💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › TSR › synd-21.phk captured on 2022-06-12 at 14:50:38.

View Raw

More Information

-=-=-=-=-=-=-

    _______________________________________________________________________
    _______________________________________________________________________


                              THE SYNDICATE REPORT

                         Information Transmittal No. 21
                                 (Part 1 of 2)

                             Released March 2, 1989
                                   Featuring:

                                 Editor's Note
                            "PCP Hacking Statistics"

                   AT&T Works on Making Unix Less Vulnerable
                         MCI Mail Rates and Info Change

                  AT&T Bellcore & Tiniest Semiconductors Ever

                             Common Unix Passwords

                          Briefs notes from The Report

                                Vocabulary Tonic

                                 by The Sensei
                        Editor Syndicate Report Magazine

    _______________________________________________________________________
    _______________________________________________________________________

    EXPOSITION:                                                         TSR

    Once   again,   The   Report  accepts  outside  sources.   Anybody  can
    write/provide     information     to     The     Syndicate      Report.
    Articles/Information may be provided through RADIO WAVES Bulletin Board
    System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data /
    Telecommunications,  and new developments on any the previous mentioned
    specialties will be: accepted, labeled, and given full actual credit to
    the article/info provider(s), or writer(s). --

    ** All articles have been presented by me unless shown at  the  end  of
    the article as the information provider(s), or writer(s). **

    _______________________________________________________________________
    _______________________________________________________________________

    EDITOR'S NOTE:                                                      TSR

                       " PC PURSUIT HACKING STATISTICS "

    PCP  password  hackers  are  welcome  tools  for virtually all types of
    users: Phreaks, Pirates, Terrorists,  system  Hackers,  etc.   PCP  has
    become  the  perfect  way  to dial long distance with low error ratios,
    flexibility with ID codes/passwords used on  other  networks  and  most
    importantly,  safety.  Telenet  is  because of the huge number of calls
    that are handled every day by the big networks, keeping track of  where
    every  call and connection is made from is financially impractical.  It
    is also very easy to disguise your location using  the  network,  which
    makes dial LD even more secure.

    As time and technology interface, code abusing slowly becomes past-time
    reminiscence for busted hackers.  In response,  PCP  becomes  the  only
    resource  for  paranoid hackers, alike.  Along these lines of paranoia,
    the need for PCP password hackers increases.

    After all the years that PCP has existed, I've only seen 5 PCP password
    hackers.  And of the  5  hackers,  3  of  these  devices  were  totally
    useless for obvious reasons, upon execution...

    Some of the obvious
    problems indicated :  No online modem configuring.

                          Incomplete documention & Technical Information.
                          These apply to the anti-user friendly hacks.

                          Inaccurate response detecting positive completion
                          of passwords.

                          Ineffective random variable password generating.

                         ...and with all beta programs -- minor bugs.

    With this in mind, I'd like to add some PCP Statistics.  PCP  ID's  and
    Passwords are not easy to get.  Format area: PCP12345 and ABCD6789.

    The  first  thing  a hacker considers when using a hacker is, what? PCP
    ID to use.  Most are between 10,000 and 40,000.  I have never  seen  an
    ID over 40,000. PCP doesn't disclose annual PCP profits, nor the number
    of  subscribers  they  currently  have.   Although  the  number by many
    hackers is approximated around 5,000  to  6,000.   Keep  in  mind  that
    businesses  use  PCP accounts too, in case your criticizing that you've
    never seen 5,500 subscribing hackers.  Therefore, the change of gaining
    a valid ID are significantly good.

    Of course, the PCP IDs do not  bug  hackers.   The  complexed  password
    scheme  is  the  brain  parasite.  First there is the 4 random letters,
    then the 4 random numbers - joined.   In  essence,  what  a  hacker  is
    dealing  with  is  2  passwords beyond 1.  The LETTERS, and the NUMBERS
    must match up - not the entire string as a whole since the letters stop
    after 4, then take on an entire new syntax.

    I've seen some passwords that had numbers in the letter positions,  and
    vise  verse for the letters.  Majority however stay in the above listed
    format.

    If interested in a PC Pursuit password hacker, consider using Phry Code
    Pro., by The Exciter / 612.  Latest  version  can  be  found  on  RADIO
    WAVES.

                            ;The Sensei / Editor TSR
    _______________________________________________________________________
    _______________________________________________________________________

    AT&T WORKS ON MAKING UNIX LESS VULNERABLE:                TSR (iw 2\11)

    Enhanced  security  features are being developed for Unix System V.4.1.
    AT&T's vice  president  stated.   His  keynotes  to  the  Usenix  Tech.
    Conference  in  California insisted that open, multivendor networks are
    not centrally more susceptible to security violations than  proprietary
    systems.

    Security  is  on  the  mind  of  every  Unix  user,  particularly  when
    Unix-based systems are to be used for  mission-critical  and  strategic
    applications, like running a high end workstation.

    The  new  version, on Unix, will achieve the National Security Agency's
    B2 level of security, and will actually also have some features of  the
    B3 level as well.  Powerful security tools exist in the current version
    of  Unix  V,  but have often gone unused by administrators because of a
    lack of quality documentation and training.  AT&T will also  be  adding
    surreal  security  features to System V.4.1., the first revision of the
    sill unreleased system V.4.0. Procrastination seems to be top  priority
    for  many  software  vendors - just look at Lotus.  Well, Unix won't be
    very   welcome   for   the   Hacking   Community,   and   myself.   The
    features/improvements include:

                           Access methodology beef up
                         Maintenance of Data Integrity
                             The denial of service
                     Hacker/Intruder/Terrorist containments
                ...and the execution of the "superuser" status.

    About   the  "superuser"  chop.   This  is  the  most  popular  status,
    especially for hackers, and AT&T takes it out.  It did more  good  than
    bad  in  the  long  run.  In  its  place will be a finer distinction in
    status.  There will be a status of "superuser" that is  only  used  for
    mounting  the  systems.   That  user  will  not be able to access other
    "superuser" privileges.

    Control of the front end of system access - password security - will be
    enhanced by the use of "shadow" password files.  The  files  containing
    the  password  (etc/passwd)  have  been  far  to  easy  to access.  So,
    restricted access to files, along with a form of activity audit,  which
    will  be  used in System V.4.1.  Actually, the greater sense within the
    system, including user and group IDs, aging information, and a  command
    and log-in audit.

    Editor's suggestions:

    Keeping systems resources in locked rooms/shells, to prevent shaking of
    the shielding of shells/rooms, which can reveal information to external
    devices.   AT&T  should  also use a dedicated printing resource to each
    high level of security - a printer on  each  label  page?   Well,  that
    would  code  a  lot of money, but LD services do it all the time, along
    with personal supervision. Then theres Fiber-Optics, and  the  security
    advantage  there.   As  printed  in  THE SYNDICATE REPORT #20 (part 2),
    where an article explains the procedures in Tapping Fiber Optic cables.
    Then again, it's hard to break into a FO  cable  without  bringing  the
    system down, with a nice alarm response.

    :::::::::::: Information written by The Sensei (TSR Editor) :::::::::::
    _______________________________________________________________________
    _______________________________________________________________________


    MCI MAIL RATES AND INFO CHANGE:                          TSR (u.t 2\15)

    Beginning  early  February 1989 MCI Mail will LOWER the cost of Instant
    Messages and domestic Fax Dispatch.  In addition, we  will  offer  FREE
    800  Access,  FREE  Advanced  Service and FREE Shared Lists.  MCI's new
    retail prices are as follows:

                             :: Instant Messages ::

                   0-500 Characters                    $ .45
                   501-2500 Characters                 $ .75
                   2501-7500 Characters                $1.00
                   Each Additional 7500 Characters     $1.00

                          :: Domestic Fax Dispatch ::

                   First Half Page                     $ .50
                   Each Additional Half Page           $ .30

                                  :: Access ::

             800 Access                          No Charge
             U.S. tymnet Access                  $ .25/ Per Minute
             International tymnet Access         $ .30/ Per Minute

                    :: MCI Mail's new 800 numbers will be ::

            Access Speed                        800 Telephone Number

              300, 1200 bps...........................800-234-MAIL
              2400 bps............................... 800-456-MAIL
              Lotus Express & Desktop Express.........800-825-1515
                                (up to 2400 bps)

    _______________________________________________________________________
    _______________________________________________________________________

    AT&T BELLCORE & TINIEST SEMICONDUCTORS EVER:             TSR (b.w 2\27)

    As the transistors on  computer  chips  steadily  shrivel  away  toward
    nothingness,  scientists  are  faced with a task much like figuring out
    how many atoms can dance on the head of a  pin.   Researchers  as  AT&T
    Bell  Laboratories  are  closing  in.   They  have  devised a method of
    producing the tiniest semiconductor crystals ever: clusters  containing
    as few as 100 atoms.  They are so far too tiny to 'print' with even the
    wispiest microcircuit.  Still, they may have practical applications.

    That's because a young polymer chemist, has developed a way to keep the
    clusters  from  combining  into  larger clumps, as they otherwise would
    do.  He grows each microcrystal inside  a  minuscule  water  droplet  a
    thousand times smaller than the diameter of a human hair, then replaces
    the  water with organic molecules.  "It's like putting the cluster in a
    little plastic bad," he says. The clusters can be 'tuned' for  specific
    jobs  because  they  absorb  different  wavelengths  of  light  as they
    decrease in size.  So they could be used for optical switches in future
    "optoelectronic" chips.
    _______________________________________________________________________
    _______________________________________________________________________

    COMMON UNIX PASSWORDS:                                   TSR (p.p 2\21)

    The subsequent list of words are a list  of  commonly  used  passwords,
    use  on  Unix computer systems.  The list also contains syntax from the
    illustrious UNIX Internet Worm on November, 1988.  Combine them into  a
    favorable Unix Hacker.

         _____________________________________________________________

    :::::::::::::::::::::::::::: Unix Passwords :::::::::::::::::::::::::::
         _____________________________________________________________

      aaa                daniel             jester             rascal
      academia           danny              johnny             really
      ada                dave               joseph             rebecca
      adrian             deb                joshua             remote
      aerobics           debbie             judith             rick
      airplane           deborah            juggle             reagan
      albany             december           julia              robot
      albatross          desperate          kathleen           robotics
      albert             develop            kermit             rolex
      alex               diet               kernel             ronald
      alexander          digital            knight             rosebud
      algebra            discovery          lambda             rosemary
      alias              disney             larry              roses
      alpha              dog                lazarus            ruben
      alphabet           drought            lee                rules
      ama                duncan             leroy              ruth
      amy                easy               lewis              sal
      analog             eatme              light              saxon
      anchor             edges              lisa               scheme
      andy               erenity            angerine           scott
      arrow              elizabeth          maggot             sex
      arthur             ellen              magic              shark
      asshole            emerald            malcolm            sharon
      athena             engine             mark               shit
      atmosphere         engineer           markus             shiva
      bacchus            enterprise         marty              shuttle
      badass             enzyme             marvin             simon
      bailey             euclid             master             simple
      banana             evelyn             maurice            singer
      bandit             extension          merlin             single
      banks              fairway            mets               smile
      bass               felicia            michael            smiles
      batman             fender             michelle           smooch
      beauty             fermat             mike               smother
      beaver             finite             minimum            snatch
      beethoven          flower             minsky             snoopy
      beloved            foolproof          mogul              soap
      benz               football           moose              socrates
      beowulf            format             mozart             spit
      berkeley           forsythe           nancy              spring
      berlin             fourier            napoleon           subway
      beta               fred               network            success
      beverly            friend             newton             summer
      bumbling           george             osiris             tape
      cardinal           gertrude           outlaw             target
      carmen             gibson             oxford             taylor
      carolina           ginger             pacific            telephone
      caroline           gnu                painless           temptation
      castle             golf               pam                tiger
      cat                golfer             paper              toggle
      celtics            gorgeous           password           tomato
      change             graham             pat                toyota
      charles            gryphon            patricia           trivial
      charming           guest              penguin            unhappy
      charon             guitar             pete               unicorn
      chester            hacker             peter              unknown
      cigar              harmony            philip             urchin
      classic            harold             phoenix            utility
      coffee             harvey             pierre             vicky
      coke               heinlein           pizza              virginia
      collins            hello              plover             warren
      comrade            help               polynomial         water
      computer           herbert            praise             weenie
      condo              honey              prelude            whatnot
      condom             horse              prince             whitney
      cookie             imperial           protect            will
      cooper             include            pumpkin            william
      create             ingres             puppet             willie
      creation           innocuous          rabbit             winston
         _____________________________________________________________

    Paean :  The Merc          V.4.1. passwd!locator
             Shooting Shark    Gfiles : Unix hacker
             The Mentor        LOD/H : Pheonix Project 512-441-3088
             TSR Dedicated     Field users

    ::::::::::::::::::: Information provided Multiformly ::::::::::::::::::
    _______________________________________________________________________
    _______________________________________________________________________
    ::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES:::::::::::::::::::::

    // Bell 900 Battles //

    AT&T, MCI and US Sprint are  arming  themselves  for  a  new  round  of
    competition in interactive 900-call services, according to TSR sources.
    AT&T  has  been  hoping for FCC approval of its interactive 900 tariff.
    MCI has been testing and plans to offer a 900 service next month.   And
    US Sprint plans to begin customer testing of its service in April '89.

         :::::::::::: Information provided by MPhone / 203 :::::::::::
         _____________________________________________________________

    // NSA Chooses Its Security //

    The  National  Security  Agency  has  chosen  the  AT&T  security  code
    algorithm called Code Excited Linear Predicted.  NSA will  propose  the
    algorithm  be  adopted  as  a  government-wide standard.  Production is
    shared by AT&T,  Motorola  and  GE  RCA.   The  algorithm  is  a  4,800
    bits-per-second coder that checks speech patterns.
    _______________________________________________________________________
    _______________________________________________________________________

    ::::::::::::::::::::::::: TSR Vocabulary Tonic ::::::::::::::::::::::::

    What  "Vocab.  Tonic" is, is a list of acronyms and definitions to help
    education the ignorant hacker.  With an extensive vocabulary, there  is
    virtually nothing one can't learn.  Study on...

    DS  - Digital Switch.  A switch in which connections are established by
    operations on digital signals without conversion to analog.

    DSX - A digital cross connect field  which  can  be  utilized  for  DS1
    (Digital Switch), DS2 or DS3 level cross connections at a digital level

    RPOA - Registered Private Op. Agencies (ID of online system).

    SCC   -   (or   SCCS),   Switch   Control   Center.   SCC  has  overall
    responsibility for the administration and maintenance  of  BOC  Central
    Offices.  Responsibilities include installation and maintenance Control
    Office for FG B, C, and D.  SCC also handles specific trouble reports.

    TAMS - System where NUIs are checked by a  central  database  when  you
    try to connect to an address, on GTE Telenet.

    TD  -  Terminating  Direction.   The  use  of  Access  Service  for the
    completion of a call from an IC (Interexchange Carrier) location to  an
    end user.
    _______________________________________________________________________
    _______________________________________________________________________

    :::::::::::::::::::::::: TSR "Quote of the Month" :::::::::::::::::::::

              "They [Hackers] have this need to find the answer."

                 To subscribe to the 2600 Magazine send 15$ to:
                                 2600 Magazine
                                  P.O. BOX 752
                            Middle Island N.Y. 11953

                          Corley, Editor 2600 Magazine
    _______________________________________________________________________
    _______________________________________________________________________

    TSR  will  accept  additional  sponsor/support  Systems.  If you have a
    certain interest in the Report, and wish to provide support to  TSR  --
    Leave  your  BBS  number  --  and  any other information on RADIO WAVES
    Bulletin Board Systems.
    _______________________________________________________________________
    _______________________________________________________________________

    Pheonix Proj. LODH :: 512-441-3088  -----  Lunatic Labs :: 415-278-7421
    At Login:  Any UNIX Default PW                               P/H System

    HackersDen 2600 #5 :: 612-522-3959  -----  Hack Shack @ :: 214-422-4307
    P/H-Files BBS                              Login: Any UNIX Default Pass

                       RADIO WAVES System :: 612-471-0060
                        - Syndicate Report Support BBS -
    _______________________________________________________________________
    _______________________________________________________________________

                     This concludes this Transmittal No. 21
                                 (Part 1 of 2)

                            Released March 2nd, 1989

                                 by The Sensei
                         Editor of The Syndicate Report

    _______________________________________________________________________
    _______________________________________________________________________

    _______________________________________________________________________
    _______________________________________________________________________



                              THE SYNDICATE REPORT

                         Information Transmittal No. 21
                                 (Part 2 of 2)

                             Released March 2, 1989
                                   Featuring:

                                 Editor's Note

                           "Cyberpunks" Vs. The Media



          Telecommunications Events, Conferences, Seminars, and Shows

                   Software Links Unix System to Atomic Clock

                          Briefs notes from The Report
                         " Hackers Fail Raiding ATMs "

                                 by The Sensei
                        Editor Syndicate Report Magazine

    _______________________________________________________________________
    _______________________________________________________________________

    EXPOSITION:                                                         TSR

    Once   again,   The   Report  accepts  outside  sources.   Anybody  can
    write/provide     information     to     The     Syndicate      Report.
    Articles/Information may be provided through RADIO WAVES Bulletin Board
    System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data /
    Telecommunications,  and new developments on any the previous mentioned
    specialties will be: accepted, labeled, and given full actual credit to
    the article/info provider(s), or writer(s). --

    Special Editor, TS, comments are placed between  brackets.
    Example: [ Hi. ]

    **  All  articles  have been presented by me unless shown at the end of
    the article as the information provider(s), or writer(s).  **
    _______________________________________________________________________
    _______________________________________________________________________

    EDITOR'S NOTE:                                                      TSR

    Just a quick note.  Just in case many of you don't know...I  distribute
    an  introduction  package  at  least 3 days every month before actually
    releasing The Syndicate Report.  These can  be  found  on  the  systems
    listed at the end of this part of TSR.

    ;The Sensei / TSR!612
    _______________________________________________________________________
    _______________________________________________________________________

    "CYBERPUNKS" VS. THE MEDIA:                              TSR (s.t 2\27)

    The  following  article  can  from  a  newspaper  local to myself.  The
    newspaper is the "Star and  Tribune."  I,  The  Sensei,  usually  don't
    print  up  verbatim  copies  of  articles,  but  this articles was very
    interesting and entertaining.

    Some of the information presented in insulting to most Hackers/Phreaks,
    etc., so I'm going to comment on parts of the article.   Comments  will
    be in designated brackets, like this: [ Blah, Blah...Har Har -TS ]

         _____________________________________________________________

    Silicon  Valley  --  A local Cop patrolling after midnight witnessed an
    unusual sight, even for this center of high technology:  Two  teenagers
    wedged  in  a  phone  booth,  laboring  over  the  keyboard of a laptop
    computer clipped into the telephone line.

    [ This is very humorous for me...I can't help wondering what  technique
    these guys are using to access Bell Fone's, heh. ]

    The  youths,  who were arrested for telephone fraud and computer abuse,
    belong to a shadowy culture of computer vandals committed to  illegally
    entering  and  frequently tampering with the computer networks on which
    society has come to rely.

    Those  in  this  expanding  underground  --  known  as  CYBERPUNKS   to
    themselves and some social scientists -- have broken into corporate and
    military  computers  and  tampered  with  telephone  billing  switching
    equipment, sometimes altering services and monitoring telephone  lines.
    Some  have  boasted of illicitly entering computer used in stock-market
    trading.

    [ First of all, I protest to the term, "Cyberpunks." No hacker  I  know
    of  as called themselves Cyberpunks.  If anyone reading this does, your
    probably not a considered a hacker by most.  Second, Social  Scientists
    don't  know  anything  about  hackers -- they're just another worthless
    clan of scientists trying to shape society as they wish. ]

    [ The newspaper then goes on to refresh our memories about  the  Morris
    Jr.  Unix  WORM,  haven't  we heard enough about his guy.  And it was a
    really complicated set of code he set for his so-called CSci Project. ]

    Articles describing how to  write  viruses  have  appeared  in  several
    publications   that  are  widely  circulated  within  the  underground.
    Writing in the journal 2600, which says  it  speaks  for  the  computer
    underground,  an  author using the pseudonym "The Plague" described how
    to create a virus.

    "If people's data is destroyed, then so be it," he wrote.   "If  people
    are  stupid  enough to accept pirated software, then they deserve to be
    punished," says Plague.

    [ Well, The Plague has it all wrong.  Viruses are not ONLY  in  pirated
    software,  my  friend,  they  creep within all types of programs.  Your
    just adding to the problem.  It's goes against 'Hacker Ethics,' but the
    information should not to suppressed from the hacking community. ]

    The term CYBERPUNK is a reference to a popular  science  fiction  genre
    that  deals  with  an  intersecting world of high technology and outlaw
    society. "This is the case of art driving  reality,"  said  one  Social
    Scientist  at  the  Institute for the Future, Calif.  "You have a small
    group who is actually going it, and a large pool that  is  buying  into
    what they are doing and redefining reality."

    [  Yet another scientist from a corrupt institution, making conclusions
    based on a small fraction of neo-hackers. ]

    Cyberpunks often  are  called  HACKERS,  but  computer  scientists  are
    careful  to  note  that  not  all  hackers  are  malicious.   The  term
    originally referred to researchers  who  were  committed  to  designing
    advanced computer hardware and software.

    [ This is the first decent statement I've read. ]

    Another  often-heard  term  is "PHREAKING," which is the illegal use of
    telephone systems.

    "Phreaking is moral," said an 18 year-old  hacker  who  calls  himself,
    "Frank  Drake"  in messages on the bulletin boards.  "There is no theft
    involved. It's not theft of  services,  because  this  equipment  would
    otherwise be idle."

    [  It's about time these Media-Types informed the public of my favorite
    hobby,  Phreaking.   And  about  the  definition  Frank   Drake   gave.
    "Illegal  use of Fone System." ?  Sorry, not all of the uses by phreaks
    is illegal.  More than anything, phreaking  is  basically  composed  of
    "Learning about the Bell system, along with illegal use." ]

    Computer  experts working in the industry who have become involved with
    malicious  hackers  see  them  as  computer  addicts  possessed  by  an
    antisocial obsession.  "They're misfits, losers or troubled individuals
    lacking  a  sense  of  duty or morals," said a computer researcher at a
    Silicon Valley institution.

    [ Misfits? Losers? Antisocial individuals?  This is  another  scientist
    shooting  his mouth off with little support.  The idea of hackers being
    social outcasts, or losers is a common  misconception  by  many.   Most
    malicious  computer  hackers  are  party  animals  when given the right
    conditions.  And if one was told he  is  labeled  an,  "Outcast,  Loser
    etc.",  the  person  talking  would  get an entire new face of the word
    MALICIOUS.   Namely  a  99e99  dollar  fone  bill,  credit  check   and
    unchecked,  and  maybe  a subscription to every magazine on the face of
    the Earth.  ]

    In recent years this researcher has offered  four  underground  hackers
    programming  jobs  to try to channel their energy away from destructive
    use of computers.  In each case the experiment ended  in  failure,  the
    scientists said.

    The  researcher  asked  not  to  be  indentified,  and  his  reason  is
    revealing. He fears that  the  CYBERPUNKS/Hackers  are  so  skilled  at
    tampering  with  computers  that they might be able to alter his credit
    rating or have his electricity turned off.

    [ Oh my.  Will these guys never learn?  Hackers  are  not  stupid  "Lab
    Rats."  They  want  a  challenge,  away  from  sitting  at  a  computer
    programming for another person.  And this scientist is  concluding  his
    entire  experiment  on just a few hackers.  Yes, his fear of hackers is
    valid.  I am now thinking of ways to find out who this  guy  might  be.
    The  credit  rating  would be no problem, same with the electricity.  A
    scientist without electricity, is like a hacker without Telenet. ]

    "Every single one of them had deep psychological  problems,"  he  said.
    Some  members  of  the  hacker  underground  appear  to agree with this
    psychological assessment.

    [ Hah!  No comment...for obvious reasons. ]

    "They have this crazed need to find the answer," said Eric Corley, edit
    of 2600 Magazine.

    Corley, whose personal hacking resulted in three brushed with  the  law
    before  he  started the publication in 1984, said: "They keep exploring
    where they know they shouldn't go.   A  true  hacker  won't  stop  just
    because he gets in trouble."

    [  Corley is totally correct here, of course.  But I think some hackers
    don't stop hacking, because some are just over powered with the need to
    learn.  I never stopped hacking after by bust for many reasons.  I  the
    primary  reason was because I'm not a quitter, and I looked back on how
    much had I learned. With the learning, fun followed. ]

    Although computer experts believe  the  number  of  outlaw  hackers  is
    growing,  the  behavior they exhibit is not new to the high-tech world.
    For example, a computer programmer, John Draper, spent  six  months  in
    jail during the 1970s for illegal use of the telephone network.

    Draper's  nickname, "Captain Crunch," derived from his discovery that a
    whistle that came as a prize in a cereal box was tuned to  the  correct
    frequency to unlawfully manipulate fone company switch gear.

    [  Hmmm.   Every hacker knows all this already.  At least a true hacker
    should know his/her past.  But the thing I  can't  help  wondering  is,
    what  was  Captain Crunch doing with a whistle from the "Captain Crunch
    cereal" box?  And why was he blowing it into the fone.  Makes me  laugh
    if  you think about it.  Another thing, anyone with two front teeth can
    blow a 2600 Hz tone whistle. ]

    ;The Sensei / TSR!612
    _______________________________________________________________________
    _______________________________________________________________________

    BUSTING TELEPHONE SOLICITORS:                         TSR (st.cit 2\27)

    Join to fight telephone solicitors!  How you ask?  Read on...

                       :::: Illustration, Exampling ::::

    "Have you ever off and had a  fantasy  of  going  to  the  library  and
    finding  out  who  owns the companies that call YOU, interrupt you, and
    calling THEM back? It makes you happy for a while.   Particularly  when
    working 11 to 7 shift, you'd think of the companies that had awoken you
    (using YOUR private fone) at noon."

    "One  nurse  I  know  did something like that to a persistent insurance
    salesman.  One day she got awake and alert enough to get his  name  and
    number  and  promised to call back.  She did.  At 2 AM, announcing that
    it was HER working day, and she was now awake and would like to discuss
    the policy....He never called her back." -TS

                      :::: Tips Offs to a Fone Scam ::::

    If it sounds too good to be true, it's probably a scam.   Some  of  the
    most  popular  promotions  among  telephone  con  artists include prize
    offers to  get  you  to  buy  water  purifiers  or  vitamins,  magazine
    subscriptions,  PENNY  STOCKS,  precious  metals,  travel  and cellular
    telephone lottery applications.

    Be skeptical of says such as,  "This  is  the  best  deal  you'll  ever
    find," or "Double your money, no risk!"

    The  government, Federal Trade Commission estimates that Americans lose
    1$ billion a year from the deceptive peddling  of  goods  and  services
    over  the  fone.   Other organizations say it's much higher.  One might
    suggest  lobbying  for  stricter  FED  laws  governing   'telemarketing
    businesses.'

                  :::: Striking Back at 'The Solicitor' ::::

     o  Do  NOT  hang  up on telephone solicitors. This just allows them to
        make another call 200 milliseconds later.   Listen  to  them.   Ask
        stupid  questions.   Drag  out conversation. Contemplate placing an
        order, then don't.  Or start to place an order,  then  change  your
        mind.

     o  Try  wasting  their  time  as much as possible, cackle insanely and
        hang  up.   Or  give   them   the   raspberry   and   yell,   "Only
        f00ling!121!!&!"

     o  Remember always, that these twits are partially paid on commission.
        The  more  of  their  time you waste, the less they are gonna earn.
        Eventually they may quit, and if  we're  persistent  enough,  maybe
        someday nobody will WANT to work for these cretins.

     o  Why not add "May I speak to your supervisor?" for no good reason...

     o  "Just  a  sec.,  I'll  get my wife, she's really interested in this
        sort of  thing..."  and  leave  the  phone  on  the  table  for  10
        minutes...

     o  Blow him some nice tones.  1000 Hz is nice.

     o  If  it's  a girl, start to BS with her.  Ask her out.  Even better,
        make like to you who she is, and your going to  strange  things  to
        her  body.  90% are ugly college chics, so you might not be able to
        hang up on one with this approach.  Use your own judgement.

     o  Turn the bell off on the phone, and hook up an  answering  machine,
        and sleep, sleep.

                      :::: Ethics one should abide by ::::

     o  Don't go after the lower echelons of the company by terrorizing the
        telemarketer.   They  have no effect on the company.  All you do is
        ruin somebody else's night.  With few exceptions,  he  is  just  as
        unhappy about bothering you as you are about being interrupted.

     o  Lash  back  at the company, not the peon.  He's paid to do that.  4
        out of 5 people wouldn't do that unless they were paid.

                               :::: REMEMBER ::::

    The organizing principal of modern society  is,  "The  only  people  in
    contact  with  the  public  are the ones with no authority".  Keeps we,
    the people, fighting with each other while leaving the Bosses  free  to
    play power games with lives.

    :::::::::::: Information written by The Sensei / TSR Editor :::::::::::
    _______________________________________________________________________
    _______________________________________________________________________

    TELCOMMUNICATIONS EVENTS,                                 TSR (c.c 2\28)
    CONFERENCES, SEMINARS, and SHOWS:

    This  is  a  list  of  meetins  and  show  in  the up coming month. I'm
    providing this list for  you  and  your  friends  to  rob,  cheat,  and
    swindle  the  angered  companies that participate in there events.  You
    are likely to find your dreams come true in telephone  accessories  and
    other  wonderful equipment.  Many things will be on show, so take items
    as you please.  There could be butt sets, testing equipment, and  other
    stuff  at  your  disposal.   Remember,  their  parking lots are usually
    filled with BELL trucks, just waiting for you to clean them out.

                    ________________________________________

    Mar. 3-4
    Exchange Carriers of Utah     St. George, UT
    Holiday Inn                   Phone: 801-298-4242

    Mar. 6-8
    Voice '89                     Santa Clara, CA
    Convention Center             Phone: 713-974-6637

    Mar. 6-10
    MFOC '89                      Washington, DC
    Hyatt Crystal City            Phone: 800-323-1088

    Mar. 7-9
    REA Telecomm. Eng. & Mgmt. Seminar      Minneapolis, MN
    Marriott City Center                    Phone: 202-382-8663

    Mar. 8-15
    Hannover Fair CeBit '89       Hannover, West Germany
    Hannover Fairgrounds          Phone: 609-987-1202

    Mar. 12-15
    Minnesota Telephone           Bloomington, MN
    Radisson South Hotel          Phone: 612-291-7311

    Mar. 13-16
    Interface '89                 New York City, NY
    Javits Conention Center       Phone: 617-449-6600

    Mar. 14-17
    Carolina-Virginias Spring Mtg.     Releigh, NC
    Marriot Hotel                      Phone: 919-592-5751

    Mar. 15-16
    InterCom '89                  Miami, FL
    Hyatt Regency Hotel           Phone: 305-446-5150

    Mar. 19-22
    South Carolina Telephone      Charleston, SC
    Omni Hotel                    Phone: 803-722-4900

    Mar. 19-22
    Entelec '89                   New Orleans, LA
    Louisiana Superdome           Phone: 504-561-4530

    Mar. 28-30
    TBT West '89                  Long Beach, CA
    Long Beach Convention Ctr.    Phone: 800-243-6002

    Mar. 29-Apr. 1
    Communications Indonesia      Jakarta, Indonesia
    Jakarta Fairgrounds           Phone: 301-656-2942

    Well all that's all for this month.  For more, read up coming Reports!

    ::::::::::::::::::::::::: Seymour Lecker / TWA  :::::::::::::::::::::::
    _______________________________________________________________________
    _______________________________________________________________________

    SOFTWARE LINKS UNIX SYSTEM TO ATOMIC CLOCK:              TSR (i.w 2\28)

    Precision  Standard  Time  Inc.  recently  placed  in the public domain
    software that synchronizes nodes  on  a  Unix  TCP/IP  network  to  the
    atomic clock that U.S. Government uses to keep official time.

    On  Unix  networks,  a  number  of  time-sensitive applications require
    careful synchronization, both between network elements and in  relation
    to an absolute time standard.

    Now   inconsistencies   need   not  occur.   The  software  continually
    synchronizes nodes on a network  to  within  100  milliseconds  on  the
    atomic clock at the National Institute for Standards and Technology.

    US NO 202-653-0351.

    The  software  consists of University of Maryland's Time Demon, "ntpd,"
    which implements the Network Time Protocol and  synchronizes  the  host
    computer   to   Coordinated  Universal  Time,  the  international  time
    standard.  The software can be operated with or without a  Time  Source
    radio  receiver  sold  by  Precision  ST.   Without  an  external  time
    standard, however, no provision exists to correct  inaccuracies  caused
    by  the  drift  of  computer calendar clocks or by errors introduced in
    manual clock setting.

    _______________________________________________________________________
    _______________________________________________________________________

    ::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES:::::::::::::::::::::

    // Callers Must be Told the Cost //

    The FCC yesterday ordered 5 companies that charge customers 20% to  80%
    more  than  AT&T,  MCI  or  Sprint  to  toe  the line.  The alternative
    operators must now tell callers how much the call will cost  and  which
    company  is  placing it before it goes through.  The high rates usually
    are placed on hotel, airport or hospital phones.

                                 :: UPDATE ::

    As stated  above,  alternative  long-distance  operators  must:  Put  a
    sticker  on  the  phone  with  price information or tell the caller the
    price verbally; give callers an chance to hang up without  any  charge;
    offer  callers  a  chance  to go through AT&T or another phone service.
    Right now many  alternative  operators  stop  you  from  using  another
    carrier.
         _____________________________________________________________

    // Bell Goes To College //

    Bell  Atlanticom  Systems  said yesterday it has signed a contract with
    the College of William and Mary  in  Williamsburg,  Va.,  for  a  fully
    integrated voice and data communications system. The campus-wide system
    will   provide   resale  of  communications  services  to  students,  a
    management system, and a universal wiring plan  to  provide  voice  and
    data transmission.

    The communications system obtained by the College of William  and  Mary
    yesterday will provide 300 trunks, 3,800 faculty and student lines, 150
    voice/data  faculty  users and 1,050 host data ports.  It includes more
    than 5,000 inside wiring runs and several miles of fiber optics.   Also
    included:  A  1,000-  user  Aspen  Voice  Mail  System  and the Alex-IS
    Telecommunications Management System.
         _____________________________________________________________

    // Hackers Fail Raiding ATMs //                                     TSR

    If authorities hadn't  been  tipped,  a  computer  hackers  could  have
    cracked one cash-machine network of more than 14$ million over a single
    weekend,  of  Feb.  18.   Charged in the plot were GTE Corp. consultant
    Mark Koenig, and 4 other hackers.   Federal  Agents  said  the  hackers
    pulled  the  personal  ATM  codes  from GTE telephone lines.  The lines
    transmit transactions from account at Bank of America and thousands  of
    other  banks  linked  to  the Plus System, a national network of shared
    ATMs.

    The Hackers put the data in magnetic strips on  5,500  pieces  of  card
    board.  They  planned to use the bogus cards to make withdrawals around
    the country. If it were not for a "TIPOFF", authorities  wouldn't  have
    known what hit them.

    [  Now  this is a sad story.  These -hackers- have a chance to break 14
    MILLION in tax-free cash, and they blow it.  I bet one of them  bragged
    about  it  to  a girl friend.  That's the only way computer hackers get
    caught...they have to see some limelight. ] --TS

         ::::::::: Information provided by John "Scij" / 612 :::::::::
         _____________________________________________________________

    // Speaking of ATM Heists... //

    Recently, a crook used a Security  Pacific  National  Bank  ATM  master
    card,  which tapped into virtually all accounts.  The heist resulted in
    a 237,000$ win for the hacker.   The  bank  reimbursed  depositors  but
    still  have  not  found  the  culprit.   Alarmed  by  the incident, the
    American Bankers Assoc. plans to urge its 13,500  members  to  strictly
    limit access to ATM master cards and personal indentification codes.

    _______________________________________________________________________
    _______________________________________________________________________

    :::::::::::::::::::::::: TSR "Quote of the Month" :::::::::::::::::::::

              "They [Hackers] have this need to find the answer."

                 To subscribe to the 2600 Magazine send 15$ to:
                                 2600 Magazine
                                  P.O. BOX 752
                            Middle Island N.Y. 11953

                                           --Corley, Editor 2600 Magazine
    _______________________________________________________________________
    _______________________________________________________________________

    TSR  will  accept  additional  sponsor/support  Systems.  If you have a
    certain interest in the Report, and wish to provide support to  TSR  --
    Leave  your  BBS  number  --  and  any other information on RADIO WAVES
    Bulletin Board Systems.

    _______________________________________________________________________
    _______________________________________________________________________

    Pheonix Proj. LODH :: 512-441-3088  -----  Lunatic Labs :: 415-278-7421
    At Login:  Any UNIX Default PW                               P/H System

    Tiamats Temple Pvt :: 612-731-0296  -----  Hack Shack @ :: 214-422-4307
    P/H-Files BBS                              Login: Any UNIX Default Pass

                      RADIO WAVES System :: 612-471-0060
                       - Syndicate Report Support BBS -
    _______________________________________________________________________
    _______________________________________________________________________

                     This concludes this Transmittal No. 21
                                 (Part 2 of 2)

                            Released March 2nd, 1989

                                 by The Sensei
                         Editor of The Syndicate Report

    _______________________________________________________________________
    _______________________________________________________________________

                                   -= EOF =-