home *** CD-ROM | disk | FTP | other *** search
- ___________________________________________________________________________
- THE SYNDICATE REPORT
- Information Transmittal No. 21
- (Part 1 of 2)
- Released March 2, 1989
- Featuring:
- Editor's Note
- "PCP Hacking Statistics"
- AT&T Works on Making Unix Less Vulnerable
- MCI Mail Rates and Info Change
- AT&T Bellcore & Tiniest Semiconductors Ever
- Common Unix Passwords
- Briefs notes from The Report
- Vocabulary Tonic
- by The Sensei
- Editor Syndicate Report Magazine
- ___________________________________________________________________________
- ___________________________________________________________________________
- EXPOSITION: TSR
- Once again, The Report accepts outside sources. Anybody can write/provide
- information to The Syndicate Report. Articles/Information may be provided
- through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
- Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
- on any the previous mentioned specialties will be: accepted, labeled, and
- given full actual credit to the article/info provider(s), or writer(s). --
- ** All articles have been presented by me unless shown at the end of the
- article as the information provider(s), or writer(s). **
- ___________________________________________________________________________
- ___________________________________________________________________________
- EDITOR'S NOTE: TSR
- " PC PURSUIT HACKING STATISTICS "
- PCP password hackers are welcome tools for virtually all types of
- users: Phreaks, Pirates, Terrorists, system Hackers, etc. PCP has become the
- perfect way to dial long distance with low error ratios, flexibility with ID
- codes/passwords used on other networks and most importantly, safety.
- Telenet is because of the huge number of calls that are handled every day by
- the big networks, keeping track of where every call and connection is made from
- is financially impractical. It is also very easy to disguise your location
- using the network, which makes dial LD even more secure.
- As time and technology interface, code abusing slowly becomes past-time
- reminiscence for busted hackers. In response, PCP becomes the only resource
- for paranoid hackers, alike. Along these lines of paranoia, the need for PCP
- password hackers increases.
- After all the years that PCP has existed, I've only seen 5 PCP password
- hackers. And of the 5 hackers, 3 of these devices were totally useless for
- obvious reasons, upon execution...
- Some of the obviousproblems indicated : No online modem configuring.
- Incomplete documention & Technical Information.
- These apply to the anti-user friendly hacks.
- Inaccurate response detecting positive completion of
- passwords.
- Ineffective random variable password generating.
- ...and with all beta programs -- minor bugs.
- With this in mind, I'd like to add some PCP Statistics. PCP
- ID's andPasswords are not easy to get. Format area: PCP12345 and ABCD6789.
- The first thing a hacker considers when using a hacker is, what? PCP ID to
- use. Most are between 10,000 and 40,000. I have never seen an ID over 40,000.
- PCP doesn't disclose annual PCP profits, nor the number of subscribers they
- currently have. Although the number by many hackers is approximated around
- 5,000 to 6,000. Keep in mind that businesses use PCP accounts too, in case
- your criticizing that you've never seen 5,500 subscribing hackers. Therefore,
- the change of gaining a valid ID are significantly good.
- Of course, the PCP IDs do not bug hackers. The complexed password scheme
- is the brain parasite. First there is the 4 random letters, then the 4 random
- numbers - joined. In essence, what a hacker is dealing with is 2 passwords
- beyond 1. The LETTERS, and the NUMBERS must match up - not the entire string
- as a whole since the letters stop after 4, then take on an entire new syntax.
- I've seen some passwords that had numbers in the letter positions, and
- vise verse for the letters. Majority however stay in the above listed format.
- If interested in a PC Pursuit password hacker, consider using Phry Code
- Pro., by The Exciter / 612. Latest version can be found on RADIO WAVES.
- ;The Sensei / Editor TSR
- ___________________________________________________________________________
- ___________________________________________________________________________
-
- AT&T WORKS ON MAKING UNIX LESS VULNERABLE:
- TSR (iw 2\11)
- Enhanced security features are being developed for Unix System V.4.1.
- AT&T's vice president stated. His keynotes to the Usenix Tech. Conference in
- California insisted that open, multivendor networks are not centrally more
- susceptible to security violations than proprietary systems.
- Security is on the mind of every Unix user, particularly when Unix-based
- systems are to be used for mission-critical and strategic applications, like
- running a high end workstation.
-
- The new version, on Unix, will achieve the National Security Agency's B2
- level of security, and will actually also have some features of the B3 level as
- well. Powerful security tools exist in the current version of Unix V, but have
- often gone unused by administrators because of a lack of quality documentation
- and training. AT&T will also be adding surreal security features to System
- V.4.1., the first revision of the sill unreleased system V.4.0.
- Procrastination seems to be top priority for many software vendors - just look
- at Lotus. Well, Unix won't be very welcome for the Hacking Community, and
- myself.
- The features/improvements include:
- Access methodology beef up
- Maintenance of Data Integrity
- The denial of service
- Hacker/Intruder/Terrorist containments
- ...and the execution of the "superuser" status.
- About the "superuser" chop. This is the most popular status, especially
- for hackers, and AT&T takes it out. It did more good than bad in the long run.
- In its place will be a finer distinction in status. There will be a status of
- "superuser" that is only used for mounting the systems. That user will not be
- able to access other "superuser" privileges.
- Control of the front end of system access - password security - will be
- enhanced by the use of "shadow" password files. The files containing the
- password (etc/passwd) have been far to easy to access. So, restricted access
- to files, along with a form of activity audit, which will be used in System
- V.4.1. Actually, the greater sense within the system, including user and group
- IDs, aging information, and a command and log-in audit.
- Editor's suggestions:
- Keeping systems resources in locked rooms/shells, to prevent shaking
- of the shielding of shells/rooms, which can reveal information to external
- devices. AT&T should also use a dedicated printing resource to each high level
- of security - a printer on each label page? Well, that would code a lot of
-
- money, but LD services do it all the time, along with personal supervision.
- Then theres Fiber-Optics, and the security advantage there. As printed in THE
- SYNDICATE REPORT #20 (part 2), where an article explains the procedures in
- Tapping Fiber Optic cables. Then again, it's hard to break into a FO cable
- without bringing the system down, with a nice alarm response.
- :::::::::::::: Information written by The Sensei (TSR Editor) :::::::::::::
- ___________________________________________________________________________
- ___________________________________________________________________________
- MCI MAIL RATES AND INFO CHANGE: TSR (u.t 2\15)
- Beginning early February 1989 MCI Mail will LOWER the cost of Instant
- Messages and domestic Fax Dispatch. In addition, we will offer FREE 800
- Access, FREE Advanced Service and FREE Shared Lists. MCI's new retail prices
- are as follows:
- :: Instant Messages ::
- 0-500 Characters $ .45
- 501-2500 Characters $ .75
- 2501-7500 Characters $1.00
- Each Additional 7500 Characters $1.00
- :: Domestic Fax Dispatch ::
- First Half Page $ .50
- Each Additional Half Page $ .30
- :: Access ::
- 800 Access No Charge
- U.S. tymnet Access $ .25/ Per Minute
- International tymnet Access $ .30/ Per Minute
- :: MCI Mail's new 800 numbers will be ::
- Access Speed 800 Telephone Number
- 300, 1200 bps...........................800-234-MAIL
- 2400 bps............................... 800-456-MAIL
- Lotus Express & Desktop Express.........800-825-1515
- (up to 2400 bps)
- ____________________________________________________________________________
- ____________________________________________________________________________
- AT&T BELLCORE & TINIEST SEMICONDUCTORS EVER: TSR (b.w 2\27)
- As the transistors on computer chips steadily shrivel away toward
- nothingness, scientists are faced with a task much like figuring out how many
- atoms can dance on the head of a pin. Researchers as AT&T Bell Laboratories
- are closing in. They have devised a method of producing the tiniest
- semiconductor crystals ever: clusters containing as few as 100 atoms. They
- are so far too tiny to 'print' with even the wispiest microcircuit. Still,
- they may have practical applications.
- That's because a young polymer chemist, has developed a way to keep the
- clusters from combining into larger clumps, as they otherwise would do. He
- grows each microcrystal inside a minuscule water droplet a thousand times
- smaller than the diameter of a human hair, then replaces the water with organic
- molecu
-
- les. "It's like putting the cluster in a little plastic bad," he says.
- The clusters can be 'tuned' for specific jobs because they absorb different
- wavelengths of light as they decrease in size. So they could be used for
- optical switches in future "optoelectronic" chips.
- ____________________________________________________________________________
- ____________________________________________________________________________
- COMMON UNIX PASSWORDS: TSR (p.p 2\21)
-
-
- The subsequent list of words are a list of commonly used passwords, use on
- Unix computer systems. The list also contains syntax from the illustrious UNIX
- Internet Worm on November, 1988. Combine them into a favorable Unix Hacker.
- _____________________________________________________________
- :::::::::::::::::::::::::::::: Unix Passwords ::::::::::::::::::::::::::::::
- _____________________________________________________________
- aaa daniel jester rascal
- academia danny johnny really
- ada dave joseph rebecca
- adrian deb joshua remote
- aerobics debbie judith rick
- airplane deborah juggle reagan
- albany december julia robot
- albatross desperate kathleen robotics
- albert develop kermit rolex
- alex diet kernel ronald
- alexander digital knight rosebud
- algebra discovery lambda rosemary
- alias disney larry roses
- alpha dog lazarus ruben
- alphabet drought lee rules
- ama duncan leroy ruth
- amy easy lewis sal
- analog eatme light saxon
- anchor edges lisa scheme
- andy erenity angerine scott
- arrow elizabeth maggot sex
- arthur ellen magic shark
- asshole emerald malcolm sharon
- athena engine mark shit
- atmosphere engineer markus shiva
- bacchus enterprise marty shuttle
- badass enzyme marvin simon
- bailey euclid master simple
- banana evelyn maurice singer
- bandit extension merlin single
- banks fairway mets smile
- bass felicia michael smiles
- batman fender michelle smooch
- beauty fermat mike smother
- beaver finite minimum snatch
- beethoven flower minsky snoopy
- beloved foolproof mogul soap
- benz football moose socrates
- beowulf format mozart spit
- berkeley forsythe nancy spring
- berlin fourier napoleon subway
- beta fred network success
- beverly friend newton summer
- bumbling george osiris tape
- cardinal gertrude outlaw target
- carmen gibson oxford taylor
- carolina ginger pacific telephone
- caroline gnu painless temptation
- castle golf pam tiger
- cat golfer paper toggle
- celtics gorgeous password tomato
- change graham pat toyota
- charles gryphon patricia trivial
- charming guest penguin unhappy
- charon guitar pete unicorn
- chester hacker peter unknown
- cigar harmony philip urchin
- classic harold phoenix utility
- coffee harvey pierre vicky
- coke heinlein pizza virginia
- collins hello plover warren
- comrade help polynomial water
- computer herbert praise weenie
- condo honey prelude whatnot
- condom horse prince whitney
- cookie imperial protect will
- cooper include pumpkin william
- create ingres puppet willie
- creation innocuous rabbit winston
- _____________________________________________________________
- Paean : The Merc V.4.1. passwd!locator
- Shooting Shark Gfiles : Unix hacker
- The Mentor LOD/H : Pheonix Project 512-441-3088
- TSR Dedicated Field users
- ::::::::::::::::::::: Information provided MUltiformly :::::::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- ::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
-
- // Bell 900 Battles //
- AT&T, MCI and US Sprint are arming themselves for a new round of competition
- in interactive 900-call services, according to TSR sources. AT&T has been
- hoping for FCC approval of its interactive 900 tariff. MCI has been testing and
- plans to offer a 900 service next month. And US Sprint plans to begin
- customer testing of its service in April '89.
- :::::::::::: Information provided by MPhone / 203 :::::::::::
- _____________________________________________________________
- // NSA Chooses Its Security //
- The National Security Agency has chosen the AT&T security code algorithm
- called Code Excited Linear Predicted. NSA will propose the algorithm be
- adopted as a government-wide standard. Production is shared by AT&T, Motorola
- and GE RCA. The algorithm is a 4,800 bits-per-second coder that checks speech
- patterns.
- ___________________________________________________________________________
- ___________________________________________________________________________
- ::::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::::
- What "Vocab. Tonic" is, is a list of acronyms and definitions to help
- education the ignorant hacker. With an extensive vocabulary, there is
- virtually nothing one can't learn.
- Study on...
- DS - Digital Switch. A switch in which connections are established by
- operations on digital signals without conversion to analog.
- DSX - A digital cross connect field which can be utilized for DS1 (Digital
- Switch), DS2 or DS3 level cross connections at a digital level
- RPOA - Registered Private Op. Agencies (ID of online system).
- SCC - (or SCCS), Switch Control Center. SCC has overall responsibility for
- the administration and maintenance of BOC Central Offices.
- Responsibilities include installation and maintenance Control Office
- for FG B, C, and D. SCC also handles specific trouble reports.
- TAMS - System where NUIs are checked by a central database when you try to
- connect to an address, on GTE Telenet.
- TD - Terminating Direction. The use of Access Service for the completion of
- a call from an IC (Interexchange Carrier) location to an end user.
- ___________________________________________________________________________
-
- ___________________________________________________________________________
- :::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::
- "They [Hackers] have this need to find the answer."
- To subscribe to the 2600 Magazine send 15$ to:
- 2600 Magazine
- P.O. BOX 752
- Middle Island N.Y. 11953
- --Corley, Editor 2600 Magazine
-
- ___________________________________________________________________________
- ___________________________________________________________________________
- TSR will accept additional sponsor/support Systems. If you have a certain
- interest in the Report, and wish to provide support to TSR -- Leave your BBS
- number -- and any other information on RADIO WAVES Bulletin Board Systems.
- ___________________________________________________________________________
- ___________________________________________________________________________
- Pheonix Proj. LODH :: 512-441-3088 --------- Lunatic Labs :: 415-278-7421
- At Login: Any UNIX Default PW P/H System
- HackersDen 2600 #5 :: 612-522-3959 --------- Hack Shack @ :: 214-422-4307
- P/H-Files BBS Login: Any UNIX Default Pass
- RADIO WAVES System :: 612-471-0060
- - Syndicate Report Support BBS -
- ___________________________________________________________________________
- ___________________________________________________________________________
- This concludes this Transmittal No. 21
- (Part 1 of 2)
- Released March 2nd, 1989
- by The Sensei
- Editor of The Syndicate Report
- ___________________________________________________________________________
- ___________________________________________________________________________
-
- THE SYNDICATE REPORT
- Information Transmittal No. 21
- (Part 2 of 2)
- Released March 2, 1989
- Featuring:
- Editor's Note
- "Cyberpunks" Vs. The Media
-
- Telecommunications Events, Conferences, Seminars, and Shows
- Software Links Unix System to Atomic Clock
- Briefs notes from The Report
- " Hackers Fail Raiding ATMs "
- by The Sensei
- Editor Syndicate Report Magazine
- ___________________________________________________________________________
- ___________________________________________________________________________
- EXPOSITION: TSR
- Once again, The Report accepts outside sources. Anybody can write/provide
- information to The Syndicate Report. Articles/Information may be provided
- through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
- Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
- on any the previous mentioned specialties will be: accepted, labeled, and
- given full actual credit to the article/info provider(s), or writer(s). --
- Special Editor, TS, comments are placed between brackets. Example: [ Hi. ]
- ** All articles have been presented by me unless shown at the end of the
- article as the information provider(s), or writer(s). **
- ___________________________________________________________________________
- ___________________________________________________________________________
- EDITOR'S NOTE: TSR
- Just a quick note. Just in case many of you don't know...I distribute
- an introduction package at least 3 days every month before actually releasing
- The Syndicate Report. These can be found on the systems listed at the end
- of this part of TSR. ;The Sensei / TSR!612
- ___________________________________________________________________________
- ___________________________________________________________________________
- "CYBERPUNKS" VS. THE MEDIA: TSR (s.t 2\27)
- The following article can from a newspaper local to myself. The
- newspaper is the "Star and Tribune." I, The Sensei, usually don't print up
- verbatim copies of articles, but this articles was very interesting and
- entertaining.
- Some of the information presented in insulting to most Hackers/Phreaks,
- etc., so I'm going to comment on parts of the article. Comments will be in
- designated brackets, like this: [ Blah, Blah...Har Har -TS ]
- _____________________________________________________________
- Silicon Valley -- A local Cop patrolling after midnight witnessed an
- unusual sight, even for this center of high technology: Two teenagers
- wedgedin a phone booth, laboring over the keyboard of a laptop computer clipped into
- the telephone line.
- [ This is very humorous for me...I can't help wondering what technique these
- guys are using to access Bell Fone's, heh. ]
- The youths, who were arrested for telephone fraud and computer abuse,
- belong to a shadowy culture of computer vandals committed to illegally entering
- and frequently tampering with the computer networks on which society has come
- to rely.
- Those in this expanding underground -- known as CYBERPUNKS to themselves
- and some social scientists -- have broken into corporate and military computers
- and tampered with telephone billing switching equipment, sometimes altering
- services and monitoring telephone lines. Some have boasted of illicitly
- entering computer used in stock-market trading.
- [ First of all, I protest to the term, "Cyberpunks." No hacker I know of as
- called themselves Cyberpunks. If anyone reading this does, your probably not a
- considered a hacker by most. Second, Social Scientists don't know anything
- about hackers -- they're just another worthless clan of scientists trying to
- shape society as they wish. ]
- [ The newspaper then goes on to refresh our memories about the Morris Jr.
- Unix WORM, haven't we heard enough about his guy. And it was a really
- complicated set of code he set for his so-called CSci Project. ]
- Articles describing how to write viruses have appeared in several
- publications that are widely circulated within the underground. Writing in
- the journal 2600, which says it speaks for the computer underground, an author
- using the pseudonym "The Plague" described how to create a virus.
- "If people's data is destroyed, then so be it," he wrote. "If people
- are stupid enough to accept pirated software, then they deserve to be
- punished," says Plague.
- [ Well, The Plague has it all wrong. Viruses are not ONLY in pirated
- software, my friend, they creep within all types of programs. Your just adding
- to the problem. It's goes against 'Hacker Ethics,' but the information should
- not to suppressed from the hacking community. ]
- The term CYBERPUNK is a reference to a popular science fiction genre
- that deals with an intersecting world of high technology and outlaw society.
- "This is the case of art driving reality," said one Social Scientist at the
- Institute for the Future, Calif. "You have a small group who is actually going
- it, and a large pool that is buying into what they are doing and redefining
- reality."
- [ Yet another scientist froma corrupt institution, making conclusions based
- on a small fraction of neo-hackers. ]
- Cyberpunks often are called HACKERS, but computer scientists are careful
- to note that not all hackers are malicious. The term originally referred to
- researchers who were committed to designing advanced computer hardware and
- software. [ This is the first decent statement I've read. ]
- Another often-heard term is "PHREAKING," which is the illegal use of
- telephone systems.
- "Phreaking is moral," said an 18 year-old hacker who calls himself,
- "Frank Drake" in messages on the bulletin boards. "There is no theft involved.
- It's not theft of services, because this equipment would otherwise be idle."
- [ It's about time these Media-Types informed the public of my favorite hobby,
- Phreaking. And about the definition Frank Drake gave. "Illegal use of Fone
- System." ? Sorry, not all of the uses by phreaks is illegal. More than
- anything, phreaking is basically composed of "Learning about the Bell system,
- along with illegal use." ]
- Computer experts working in the industry who have become involved with
- malicious hackers see them as computer addicts possessed by an antisocial
- obsession. "They're misfits, losers or troubled individuals lacking a sense of
- duty or morals," said a computer researcher at a Silicon Valley institution.
- [ Misfits? Losers? Antisocial individuals? This is another scientist
- shooting his mouth off with little support. The idea of hackers being social
- outcasts, or losers is a common misconception by many. Most malicious computer
- hackers are party animals when given the right conditions. And if one was told
- he is labeled an, "Outcast, Loser etc.", the person talking would get an entire
- new face of the word MALICIOUS. Namely a 99e99 dollar fone bill, credit check
- and unchecked, and maybe a subscription to every magazine on the face of the
- Earth. ]
- In recent years this researcher has offered four underground hackers
- programming jobs to try to channel their energy away from destructive use of
- computers. In each case the experiment ended in failure, the scientists said.
- The researcher asked not to be indentified, and his reason is revealing.
- He fears that the CYBERPUNKS/Hackers are so skilled at tampering with computers
- that they might be able to alter his credit rating or have his electricity
- turned off.
- [ Oh my. Will these guys never learn? Hackers are not stupid "Lab Rats."
- They want a challenge, away from sitting at a computer programming for another
- person. And this scientist is concluding his entire experiment on just a few
- hackers. Yes, his fear of hackers is valid. I am now thinking of ways to find
- out who this guy might be. The credit rating would be no problem, same with
- the electricity. A scientist without electricity, is like a hacker without
- Telenet. ]
- "Every single one of them had deep psychological problems," he said.
- Some members of the hacker underground appear to agree with this psychological
- assessment.
- [ Hah! No comment...for obvious reasons. ]
- "They have this crazed need to find the answer," said Eric Corley, edit
- of 2600 Magazine.
- Corley, whose personal hacking resulted in three brushed with the law
- before he started the publication in 1984, said: "They keep exploring where
- they know they shouldn't go. A true hacker won't stop just because he gets in
- trouble."
- [ Corley is totally correct here, of course. But I think some hackers don't
- stop hacking, because some are just over powered with the need to learn. I
- never stopped hacking after by bust for many reasons. I the primary reason
- was because I'm not a quitter, and I looked back on how much had I learned.
- With the learning, fun followed. ]
- Although computer experts believe the number of outlaw hackers is
- growing, the behavior they exhibit is not new to the high-tech world.
- For example, a computer programmer, John Draper, spent six months in jail
- during the 1970s for illegal use of the telephone network.
- Draper's nickname, "Captain Crunch," derived from his discovery that a
- whistle that came as a prize in a cereal box was tuned to the correct frequency
- to unlawfully manipulate fone company switch gear.
- [ Hmmm. Every hacker knows all this already. At least a true hacker should
- know his/her past. But the thing I can't help wondering is, what was Captain
- Crunch doing with a whistle from the "Captain Crunch cereal" box? And why was
- he blowing it into the fone. Makes me laugh if you think about it. Another
- thing, anyone with two front teeth can blow a 2600 Hz tone whistle. ]
- ;The Sensei / TSR!612
- ____________________________________________________________________________
- ____________________________________________________________________________
- BUSTING TELEPHONE SOLICITORS: TSR (st.cit 2\27)
- Join to fight telephone solicitors! How you ask? Read on...
- :::: Illustration, Exampling ::::
- "Have you ever off and had a fantasy of going to the library and finding
- out who owns the companies that call YOU, interrupt you, and calling THEM back?
- It makes you happy for a while. Particularly when working 11 to 7 shift, you'd
- think of the companies that had awoken you (using YOUR private fone) at noon."
- "One nurse I know did something like that to a persistent insurance
- salesman. One day she got awake and alert enough to get his name and number
- and promised to call back. She did. At 2 AM, announcing that it was HER
- working day, and she was now awake and would like to discuss the po
- licy....He never called her back." -TS
- :::: Tips Offs to a Fone Scam ::::
- If it sounds too good to be true, it's probably a scam. Some of the most
- popular promotions among telephone con artists include prize offers to get you
- to buy water purifiers or vitamins, magazine subscriptions, PENNY STOCKS,
- precious metals, travel and cellular telephone lottery applications.
- Be skeptical of says such as, "This is the best deal you'll ever find," or
- "Double your money, no risk!"
-
- The government, Federal Trade Commission estimates that Americans lose 1$
- billion a year from the deceptive peddling of goods and services over the
- fone. Other organizations say it's much higher. One might suggest lobbying
- for stricter FED laws governing 'telemarketing businesses.'
- :::: Striking Back at 'The Solicitor' ::::
- o Do NOT hang up on telephone solicitors. This just allows them to make
- another call 200 milliseconds later. Listen to them. Ask stupid
- questions. Drag out conversation. Contemplate placing an order, then
- don't. Or start to place an order, then change your mind.
- o After wasting their time as much as possible, cackle insanely and hang
- up. Or give them the raspberry and yell, "Only f00ling!121!!&!"
- o Remember always, that these twits are partially paid on commission.
- The more of their time you waste, the less they are gonna earn.
- Eventually they may quit, and if we're persistent enough, maybe
- someday nobody will WANT to work for these cretins.
- o Why not add "May I speak to your supervisor?" for no good reason...
- o "Just a sec., I'll get my wife, she's really interested in this sort
- of thing..." and leave the phone on the table for 10 minutes...
- o Blow him some nice tones. 1000 Hz is nice.
- o If it's a girl, start to BS with her. Ask her out. Even better, make
- like to you who she is, and your going to strange things to her body.
- 90% are ugly college chics, so you might not be able to hang up on one
- with this approach. Use your own judgement.
- o Turn the bell off on the phone, and hook up an answering machine, and
- sleep, sleep.
- :::: Ethics one should abide by ::::
- o Don't go after the lower echelons of the company by terrorizing the
- telemarketer. They have no effect on the company. All you do is ruin
- somebody else's night. With few exceptions, he is just as unhappy
- about bothering you as you are about being interrupted.
- o Lash back at the company, not the peon. He's paid to do that. 4 out
- of 5 people wouldn't do that unless they were paid.
- :::: REMEMBER ::::
- The organizing principal of modern society is, "The only people in contact
- with the public are the ones with no authority". Keeps we, the people,
- fighting with each other while leaving the Bosses free to play power games with
- lives.
- :::::::::::::: Information written by The Sensei / TSR Editor ::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- TELCOMMUNICATIONS EVENTS, TSR (c.c 2\28)
- CONFERENCES, SEMINARS, and SHOWS:
- This is a list of meetins and show in the up coming month. I'm providing
- this list for you and your friends to rob, cheat, and swindle the angered
- companies that participate in there events. You are likely to find your dreams
- come true in telephone accessories and other wonderful equipment. Many things
- will be on show, so take items as you please. There could be butt sets,
- testing equipment, and other stuff at your disposal. Remember, their parking
- lots are usually filled with BELL trucks, just waiting for you to clean them
- out.
- ________________________________________
- Mar. 3-4
- Exchange Carriers of Utah St. George, UT
- Holiday Inn Phone: 801-298-4242
- Mar. 6-8
- Voice '89 Santa Clara, CA
- Convention Center Phone: 713-974-6637
- Mar. 6-10
- MFOC '89 Washington, DC
- Hyatt Crystal City Phone: 800-323-1088
- Mar. 7-9
- REA Telecomm. Eng. & Mgmt. Seminar Minneapolis, MN
- Marriott City Center Phone: 202-382-8663
- Mar. 8-15
- Hannover Fair CeBit '89 Hannover, West Germany
- Hannover Fairgrounds Phone: 609-987-1202
- Mar. 12-15
- Minnesota Telephone Bloo
- mington, MN
- Radisson South Hotel Phone: 612-291-7311
- Mar. 13-16
- Interface '89 New York City, NY
- Javits Conention Center Phone: 617-449-6600
- Mar. 14-17
- Carolina-Virginias Spring Mtg. Releigh, NC
- Marriot Hotel Phone: 919-592-5751
- Mar. 15-16
- InterCom '89 Miami, FL
- Hyatt Regency Hotel Phone: 305-446-5150
- Mar. 19-22
- South Carolina Telephone Charleston, SC
- Omni Hotel Phone: 803-722-4900
- Mar. 19-22
- Entelec '89 New Orleans, LA
- Louisiana Superdome Phone: 504-561-4530
- Mar. 28-30
- TBT West '89 Long Beach, CA
- Long Beach Convention Ctr. Phone: 800-243-6002
- Mar. 29-Apr. 1
- Communications Indonesia Jakarta, Indonesia
- Jakarta Fairgrounds Phone: 301-656-2942
- Well all that's all for this month. For more, read up coming Reports!
- ::::::::::::::::::::::::::: Seymour Lecker / TWA ::::::::::::::::::::::::::
- ___________________________________________________________________________
- ___________________________________________________________________________
- SOFTWARE LINKS UNIX SYSTEM TO ATOMIC CLOCK: TSR (i.w 2\28)
- Precision Standard Time Inc. recently placed in the public domain
- software that synchronizes nodes on a Unix TCP/IP network to the atomic clock
- that U.S. Government uses to keep official time.
- On Unix networks, a number of time-sensitive applications require
- careful synchronization, both between network elements and in relation to an
- absolute time standard.
- Now inconsistencies need not occur. The software continually
- synchronizes nodes on a network to within 100 milliseconds on the atomic clock
- at the National Institute for Standards and Technology.
- US NO 202-653-0351.
- The software consists of University of Maryland's Time Demon, "ntpd,"
- which implements the Network Time Protocol and synchronizes the host computer
- to Coordinated Universal Time, the international time standard. The software
- can be operated with or without a Time Source radio receiver sold by Precision
- ST. Without an external time standard, however, no provision exists to correct
- inaccuracies caused by the drift of computer calendar clocks or by errors
- introduced in manual clock setting.
- ____________________________________________________________________________
- ____________________________________________________________________________
- ::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
-
- // Callers Must be Told the Cost //
- The FCC yesterday ordered 5 companies that charge customers 20% to 80% more
- than AT&T, MCI or Sprint to toe the line. The alternative operators must now
- tell callers how much the call will cost and which company is placing it before
- it goes through. The high rates usually are placed on hotel, airport or
- hospital phones.
- :: UPDATE ::
- As stated above, alternative long-distance operators must: Put a sticker on
- the phone with price information or tell the caller the price verbally; give
- callers an chance to hang up without any charge; offer callers a chance to go
- through AT&T or another phone service. Right now many alternative operators
- stop you from using another carrier.
- _____________________________________________________________
- // Bell Goes To College //
- Bell Atlanticom Systems said yesterday it has signed a contract with the
- College of William and Mary in Williamsburg, Va., for a fully integrated voice
- and data communications system. The campus-wide system will provide resale of
- communications services to students, a management system, and a universal wiring
- plan to provide voice and data transmission.
- The communications system obtained by the College of William and Mary
- yesterday will provide 300 trunks, 3,800 faculty and student lines, 150
- voice/data faculty users and 1,050 host data ports. It includes more than 5,000
- inside wiring runs and several miles of fiber optics. Also included: A 1,000-
- user Aspen Voice Mail System and the Alex-IS Telecommunications Management
- System.
- _____________________________________________________________
- // Hackers Fail Raiding ATMs // TSR
- If authorities hadn't been tipped, a computer hackers could have cracked
- one cash-machine network of more than 14$ million over a single weekend, of
- Feb. 18. Charged in the plot were GTE Corp. consultant Mark Koenig, and 4
- other hackers. Federal Agents said the hackers pulled the personal ATM codes
- from GTE te
- lephone lines. The lines transmit transactions from account at Bank
- of America and thousands of other banks linked to the Plus System, a national
- network of shared ATMs.
- The Hackers put the data in magnetic strips on 5,500 pieces of card board.
- They planned to use the bogus cards to make withdrawals around the country. If
- it were not for a "TIPOFF", authorities wouldn't have known what hit them.
- [ Now this is a sad story. These -hackers- have a chance to break 14 MILLION
- in tax-free cash, and they blow it. I bet one of them bragged about it to a
- girl friend. That's the only way computer hackers get caught...they have to
- see some limelight. ] --TS
- ::::::::: Information provided by John "Scij" / 612 :::::::::
- _____________________________________________________________
- // Speaking of ATM Heists... //
- Recently, a crook used a Security Pacific National Bank ATM master card,
- which tapped into virtually all accounts. The heist resulted in a 237,000$ win
- for the hacker. The bank reimbursed depositors but still have not found the
- culprit. Alarmed by the incident, the American Bankers Assoc. plans to urge
- its 13,500 members to strictly limit access to ATM master cards and personal
- indentification codes.
- ___________________________________________________________________________
- ___________________________________________________________________________
- :::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::::
- "They [Hackers] have this need to find the answer."
- To subscribe to the 2600 Magazine send 15$ to:
- 2600 Magazine
- P.O. BOX 752
- Middle Island N.Y. 11953
- --Corley, Editor 2600 Magazine
- ___________________________________________________________________________
- ___________________________________________________________________________
- TSR will accept additional sponsor/support Systems. If you have a certain
- interest in the Report, and wish to provide support to TSR -- Leave your BBS
- number -- and any other information on RADIO WAVES Bulletin Board Systems.
- ___________________________________________________________________________
- ___________________________________________________________________________
- Pheonix Proj. LODH :: 512-441-3088 --------- Lunatic Labs :: 415-278-7421
- At Login: Any UNIX Default PW P/H System
- Tiamats Temple Pvt :: 612-731-0296 --------- Hack Shack @ :: 214-422-4307
- P/H-Files BBS Login: Any UNIX Default Pass
- RADIO WAVES System :: 612-471-0060
- - Syndicate Report Support BBS -
- ___________________________________________________________________________
- ___________________________________________________________________________
- This concludes this Transmittal No. 21
- (Part 2 of 2)
- Released March 2nd, 1989
- by The Sensei
- Editor of The Syndicate Report
- ___________________________________________________________________________
- ___________________________________________________________________________
-
-
-