inn Phone: 801-298-4242
|
|
|
|
Mar. 6-8
|
|
Voice '89 Santa Clara, CA
|
|
Convention Center Phone: 713-974-6637
|
|
|
|
Mar. 6-10
|
|
MFOC '89 Washington, DC
|
|
Hyatt Crystal City Phone: 800-323-1088
|
|
|
|
Mar. 7-9
|
|
REA Telecomm. Eng. & Mgmt. Seminar Minneapolis, MN
|
|
Marriott City Center Phone: 202-382-8663
|
|
|
|
Mar. 8-15
|
|
Hannover Fair CeBit '89 Hannover, West Germany
|
|
Hannover Fairgrounds Phone: 609-987-1202
|
|
|
|
Mar. 12-15
|
|
Minnesota Telephone Bloomington, MN
|
|
Radisson South Hotel Phone: 612-291-7311
|
|
|
|
Mar. 13-16
|
|
Interface '89 New York City, NY
|
|
Javits Conention Center Phone: 617-449-6600
|
|
|
|
Mar. 14-17
|
|
Carolina-Virginias Spring Mtg. Releigh, NC
|
|
Marriot Hotel Phone: 919-592-5751
|
|
|
|
Mar. 15-16
|
|
InterCom '89 Miami, FL
|
|
Hyatt Regency Hotel Phone: 305-446-5150
|
|
|
|
Mar. 19-22
|
|
South Carolina Telephone Charleston, SC
|
|
Omni Hotel Phone: 803-722-4900
|
|
|
|
Mar. 19-22
|
|
Entelec '89 New Orleans, LA
|
|
Louisiana Superdome Phone: 504-561-4530
|
|
|
|
Mar. 28-30
|
|
TBT West '89 Long Beach, CA
|
|
Long Beach Convention Ctr. Phone: 800-243-6002
|
|
|
|
Mar. 29-Apr. 1
|
|
Communications Indonesia Jakarta, Indonesia
|
|
Jakarta Fairgrounds Phone: 301-656-2942
|
|
|
|
Well all that's all for this month. For more, read up coming Reports!
|
|
|
|
::::::::::::::::::::::::: Seymour Lecker / TWA :::::::::::::::::::::::
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
SOFTWARE LINKS UNIX SYSTEM TO ATOMIC CLOCK: TSR (i.w 2\28)
|
|
|
|
Precision Standard Time Inc. recently placed in the public domain
|
|
software that synchronizes nodes on a Unix TCP/IP network to the
|
|
atomic clock that U.S. Government uses to keep official time.
|
|
|
|
On Unix networks, a number of time-sensitive applications require
|
|
careful synchronization, both between network elements and in relation
|
|
to an absolute time standard.
|
|
|
|
Now inconsistencies need not occur. The software continually
|
|
synchronizes nodes on a network to within 100 milliseconds on the
|
|
atomic clock at the National Institute for Standards and Technology.
|
|
|
|
US NO 202-653-0351.
|
|
|
|
The software consists of University of Maryland's Time Demon, "ntpd,"
|
|
which implements the Network Time Protocol and synchronizes the host
|
|
computer to Coordinated Universal Time, the international time
|
|
standard. The software can be operated with or without a Time Source
|
|
radio receiver sold by Precision ST. Without an external time
|
|
standard, however, no provision exists to correct inaccuracies caused
|
|
by the drift of computer calendar clocks or by errors introduced in
|
|
manual clock setting.
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES:::::::::::::::::::::
|
|
|
|
// Callers Must be Told the Cost //
|
|
|
|
The FCC yesterday ordered 5 companies that charge customers 20% to 80%
|
|
more than AT&T, MCI or Sprint to toe the line. The alternative
|
|
operators must now tell callers how much the call will cost and which
|
|
company is placing it before it goes through. The high rates usually
|
|
are placed on hotel, airport or hospital phones.
|
|
|
|
:: UPDATE ::
|
|
|
|
As stated above, alternative long-distance operators must: Put a
|
|
sticker on the phone with price information or tell the caller the
|
|
price verbally; give callers an chance to hang up without any charge;
|
|
offer callers a chance to go through AT&T or another phone service.
|
|
Right now many alternative operators stop you from using another
|
|
carrier.
|
|
_____________________________________________________________
|
|
|
|
// Bell Goes To College //
|
|
|
|
Bell Atlanticom Systems said yesterday it has signed a contract with
|
|
the College of William and Mary in Williamsburg, Va., for a fully
|
|
integrated voice and data communications system. The campus-wide system
|
|
will provide resale of communications services to students, a
|
|
management system, and a universal wiring plan to provide voice and
|
|
data transmission.
|
|
|
|
The communications system obtained by the College of William and Mary
|
|
yesterday will provide 300 trunks, 3,800 faculty and student lines, 150
|
|
voice/data faculty users and 1,050 host data ports. It includes more
|
|
than 5,000 inside wiring runs and several miles of fiber optics. Also
|
|
included: A 1,000- user Aspen Voice Mail System and the Alex-IS
|
|
Telecommunications Management System.
|
|
_____________________________________________________________
|
|
|
|
// Hackers Fail Raiding ATMs // TSR
|
|
|
|
If authorities hadn't been tipped, a computer hackers could have
|
|
cracked one cash-machine network of more than 14$ million over a single
|
|
weekend, of Feb. 18. Charged in the plot were GTE Corp. consultant
|
|
Mark Koenig, and 4 other hackers. Federal Agents said the hackers
|
|
pulled the personal ATM codes from GTE telephone lines. The lines
|
|
transmit transactions from account at Bank of America and thousands of
|
|
other banks linked to the Plus System, a national network of shared
|
|
ATMs.
|
|
|
|
The Hackers put the data in magnetic strips on 5,500 pieces of card
|
|
board. They planned to use the bogus cards to make withdrawals around
|
|
the country. If it were not for a "TIPOFF", authorities wouldn't have
|
|
known what hit them.
|
|
|
|
[ Now this is a sad story. These -hackers- have a chance to break 14
|
|
MILLION in tax-free cash, and they blow it. I bet one of them bragged
|
|
about it to a girl friend. That's the only way computer hackers get
|
|
caught...they have to see some limelight. ] --TS
|
|
|
|
::::::::: Information provided by John "Scij" / 612 :::::::::
|
|
_____________________________________________________________
|
|
|
|
// Speaking of ATM Heists... //
|
|
|
|
Recently, a crook used a Security Pacific National Bank ATM master
|
|
card, which tapped into virtually all accounts. The heist resulted in
|
|
a 237,000$ win for the hacker. The bank reimbursed depositors but
|
|
still have not found the culprit. Alarmed by the incident, the
|
|
American Bankers Assoc. plans to urge its 13,500 members to strictly
|
|
limit access to ATM master cards and personal indentification codes.
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
:::::::::::::::::::::::: TSR "Quote of the Month" :::::::::::::::::::::
|
|
|
|
"They [Hackers] have this need to find the answer."
|
|
|
|
To subscribe to the 2600 Magazine send 15$ to:
|
|
2600 Magazine
|
|
P.O. BOX 752
|
|
Middle Island N.Y. 11953
|
|
|
|
--Corley, Editor 2600 Magazine
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
TSR will accept additional sponsor/support Systems. If you have a
|
|
certain interest in the Report, and wish to provide support to TSR --
|
|
Leave your BBS number -- and any other information on RADIO WAVES
|
|
Bulletin Board Systems.
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
Pheonix Proj. LODH :: 512-441-3088 ----- Lunatic Labs :: 415-278-7421
|
|
At Login: Any UNIX Default PW P/H System
|
|
|
|
Tiamats Temple Pvt :: 612-731-0296 ----- Hack Shack @ :: 214-422-4307
|
|
P/H-Files BBS Login: Any UNIX Default Pass
|
|
|
|
RADIO WAVES System :: 612-471-0060
|
|
- Syndicate Report Support BBS -
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
This concludes this Transmittal No. 21
|
|
(Part 2 of 2)
|
|
|
|
Released March 2nd, 1989
|
|
|
|
by The Sensei
|
|
Editor of The Syndicate Report
|
|
|
|
_______________________________________________________________________
|
|
_______________________________________________________________________
|
|
|
|
-= EOF =-
|
|
|
|
|