home *** CD-ROM | disk | FTP | other *** search
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- THE SYNDICATE REPORT
-
- Information Transmittal No. 20
- (Part 1 of 2)
-
- Released January 31, 1989
- Featuring:
-
- Editor's Note
-
- Telenet / PC Pursuit Price Hike
-
- Phone Fraud Techniques
-
- Information Age Attacks
-
- Unix Hacker Caught at LLNL
-
- Briefs notes from The Report
-
- Vocabulary Tonic
-
- by The Sensei
- Editor Syndicate Report Magazine
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- EXPOSITION: TSR
-
- Once again, The Report accepts outside sources. Anybody can write/provide
- information to The Syndicate Report. Articles/Information may be provided
- through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
- Busts, Phreaking, Hacking, Data / Telecommunications, and new developments
- on any the previous mentioned specialties will be: accepted, labeled, and
- given full actual credit to the article/info provider(s), or writer(s). --
-
- ** All articles have been presented by me unless shown at the end of the
- article as the information provider(s), or writer(s). **
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- EDITOR'S NOTE: TSR
-
- A New-Year is upon us, 1989. The final year of the decade. Only ten
- more and we turn over another Century. Just think, only a few decades back
- the World had no wonderful high speed Computers, no means of Telecommunications
- via Computer, and not even a fraction of the amount of data being exchange over
- systems - a few decades back. Technology will have multiplied 4 times by the
- year 2000. I for one feel like I'm still in the Dark Ages. I'd like to be
- born around the year 2100 or 2150. Around that time, computers will be as
- common as the person - and probably more valuable to an extent.
- One bad point though: Phreaking and Hacking in the year 2100 would be
- in toto termination. In other words, suicide. Hackers, Crackers, Breakers,
- Phreakers, Terrorists - whatever you want to call'em are already talking about
- the end of phreaking and hacking. It's just a matter of time.
-
- You know what I really get tired of hearing? Bad news about 2 things.
- 1) The United States falling apart, and 2) Phreak/Hack world crumbling. And
- WHAT did I just report as an opinion? "The end of the Phreak/Hack soon." I've
- tried to turned myself away from writing depressing editorial opinions, but
- I've learned its basically impossible! Something that I never find myself
- writing, something like: "Hackers/Phreaks break into Government Bank and get
- rich...no suspects have been found." I'm babbling here, I'll have to edit half
- of this out... On with the Report #20.
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
-
- TELENET / PCP PURSUIT PRICE HIKE: TSR (pc!p 1\2)
-
- This bit of news is probably all over the nation by now, but PCP is
- hanging itself - trying to get users to pay more $$ CASH. Here's a transcript
- from the 'C PURSUIT' Telenet accessible PCP Line:
-
- Here is a summary of the price change:
-
- o Monthly Charge. The new fixed charge is $30 per month.
-
- o Cap on Free Usage. Your $30 per month will now pay for up
- to 30 monthly hours of non-prime time usage. Using the full
- 30 hours in one month amounts to an hourly rate of only
- $1.00 -- more than 85% less than you would pay with the most
- popular long distance discount service. Only a small
- fraction of you will even be affected by this cap.
-
- o Over Cap Rate. Non-prime time usage, above the 30 hour cap,
- will be billed at $4.50 per hour, which is about half of the
- next lowest rate in the market place.
-
- o Second Tier Rates. There will be a second level of rates
- for those who use the service at business levels. When your
- total monthly usage exceeds 60 hours, both prime time and
- non-prime time rates will increase for those hours in excess
- of 60, as follows:
-
- PRIME TIME 2nd tier rate: $ 14.00 /hr
- Non-Prime 2nd tier rate: $ 7.50 /hr
-
- ....other changes are included, although the information is
- changing a lot - log into the PCP Via telenet to check all
- the latest info.
-
- The new pricing scheme goes into effect May. 1st, raises the monthly PC
- Pursuit charge to 30$, with a limit of 30 hours of service per month for
- that price, according to Peter Naleszkiewicz, Telenet's product manager
- for outdial services. After 30 hours, the cost of service rises to 4.50$
- per hour, with another jump to $7.50 per hour coming at 60 hours per
- month.
-
- A Note from Mr. Naleszkiewicz
-
- "The service was far more popular that we ever expected it to be,"
- Naleszkiewicz said. "Thirty hours per month is significantly more than the
- average use of the service, so most users will see only a five dollar per
- month increase. But it's not the average PC Pursuit user that concerns
- Telenet, according to Phil Sih, prez of Portal Communications CO. of
- Cupertino, Calif. "We have a population of heavy Pursuit users on out 10$
- per month online service," Sih said. "Some of these people are using
- Pursuit 200 to 300 hours per month. You didn't have to be a rocket
- scientist to see this change coming."
-
-
- ::::::::::::::::: Information Provided by KM / 'C Pursuit' :::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- PHONE FRAUD TECHNIQUES: TSR (usr 1\3)
-
-
- %&%&%&%&%&%&%&%&%&%&%&%&%
- %Phone Fraud, Part III%
- %&%&%&%&%&%&%&%&%&&&%&%&%
-
-
- Well in Part Three, I will discuss a part of phone fraud you
- very rarely see used, The Outside line, How you can get it and where.
-
- A very interesting thing I ran upon when I was hacking around
- on a PBX. I thought, How easy would it be to get a operator to
- give you an outside line from a hospital. In fact, I found it to be
- very simple, this is what ya do:
-
- You call your nearest hospital and when the switchboard
- operator answers ask her to send you to Radiology, (Doesn't really
- matter ask for any department) And when the department you asked for
- answers, tell them that you have made a mistake and that you would
- like to be transferred to the switchboard. You then will get sent
- back to the main switchboard but this time once the operator
- answers say, "Yes, This is Dr. Jones, I'm having trouble getting
- an outside line, Could give me an outside line please". Then most
- likely you will hear a Dial Tone! Now you can screw everything
- up and call Alliance, or anything your heart desires.
-
- The reason must call and get transferred to a different department
- before asking for the outside line is that if you just
- call up and ask for an outside line, the operator will see that
- your are on a Incoming Trunk, (If you don't know what that means,
- she'll simply tell you that your not in the hospital, but outside)
- But you see, once you get transferred, then again transferred back
- it looks like you're inside the hospital - so, it's more of a good
- chance of getting the outside line.
-
- I hope this File helps you out. Direct all questions to TSR #21/TS
-
- ::::::::::::::::::: Information Written by The Synergist :::::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- INFORMATION AGE ATTACKS: TSR (fbs 1\30)
-
- Solicitors hit you at night with so many phone solicitations that you
- shelled out the extra bucks for an unlisted numbers, among other annoying
- reasons. Then they got through with random dialers. So you bought an
- answering machine. And now they've invaded your computer and your fax machine
- with junk mail. Is there no peace?
- This is the information age that the futurists talked about, the day
- when telephone technology, fax machines and electronic mail would make
- communications cheap and plentiful. Too plentiful. Says Lotus Corp.,:
- "It's a well-known phenomenon in large corporations that when you come back
- from a long weekend you'll find 50 pieces of electronic mail in your mailbox,
- spend hours going though it, and end up with most of it being stuff you don't
- want to see." LOTUS protects itself at home and with an unpublished telephone
- number, and opts for a public electronic mail address for his computer. Yet
- the unwanted messages still come through.
- WITH THIS, we have what could perhaps be called as a "War of Access",
- fought on the battleground of chips and software. Everyone, it seems, is
- screaming for your attention. Among the callers' weapons are electronic white
- pages, power dialers that can do 20k calls a day, and systems that hunt down
- unpublished fax numbers. Defensive strategies? These include PBX switchboards
- with software to route unwanted calls into answering machines and call blockers
- that reject calls from specific unwanted numbers. Tomorrow's strategies will
- include software that filters out sales pitches from electronic mail by looking
- for telltale words like "insurance" and "financial planner."
- While senders are spending more to reach out, some receivers are
- spending more not to be touched. Survey Sampling, a Fairfield, Conn researched
- firm, says 28% of all U.S. household have an unlisted number. LA is 56%
- unlisted. NEW JERSEY BELL, which already charges customers $12.50 a year for
- the privilege of not having their numbers published, is offering another
- defense this year, CALLER ID, in some parts of its territory. For 78.00$ a
- year plus a onetime charge of 60.00$ for a readout device, a residential
- customer sees the number of the caller when his phone rings. If he recognizes
- the number, he pickes up; if he doesn't, he might ignore the call or maybe let
- an answering machine get it. Then again, he can send it to the police or the
- Bell company to follow up annoying charges. This privilege, CLID, is fast
- sweeping the country...and becoming a necessity for prank/obscene phone
- calls. The Northern Bell is next in line for the feature.
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- UNIX HACKER CAUGHT AT LLNL: TSR (i.w 1\15)
-
- A remote caller who had repeatedly broken through the network security
- at Lawrence Livermore National Laboratories has been detected and contacted by
- LLNL officials.
- The vulnerability of Unix networks to unauthorized intrusions has become
- a serious concern at the federal level, where a number of agencies are trying
- to standardize upon the use of Unix-based networks. The concern has prompted
- the establishment of a national crisis center for network break-ins, called the
- Computer Emergency Response Team.
- According to an LLNL document obtained by TSR, the most recent LLNL
- intruder gained access to the system by way of Internet computers at the
- University of Washington and Stanford University. Because of the remote
- accessibility of these computers through e Internet, however, it is possible
- that these computers were not the point of origin. Once the intruder gained
- access to the LLNL computers, he achieved "superuser" status, which permitted
- access to every nonclassified file at LLNL, the document states.
- This opportunity could have resulted in widespread destruction of
- unclassified data, but no files are known to have been damaged, according to
- officials. The intruder used a "cracker's dictionary" to obtain a small list
- of old and existing passwords, the document states. He also created the
- capability to reenter the system by giving himself an account number and his
- own password to make it appear that he was a legitimate user.
- "Our security people have been in touch with the intruder, and we have
- been assured that there will be no further intrusions from that source," said
- Ron Teunis, an LLNL spokesman. Teunis also said the matter had been turned
- over to the FBI for further investigation, and the intruder could be prosecuted
- for federal computer-security laws. Officials at LLNL said that fixes have
- been created to guard against the particular methods used in the Dec 3rd to 10
- intrusions.
- The intruder had broken into the unclassified portion of LLNL's node of
- the Internet system on at least 10 occasions between December 3 and 10,
- according to a document released by LLNL. The intruder exploited one of the
- known weaknesses in the Unix systems running on many LLNL's computers.
-
- ::::::::::::::::::::: Information by The Sensei / TSR ::::::::::::::::::::::
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- ::::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::::::
-
- ... TID BITS ON BELL ...
-
- // Bell Atlantic Offers Email //
-
- Bell Atlantic and Telenet Com Corp., the US Sprint data communications
- company, have announced a strategic alliance that enables Bell Atlantic to
- enter the email business, pending regulatory approval by the FCC. The
- agreement is the first between a regional Bell operating co and an enhanced
- service provider for email service, and capitalizes on the ability of local
- exchange carriers to provide information services. Until recently, telephone
- companies subject to the Modified Final Judgment, the consent decree that
- resulted in the break-up of AT&T, were not allowed to provide such services.
- _____________________________________________________________
-
- // AT&T, BellSouth Offer Cable TV //
-
- AT&T and BellSouth Corp. will be ushers, of sorts, for callers who want to
- order specific pay-per-view cable TV programs, reports Communications Week.
- The companies will use their respective equipment to furnish order-taking
- services for special pay-per-view cable broadcasts, such as first-run movies or
- live
- sporting events. Normally, cable TV phone operators handle the requests.
- _____________________________________________________________
-
- // Phone Co's Reaching Overseas //
-
- The lure of overseas cable investments continues to draw the interest of U.S.
- cable operators and an increasing number of telephone companies. BellSouth, Bell
- Atlantic and GTE are on the prowl for foreign cable holdings, Broadcasting
- magazine says. Pacific Telesis and US West already have United Kingdom holdings.
-
- :::::::::::::::::: Information Provided by Delta #5 / 606 ::::::::::::::::::
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- ::::::::::::::::::::::::::::::VOCABULARY TONIC::::::::::::::::::::::::::::::
-
- This is the second in a series of Vocabulary Tonic sections. I decided
- to do this for a few reasons. 1) If a person has an extensive vocabulary,
- there are practically no limits to what he/she can learn. 2) It's a nice idea
- from a Technical. book I read occasionally. And lastly, 4) It gives The Report
- a bit more spice. The acronyms/words presented will relate to
- Telecommunications in one way or another, and only telcom. An average of 15
- acronyms/words will appear monthly - along with The Report.
-
- ISDN - Integrated Services Digital Network: A planned hierarchy of digital
- switching and transmission systems. Final phase of modern day switches.
-
- AIS - Automatic Intercept System: System employing an audio-response unit
- under control of a processor to automatically provide pertinent info to
- callers routed to intercept.
-
- ESB - Emergency Service Bureau: A centralized agency to which 911 "Universal"
- emergency calls are routed.
-
- ADU - Automatic Dialing Unix: A device which automatically generates a
- predetermined set of dialing digits.
-
- FACS - Facility Assignment and Control System: Mechanizes the service order
- assignment process.
-
- CAROT- Centralized Automatic Reporting on Trunks: This takes transmission and
- trunk measurements. Does routine tests and forwards results to work
- control locations.
-
- TASC - Telecommunications Alarm Surveillance and Control: Provides centralized
- surveillance of telecom equipment.
-
- EC - Exchange Carrier: A company engaged in the business of furnishing
- access service in a franchised territory. (ie; US Sprint, MCI, AT&T)
-
- AC - Access Code: A uniform set digit code assigned by an Exchange Carrier
- to an individual customer.
-
- Gateway - A network element that permits communication between two
- organizationally or technically dissimilar networks.
-
- PJ - Phrase Jitter: The unwanted phase variations of a signal. Garble, or
- Garbage online.
-
- 3TS - 3-Tone Slope: The difference in loss between 1004 Hz and 404 Hz and
- 2804 Hz (AKA Attenuation Distortion).
-
- PAD - Packet Assembler/Disassembler: Information passed though an Information
- Service, translated to the computer's specifications. (ie; baud
- differences, computer emulations, and protocol handshaking).
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- TSR will accept additional sponsor/support Systems. If you have a certain
- interest in the Report, and wish to provide support to TSR -- Leave your BBS
- number -- also any other information on RADIO WAVES Bulletin Board System.
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- The End System TSR :: 915-821-1856 --------- Lunatic Labs :: 415-278-7421
- At Login: Any UNIX Default PW P/H System
-
- PlaydoLand Systems :: 612-522-3959 --------- The Outlet @ :: 313-261-6141
- P/H-Files BBS Private P/H Newuser:Kenwood
-
- Radio Waves System :: 612-471-0060
- * #1 Syndicate Support BBS *
- ____________________________________________________________________________
- ____________________________________________________________________________
-
-
- This concludes this Transmittal No. 20
- (Part 1 of 1)
-
- Released January 31st, 1989
-
- by The Sensei
- Editor of The Syndicate Report
-
- ____________________________________________________________________________
- ____________________________________________________________________________
-
-