____________________________________________________________________________ ____________________________________________________________________________ THE SYNDICATE REPORT Information Transmittal No. 25 (Part 2 of 2) Released September 20, 1989 Featuring: Editor's Note "The Strikes, Pi, and Cracking a Bank Open" dOGMA! TSR Feverishly Battered by Citadalions, Again NEW! The ProDial V1.0 Hacker for Apple // TSR ADVERTISEMENT Privacy A Top Concern In The 1990s _____________________________________________________________ MONTHLY COGNIZANCES All New! TSR Historical Information Tome Brief Notes From The Report by The Sensei Editor Syndicate Report Magazine ____________________________________________________________________________ ____________________________________________________________________________ EXPOSITION: TSR Once again, The Report accepts outside sources. Anybody can write/provide information to The Syndicate Report. Articles/Information may be provided through RADIO WAVES Bulletin Board System 612-639-1053. Any info such as Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on any the previous mentioned specialties will be: accepted, labeled, and given full actual credit to the article/info provider(s), or writer(s). -- ** All articles have been presented by me unless shown at the end of the article as the information provider(s), or writer(s). ** ____________________________________________________________________________ ____________________________________________________________________________ EDITOR'S NOTE: TSR THE STRIKES Just to fill this space... I've no mentioned anything about the recent BELL STRIKES, though they were interesting and did affect many users. As of mid-month Sept 4, all the Communications Workers of America (CWA) and International Brotherhood of electrical Workers (IBEW) members had agreed to contracts with Ameritech Corp. At Bell Atlantic Corps., settlements had been reached with CWA, but the IBEW continued to strike for a while later against New Jersey Bell. Meanwhile, at Nynex Corp., CWA members and IBEW representatives were back at the table talking about management responsibilities. The strike began August 5th, 1989. _____________________________________________________________ PI -- THAT ROUND NUMBER: Pi. What a wonderfully irrational number. Pi has recently been calculated by Columbia Univ. scientists to over a billion places. More than twice that of 480 million places record in the past year. The Univ. used a pair of IBM 3090 supercomputers (something like my Cray Pc) at IBM's Research Center and the experimental IBM Scratchpad automated algebra system to complete the feat. CRACKING OPEN YOU LOCAL BANK, CONTINUED: AND! if that isn't enough, six researches from Amdahl Corp. announced recently the largest known prime number -- one that contains 65,087 digits. This is useful for cracking open Banks. Banks use prime numbers as passcodes. Currently, I would estimate that they are using around 150 digits of a prime. I don't think that's very safe, but how many of us have access to bank lines, and supercomputers. ;The Sensei / TSR '89 ____________________________________________________________________________ ____________________________________________________________________________ dOGMA! TSR FEVERISHLY BATTERED TSR (c.s.comp 9\8) BY CITADALIONS, AGAIN: Citadel people are great people. They come in all sorts and sizes. They also make great shot guns, feverishly attempting to break the TSR back-bone: Illegal Telcom Distribution. Haha! There is none! So why whine about it? I'm commenting on this one, like the last one, within the brackets [..] This particular event occured during, "Evil Feeble Weeble Wonble Week, on SuperComputer Cita BBS (Sysop: Hue). The Cita accusations before these, occured on Citadel '86 (Sysop: Hue, Jr.) I START IT OUT AFTER BEING ACCUSED OF THE CRIME, WITH A RESPONSE: 89Aug21 1:43 am from The Sensei Phluffy, you prude -- leave me alone!!11@10! Hue, I'll not upload another TSR TOC to this system again. Just because of Phluffy. 89Aug21 4:55 pm from Hue Prudishness has nothing to do with it.. this board prides itself on being on the straight and narrow in all areas where the law might get interested.. 89Aug21 5:45 pm from Phluffy It does seem quite clear from the files tsr.23 and tsr.24 contained in this directory that the "tsr" report is clearly engaged in providing information that could only be used to facilitate criminal activities. I wonder how the phone company would feel about this. [ Sensei here, commenting. Criminal activities? Tell me how much of that sort of data is published within TSR? Not much. It's mainly news. No real information that could get me busted. These guys are afraid of everything that has to do with fraud -- guess it's called: Old Age. ] 89Aug22 7:52 pm from Hue Say "bye bye" to the offending files everybody.. [ I never got to say, "bye bye". So, BYE! ] 89Aug22 10:47 pm from Electric Dude First amendment rights. Nothing illegal in printing the info. [ There is always a few BRAVE individuals out there to help me out during times of "The Anti-1st Amendment Law." This is a perfect example. Thanks Electric Dude, true American. ] 89Aug22 11:00 pm from ??? MR. ROGERS: Can you say "Probable Cause"? [pause] I knew you could. 89Aug23 3:08 pm from Sado-Masochist I do believe, ED, that the FCC and many other governmental companies would not be pleased.. it is an illegal act and printing illegal info.. 89Aug23 7:42 pm from Tin Soldier Didn't you read the little clause in the files stating that they are only for information purposes and not to be acted upon directly. From the same reasoning, there are book out there on how to make Nuks. Is there a difference? [ Strange, I never wrote such a thing in TSR -- since disclaimers really mean nothing to anyone in the first place -- even the law. ] 89Aug23 10:08 pm from Phluffy The little clause you refer to, Tin Soldier, is called a disclaimer, and it has been held in court, that the disclaimer has no force, nor effect. If the attorney who explained this to me was correct, if you publish the information, and it is used to commit a crime, you are, de facto, an accomplishment to the commission of that crime, and thereby liable for it. 89Aug24 2:29 am from Puck Nonono, otherwise gun companies would all be toast. 89Aug24 9:55 am from Michelangelo I checked, That should read BACKDOOR.ARC. Rename it and de-ARC it. That should work. Sorry for the trouble, I was thinking one thing and typed another. 89Aug24 12:00 am from Electric Dude What about the anarchists cookbook? Completely legal and also contains a lot of info that could be used to commit various crimes. 89Aug25 7:46 am from Sado-Masochist I can't explain that.. I guess the key word is "could" in your last post, ED.. I dunno. Any help? Achilles? 89Aug25 3:56 pm from Michelangelo Anarchists Cookbook, eh? Dangerous stuff, I've seen extracts foatong around. Tell you how to break into Express Tellers and Blow up bridges, stuff like that. Why would someone want to know something like that anyway? (unless they were planning to use it) I think that t king of knowledge is not good, but can't be called illegal. Once you start censoring, where do you stop? Before long Isaac Asimov could be considered illegal! 89Aug25 7:06 pm from Phluffy A priori censorship, is of course, not acceptable. However, a BBS is NOT a free press, you use it by the sufferance of its owner, and you have no other factual or derivative rights to its use than those which the owner of that BBS chooses to allow you. By the same token, if you use a sysop's system to disseminate information which is later used in the commission of a crime, and the source of the information so used can be traced back to the system, then several courts have held that the sysop is a de facto accomplice to the commission of that crime. Therefore, Sensei, Eta alia, have to particular right to use this as a forum for disseminating that sort of information. 89Aug27 2:57 pm from The Sensei Phluffy -- great vocabulary. The main point of those that are on my side, are saying that, "Yeah...it's not at all illegal to carry any type of information on a bulletin board, unless it's owned by someone else. Like codes, credit cards, passcodes, etc." The Syndicate Report isn't really that type of information handout. I haven't had any illegal information in it. I've been busted many times before. Once for hacking The Connection's (922 9000) VMS computers. Edina Police, and the SS got involved. I set up a few of my TSR files on the VMS for people to dial in and download. When Edina came over, they showed me the file -- probably #12, since #13 explained my bust, part 2. The secret service showed no interest in it -- nor FBI. They just didn't want me on there, and distributing codes (since the SS controls the treasury flow). So, you see, it's all very innocent. Read some of the articles, they are not at all illegal/damaging. Computer Adventures] enter Message 89Aug27 from The Sensei ...and for sake of a precedence, the BBSs and Law sub on Cita 86, Hue Jr's, had the same discussion. He still holds TSR files. entry cmd: save Computer Adventures] :::: Information/Data Provided by SuperCOMP Users / 612 :::: :::: SuperCOMP is a Citadel-86 Exemplar System :::: :::: Info Standardized by The Sensei / TSR Editor '89 :::: ____________________________________________________________________________ ____________________________________________________________________________ TSR ADVERTISEMENT TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. ____________________________________________________________________________ ____________________________________________________________________________ NEW! THE PRODIAL V1.0 HACKER FOR APPLE //: TSR (c.g. 9\7) ProDial V1.0 Communication Disorders, Inc. ProDial is a new Apple // wardialer developed over the past six months. It was designed and written by Cyber Groan from Minnesota (612). Its main purpose is to give old-fashioned hacking a new boost. Since more modems are added to the telephone lines daily, the value of a good wardialing program increases. Many systems still have default accounts, users who forget to log off, glitches in the software, and mnemonic passwords. ProDial represents the first step in the hacking process - finding the modem telephone number. Features -------- - ProTerm style windows and menus - A DOS command menu - Route output to printer, screen, "alarm bell", and/or data file - Dial up to 9 ranges simultaneously - Mix and match random with sequential dialing - A run-time menu enabling individual ranges to be de-activated Tech Info --------- - Requires 128k; enhanced //e, //c, or //gs - Current version (ProDial v1.0) supports 100% Hayes compatibles only - Programed in Applesoft BASIC with ML support files - ProDOS 8 Final Notes ----------- BETA test released on September 6, 1989. Final release scheduled for the second week of September. Current updates may be found on Radio Waves BBS (612-639-1053) and Tiamat's Temple (612-731-0296). Please direct any problems or suggestions to Cyber Groan. :::: Information Provided by Cyber Groan / 612 :::: ____________________________________________________________________________ ____________________________________________________________________________ PRIVACY A TOP CONCERN IN THE 1990s: TSR (u.s 9\8) Privacy-related issues could emerge as a major battleground for the cellular telephone industry, an expert says. Network World reports in its Aug. 28 issue that Sharon Nelson of the Washington State Utilities and Transportation Commission says the industry might demand warnings on the phones telling customers their conversations may be subject to electronic eavesdropping. [Oh well, life sucks. I've reports what bandwidths, etc. these waves occupy, so read previous TSR Brief/Extended Notes. Thanks. -TS ] :::: Info provided by Ali Stench / 612 / Editor of Unknown Mag. :::: ____________________________________________________________________________ ____________________________________________________________________________ :::::::::::::::::::::::::: THE SYNDICATE REPORT ::::::::::::::::::::::::: :::::::::::::::::::::::: HISTORICAL INFORMATION TOME :::::::::::::::::::::: TSR HIT Vol. #1 TSR Issue #25 What's New? The TSR HIT (Historical Information Tome). What HIT is, is a BRAND NEW monthly column about the History of Telecommunications (Data, more specifically, the modem world of hackers/phreaks, etc.) Each month, I'll be presenting you, the TSR reader, a new and exciting titbit of history. For we all should know our history -- and be able to manifest our history to others....no matter what they are. And now for HIT, Volume #1: _____________________________________________________________ THE TERM 'HACKER' HAUNTS COMPUTISTS OF MIT, AGAIN Back in the day, when they used to say Hacker, they meant someone who literally HACKS on computers, one who is devoted to working with computers. Computists from MIT coined the phrase. Now, of course, the term 'hacker' means much more. It has evolved quickly to mean someone who commits computer crime (and other detailed terminology). The old to some, new to others MEANING casts casts aspersions on all old hackers. New laws are needed to specifically cover computer crimes. To the last generation of computists from MIT, the term 'hacker' should not be used where 'cracker' would be more appropriate. Now we have the term 'cracker' to fondle with. Doesn't 'cracker' now mean one who commits crime on software? Yes, it does. Now we need a new term for 'cracker'. How about, 'decoder'? or 'ware-breaker'? or better yet...'Software Company (out-of-business) Pain In The Ass'! _____________________________________________________________ INTEL'S ANTI-HACKER [KEPROM] CHIP KEPROM is Intel's new anti-hacker chip. To protect links between remote equipment and a host computer, all that need be done is to replace a standard 128-Kbyte EPROM chip with the 128-Kbyte KEPROM and write 500 bytes of code. At $45 each, the KEPROMs are low in cost compared to the cost of implementing the United States data encryption software. Only the systems designer has to know the combination, which will put up a strong barrier against a computer hacker or software pirate. Really? Does anyone know if this thing has been implement? Or even acted upon -- by even an inch? Other than past this article? Thought-Not-Tot. -End of TSR HIT Vol. #1- [Last minute info: HIT articles are mainly information gathered by me over the years -- mainly from memory, experience. If you have had any experiences like these, send them to Radio Waves via mail, or TSR Mag. Files area. Thanks] ;The Sensei, TSR Editor, HIT Reporter ____________________________________________________________________________ ____________________________________________________________________________ ::::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES ::::::::::::::::::::::: // Credit Card Checksum Generation Inc. // The Phantom Viper has done it again, with a little incentive from Scourge, 612. He's devised a Credit Card Checksum program for the Apple computer. Check it out from Radio Waves / FCP III Systems. This is a message directly from T.P. Viper: :::: Information Provided by T.P. Viper / 612 :::: :::: Programmer of Extender Bender (Hacker) :::: _____________________________________________________________ // A Consultant Talks To Ignorant // Donn Parker, computer security consultant, advises DP managers to think like hackers so they will know what to look for in terms of their own data security and be able to develop data security plans. Various means by which hackers breach system security include shoulder surfing, the stealing of passwords from employees when they sign on; spoofing (Social Engineering?), the lying to individuals to obtain information; data diddling, the intentional entering of false data into a system; and logic bombs, which are the most difficult to detect and the most destructive to a system. _____________________________________________________________ // PACBELL Files Suit // Pacific Bell has filed a lawsuit in a California court seeking clarification of its right to disconnect dial-a-porn services. The carrier filed Wednesday in San Francisco superior court, naming 13 pornographic telephone services as defendants. The company asked the court to recognize it as a private business with the right to refuse service to dial-a-porn agencies. Pacific Bell's filing for clarification of its right to disconnect sexually explicit 976 services came following a Tuesday ruling by federal courts that said private businesses could refuse to sell the services. The federal ruling didn't address whether Pac Bell was considered a private company or a public utility. Pacific Bell officials said the company disapproves of the services. _____________________________________________________________ // SPRINT Offers New Service // U.S. Sprint announced Thursday that Integrated Services Digital Network features will be available during the first quarter of 1990. ISDN features include primary rate interface, integrated telenet packet data access and call- by-call service access. ISDN WILL use the companies' development of a flexible network that responds more quickly, they said. :::: Info from The Sensei :::: _____________________________________________________________ // Electronic News For Colleges // Apple Computer, Inc. and Gannett Co., Inc. are launching in September the first daily electronic college news service for college newspapers - the USA TODAY/Apple College Information Network. The network lets college journalists receive news stories, interact with editors, contribute stories and learn how to use desktop publishing software. :::: Information from "A Local College Kidd" :::: _____________________________________________________________ // Telcor Unveils Sppedy Modem // Telcor Systems Corp. recently unveiled the Accelerator 3238, a V.32 full- duplex modem it says uses a proprietary compression algorithm to transmit data at speeds up to 38,4k bit/sec. It is available at $1,695. The DES software is $100 per unit. ____________________________________________________________________________ ____________________________________________________________________________ TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. ____________________________________________________________________________ ____________________________________________________________________________ Nanotech Collusion 612-476-4913 ----------- Lunatic Labs :: 415-278-7421 Syndicate Report Support BBS P/H System Tiamat's Temple :: 612-731-0296 ----------- The Curse Sy :: 612-835-1653 P/H-Files Apple Select System RADIO WAVES System :: 612-639-1053 Logon: RW Pass: RADIO - Syndicate Report Support BBS - ____________________________________________________________________________ ____________________________________________________________________________ This Concludes This Transmittal No. 25 (Part 2 of 2) Released September 20th, 1989 by The Sensei Editor of The Syndicate Report ____________________________________________________________________________ ____________________________________________________________________________ Downloaded From P-80 International Information Systems 304-744-2253