____________________________________________________________________________ ____________________________________________________________________________ THE SYNDICATE REPORT Information Transmittal No. 23 (Part 1 of 2) Released June 13, 1989 Featuring: Editor's Note Telecommunication Events, Conferences, Seminars, and Shows Phreak Tools V1.1 - Remake of CNA/L Lister Radio WTSP Hacker Charged With Computer Tampering The "950" Busts Hacker Stereotypes and Statistics Brief Notes from the Report "Drowning Hackers" Vocabulary Toni by The Sensei Editor Syndicate Report Magazine ____________________________________________________________________________ ____________________________________________________________________________ EXPOSITION: TSR Once again, The Report accepts outside sources. Anybody can write/provide information to The Syndicate Report. Articles/Information may be provided through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on any the previous mentioned specialties will be: accepted, labeled, and given full actual credit to the article/info provider(s), or writer(s). -- ** All articles have been presented by me unless shown at the end of the article as the information provider(s), or writer(s). ** ____________________________________________________________________________ ____________________________________________________________________________ EDITOR'S NOTE: TSR TSR #23, late as usual. Sorry, once again - life is testing me in many ways, that's why this issue is over a month late. This apology goes mainly to 'contributing writers,' for their help in this Report. Reasons: Like I said, I've been busy, and most of the information here is (unlikeusual) written by others. A lot of the info. is from locals, and users that call Radio Waves System, since I've not been calling the usual systems lately. I'm not going to go into a specific topic for my Editorial this issue, instead I'll just outline a few things of interest. Just a quick note: Abbie Hoffman, author of "Steal this Book" "Steal this Urine Test." and other books, is DEAD. I heard about it on the news a whileback, approx 1.5 months ago, but I didn't get all the specifics. From what I know he over dosed. Now he's a legend. PC Pursuit. The format change is complete, and all the old passwords are dead. June 1st was supposed to be the cut off date, I guess they finally did something on time. If anyone is still using the old format, it's probably the new format. I haven't heard too much information on the new format(s), butthere has been talk of 20 to 30 different formats used by PCP. Although new formats can be made swiftly and easily to accomodate any abuse. Good luck. The 4.6 trillion chance of hacking a PCP code is over, now it's justabout impossible. The only codes you will see now are the ones hackers have tapped from the "INSIDE of PCP." In TSR #23, Part II, I'm going to copy a letter I received from a guy in England. ;The Sensei / TSR Editor ____________________________________________________________________________ ____________________________________________________________________________ TELECOMMUNICATION EVENTS, TSR (c.c 6\9) CONFERENCES, SEMINARS, AND SHOWS: This is a list of meetings and shows in this coming month. I'm providing this list for you and your friends to rob, cheat, and swindle the angered companies that participate in their events. You are likely to find your dreams come true in telephone accessories and other wonderful equipment. Many thing will be on show, so take items as you please. There could be butt sets, testing equipment, and other things at your disposal. Remember, their parking lots are usually filled with BELL* trucks just waiting for you to clean them out. _____________________________________________________________ June 6-9 Payphone/Operator Services Orlando, FL. Buena Vista Palace 713-974-6637 June 7-9 TEXPO '89 San Francisco, CA. Civic Auditorium 415-542-7753 June 11-13 Illinois Telephone Assn. Osage Beach, MO. Tan-Tar Resort 217-525-1044 June 11-14 ICC '89 Boston, MA. Sheraton Boston Hotel 617-466-3506 June 11-14 New York State Telephone Assoc. Lake Geroge, NY.Sagamore Hotel 518-462-6696 June 11-14 ADUC 1989 National Conference Boston, MA. Marriot Copley Hotel 800-228-9290 June 12-15 BICSI Workshop Lexington, NY. Radisson Plaza Hotel 606-257-3972 June 18-21 Pennsylvania TelephoneHershey, PA. Hershey Hotel 717-238-8311 June 18-21 Arkansas Tel Assoc. Hot Springs, AR. Lake Shore Sheridan 501-375-0086 June 18-22 NENA '89 Long Beach, CA. Hotel Queen Mary 213-596-0144 June 19-21 Videotex Industry Assoc. Ann. Conf. San Francisco, CA. The Fairmount Hotel 703-522-0883 June 19-22 NTCA Leadership Conf.San Francisco, CA. Fairmount Hotel 202-298-2300 June 19-23 Fiberoptic Splicing/Termination Sturbridge, MA. FC2 Training Facility 508-347-7133 June 20-22 AFCEA Intl. Convention/ExpoWashington, DC. Washington Conv. Center 703-631-6100 June 20-22 Maine Tel Assoc. Rockport, ME. The Samoset Resort 207-763-9911 June 20-22 UTC Orlando, FL. Buena Vista Palace 301-621-5596 June 24-28 Georgia Tel Assoc. Sandestin Beach, Fl. Sandestin Hilton 404-321-5440 June 26-28 Intelligent Network ConForum Chicago, IL.Westin Hotel O'Hare 312-938-3500 :::: Information provided by Seymour Lecker / TWA :::: ____________________________________________________________________________ ____________________________________________________________________________ PHREAK TOOLS V1.1 - REMAKE OF CNA/L LISTER: TSR (p.f 5\5) Ever get tired of looking up out-dated CNA listings in text files? Or did you ever wondered WHO own what prefix on an 1-800/900 exchange? If you have these problems, then check out PHREAK TOOLS V1.1, formerly called CNA/L Finder or Lister. Professor Falken, of Minnesota 612, has reformatted this CNA/L Lister, and renamed it to fit its style. Here's Falken's latest information about Phreak Tools: "It has a 800/900 WATS Exchange Reverse Directory and a built in CNAfinder in it. The 800/900 directory, all you do is tell it what exchange youneed and it will tell you who owns it, and from that you should be able to tell if it's a safe exchange. The CNA program is the same as the current stand-alone version, however, all new releases of Automated CNA Finder will be in Phreak Tools Versions 1.x+ New features to be in upcoming versions are newer CNA list, with ID codes. Area code/Country code finder, and a 950 port directory listing." (Sent via Radio Waves mail). The latest version has some hard to get information, and can be found onRadio Waves BBS at (612) 471-0060, and the 203 area. Currently, only IBM version 1.1 is available. There has been no further information from Falken, or Twisted Sector, 408 California, about an Apple version of Phreak Tools/CNA Lister. News about this in future TSRs, or on Radio Waves (RW/TSR) The Author will be taking suggestions, and questions on RW. :::: Information by Professor Falken / Phortune 500 / 612 :::: :::: Contributing Writer, Programmer of Phreak Tools :::: ____________________________________________________________________________ ____________________________________________________________________________ RADIO WTSP HACKER CHARGED WITH COMPUTER TAMPERING: TSR (5\11 ny.t) Michael I. Shapiro and Terry L. Cole, former news executives of WTSP,a Florida television station in the Tampa area, are charged with illegally entering the computer system of a rival television station.Christian Hoyer, an assistant state attorney in Hillsborough County, who is prosecuting the case, says that Shapiro, working for WTSP, Channel 10, had previously worked for a rival station, Channel 13. Shapiro is chargedwith using his own microcomputer and a microcomputer at Channel 10 to break into Channel 13's news computer, possibly seeking a competitive advantage for Channel 10's newscasts. The case is unusual because it involves 'media espionage.' :::: Information Provided by Romeo Andria :::: ____________________________________________________________________________ ____________________________________________________________________________ THE "950" BUSTS: TSR (usr 5\9) A bust recently went down, May 3rd, 1989. It's called "Beta Cygnus,"which is in the 602 area code, address 602-234-3376. The Sysop, Mastermind, did something very foolish to get caught. That's right, he was hacking 950-1001 and was caught. At the time of his arrest/capture the attorney general of Arizona had ordered a DNR on his line, consequently, a listing of all callsgoing to/from his board number were captured by the Feds. Mastermind's system and hardrive etc..was retrieved INTACT. Mastermind also kept all INFO-FORMS handy and un-censored. So if you wereon the board, and left some confidential information in the information form, the Feds have it now. Several other 602 boards went down due to the NEWS, Temple of Doom is down, and the HD is nuked. Valhalla Island did the same. * More busts are expected to come, since the attorney general made inferences to others. * :::: Information by Professor Falken / Phortune 500 / 612 :::: ____________________________________________________________________________ ____________________________________________________________________________ HACKER STEREOTYPES AND STATISTICS: TSR (5\19) Computer hackers have broken out of their old stereotypes. The information necessary to commit computer crime is spreading rapidly through the population as computers are becoming easier to access. According to a recent report published by the National Center for Computer Crime Data (NCCCD), 32 percent of the people arrested for computer crimes are women, 43 percent are minorities and 67 percent are between the ages of 21 and 35. Former and current employees are far more likely to breach a company's computer than someone from outside the company. Seventy percent of all computer crimes involve the theft of money or services. The NCCCD estimates that computer crimes cost the US $555 million in 1988. Also, 15 computer-years were lost in down time and 930 man-years were spent detecting and removing viruses. The arrest of computer criminals and the laws concerning them are examined. :::: Information by TS / TSR :::: ____________________________________________________________________________ ____________________________________________________________________________ ::::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES ::::::::::::::::::::::: // Drowning Hackers // (3\0 d.log) Computer security is threatened by the nature of a computer's own configuration, especially stationary networks. Hackers have the advantage of surprise and a global entry capability. Several security measures are available to deter unauthorized entry into data files, although no computer is completely safe from intrusion. 'Drowning' is a method that hides important information within data that is actually garbage and not useful. Cost-benefit factors come into play when it takes more time to sort through files than the sought after information is worth to begin with. 'Traps' are programs that engage intruders in a dialogue while the system is being invaded. Meanwhile the hacker is being tracked down by the computer's security system. _____________________________________________________________ // FBI Haunted by West German Hackers // (3\0 d.log) Inattention in pursuing a widely publicized 1988 computer hacking case involving Marcus Hess is coming back to haunt the FBI, as West German authorities arrested Hess, along with several other hackers, for allegedly giving computer information to the Soviets. Hess had earlier been identified as being involved in the penetration of more than 30 computers at US research laboratories, military installations and defense contractors. US Air Force Office of Special Investigation assistant chief of computer crime, Jim Christy, says that the FBI has been embarrassed into more actively pursuing computer crime and that the Hess case is a catalyst that has engendered an understanding of the threat. _____________________________________________________________ // Hotel Motel Holiday Inn Services // (3\2 u.s.t) Telesphere International will implement for Concord Hotels of Cleveland its Telesphere Planned Hotel telecommunication services. With TPH, Telesphere will provide a package of services utilizing the company's all digital fiber optic network. Included: High volume WATS, switched access WATS, hotel flat rate service, international calling and 900 information service. Telesphere International will provide credit card and operator-assistedcalling from public pay phones and hotel lobby phones at Concord Hotels. Callaccounting systems will be used to manage call activity and monitor line usage.Under the agreement, Telesphere will provide its TPH services to 11 hotels with 1,400 rooms. The hotels are concentrated in the East but are expanding westward. :::: Information by The Curist / 615 :::: _____________________________________________________________ // Hacker Busted: Steals DEC VMS code // (2\2 m.wk) Twenty-five-year-old computer hacker Kevin David Mitnick is being held without bail on charges that include stealing $1 million in software from DEC, including VMS source code, and causing that firm $4 million in damages. Mitnick is also charged with unauthorized entry into the Leeds University campus. [ TS here. Just wondering, this guy appeared on several systems, including Radio Waves. He positioned himself as an official...guess we could have learned from him. If there is anymore information on this articles, send it in. ] ____________________________________________________________________________ ___________________________________________________________________________ ::::::::::::::::::::::::::: TSR Vocabulary Tonic :::::::::::::::::::::::::: What "Vocab. Tonic" is, is a list of acronyms and definitions to help education the ignorant hacker. With an extensive vocabulary, there is virtually nothing one can't learn. Study on... CO - Central Office: The building which comprises a switching network and its control and support equipment. (Trash House) FX - Foreign Exchange Line: A voice circuit between a remote CO, and a station. IOSA - Ignorant Operator Silent Approach: Form of phreaking, relating to Voice Mail Systems. From 3rd Party Fraud, Part II. ETS - Electronic Translation Systems: An electronic replacement for the card translator in 4A Xbar systems. Makes use of SPC 1A Processor. XBAR - Cross Bar: Old switching system. SF - Single Frequency: A signaling method for trunks. 2600 Hz is impressed upon idle trunks. ____________________________________________________________________________ ____________________________________________________________________________ :::::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::::: "Against All Odds, There is Greatness" - TSR ____________________________________________________________________________ ____________________________________________________________________________ TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. ____________________________________________________________________________ ____________________________________________________________________________ R A D I O W A V E S 6 1 2 - 4 7 1 - 0 0 6 0 Syndicate Report Support BBS ____________________________________________________________________________ ____________________________________________________________________________ This concludes this Transmittal No. 23 (Part 1 of 2) Released June 13th, 1989 by The Sensei Editor of The Syndicate Report ____________________________________________________________________________ ___________________________________________________________________________