___________________________________________________________________________ ___________________________________________________________________________ THE SYNDICATE REPORT Information Transmittal No. 23 (Part 2 of 2) Released June 13, 1989 Featuring: Editor's Note "Hacker from England Letter" The CT2 Phone - Another Abuse Product Virus Outbreaks Spur Congree To Combat Threat How To Become A Syndicate Report Support BBS Credit Card Fraud: Old Techniques Still Work Brief Notes from the Report by The Sensei Editor Syndicate Report Magazine ___________________________________________________________________________ ___________________________________________________________________________ EXPOSITION: TSR Once again, The Report accepts outside sources. Anybody can write/provide information to The Syndicate Report. Articles/Information may be provided through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on any the previous mentioned specialties will be: accepted, labeled, and given full actual credit to the article/info provider(s), or writer(s). -- ** All articles have been presented by me unless shown at the end of the article as the information provider(s), or writer(s). ** ___________________________________________________________________________ ___________________________________________________________________________ EDITOR'S NOTE: TSR One day I went digging through some of my old letters in the file cabinet. A lot were from computer people -- this was all normal USPS Mail. One caught my eye. It was from a guy in England. I forgot I ever got it, and for good reason, it's post dated May 21, 1986. I found it interesting... _____________________________________________________________ My name John Doe and Address North Hull Estate HULL North Humerside ENGLAND Phone 0482 XXXXXX 21st May 86 Dear Sensei, Hello, as you can see, I live about 4200 miles away from you hence this letter, I'll try to keep it short. I know that you have, or had a C128 with a Volks 300-1200 modem, I have a Atmos 48k with D/D and a Voyager 11 modem, giving 1200/1200 and 300/300 baud. I am not 'on-line' at the moment, due to some technical problem with my cable, but when I am my password is 'xxxx'. Tell me now if you can, have you heard of a piece of equipment called a 'phreaker', there is a great lack of information 'over hear' regarding this machine, but apparently it aids you in your phone bills. With the limited knowledge available to me, I know your "Bell-Phone" system works on the 'two-phase' method, this would cause only slight problems in altering one or two of the part numbers. If you do know about this machine, I would be greatful to you if you could let me have details about its construction, part numbers each. Awair as I am that there will be some cost involved, I am quite prepared to respond with an agreed 'fee' for any and all information I can get. Should you be able to send this machine to me via air mail, or boat, this would prove expenceive from this end, and so I think a diagramm with part numbers, the best option. Anyway Sensei, I seem to be 'rabbiting' a bit, so I think I'll close now, iff youcan get some free time, would you simply 'drop me a line' to say that you have received my letter. Many thanks. Yours sincerely, John Doe _____________________________________________________________ Interesting, eh? When I first read this, I laughed. This guy thinks a 'phreaker' is a machine. I thought it was a person. Well, I tried to call the guy with the number, via MCI (love that service), and I got no answer. Back in '86 about this time, there was a lot of paranoia about busts. I thought this was some guy from England trying to find out about phreaking, thus do some busting or whatever. I never responded. Some of my readers are overseas, so if this person is reading this, write me again. I'm not sure how this person got all the information about me then. I did have a C128, with other computers. Maybe it was an overseas commie system. Who knows. These types of responses are rare -- via USPS. Usually it's all through networking/email etc. But I'm thinking about posting a READER'S RESPONSE COLLUMN in future TSRs. I do get many bits of information from the readers, so if I get a lot on a particular month -- I'll post more. Send those responses in! Via Radio Waves. ;The Sensei / TSR '89 ___________________________________________________________________________ ___________________________________________________________________________ THE CT2 PHONE - ANOTHER ABUSE PRODUCT: TSR (p.f 5/5) British Telecom, has made a cordless phone that's really portable. It's called the CT2 and weighs only 2.7 ounces. You bring it with you wherever you go, and when you are within reach of one of the base units popularly called " PhonePoints ", you can make calls. These PhonePoints/base units are permanently installed at popular locations such as airports, bus/train stations, shopping malls, and grocery stores. The CT2 is expected to cost about as much as a regular phortress phone call ($0.25), which makes it much more affordable than a cellular phone. The CT2's base unit has a range of 200 meters from its antennae. The technology is based on ISDN ( Integrated Services Digital Network ) instead of the current analog technology. The CT2 works in this matter, 1) Once you are in range of any of the CT2's base units (200 meters) you turn the phone to the TALK position. 2) At this time the telephone scans the 40 channels designated for it's use. The channels are in the 864 Mhz to 868 Mhz range, which is a step above the current Cellular frequencies (810 Mhz to 830 Mhz). 3) The phone sends out its owners billing information and authorization code etc. 4) The PhonePoint checks the users billing info and ID code with a central computer, and if everything matches up, you get a dialtone. :::: THE ABUSE :::: The process of scanning and locking onto the first available frequency is called FDMA ( frequency division multiple access ), British Telecom claims this " avoids the cross-talk interference " common in most cellular phones currently. The PhonePoint/CT2 system is to be deployed sometime within the next 2 years, for an approximate price of $275 per phone & access fees. At this time, it makes me wonder if they will encrypt the data going back & forth. If not, they could have major abuse to the system, just think what a person with a portable scanner could do? All he'd have to do is scan the 860 Mhz range and listen to peoples billing info and/or conversations, the information gathering possibilities are unlimited. :::: Information by Professor Falken / Phortune 500 / 612 :::: ____________________________________________________________________________ ____________________________________________________________________________ VIRUS OUTBREAKS SPUR TSR (i.w. 6\9) CONGRESS TO COMBAT THREAT: Concerned by press reports and stung by its own outbreak, The U.S. Congress has begun talking about ways to combat computer viruses. FBI Director William Sessions warned last week that no current statutes specifically address viruses, particularly those where damage is limited to lost time instead of data and where the virus maker's motive is unclear. "Viruses are easy to create and propagate, require little expertise, and may by nearly impossible to prevent or detect," Sessions told the Senate on Technology and the Law. Sessions said the FBI is developing behavior profiles of computer hackers in an effort to combat viruses but noted that the FBI has only conducted two criminal investigations of viruses so far. [ TS here -- Only two cases? Damn, I thought the FBI was a little more informed about viruses than that! One almost pulls down an entire network, yet, no one on their staff can understand one completely. So, all you virus spreadors better get hopping before the law strikes back. ] Bill introduced is called the Computer Virus Eradication Act of 1989. By Wally Herger of Calif. The reason, according to Herger's press secretary Mahan, is three different House offices were infected by a virus through a computer bulletin board network shortly before an earlier version of Herger's bill was introduced in May 1988. If viruses persist, "out networks could be consumed by mutual suspicion," testified Clifford Stoll, a scientist at the Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass. "Networks could become so bureaucratic no one could use them anymore," he said. "Cleaning up after viruses may be cheaper than preventing them." Stoll helped track down a West German hacker who broke into various unclassified military computer in this country. "Catching this spy took over a year of full-time effort," he said. "While he was reaching into out computer, I lost a year of astronomy research. Much worse, a thief was stealing information from out nation's computers." [ What, was he required to track this guy down for an entire year? I really feel sorry for him. He could have just asked some local BBS kids -- he would have gotten further, quicker. -TS ] ____________________________________________________________________________ ____________________________________________________________________________ HOW TO BECOME A SYNDICATE REPORT TSR (tsr 6\13) SUPPORT BULLETIN BOARD SYSTEM: At the end of each TSR Information Transmittal, you'll see a message something like... "TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems." Many users/sysops, after reading TSRs, ask, "How can I (or whomever) become a TSR Support BBS"? Well, knowing that not everyone reads every bit of data in a magazine, I'll write about in now. This article has a heading at the beginning of TSR and some substantial space, so people should understand now. Number one, if you like The Syndicate Report, you're already half way to having a TSR support system. When I look over possible TSR support BBSs, I look for what interests me in the BBS. It should favor certain hobbyists such as: hackers, phreaks, pirates, thrashers, etc. If you don't you might as well forget it -- since I probably won't call the system anyway to upload it regularly, nor anyone else. But, if you have those qualities with a good piece of software/hardware, then just leave your phone number and BBS name, and any login/new user info to me in feedback/mail on Radio Waves 612-471-0060. I'll reply back to you within a few days, no longer than a week. In that time, I'll probably be checking out your system. Most of the systems that do support TSR are ones that I've been calling for a while, and I've picked. What I usually require a BBS to have, is a transfer area dedicated to The Syndicate Report for easy up/downloading. Also, if there is an intense demand, a sub-board may erect. Usually sub-boards only appear on highly active hack orientated systems. So, if you wish to become a TSR support BBS, get a hold on me and leave any BBS information. Thank you for your support. ;The Sensei / TSR ____________________________________________________________________________ ____________________________________________________________________________ CREDIT CARD FRAUD; OLD TECHNIQUES STILL WORK: TSR (strs 6\13) Credit card fraud is doing very nicely, thank you. And, in some degree, that is a result of poor retail procedures and policies, says Limited Credit Services, Inc. and U.S. Secret Service agent Perry. One of the most serious internal fraud problems retailers are facing has not abated over the last several years. Or, as the SS puts it: "The Nigerians are still alive an well. I hate to keep beating up on them, but they're responsible, probably, for about 50% of everybody's fraud." The Assoc. of Credit Card Investigators' latest bulletin states: 'There are now an estimated 30k to 50k Nigerians in the U.S. and an estimated 75% to 90% of this group participates in fraudulent activity.' " The security asserts: "It is amazing they have changed their techniques very little and are still able to get away with it." They're getting away with it to a large extent by going into establishments as employees. Especially in the personnel departments -- that's where they want to work. They can get access to the information and they're off to the races. Employers assume they put these people into entry level jobs and they're not going to do anything. But they want entry level, low profile jobs, like a factory environment, almost. And a lot of credit card operations are like factory environments. One they're in, keying in payments, for example, they have the customer's back account number, where the checks are drawn. Most of the time there's a statement header that says what the person's credit line is, what the balance is. [ More Credit Card Technique Information in TSR #24. ] :::: Information by Credit Card Carny / 407 :::: ____________________________________________________________________________ ____________________________________________________________________________ ::::::::::::::::::::::: SYNDICATE REPORT BRIEF NOTES ::::::::::::::::::::::: // Pizza Hut Uses Central Number // Telecommunications advances are helping Pizza Hut deliver pizzas faster. National Telecom's Automatic Call Distributor allows several shops in an area use a single number. Incoming calls are automatically routed to the shop nearest the caller's location. The system also features management information capability, helping store managers monitor service. If you have more information on this technology, dial Radio Waves now. _____________________________________________________________ // One in 10 to use fiber by 2001 // Telecommunications industry experts estimate that 10 percent of all American homes will be connected by fiber optics in the year 2001. A University of Southern California survey reported in Communications Week's current issue predicted 10 million Americans work from their homes in 2001 and would need the communications capability offered by fiber optics. :::: Information Provided by Celtic Phrost / 713 :::: _____________________________________________________________ // UK Law fails to snare Hackers // United Kingdom companies have no laws to protect them from unauthorized access to computer files. Existing laws refer to fraudulent tampering with programs. Proposals for new legislation from the Scottish and English Law Commissions are not expected to change the situation in the next two years. Two communications tappers who broke into the Duke of Edinburgh's mailbox on British Telecom's Prestel service have been fined 1,350 pounds sterling for electronic forgery. ___________________________________________________________________________ ___________________________________________________________________________ TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. ____________________________________________________________________________ ____________________________________________________________________________ The Black Market :: 408-741-5443 ----------- Lanatic Labs :: 415-278-7421 Login: Zeppelin New User: Bong P/H System Tiamat's Temple :: 612-731-0296 ----------- Hysteria Prl :: 612-557-2811 P/H-Files Unix!Proline System RADIO WAVES System :: 612-471-0060 - Syndicate Report Support BBS - ___________________________________________________________________________ ___________________________________________________________________________ This concludes this Transmittal No. 23 (Part 2 of 2) Released June 13th, 1989 by The Sensei Editor of The Syndicate Report ___________________________________________________________________________ __________________________________________________________________________