home *** CD-ROM | disk | FTP | other *** search
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- THE SYNDICATE REPORT
- Information Transmittal No. 23
- (Part 1 of 2)
- Released June 13, 1989
- Featuring:
-
- Editor's Note
- Telecommunication Events, Conferences, Seminars, and Shows
- Phreak Tools V1.1 - Remake of CNA/L Lister
- Radio WTSP Hacker Charged With Computer Tampering
- The "950" Busts
- Hacker Stereotypes and Statistics
- Brief Notes from the Report
- "Drowning Hackers"
- Vocabulary Toni
-
- by The Sensei
- Editor Syndicate Report Magazine
- ____________________________________________________________________________
- ____________________________________________________________________________
- EXPOSITION: TSR
- Once again, The Report accepts outside sources. Anybody can write/provide
- information to The Syndicate Report. Articles/Information may be provided
- through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as
- Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on
- any the previous mentioned specialties will be: accepted, labeled, and given
- full actual credit to the article/info provider(s), or writer(s). -- ** All
- articles have been presented by me unless shown at the end of the article as
- the information provider(s), or writer(s). **
- ____________________________________________________________________________
- ____________________________________________________________________________
- EDITOR'S NOTE: TSR
- TSR #23, late as usual. Sorry, once again - life is testing me in many ways,
- that's why this issue is over a month late. This apology goes mainly to
- 'contributing writers,' for their help in this Report. Reasons: Like I
- said, I've been busy, and most of the information here is (unlikeusual) written
- by others. A lot of the info. is from locals, and users that call Radio Waves
- System, since I've not been calling the usual systems lately. I'm not going
- to go into a specific topic for my Editorial this issue, instead I'll just
- outline a few things of interest. Just a quick note: Abbie Hoffman, author
- of "Steal this Book" "Steal this Urine Test." and other books, is DEAD. I
- heard about it on the news a whileback, approx 1.5 months ago, but I didn't get
- all the specifics. From what I know he over dosed. Now he's a legend. PC
- Pursuit. The format change is complete, and all the old passwords are dead.
- June 1st was supposed to be the cut off date, I guess they finally did
- something on time. If anyone is still using the old format, it's probably the
- new format. I haven't heard too much information on the new format(s),
- butthere has been talk of 20 to 30 different formats used by PCP. Although new
- formats can be made swiftly and easily to accomodate any abuse. Good luck.
- The 4.6 trillion chance of hacking a PCP code is over, now it's justabout
- impossible. The only codes you will see now are the ones hackers have tapped
- from the "INSIDE of PCP." In TSR #23, Part II, I'm going to copy a
- letter I received from a guy in England.
- ;The Sensei / TSR Editor
- ____________________________________________________________________________
- ____________________________________________________________________________
- TELECOMMUNICATION EVENTS, TSR (c.c 6\9)
- CONFERENCES, SEMINARS, AND SHOWS: This is a list of meetings and shows in this
- coming month. I'm providing this list for you and your friends to rob, cheat,
- and swindle the angered companies that participate in their events. You are
- likely to find your dreams come true in telephone accessories and other
- wonderful equipment. Many thing will be on show, so take items as you please.
- There could be butt sets, testing equipment, and other things at your disposal.
- Remember, their parking lots are usually filled with BELL* trucks just waiting
- for you to clean them out.
- _____________________________________________________________
-
- June 6-9
- Payphone/Operator Services Orlando, FL. Buena Vista Palace 713-974-6637
- June 7-9
- TEXPO '89 San Francisco, CA. Civic Auditorium 415-542-7753
- June 11-13
- Illinois Telephone Assn. Osage Beach, MO. Tan-Tar Resort 217-525-1044
- June 11-14
- ICC '89 Boston, MA. Sheraton Boston Hotel 617-466-3506
- June 11-14
- New York State Telephone Assoc. Lake Geroge, NY.Sagamore Hotel 518-462-6696
- June 11-14
- ADUC 1989 National Conference Boston, MA. Marriot Copley Hotel 800-228-9290
- June 12-15
- BICSI Workshop Lexington, NY. Radisson Plaza Hotel 606-257-3972
- June 18-21
- Pennsylvania TelephoneHershey, PA. Hershey Hotel 717-238-8311
- June 18-21
- Arkansas Tel Assoc. Hot Springs, AR. Lake Shore Sheridan 501-375-0086
- June 18-22
- NENA '89 Long Beach, CA. Hotel Queen Mary 213-596-0144
- June 19-21
- Videotex Industry Assoc. Ann. Conf. San Francisco, CA. The Fairmount Hotel
- 703-522-0883
- June 19-22
- NTCA Leadership Conf.San Francisco, CA. Fairmount Hotel 202-298-2300
- June 19-23
- Fiberoptic Splicing/Termination Sturbridge, MA. FC2 Training Facility
- 508-347-7133
- June 20-22 AFCEA Intl. Convention/ExpoWashington, DC. Washington Conv.
- Center 703-631-6100
- June 20-22
- Maine Tel Assoc. Rockport, ME. The Samoset Resort 207-763-9911
- June 20-22
- UTC Orlando, FL. Buena Vista Palace 301-621-5596
- June 24-28
- Georgia Tel Assoc. Sandestin Beach, Fl. Sandestin Hilton 404-321-5440
- June 26-28
- Intelligent Network ConForum Chicago, IL.Westin Hotel O'Hare 312-938-3500
-
- :::: Information provided by Seymour Lecker / TWA ::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- PHREAK TOOLS V1.1 - REMAKE OF CNA/L LISTER: TSR (p.f 5\5)
- Ever get tired of looking up out-dated CNA listings in text files? Or did
- you ever wondered WHO own what prefix on an 1-800/900 exchange? If you have
- these problems, then check out PHREAK TOOLS V1.1, formerly called CNA/L Finder
- or Lister. Professor Falken, of Minnesota 612, has reformatted this CNA/L
- Lister, and renamed it to fit its style. Here's Falken's latest information
- about Phreak Tools: "It has a 800/900 WATS Exchange Reverse Directory and
- a built in CNAfinder in it. The 800/900 directory, all you do is tell it what
- exchange youneed and it will tell you who owns it, and from that you should be
- able to tell if it's a safe exchange. The CNA program is the same as the
- current stand-alone version, however, all new releases of Automated CNA Finder
- will be in Phreak Tools Versions 1.x+ New features to be in upcoming versions
- are newer CNA list, with ID codes. Area code/Country code finder, and a 950
- port directory listing." (Sent via Radio Waves mail). The latest version
- has some hard to get information, and can be found onRadio Waves BBS at (612)
- 471-0060, and the 203 area. Currently, only IBM version 1.1 is available.
- There has been no further information from Falken, or Twisted Sector, 408
- California, about an Apple version of Phreak Tools/CNA Lister. News about this
- in future TSRs, or on Radio Waves (RW/TSR)
- The Author will be taking suggestions, and questions on RW.
- :::: Information by Professor Falken / Phortune 500 / 612 ::::
- :::: Contributing Writer, Programmer of Phreak Tools ::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- RADIO WTSP HACKER CHARGED WITH COMPUTER TAMPERING: TSR (5\11 ny.t)
- Michael I. Shapiro and Terry L. Cole, former news executives of WTSP,a
- Florida television station in the Tampa area, are charged
- with illegally entering the computer system of a rival television
- station.Christian Hoyer, an assistant state attorney in Hillsborough County,
- who is prosecuting the case, says that Shapiro, working for WTSP, Channel
- 10, had previously worked for a rival station, Channel 13. Shapiro is
- chargedwith using his own microcomputer and a microcomputer at Channel 10 to
- break into Channel 13's news computer, possibly seeking a competitive
- advantage for Channel 10's newscasts. The case is unusual because it involves
- 'media espionage.'
- :::: Information Provided by Romeo Andria ::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- THE "950" BUSTS: TSR (usr 5\9)
- A bust recently went down, May 3rd, 1989. It's called "Beta Cygnus,"which
- is in the 602 area code, address 602-234-3376. The Sysop, Mastermind, did
- something very foolish to get caught. That's right, he was hacking 950-1001
- and was caught. At the time of his arrest/capture the attorney general of
- Arizona had ordered a DNR on his line, consequently, a listing of all
- callsgoing to/from his board number were captured by the Feds. Mastermind's
- system and hardrive etc..was retrieved INTACT. Mastermind also kept all
- INFO-FORMS handy and un-censored. So if you wereon the board, and left some
- confidential information in the information form, the Feds have it now.
- Several other 602 boards went down due to the NEWS, Temple of Doom is down, and
- the HD is nuked. Valhalla Island did the same. * More busts are expected
- to come, since the attorney general made inferences to others. *
-
- :::: Information by Professor Falken / Phortune 500 / 612 ::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- HACKER STEREOTYPES AND STATISTICS: TSR (5\19)
- Computer hackers have broken out of their old stereotypes. The information
- necessary to commit computer crime is spreading rapidly through the population
- as computers are becoming easier to access. According to a recent report
- published by the National Center for Computer Crime Data (NCCCD), 32 percent of
- the people arrested for computer crimes are women, 43 percent are minorities
- and 67 percent are between the ages of 21 and 35. Former and current employees
- are far more likely to breach a company's computer than someone from outside
- the company. Seventy percent of all computer crimes involve the theft of money
- or services. The NCCCD estimates that computer crimes cost the US $555 million
- in 1988. Also, 15 computer-years were lost in down time and 930 man-years were
- spent detecting and removing viruses. The arrest of computer criminals and the
- laws concerning them are examined.
- :::: Information by TS / TSR ::::
- ____________________________________________________________________________
- ____________________________________________________________________________
- ::::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES :::::::::::::::::::::::
- // Drowning Hackers // (3\0 d.log)
- Computer security is threatened by the nature of a computer's own
- configuration, especially stationary networks. Hackers have the advantage of
- surprise and a global entry capability. Several security measures are available
- to deter unauthorized entry into data files, although no computer is completely
- safe from intrusion. 'Drowning' is a method that hides important information
- within data that is actually garbage and not useful. Cost-benefit factors come
- into play when it takes more time to sort through files than the sought after
- information is worth to begin with. 'Traps' are programs that engage intruders
- in a dialogue while the system is being invaded. Meanwhile the hacker is being
- tracked down by the computer's security system.
- _____________________________________________________________
- // FBI Haunted by West German Hackers // (3\0 d.log)
- Inattention in pursuing a widely publicized 1988 computer hacking case
- involving Marcus Hess is coming back to haunt the FBI, as West German
- authorities arrested Hess, along with several other hackers, for allegedly
- giving computer information to the Soviets. Hess had earlier been identified as
- being involved in the penetration of more than 30 computers at US research
- laboratories, military installations and defense contractors. US Air Force
- Office of Special Investigation assistant chief of computer crime, Jim Christy,
- says that the FBI has been embarrassed into more actively pursuing computer
- crime and that the Hess case is a catalyst that has engendered an understanding
- of the threat.
- _____________________________________________________________
- // Hotel Motel Holiday Inn Services // (3\2 u.s.t)
- Telesphere International will implement for Concord Hotels of Cleveland its
- Telesphere Planned Hotel telecommunication services. With TPH, Telesphere
- will provide a package of services utilizing the company's all digital fiber
- optic network. Included: High volume WATS, switched access WATS, hotel flat
- rate service, international calling and 900 information service. Telesphere
- International will provide credit card and operator-assistedcalling from public
- pay phones and hotel lobby phones at Concord Hotels. Callaccounting systems
- will be used to manage call activity and monitor line usage.Under the
- agreement, Telesphere will provide its TPH services to 11 hotels with 1,400
- rooms. The hotels are concentrated in the East but are expanding westward.
- :::: Information by The Curist / 615 ::::
- _____________________________________________________________
- // Hacker Busted: Steals DEC VMS code // (2\2 m.wk)
- Twenty-five-year-old computer hacker Kevin David Mitnick is being held without
- bail on charges that include stealing $1 million in software from DEC,
- including VMS source code, and causing that firm $4 million in damages. Mitnick
- is also charged with unauthorized entry into the Leeds University campus.
- [ TS here. Just wondering, this guy appeared on several systems, including
- Radio Waves. He positioned himself as an official...guess we could have learned
- from him. If there is anymore information on this articles, send it in. ]
- ____________________________________________________________________________
- ___________________________________________________________________________
- ::::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::::
- What "Vocab. Tonic" is, is a list of acronyms and definitions to
- help education the ignorant hacker. With an extensive vocabulary, there is
- virtually nothing one can't learn. Study on... CO - Central Office: The
- building which comprises a switching network and its control and support
- equipment. (Trash House) FX - Foreign Exchange Line: A voice circuit
- between a remote CO, and a station. IOSA - Ignorant Operator Silent
- Approach: Form of phreaking, relating to Voice Mail Systems. From 3rd
- Party Fraud, Part II. ETS - Electronic Translation Systems: An electronic
- replacement for the card translator in 4A Xbar systems. Makes use of SPC
- 1A Processor. XBAR - Cross Bar: Old switching system. SF - Single Frequency:
- A signaling method for trunks. 2600 Hz is impressed upon idle trunks.
- ____________________________________________________________________________
- ____________________________________________________________________________
- :::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::: "Against All Odds, There is Greatness" - TSR
- ____________________________________________________________________________
- ____________________________________________________________________________
-
- TSR will accept additional sponsor/support Systems. If you have a certain
- interest in the Report, and wish to provide support to TSR -- Leave your BBS
- number -- and any other information on RADIO WAVES Bulletin Board Systems.
- ____________________________________________________________________________
- ____________________________________________________________________________
- R A D I O W A V E S
- 6 1 2 - 4 7 1 - 0 0 6 0
- Syndicate Report Support BBS
- ____________________________________________________________________________
- ____________________________________________________________________________
- This concludes this Transmittal No. 23 (Part 1 of 2)
- Released June 13th, 1989
- by The Sensei
- Editor of The Syndicate Report
- ____________________________________________________________________________
- ___________________________________________________________________________