home *** CD-ROM | disk | FTP | other *** search
-
- ____________________________________________________________________________
- ____________________________________________________________________________
- THE SYNDICATE REPORT
- Information Transmittal No. 20
- (Part 1 of 1)
- Released January 31, 1989
- Featuring:
- Editor's Note
- Telenet / PC Pursuit Price Hike
- Phone Fraud Techniques
- Information Age Attacks
- Unix Hacker Caught at LLNL
- Briefs notes from The Report
- Vocabulary Tonic
- by The Sensei
- Editor Syndicate Report Magazine
- ____________________________________________________________________________
- ____________________________________________________________________________
- EXPOSITION: TSR
- Once again, The Report accepts outside sources. Anybody can write/provide
- information to The Syndicate Report. Articles/Information may be provided
- through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
- Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
- on any the previous mentioned specialties will be: accepted, labeled, and
- given full actual credit to the article/info provider(s), or writer(s). --
- ** All articles have been presented by me unless shown at the end of the
- article as the information provider(s), or writer(s). **
- ____________________________________________________________________________
- ____________________________________________________________________________
- EDITOR'S NOTE: TSR
- A New-Year is upon us, 1989. The final year of the decade. Only
- ten more and we turn over another Century. Just think, only a few decades back
- the World had no wonderful high speed Computers, no means of Telecommunications
- via Computer, and not even a fraction of the amount of data being exchange over
- systems - a few decades back. Technology will have multiplied 4 times by the
- year 2000. I for one feel like I'm still in the Dark Ages. I'd like to be
- born around the year 2100 or 2150. Around that time, computers will be as
- common as the person - and probably more valuable to an extent.
- One bad point though: Phreaking and Hacking in the year 2100 would be
- in toto termination. In other words, suicide. Hackers, Crackers, Breakers,
- Phreakers, Terrorists - whatever you want to call'em are already talking about
- the end of phreaking and hacking. It's just a matter of time.
- You know what I really get tired of hearing? Bad news about 2 things.
- 1) The United States falling apart, and 2) Phreak/Hack world crumbling. And
- WHAT did I just report as an opinion?
- "The end of the Phreak/Hack soon." I've tried to turned myself away from
- writing depressing editorial opinions, but I've learned its basically
- impossible! Something that I never find myself writing, something like:
- "Hackers/Phreaks break into Government Bank and get rich...no suspects have
- been found." I'm babbling here, I'll have to edit half of this out... On
- with the Report #20.
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- TELENET / PCP PURSUIT PRICE HIKE: TSR (pc!p 1\2)
- This bit of news is probably all over the nation by now, but PCP is
- hanging itself - trying to get users to pay more $$ CASH. Here's a transcript
- from the 'C PURSUIT' Telenet accessible PCP Line:
- Here is a summary of the price change:
- o Monthly Charge. The new fixed charge is $30 per month.
- o Cap on Free Usage. Your $30 per month will now pay for up
- to 30 monthly hours of non-prime time usage. Using the full
- 30 hours in one month amounts to an hourly rate of only
- $1.00 -- more than 85% less than you would pay with the most
- popular long distance discount service. Only a small
- fraction of you will even be affected by this cap.
- o Over Cap Rate. Non-prime time usage, above the 30 hour cap,
- will be billed at $4.50 per hour, which is about half of the
- next lowest rate in the market place.
- o Second Tier Rates. There will be a second level of rates
- for those who use the service at business levels. When your
- total monthly usage exceeds 60 hours, both prime time and
- non-prime time rates will increase for those hours in excess
- of 60, as follows:
- PRIME TIME 2nd tier rate: $ 14.00 /hr
- Non-Prime 2nd tier rate: $ 7.50 /hr
- ....other changes are included, although the information is
- changing a lot - log into the PCP Via telenet to check all
- the latest info.
- The new pricing scheme goes into effect May. 1st, raises the monthly PC
- Pursuit charge to 30$, with a limit of 30 hours of service per month for
- that price, according to Peter Naleszkiewicz, Telenet's product manager
- for outdial services. After 30 hours, the cost of service rises to 4.50$
- per hour, with another jump to $7.50 per hour coming at 60 hours per
- month.
- A Note from Mr. Naleszkiewicz
- "The service was far more popular that we ever expected it to be,"
- Naleszkiewicz said. "Thirty hours per month is significantly more than the
- average use of the service, so most users will see only a five dollar per
- month increase. But it's not the average PC Pursuit user that concerns
- Telenet, according to Phil Sih, prez of Portal Communications CO. of
- Cupertino, Calif. "We have a population of heavy Pursuit users on out 10$
- per month online service," Sih said. "Some of these people are using
- Pursuit 200 to 300 hours per month. You didn't have to be a rocket
- scientist to see this change coming."
-
- ::::::::::::::::: Information Provided by KM / 'C Pursuit' :::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- PHONE FRAUD TECHNIQUES:
- TSR (usr 1\3)
-
- %&%&%&%&%&%&%&%&%&%&%&%&%
- %Phone Fraud, Part III%
- %&%&%&%&%&%&%&%&%&&&%&%&%
-
- Well in Part Three, I will discuss a part of phone fraud you
- very rarely see used, The Outside line, How you can get it and where.
- A very interesting thing I ran upon when I was hacking around
- on a PBX. I thought, How easy would it be to get a operator to
- give you an outside line from a hospital. In fact, I found it to be
- very simple, this is what ya do:
- You call your nearest hospital and when the switchboard
- operator answers ask her to send you to Radiology, (Doesn't really
- matter ask for any department) And when the department you asked for
- answers, tell them that you have made a mistake and that you would
- like to be transferred to the switchboard. You then will get sent
- back to the main switchboard but this time once the operator
- answers say, "Yes, This is Dr. Jones, I'm having trouble getting
- an outside line, Could give me an outside line please". Then most
- likely you will hear a Dial Tone! Now you can screw everything
- up and call Alliance, or anything your heart desires.
- The reason must call and get transferred to a different department
- before asking for the outside line is that if you just
- call up and ask for an outside line, the operator will see that
- your are on a Incoming Trunk, (If you don't know what that means,
- she'll simply tell you thatyour not in the hospital, but outside)
- But you see, once you get transferred, then again transferred back
- it looks like you're inside the hospital - so, it's more of a good
- chance of getting the outside line.
- I hope this File helps you out. Direct all questions to TSR #21/TS
- ::::::::::::::::::: Information Written by The Synergist :::::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- INFORMATION AGE ATTACKS: TSR (fbs 1\30)
- Solicitors hit you at night with so many phone solicitations that you
- shelled out the extra bucks for an unlisted numbers, among other annoying
- reasons. Then they got through with random dialers. So you bought an
- answering machine. And now they've invaded your computer and your fax machine
- with junk mail. Is there no peace?
- This is the information age that the futurists talked about, the day
- when telephone technology, fax machines and electronic mail would make
- communications cheap and plentiful. Too plentiful. Says Lotus Corp.,:
- "It's a well-known phenomenon in large corporations that when you come back
- from a long weekend you'll find 50 pieces of electronic mail in your mailbox,
- spend hours going though it, and end up with most of it being stuff you don't
- want to see." LOTUS protects itself at home and with an unpublished telephone
- number, and opts for a public electronic mail address for his computer. Yet
- the unwanted messages still come through.
- WITH THIS, we have what could perhaps be called as a "War of Access",
- fought on the battleground of chips and software. Everyone, it seems, is
- screaming for your attention. Among the callers' weapons are electronic white
- pages, power dialers that can do 20k calls a day, and systems that hunt down
- unpublished fax numbers. Defensive strategies? These include PBX switchboards
- with software to route unwanted calls into answering machines and call blockers
- that reject calls from specific unwanted numbers. Tomorrow's strategies will
- include software that filters out sales pitches from electronic mail by looking
- for telltale words like "insurance" and "financial planner."
- While senders are spending more to reach out, some receivers are
- spending more not to be touched. Survey Sampling, a Fairfield, Conn researched
- firm, says 28% of all U.S. household have an unlisted number. LA is 56%
- unlisted. NEW JERSEY BELL, which already charges customers $12.50 a year for
- the privilege of not having their numbers published, is offering another
- defense this year, CALLER ID, in some parts of its territory. For 78.00$ a
- year plus a onetime charge of 60.00$ for a readout device, a residential
- customer sees the number of the caller when his phone rings. If he recognizes
- the number, he pickes up; if he doesn't, he might ignore the call or maybe let
- an answering machine get it. Then again, he can send it to the police or the
- Bell company to follow up annoying charges. This privilege, CLID, is fast
- sweeping the country...and becoming a necessity for prank/obscene phone
- calls. The Northern Bell is next in line for the feature.
- ____________________________________________________________________________
- ____________________________________________________________________________
- UNIX HACKER CAUGHT AT LLNL: TSR (i.w 1\15)
- A remote caller who had repeatedly broken through the network security
- at Lawrence Livermore National Laboratories has been detected and contacted by
- LLNL officials.
- The vulnerability of Unix networks to unauthorized intrusions has become
- a serious concern at the federal level, where a number of agencies are trying
- to standardize upon the use of Unix-based networks. The concern has prompted
- the establishment of a national crisis center for network break-ins, called the
- Computer Emergency Response Team.
- According to an LLNL document obtained by TSR, the most recent LLNL
- intruder gained access to the system by way of Internet computers at the
- University of Washington and Stanford University. Because of the remote
- accessibility of these computers through e Internet, however, it is possible
- that these computers were not the point of origin. Once the intruder gained
- access to the LLNL computers, he achieved "superuser" status, which permitted
- access to every nonclassified file at LLNL, the document states.
- This opportunity could have resulted in widespread destruction of
- unclassified data, but no files are known to have been damaged, according to
- officials. The intruder used a "cracker's dictionary" to obtain a small list
- of old and existing passwords, the document states. He also created the
- capability to reenter the system by giving himself an account number and his
- own password to make it appear that he was a legitimate user.
- "Our security people have been in touch with the intruder, and we have
- been assured that there will be no further intrusions from that source," said
- Ron Teunis, an LLNL spokesman. Teunis also said the matter had been turned
- over to the FBI for further investigation, and the intruder could be prosecuted
- for federal computer-security laws. Officials at LLNL said that fixes have
- been created to guard against the particular methods used in the Dec 3rd to 10
- intrusions.
- The intruder had broken into the unclassified portion of LLNL's node of
- the Internet system on at least 10 occasions between December 3 and 10,
- according to a document released by LLNL. The intruder exploited one of the
- known weaknesses in the Unix systems running on many LLNL's computers.
- ::::::::::::::::::::: Information by The Sensei / TSR ::::::::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- ::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
- ... TID BITS ON BELL ...
- // Bell Atlantic Offers Email //
- Bell Atlantic and Telenet Com Corp., the US Sprint data communications
- company, have announced a strategic alliance that enables Bell Atlantic to
- enter the email business, pending regulatory approval by the FCC. The
- agreement is the first between a regional Bell operating co and an enhanced
- service provider for email service, and capitalizes on the ability of local
- exchange carriers to provide information services. Until recently, telephone
- companies subject to the Modified Final Judgment, the consent decree that
- resulted in the break-up of AT&T, were not allowed to provide such services.
- _____________________________________________________________
-
- // AT&T, BellSouth Offer Cable TV //
- AT&T and BellSouth Corp. will be ushers, of sorts, for callers who want to
- order specific pay-per-view cable TV programs, reports Communications Week.
- The companies will use their respective equipment to furnish order-taking
- services for special pay-per-view cable broadcasts, such as first-run movies or
- livesporting events. Normally, cable TV phone operators handle the requests.
- _____________________________________________________________
-
- // Phone Co's Reaching Overseas //
- The lure of overseas cable investments continues to draw the interest of U.S.
- cable operators and an increasing number of telephone companies. BellSouth, Bell
- Atlantic and GTE are on the prowl for foreign cable holdings, Broadcasting
- magazine says. Pacific Telesis and US West already have United Kingdom holdings.
-
- ::::::::::::::::::Information Provided by Delta #5 / 606 ::::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- ::::::::::::::::::::::::::::::VOCABULARY TONIC::::::::::::::::::::::::::::::
- This is the second in a series of Vocabulary Tonic sections. I decided
- to do this for a few reasons.
-
- 1) If a person has an extensive vocabulary,there are practically no limits to
- what he/she can learn.
- 2) It's a nice idea from a Technical. book I read occasionally. And lastly,
- 4) It gives The Report a bit more spice. The acronyms/words presented will
- relate to Telecommunications in one way or another, and only telcom. An
- average of 15 acronyms/words will appear monthly - along with The Report.
-
- ISDN - Integrated Services Digital Network: A planned hierarchy of digital
- switching and transmission systems. Final phase of modern day switches.
- AIS - Automatic Intercept System: System employing an audio-response unit
- under control of a processor to automatically provide pertinent info to
- callers routed to intercept.
- ESB - Emergency Service Bureau: A centralized agency to which 911 "Universal"
- emergency calls are routed.
- ADU - Automatic Dialing Unix: A device which automatically generates a
- predetermined set of dialing digits.
- FACS - Facility Assignment and Control System: Mechanizes the service order
- assignment process.
- CAROT- Centralized Automatic Reporting on Trunks: This takes transmission and
- trunk measurements. Does routine tests and forwards results to work
- control locations.
- TASC - Telecommunications Alarm Surveillance and Control: Provides centralized
- surveillance of telecom equipment.
-
- EC - Exchange Carrier: A company engaged in the business of furnishing
- access service in a franchised territory. (ie; US Sprint, MCI, AT&T)
- AC - Access Code: A uniform set digit code assigned by an Exchange Carrier
- to an individual customer.
- Gateway - A network element that permits communication between two
- organizationally or technically dissimilar networks.
- PJ - Phrase Jitter: The unwanted phase variations of a signal. Garble, or
- Garbage online.
- 3TS - 3-Tone Slope: The difference in loss between 1004 Hz and 404 Hz and
- 2804 Hz (AKA Attenuation Distortion).
- PAD - Packet Assembler/Disassembler: Information passed though an Information
- Service, translated to the computer's specifications. (ie; baud
- differences, computer emulations, and protocol handshaking).
- ____________________________________________________________________________
- ____________________________________________________________________________
- TSR will accept additional sponsor/support Systems. If you have a certain
- interest in the Report, and wish to provide support to TSR -- Leave your BBS
- number -- also any other information on RADIO WAVES Bulletin Board System.
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- The End System TSR :: 915-821-1856 --------- Lunatic Labs :: 415-278-7421
- At Login: Any UNIX Default PW P/H System
-
- PlaydoLand Systems :: 612-522-3959 --------- The Outlet @ :: 313-261-6141
- P/H-Files BBS Private P/H Newuser:Kenwood
-
- Radio Waves System :: 612-471-0060
-
-
- * #1 Syndicate Support BBS *
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- This concludes this Transmittal No. 20
- (Part 1 of 1)
- Released January 31st, 1989
- by The Sensei
- Editor of The Syndicate Report
- ____________________________________________________________________________
- ____________________________________________________________________________
- THE SYNDICATE REPORT
- Information Transmittal No. 20
- (Part 2 of 2)
- Released January 31, 1989
- Featuring:
- Editor's Note
- How to Tap Fiber-Optic Cable
- Toll Fraud Literally on the Home
- Cracker's Love a Challenge
- Modems Annexed, ISDN In
- Briefs notes from The Report
- "CLID Going National"
- by The Sensei
- Editor Syndicate Report Magazine
- ____________________________________________________________________________
- ____________________________________________________________________________
- EXPOSITION:
- TSR
- Once again, The Report accepts outside sources. Anybody can write/provide
- information to The Syndicate Report. Articles/Information may be provided
- through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
- Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
- on any the previous mentioned specialties will be: accepted, labeled, and
- given full actual credit to the article/info provider(s), or writer(s). --
- ** All articles have been presented by me unless shown at the end of the
- article as the information provider(s), or writer(s). **
- ____________________________________________________________________________
- ____________________________________________________________________________
- HOW TO TAP FIBER-OPTIC CABLE: TSR (i.w 1\21)
-
- Fiber Optic networks, long touted for their immunity from snooping by
- foreign governments or local competitors, no longer offer the total security
- they once did, according to the experts who say that, given enough resources,
- any network can now be tapped.
- "Five years ago, I would have said that FO networks were totally secure,
- but that's no longer true," stated Northern Telecom. According to Northern
- Telecom, tapping a FO cable requires stripping the cable's plastic outer
- sheathing and gaining access to the glass fibers within. "When we enter a
- fiber bundle, we have instruments that detect whether a given fiber is carrying
- a signal before we cut it," North Telecom stated. "A tap could be
- accomplished in much the same way."
- Tapping an optical fiber relies on a macrobending effect. Bending a
- fiber 180 degrees around an 1/8-inch radius forces the contained light signal
- to go around a tighter bend than it's capable of traversing without some loss
- of light. This light loss can be detected and, given the right equipment,
- demultiplexed and decoded.
- "Our test instruments that clamps on the fiber show the escaping signal
- has a 30-dB dynamic range," Telecom said. "That's a signal level a thousand
- times stronger than background noise and easily capable of being demultiplexed.
- It's not an easy task, but it can be done."
- Given the reality that fiber can be tapped, Telecom said one security
- effort could be to detect the 3-dB signal loss on the fiber bundle that would
- typically accompany such a tapping. "Most fiber systems have a 10-dB window
- before an alarm sounds, so you either have to preattenuate the system so that a
- 3-dB loss causes the alarm to sound or get some finer method of measurement."
- Other security measures suggested by Telecom include the use of air-core
- cables, which have pressurized air inside them. "If they cut through the cable
- to get to the fiber, air pressure is lost and an alarm sounds," Telecom says.
- Even steel or iron pipes ought to be pressurized for true security, and anyone
- who goes to the trouble of tapping fiber isn't going to be deterred by a little
- iron."
- There is a significant security advantage to fiber over other media,
- according to Northern Telecom. With coax (Coaxial Cable), or twisted pair
- (Normal Tele-lines), you can take the signals right out of the air. Sure you
- can tap a fiber-optic cable, but it's hard to do and fairly easy detected.
- First the bad guys have to get to the cable, which is usually in a secure run,
- and then they have to get the data, which is nearly always encrypted.
- ____________________________________________________________________________
- ____________________________________________________________________________
- TOLL FRAUD LITERALLY ON THE HOME: TSR (z.b 1\25)
- According to Dennis E. Love, a northern California inventor and
- entrepreneur, telephone utility companies throughout the United States are
- unwittingly promoting telephone toll fraud by installing a new telephone line
- demarcation device on all new construction and every time a service is made.
- Love said the new device has an easily accessible standard phone jack
- that is located on the outside of the home and provides the opportunity for
- anyone to plug in a standard telephone and make calls that would be charged to
- the phone bill of the person whose phone line was attached to the new device.
- Love said he has evidence that this toll fraud is already occurring in
- California and that Pacific Bell, California's largest phone utility, is
- attempting to minimize the situation by denying that the problem exists.
- It should be noted that by California law, it is not against the law to
- engage in this toll fraud activity. If a person engaging in toll fraud were
- caught red-handed, he could only be charged with trespassing, even if the cost
- of the phone call was as great as that amount set to delineate grand theft.
- the only recourse for the victim would be a civil suit.
- Love said the whole thing started when the Federal Communications
- Commission deregulated portions of the telephone industry and broke up AT&T.
- At that time the FCC ruled that the first standard phone jack would serve as
- the demarcation point separating customer and phone utility responsibility.
- The device that the phone utilities are using, and that has been
- installed on about 400,000 homes in California to date, is manufactured by
- SIECOR U.S.A. and has a standard modular jack that serves as the first
- modular jack in the house. Unfortunately, it also provides a convenient way
- to commit telephone toll fraud.
- The FCC said that the SIECOR device submitted to the FCC meets the
- required specifications. The California Public Utilities Commission (CPUC),
- ordered Pacific Bell to go ahead with the SIECOR device. At that time the
- CPUC had not considered the toll fraud issue in making that order.
- Love said he has developed a device, the Station Release Breaker, or SRB,
- which satisfies all of the FCC requirements. In addition, it is well
- protected from the weather and does not allow for toll fraud.
- Love said he presented his device to the CPUC but has been waiting for
- over two years for a decision while the SIECOR device is being installed at an
- alarming rate.
- Love is currently forming a nationwide coalition, among consumer advocacy
- groups, against the installation of any device that uses a modular jack
- accessible to anyone that desires to use it.
- TURN, a San Francisco-based consumer group headed by Silvia Siegle, has
- thrown their support in Love's corner, as has UCAN, a San Diego-based consumer
- group headed by Mike Shames.
-
- In an effort to save the phone customers astronomical costs in toll fraud
- as well as the $1.1 billion that it will cost to retrofit the state of
- Calif., Love and his new-found supporters intend to file an emergency motion
- with the CPUC enjoining Pacific, General, and other utilities in the state
- from further installation of this "bothersome jack" until a decision is
- reached by the CPUC on the toll fraud issues.
- Love said it is not important to him that his device be the one used but
- that some device that allows the customers to test, diagnose, and re-establish
- their own phone service without the encouragement of toll fraud be approved.
- Love asked, "What would it be like to have every home in America with a jack
- on the outside so that whoever desired to do so could walk right up and plug
- in? Think about it."
-
- ::::::::::::::: Information provided by Euclidean Wave / 415 :::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- CRACKER'S LOVE A CHALLENGE: TSR (i.w 1\28)
- The only truly secure network is on that's locked up and physically
- isolated from the rest of the world. Short of that, "network security" becomes
- a relative term rather than an absolute one -- trading off the advantage of
- security against the problems it brings. In some cases, organizations
- deliberately limit the amount of system security, saying that having too much
- security simply sets up a challenge for hackers.
- The organizations most likely to use such a minimalist approach are
- universities. Universities have a large number of hackers as users -- the type
- of user most likely to look upon breaking through a security system as a
- problem to be solved, without malicious intent. And universities are dedicated
- to spreading information and thus have a philosophical difficulty with keeping
- it locked up. While such openness is less common in a nonacademic environment,
- it nevertheless exists. "Anyone in the world can dial in and get on my
- system," David Parks (AKA) Tom E Hawk who runs four BBS's California.
- "The more open my systems have been, the fewer problems I've had with hackers."
- ____________________________________________________________________________
- ____________________________________________________________________________
- MODEMS ANNEXED, ISDN IN: TSR (fbs 1\30)
-
- When Dennis Hayes started his Atlanta-based HayesMicrocomputer Products
- in 1977 on a borrowed dining room table, the future seemed boundless. Hayes
- and his partner, Dale Heatherington, spent their evenings soldering together
- personal computer modems -- devices that allow computers to communicate via
- telephone lines. By 1984 privately held Hayes Microcomputer Products was
- commanding 55% of the personal computer modem market, with sales of more than
- 100$ million. The expression "Hayes compatible" is now as standard in the PC
- modem as "IBM compatible" in the PC business.
- Hayes didn't invent modems. They date back to the '60s, as complicated,
- cranky devices that had to be taken apart and rewire every time their phone
- numbers and software changed. Hayes, who started his career installing these
- models all over rural Georgia for electric utility cooperatives, knew he could
- do better. He changed data communications forever by giving users the ability
- to control a modem with their software instead of a screwdriver.
- What about the danger that the so-called Integrated Services Digital
- Network (ISDN) will obviate the need for modems? Hayes swears he isn't going
- to sit back and watch modems turn into the buggy whips of the 21st Century.
- Instead, he is working on an ISDN circuit board that will plug into a PC,
- enabling it to support a telephone call, data communications and video
- transmission all at the same time. Explains Hayes: "Soon a modem will come to
- mean any device which connects a computer to the phone line - analog or
- digital." And he expects to remain "king of modems" in the broader sense, as
- he did of modems in the narrower sense.
- :::::::::::::::::: Information provided by The Teknition :::::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- THOMAS COVENANT CRACKED BY THE FEDERAL COMPUTER CRIME UNIT:
- Recently, about 3 weeks ago, the infamous Thomas Covenant was cracked by
- the FBI Computer Crime Unit. Apparently,the FBI caught TC completely off
- guard, thus found some sensitive information including: Hacking documents,
- PW's and Accounts, and other lists of information.
- In response, Digital Logic's Data Service and Phoenix Project will down
- for approximately 1-2 months to wait for the scene to blow over. The Ronz, who
- is another witnessed hacker, tells that Digital Data Logic Service (DLDS) has
- been packed up and buried inside of a Nuclear Waste Dumping Ground.
- As for Phoenix Project, its been taken down, but TSR is not sure of the
- total details. Anyways, it is hoped that this bust won't take too many systems
- down. From what The Ronz says, the FBI and "other" government agencies are
- going on a mass crackdown (as usual) in late January, which happens to be
- happening now according to sources. So far nothing has happened to TC, but
- only time will tell...
- -- UPDATE! ON TC BUST --
- Well about the Thomas Covenant bust, the whole ordeal is featured in
- Phrack Issue #23. Thisis the current story...
- TC was busted boxing (wire tapping) on his junction box in his apartment
- basement. He hooked into a certain line and, and he over heard a guy arguing
- with his wife. Unfortunately, this guy was a dangerous NSA (National Security
- Agency) employee. The NSA Agent had a measurable amount of equipment on his
- line to detect if it was being tapped. The NSA Agent prompted the police to
- catch Thomas Covenant in the fraudulent act. In turn, the cops turned upside
- down his apartment and seized PW files and other unknown bits of information.
- ____________________________________________________________________________
- ____________________________________________________________________________
- THE WASP - BUSTED BY FEDS
- The WASP- who was hacking government computers (Defense related items) was
- caught by a line trace. The Federal Agents picked him up along with some
- highly illegal information. The Feds were also are looking for LOD namely Lex
- Luthor, and Phase Jitter relating to the bust. Lex talked with the Feds
- via code, and the air was cleared with the Feds, and with LOD.
- :::::::::::::::: Source on Busts by Professor Falken / 612 :::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- ::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
- ... TID BITS ON BELL ...
-
- // Service Tells 'Who is Ringin' // New Jersey Bell Telephone
- has decided to offer a service that will allow customers to determine if a
- phone call is for them - without picking up the phone. How to know: Different
- ring patterns. The service may start next month. Monthly fee: $4.50 for homes,
- 6.50$ for offices.
- _____________________________________________________________
- // Service Helps Social Security //
- MCI has created an 800 toll-free number program to help the Social Security
- Administration add about 6 million more beneficiaries by the 21st century. IN
- magazine says the MCI Advanced 800 Service and Menu Routing Service will take
- an estimated 50 million calls this year from people in the USA and Canada.
- _____________________________________________________________
-
- // New Jersey Bell - CLID //
- New Jersey Bell is introducing Caller ID, CLID, which produces an output of
- the callers Telephone Number on LCD Screens. The customer may block out phone
- prankers or annoying advertisers via CLID. The callers get a central-office
- recording telling them to buzz off. Currently 6 calls maybe blocked at one
- time only, with a price. If a 60.00$ device can capture phone number data from
- the phone line for display, another device could sit between a telephone line
- and a personal computer, trapping and storing incoming phone numbers.
- Both NJ Bell, and Nynex offer are offering the services nationally.
- ::::::::::::: Information provided by The Sensei ::::::::::::
- _____________________________________________________________
- // Frequent Fliers Phone Flagging //
- An MCI-Northwest Airlines promotion started last September "has met and
- exceeded our expectations," says MCI's Brian Thompson. MCI and Northwest
- offered frequent fliers one mile for every $1 of calls. But other long-
- distance companies aren't rushing in. Sprint says the company is looking into
- the idea. AT&T says it has no plans for a similar program.
-
- ____________________________________________________________________________
- ____________________________________________________________________________
- :::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::
- "Watch that 'sed' editor - it can invoke a chain reaction"
- - SysAdmin, New York
- ____________________________________________________________________________
- ____________________________________________________________________________
- TSR will accept additional sponsor/support Systems. If you have a certain
- interest in the Report, and wish to provide support to TSR -- Leave your BBS
- number -- also any other information on RADIO WAVES Bulletin Board System.
- ____________________________________________________________________________
- ____________________________________________________________________________
- The End System TSR :: 915-821-1856 --------- Lunatic Labs :: 415-278-7421
- At Login: Any UNIX Default PW P/H System
-
- PlaydoLand Systems :: 612-522-3959 --------- The Outlet @ :: 313-261-6141
- P/H-Files BBS Private P/H Newuser:Kenwood
-
- Radio Waves System :: 612-471-0060
- * #1 Syndicate Support BBS *
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- This concludes this Transmittal No. 20
- (Part 2 of 2)
- Released January 31st, 1989
- by The Sensei
- Editor of The Syndicate Report
- ____________________________________________________________________________
- ____________________________________________________________________________
-