💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › TSR › synd-23.phk captured on 2022-06-12 at 14:50:41.

View Raw

More Information

-=-=-=-=-=-=-

    _______________________________________________________________________
    _______________________________________________________________________

                              THE SYNDICATE REPORT
                         Information Transmittal No. 23
                                 (Part 1 of 2)
                             Released June 13, 1989
                                   Featuring:

                                 Editor's Note
           Telecommunication Events, Conferences, Seminars, and Shows
                   Phreak Tools V1.1 - Remake of CNA/L Lister
               Radio WTSP Hacker Charged With Computer Tampering
                                The "950" Busts
                       Hacker Stereotypes and Statistics
                          Brief Notes from the Report
                               "Drowning Hackers"
                                Vocabulary Toni

                                 by The Sensei
                        Editor Syndicate Report Magazine
    _______________________________________________________________________
    _______________________________________________________________________

    EXPOSITION:                                                         TSR

    Once   again,   The   Report  accepts  outside  sources.   Anybody  can
    write/provide information to The Syndicate Report. Articles/Information
    may be provided through RADIO WAVES Bulletin Board System 612-471-0060.
    Any info such as Busts, Phreaking, Hacking, Data /  Telecommunications,
    and new developments on any the previous mentioned specialties will be:
    accepted,  labeled,  and  given  full actual credit to the article/info
    provider(s), or writer(s). -- ** All articles have been presented by me
    unless shown at the end of the article as the information  provider(s),
    or writer(s). **
    _______________________________________________________________________
    _______________________________________________________________________

    EDITOR'S NOTE:                                                      TSR

    TSR  #23,  late  as  usual.   Sorry, once again - life is testing me in
    many ways, that's why this issue is over a month  late.   This  apology
    goes  mainly  to 'contributing writers,' for their help in this Report.
    Reasons: Like I said, I've been busy, and most of the information  here
    is (unlikeusual) written by others.  A lot of the info. is from locals,
    and users that call Radio Waves System, since I've not been calling the
    usual systems lately.  I'm not going to go into a specific topic for my
    Editorial  this  issue,  instead  I'll  just  outline  a  few things of
    interest.  Just a quick note: Abbie  Hoffman,  author  of  "Steal  this
    Book" "Steal this Urine Test." and other books, is DEAD.  I heard about
    it on the news a whileback, approx 1.5 months ago, but I didn't get all
    the specifics.  From what I know he over dosed.  Now he's a legend.  PC
    Pursuit.  The  format change is complete, and all the old passwords are
    dead. June 1st was supposed to be  the  cut  off  date,  I  guess  they
    finally  did  something  on  time.   If  anyone  is still using the old
    format, it's probably  the  new  format.   I  haven't  heard  too  much
    information  on  the  new format(s), butthere has been talk of 20 to 30
    different formats used by  PCP.   Although  new  formats  can  be  made
    swiftly and easily to accomodate any abuse.  Good luck.

    The  4.6  trillion  chance  of  hacking  a  PCP  code is over, now it's
    justabout impossible.  The only codes you will see  now  are  the  ones
    hackers  have tapped from the "INSIDE of PCP." In TSR #23, Part II, I'm
    going to copy a letter I received from a guy in England. ;The Sensei  /
    TSR Editor
    _______________________________________________________________________
    _______________________________________________________________________

    TELECOMMUNICATION EVENTS,                                 TSR (c.c 6\9)
    CONFERENCES, SEMINARS, AND SHOWS:

    This  is  a  list  of  meetings  and  shows  in this coming month.  I'm
    providing this list for you and your friends to rob, cheat, and swindle
    the angered companies that participate in their events.  You are likely
    to find your dreams  come  true  in  telephone  accessories  and  other
    wonderful  equipment.  Many thing will be on show, so take items as you
    please. There could be butt sets, testing equipment, and  other  things
    at  your disposal. Remember, their parking lots are usually filled with
    BELL* trucks just waiting for you to clean them out.
         _____________________________________________________________

    June 6-9
    Payphone/Op Services Orlando, FL. Buena Vista Palace       713-974-6637
    June 7-9
    TEXPO '89 San Francisco, CA.  Civic Auditorium             415-542-7753
    June 11-13
    Illinois Telephone Assn. Osage Beach, MO. Tan-Tar Resort   217-525-1044
    June 11-14
    ICC '89 Boston, MA. Sheraton Boston Hotel                  617-466-3506
    June 11-14
    New York State Telephone Assoc. Lake Geroge, NY.           518-462-6696
    June 11-14
    ADUC 1989 National Conference Boston, MA.                  800-228-9290
    June 12-15
    BICSI Workshop Lexington, NY. Radisson Plaza Hotel         606-257-3972
    June 18-21
    Pennsylvania TelephoneHershey, PA. Hershey Hotel           717-238-8311
    June 18-21
    Arkansas Tel Assoc. Hot Springs, AR. Lake Shore Sheridan   501-375-0086
    June 18-22
    NENA '89 Long Beach, CA.     Hotel Queen Mary              213-596-0144
    June 19-21
    Videotex Industry Assoc. Ann. Conf. San Francisco, CA.     703-522-0883
    June 19-22
    NTCA Leadership Conf.San Francisco, CA.  Fairmount Hotel   202-298-2300
    June 19-23
    Fiberoptic Splicing/Termination Sturbridge, MA.            508-347-7133
    June 20-22
    AFCEA Intl. Convention/ExpoWashington, DC.                 703-631-6100
    June 20-22
    Maine Tel Assoc. Rockport, ME.  The Samoset Resort         207-763-9911
    June 20-22
    UTC Orlando, FL.        Buena Vista Palace                 301-621-5596
    June 24-28
    Georgia Tel Assoc. Sandestin Beach, Fl.  Sandestin Hilton  404-321-5440
    June 26-28
    Intelligent Network ConForum Chicago, IL.                  312-938-3500

             :::: Information provided by Seymour Lecker / TWA ::::
    _______________________________________________________________________
    _______________________________________________________________________

    PHREAK TOOLS V1.1 - REMAKE OF CNA/L LISTER:               TSR (p.f 5\5)

    Ever get tired of looking up out-dated CNA listings in text  files?  Or
    did  you ever wondered WHO own what prefix on an 1-800/900 exchange? If
    you have these problems, then check out  PHREAK  TOOLS  V1.1,  formerly
    called CNA/L Finder or Lister.  Professor Falken, of Minnesota 612, has
    reformatted this CNA/L Lister, and renamed it to fit its style.  Here's
    Falken's  latest information about Phreak Tools: "It has a 800/900 WATS
    Exchange Reverse Directory and a built in CNAfinder in it.  The 800/900
    directory, all you do is tell it what exchange youneed and it will tell
    you who owns it, and from that you should be able to  tell  if  it's  a
    safe  exchange.  The CNA program is the same as the current stand-alone
    version, however, all new releases of Automated CNA Finder will  be  in
    Phreak  Tools Versions 1.x+ New features to be in upcoming versions are
    newer CNA list, with ID codes.  Area code/Country code  finder,  and  a
    950  port  directory listing." (Sent via Radio Waves mail).  The latest
    version has some hard to get information,  and  can  be  found  onRadio
    Waves  BBS  at  (612)  471-0060, and the 203 area.  Currently, only IBM
    version 1.1 is available. There has been no  further  information  from
    Falken,  or  Twisted  Sector, 408 California, about an Apple version of
    Phreak Tools/CNA Lister.  News about this in future TSRs, or  on  Radio
    Waves (RW/TSR)

          The Author will be taking suggestions, and questions on RW.
         :::: Information by Professor Falken / Phortune 500 / 612 ::::
           :::: Contributing Writer, Programmer of Phreak Tools ::::
    _______________________________________________________________________
    _______________________________________________________________________

    RADIO WTSP HACKER CHARGED WITH COMPUTER TAMPERING:      TSR (5\11 ny.t)

    Michael I.  Shapiro and Terry L. Cole, former news executives of WTSP,a
    Florida  television  station  in  the  Tampa  area,  are  charged  with
    illegally  entering  the  computer  system  of   a   rival   television
    station.Christian  Hoyer,  an  assistant state attorney in Hillsborough
    County, who is prosecuting the case, says  that  Shapiro,  working  for
    WTSP,  Channel  10,  had previously worked for a rival station, Channel
    13.   Shapiro  is  chargedwith  using  his  own  microcomputer  and   a
    microcomputer  at  Channel 10 to break into Channel 13's news computer,
    possibly seeking a competitive advantage for  Channel  10's  newscasts.
    The case is unusual because it involves 'media espionage.'

                 :::: Information Provided by Romeo Andria ::::
    _______________________________________________________________________
    _______________________________________________________________________

    THE "950" BUSTS:                                          TSR (usr 5\9)

    A   bust  recently  went  down,  May  3rd,  1989.   It's  called  "Beta
    Cygnus,"which is in the  602  area  code,  address  602-234-3376.   The
    Sysop,  Mastermind,  did  something very foolish to get caught.  That's
    right, he was hacking 950-1001 and was caught.   At  the  time  of  his
    arrest/capture the attorney general of Arizona had ordered a DNR on his
    line,  consequently,  a  listing  of  all  callsgoing to/from his board
    number were captured by the Feds.   Mastermind's  system  and  hardrive
    etc..was  retrieved  INTACT.  Mastermind also kept all INFO-FORMS handy
    and  un-censored.   So  if  you  wereon  the  board,  and   left   some
    confidential information in the information form, the Feds have it now.
    Several  other  602 boards went down due to the NEWS, Temple of Doom is
    down, and the HD is nuked.  Valhalla Island did the same.

    * More busts are expected to come,  since  the  attorney  general  made
                            inferences to others. *

        :::: Information by Professor Falken / Phortune 500 / 612 ::::
    _______________________________________________________________________
    _______________________________________________________________________

    HACKER STEREOTYPES AND STATISTICS:                           TSR (5\19)

    Computer  hackers  have  broken  out  of  their  old  stereotypes.  The
    information necessary to commit computer  crime  is  spreading  rapidly
    through  the  population  as  computers  are becoming easier to access.
    According to a recent report  published  by  the  National  Center  for
    Computer  Crime  Data  (NCCCD),  32  percent of the people arrested for
    computer crimes are women, 43 percent are minorities and 67 percent are
    between the ages of 21 and 35. Former and  current  employees  are  far
    more  likely  to  breach a company's computer than someone from outside
    the company. Seventy percent of all computer crimes involve  the  theft
    of  money  or  services.  The NCCCD estimates that computer crimes cost
    the US $555 million in 1988. Also, 15 computer-years were lost in  down
    time  and  930 man-years were spent detecting and removing viruses. The
    arrest of computer criminals and the laws concerning them are examined.

                       :::: Information by TS / TSR ::::
    _______________________________________________________________________
    _______________________________________________________________________
    :::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES :::::::::::::::::::::

    // Drowning Hackers //                                      (3\0 d.log)

    Computer security is threatened by  the  nature  of  a  computer's  own
    configuration,   especially   stationary  networks.  Hackers  have  the
    advantage of surprise and a global entry capability.  Several  security
    measures  are  available  to  deter unauthorized entry into data files,
    although no computer is completely safe from intrusion. 'Drowning' is a
    method that hides important information within data  that  is  actually
    garbage  and  not  useful.  Cost-benefit factors come into play when it
    takes more time to sort through files than the sought after information
    is worth to begin with. 'Traps' are programs that engage intruders in a
    dialogue while the system is being invaded.  Meanwhile  the  hacker  is
    being tracked down by the computer's security system.

         _____________________________________________________________

    // FBI Haunted by West German Hackers //                    (3\0 d.log)

    Inattention  in pursuing a widely publicized 1988 computer hacking case
    involving Marcus Hess is coming back to haunt the FBI, as  West  German
    authorities  arrested  Hess,  along  with  several  other  hackers, for
    allegedly giving computer information to the Soviets. Hess had  earlier
    been  identified  as  being involved in the penetration of more than 30
    computers at  US  research  laboratories,  military  installations  and
    defense  contractors.  US  Air  Force  Office  of Special Investigation
    assistant chief of computer crime, Jim Christy, says that the  FBI  has
    been  embarrassed  into  more actively pursuing computer crime and that
    the Hess case is a catalyst that has engendered an understanding of the
    threat.

        _____________________________________________________________

    // Hotel Motel Holiday Inn Services //                      (3\2 u.s.t)

    Telesphere  International  will  implement  for   Concord   Hotels   of
    Cleveland  its  Telesphere  Planned  Hotel  telecommunication services.
    With TPH, Telesphere will provide a package of services  utilizing  the
    company's  all digital fiber optic network. Included: High volume WATS,
    switched access WATS, hotel flat rate  service,  international  calling
    and  900  information  service.   Telesphere International will provide
    credit card and operator-assistedcalling from  public  pay  phones  and
    hotel  lobby  phones  at Concord Hotels. Callaccounting systems will be
    used  to  manage  call  activity  and  monitor  line  usage.Under   the
    agreement,  Telesphere  will provide its TPH services to 11 hotels with
    1,400 rooms. The hotels are concentrated in the East but are  expanding
    westward.

                   :::: Information by The Curist / 615 ::::
         _____________________________________________________________

    // Hacker Busted: Steals DEC VMS code //                     (2\2 m.wk)

    Twenty-five-year-old  computer hacker Kevin David Mitnick is being held
    without bail on charges that include stealing $1  million  in  software
    from  DEC,  including VMS source code, and causing that firm $4 million
    in damages. Mitnick is also charged with unauthorized  entry  into  the
    Leeds  University campus. [ TS here.  Just wondering, this guy appeared
    on several systems, including Radio Waves. He positioned himself as  an
    official...guess  we  could  have learned from him. If there is anymore
    information on this articles, send it in. ]

    _______________________________________________________________________
    _______________________________________________________________________
    ::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::::

    What "Vocab. Tonic" is, is a list of acronyms and definitions  to  help
    education  the ignorant hacker.  With an extensive vocabulary, there is
    virtually nothing one can't learn.  Study on...

    CO - Central Office: The building which comprises a  switching  network
    and its control and support equipment.  (Trash House)

    FX  - Foreign Exchange Line: A voice circuit between a remote CO, and a
    station.

    IOSA - Ignorant Operator Silent Approach: Form of  phreaking,  relating
    to Voice Mail Systems. From 3rd Party Fraud, Part II.

    ETS  -  Electronic  Translation  Systems: An electronic replacement for
    the card translator in 4A Xbar systems.  Makes use of SPC 1A Processor.

    XBAR - Cross Bar: Old switching system.

    SF - Single Frequency: A signaling  method  for  trunks.   2600  Hz  is
    impressed upon idle trunks.

    _______________________________________________________________________
    _______________________________________________________________________
    :::::::::::::::::::::: TSR "Quote of the Month" :::::::::::::::::::::::

    "Against All Odds, There is Greatness"                            - TSR
    _______________________________________________________________________
    _______________________________________________________________________


    TSR  will  accept  additional  sponsor/support  Systems.  If you have a
    certain interest in the Report, and wish to provide support to  TSR  --
    Leave  your  BBS  number  --  and  any other information on RADIO WAVES
    Bulletin Board Systems.

    _______________________________________________________________________
    _______________________________________________________________________

                             R A D I O   W A V E S
                            6 1 2 - 4 7 1 - 0 0 6 0
                         Syndicate Report Support BBS
    _______________________________________________________________________
    _______________________________________________________________________

                    This concludes this Transmittal No. 23                                                    (Part 1 of 2)
                         Released June 13th, 1989
                                 by The Sensei
                         Editor of The Syndicate Report
    _______________________________________________________________________
    _______________________________________________________________________

    _______________________________________________________________________
    _______________________________________________________________________

                              THE SYNDICATE REPORT

                         Information Transmittal No. 23
                                 (Part 2 of 2)

                             Released June 13, 1989
                                   Featuring:

                                 Editor's Note
                          "Hacker from England Letter"

                     The CT2 Phone - Another Abuse Product

                 Virus Outbreaks Spur Congree To Combat Threat

                  How To Become A Syndicate Report Support BBS

                  Credit Card Fraud: Old Techniques Still Work

                          Brief Notes from the Report

                                 by The Sensei
                        Editor Syndicate Report Magazine

    _______________________________________________________________________
    _______________________________________________________________________

    EXPOSITION:                                                         TSR

    Once  again,  The  Report  accepts  outside   sources.    Anybody   can
    write/provide information to The Syndicate Report. Articles/Information
    may be provided through RADIO WAVES Bulletin Board System 612-471-0060.
    Any  info such as Busts, Phreaking, Hacking, Data / Telecommunications,
    and new developments on any the previous mentioned specialties will be:
    accepted, labeled, and given full actual  credit  to  the  article/info
    provider(s), or writer(s). --

    **  All  articles  have been presented by me unless shown at the end of
    the article as the information provider(s), or writer(s).  **

    _______________________________________________________________________
    _______________________________________________________________________

    EDITOR'S NOTE:                                                      TSR

    One day I went digging through some of  my  old  letters  in  the  file
    cabinet.  A  lot  were from computer people -- this was all normal USPS
    Mail.  One caught my eye.  It was from a guy in England.   I  forgot  I
    ever  got  it,  and  for  good reason, it's post dated May 21, 1986.  I
    found it interesting...

         _____________________________________________________________

    My name                                            John Doe
    and Address                                        North Hull Estate
                                                       HULL
                                                       North Humerside
                                                       ENGLAND
                                                       Phone 0482 XXXXXX

                                                       21st May  86

       Dear Sensei,

       Hello,  as  you can see, I live about 4200 miles away from you hence
    this letter, I'll try to keep it short.

       I know that you have, or had a C128 with a Volks 300-1200  modem,  I
    have  a Atmos 48k with D/D and a Voyager 11 modem, giving 1200/1200 and
    300/300 baud. I am not 'on-line' at the moment, due to  some  technical
    problem with my cable, but when I am my password is 'xxxx'.

       Tell  me  now  if  you  can,  have you heard of a piece of equipment
    called a 'phreaker', there is a great lack of information  'over  hear'
    regarding this machine, but apparently it aids you in your phone bills.

       With the limited knowledge available to me, I know your "Bell-Phone"
    system  works  on  the 'two-phase' method, this would cause only slight
    problems in altering one or two of the part numbers.

       If you do know about this machine, I would be greatful to you if you
    could let me have details about its construction, part numbers each.

       Awair as I am that there will be some  cost  involved,  I  am  quite
    prepared  to respond with an agreed 'fee' for any and all information I
    can get.  Should you be able to send this machine to me via  air  mail,
    or  boat,  this  would prove expenceive from this end, and so I think a
    diagramm with part numbers, the best option.

       Anyway Sensei, I seem to be 'rabbiting' a bit, so I think I'll close
    now, iff youcan get some free time, would you simply 'drop me  a  line'
    to say that you have received my letter.

    Many thanks.

       Yours sincerely,

       John Doe

         _____________________________________________________________

       Interesting,  eh?   When  I  first  read  this, I laughed.  This guy
    thinks a 'phreaker' is a machine.  I thought it was a person.  Well,  I
    tried to call the guy with the number, via MCI (love that service), and
    I  got  no  answer.   Back  in  '86 about this time, there was a lot of
    paranoia about busts.  I thought this was some guy from England  trying
    to find out about phreaking, thus do some busting or whatever.  I never
    responded.

       Some  of my readers are overseas, so if this person is reading this,
    write me again.  I'm not sure how this person got all  the  information
    about  me then.  I did have a C128, with other computers.  Maybe it was
    an overseas commie system.  Who knows.

       These types of responses are rare -- via  USPS.   Usually  it's  all
    through  networking/email  etc.   But  I'm  thinking  about  posting  a
    READER'S RESPONSE COLLUMN in future  TSRs.   I  do  get  many  bits  of
    information  from  the readers, so if I get a lot on a particular month
    -- I'll post more.  Send those responses in!  Via Radio Waves.

                               The Sensei/TSR '89
    _______________________________________________________________________
    _______________________________________________________________________

              THE CT2 PHONE - ANOTHER ABUSE PRODUCT: TSR (p.f 5/5)

    British  Telecom,  has  made  a  cordless phone that's really portable.
    It's called the CT2 and weighs only 2.7 ounces.  You bring it with  you
    wherever you go, and when you are within reach of one of the base units
    popularly   called   "  PhonePoints  ",  you  can  make  calls.   These
    PhonePoints/base units are permanently installed at  popular  locations
    such  as  airports,  bus/train  stations,  shopping  malls, and grocery
    stores.  The CT2 is expected  to  cost  about  as  much  as  a  regular
    phortress  phone call ($0.25), which makes it much more affordable than
    a cellular phone.

     The CT2's base unit has a range of 200 meters from its antennae.   The
    technology  is  based  on  ISDN ( Integrated Services Digital Network )
    instead of the current  analog  technology.   The  CT2  works  in  this
    matter,  1)  Once  you are in range of any of the CT2's base units (200
    meters) you turn the phone to the TALK position. 2) At  this  time  the
    telephone  scans  the 40 channels designated for it's use. The channels
    are in the 864 Mhz to 868 Mhz range, which is a step above the  current
    Cellular  frequencies (810 Mhz to 830 Mhz).  3) The phone sends out its
    owners  billing  information  and  authorization  code  etc.   4)   The
    PhonePoint  checks  the  users  billing info and ID code with a central
    computer, and if everything matches up, you get a dialtone.

                              :::: THE ABUSE ::::

    The process of scanning and locking onto the first available  frequency
    is  called FDMA ( frequency division multiple access ), British Telecom
    claims this " avoids the  cross-talk  interference  "  common  in  most
    cellular phones currently.  The PhonePoint/CT2 system is to be deployed
    sometime  within the next 2 years, for an approximate price of $275 per
    phone & access fees. At this time, it makes  me  wonder  if  they  will
    encrypt  the  data  going  back & forth.  If not, they could have major
    abuse to the system, just think what a person with a  portable  scanner
    could  do?  All he'd have to do is scan the 860 Mhz range and listen to
    peoples billing info and/or conversations,  the  information  gathering
    possibilities are unlimited.

         :::: Information by Professor Falken / Phortune 500 / 612 ::::
    _______________________________________________________________________
    _______________________________________________________________________

    VIRUS OUTBREAKS SPUR CONGRESS TO COMBAT THREAT TSR           (i.w. 6\9)

    Concerned  by  press  reports  and  stung by its own outbreak, The U.S.
    Congress has begun talking about ways to combat computer viruses.

    FBI Director William Sessions warned last week that no current statutes
    specifically  address  viruses,  particularly  those  where  damage  is
    limited  to  lost  time  instead  of  data  and where the virus maker's
    motive is unclear.

    "Viruses are easy to create and propagate,  require  little  expertise,
    and  may  by nearly impossible to prevent or detect," Sessions told the
    Senate on Technology and the Law.

    Sessions said the FBI  is  developing  behavior  profiles  of  computer
    hackers  in an effort to combat viruses but noted that the FBI has only
    conducted two criminal investigations of viruses so far. [ TS  here  --
    Only  two  cases?   Damn,  I thought the FBI was a little more informed
    about viruses than that!  One almost pulls down an entire network, yet,
    no one on their staff can understand one completely.  So, all you virus
    spreadors better get hopping before the law strikes back. ]

    Bill  introduced  is called the Computer Virus Eradication Act of 1989.
    By Wally Herger of Calif.

    The  reason,  according  to  Herger's  press  secretary Mahan, is three
    different House offices were infected by a  virus  through  a  computer
    bulletin  board  network  shortly before an earlier version of Herger's
    bill was introduced in May 1988.

    If   viruses  persist,  "out  networks  could  be  consumed  by  mutual
    suspicion,"   testified   Clifford   Stoll,   a   scientist   at    the
    Harvard-Smithsonian   Center   for  Astrophysics  in  Cambridge,  Mass.
    "Networks could become so bureaucratic no one could use them  anymore,"
    he  said.   "Cleaning  up  after viruses may be cheaper than preventing
    them." Stoll helped track down a West  German  hacker  who  broke  into
    various unclassified military computer in this country.  "Catching this
    spy  took  over  a  year  of full-time effort," he said.  "While he was
    reaching into out computer, I lost a year of astronomy research.   Much
    worse, a thief was stealing information from out nation's computers."

    [  What,  was he required to track this guy down for an entire year?  I
    really feel sorry for him.  He could have just  asked  some  local  BBS
    kids -- he would have gotten further, quicker.  -TS ]

    _______________________________________________________________________
    _______________________________________________________________________

    HOW TO BECOME A SYNDICATE REPORT                         TSR (tsr 6\13)
    SUPPORT BULLETIN BOARD SYSTEM:

    At  the  end  of each TSR Information Transmittal, you'll see a message
    something like...

    "TSR will accept additional sponsor/support  Systems.  If  you  have  a
    certain  interest  in the Report, and wish to provide support to TSR --
    Leave your BBS number -- and  any  other  information  on  RADIO  WAVES
    Bulletin Board Systems."

    Many  users/sysops,  after  reading TSRs, ask, "How can I (or whomever)
    become a TSR Support BBS"?  Well, knowing that not everyone reads every
    bit of data in a magazine, I'll write about in now. This article has  a
    heading  at  the beginning of TSR and some substantial space, so people
    should understand now.

    Number one, if you like The Syndicate Report, you're already  half  way
    to  having a TSR support system.  When I look over possible TSR support
    BBSs, I look for what interests me in the BBS.  It should favor certain
    hobbyists such as: hackers, phreaks, pirates, thrashers, etc.   If  you
    don't  you  might  as well forget it -- since I probably won't call the
    system anyway to upload it regularly, nor anyone else.

    But,  if  you   have   those   qualities   with   a   good   piece   of
    software/hardware,  then just leave your phone number and BBS name, and
    any  login/new  user  info  to  me  in  feedback/mail  on  Radio  Waves
    612-471-0060.  I'll reply back to you within a few days, no longer than
    a week.  In that time, I'll probably be checking out your system.

    Most of the systems that do support TSR are ones that I've been calling
    for a while, and I've picked.

    What  I  usually require a BBS to have, is a transfer area dedicated to
    The Syndicate Report for easy up/downloading.  Also,  if  there  is  an
    intense  demand, a sub-board may erect.  Usually sub-boards only appear
    on highly active hack orientated systems.

    So, if you wish to become a TSR support BBS, get a hold on me and leave
    any BBS information.  Thank you for your support.

    ;The Sensei / TSR

    _______________________________________________________________________
    _______________________________________________________________________

    CREDIT CARD FRAUD; OLD TECHNIQUES STILL WORK:           TSR (strs 6\13)

    Credit  card  fraud  is  doing  very  nicely,  thank you.  And, in some
    degree, that is a result of poor retail procedures and  policies,  says
    Limited Credit Services, Inc.  and U.S. Secret Service agent Perry.

    One  of  the  most serious internal fraud problems retailers are facing
    has not abated over the last several years.  Or, as  the  SS  puts  it:
    "The  Nigerians  are still alive an well.  I hate to keep beating up on
    them, but they're responsible, probably, for about 50%  of  everybody's
    fraud."

    The Assoc. of Credit Card Investigators' latest bulletin states: 'There
    are  now an estimated 30k to 50k Nigerians in the U.S. and an estimated
    75% to 90% of this group participates in fraudulent activity.' "

    The security asserts: "It is amazing they have changed their techniques
    very little and are still able to get away with  it."  They're  getting
    away  with  it  to  a  large  extent  by  going  into establishments as
    employees. Especially in the personnel departments -- that's where they
    want to work.  They can get access to the information and  they're  off
    to  the races.  Employers assume they put these people into entry level
    jobs and they're not going to do anything. But they want  entry  level,
    low  profile  jobs,  like  a factory environment, almost.  And a lot of
    credit card operations are like factory environments. One  they're  in,
    keying  in payments, for example, they have the customer's back account
    number, where the checks  are  drawn.   Most  of  the  time  there's  a
    statement  header  that says what the person's credit line is, what the
    balance is.

             [ More Credit Card Technique Information in TSR #24. ]

                :::: Information by Credit Card Carny / 407 ::::
    _______________________________________________________________________
    _______________________________________________________________________

    ::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES ::::::::::::::::::::

                      // Pizza Hut Uses Central Number //

    Telecommunications  advances  are  helping  Pizza  Hut  deliver  pizzas
    faster.  National  Telecom's  Automatic Call Distributor allows several
    shops  in  an  area  use  a  single   number.    Incoming   calls   are
    automatically  routed  to  the shop nearest the caller's location.  The
    system also features management information capability,  helping  store
    managers  monitor  service.  If  you  have  more  information  on  this
    technology, dial Radio Waves now.
         _____________________________________________________________

                      // One in 10 to use fiber by 2001 //

    Telecommunications  industry  experts  estimate  that 10 percent of all
    American homes will be connected by fiber optics in the year  2001.   A
    University  of  Southern  California  survey reported in Communications
    Week's current issue predicted 10 million  Americans  work  from  their
    homes  in  2001 and would need the communications capability offered by
    fiber optics.

             :::: Information Provided by Celtic Phrost / 713 ::::
         _____________________________________________________________

                      // UK Law fails to snare Hackers //

    United  Kingdom  companies  have  no  laws   to   protect   them   from
    unauthorized   access   to  computer  files.  Existing  laws  refer  to
    fraudulent tampering with programs. Proposals for new legislation  from
    the Scottish and English Law Commissions are not expected to change the
    situation  in  the next two years. Two communications tappers who broke
    into the Duke of  Edinburgh's  mailbox  on  British  Telecom's  Prestel
    service have been fined 1,350 pounds sterling for electronic forgery.

    _______________________________________________________________________
    _______________________________________________________________________

    TSR  will  accept  additional  sponsor/support  Systems.  If you have a
    certain interest in the Report, and wish to provide support to  TSR  --
    Leave  your  BBS  number  --  and  any other information on RADIO WAVES
    Bulletin Board Systems.

    _______________________________________________________________________
    _______________________________________________________________________

    The Black Market :: 408-741-5443  -------  Lanatic Labs :: 415-278-7421
    Login: Zeppelin   New User: Bong                        P/H System

    Tiamat's Temple  :: 612-731-0296  -------  Hysteria Prl :: 612-557-2811
          P/H-Files                                  Unix!Proline System

                       RADIO WAVES System :: 612-471-0060
                        - Syndicate Report Support BBS -
    _______________________________________________________________________
    _______________________________________________________________________

                    This concludes this Transmittal No. 23
                                 (Part 2 of 2)

                           Released June 13th, 1989

                                 by The Sensei
                        Editor of The Syndicate Report

    _______________________________________________________________________
    _______________________________________________________________________

                                   -= EOF =-