_______________________________________________________________________ _______________________________________________________________________ THE SYNDICATE REPORT Information Transmittal No. 21 (Part 2 of 2) Released March 2, 1989 Featuring: Editor's Note "Cyberpunks" Vs. The Media Telecommunications Events, Conferences, Seminars, and Shows Software Links Unix System to Atomic Clock Briefs notes from The Report " Hackers Fail Raiding ATMs " by The Sensei Editor Syndicate Report Magazine _______________________________________________________________________ _______________________________________________________________________ EXPOSITION: TSR Once again, The Report accepts outside sources. Anybody can write/provide information to The Syndicate Report. Articles/Information may be provided through RADIO WAVES Bulletin Board System 612-471-0060. Any info such as Busts, Phreaking, Hacking, Data / Telecommunications, and new developments on any the previous mentioned specialties will be: accepted, labeled, and given full actual credit to the article/info provider(s), or writer(s). -- Special Editor, TS, comments are placed between brackets. Example: [ Hi. ] ** All articles have been presented by me unless shown at the end of the article as the information provider(s), or writer(s). ** _______________________________________________________________________ _______________________________________________________________________ EDITOR'S NOTE: TSR Just a quick note. Just in case many of you don't know...I distribute an introduction package at least 3 days every month before actually releasing The Syndicate Report. These can be found on the systems listed at the end of this part of TSR. ;The Sensei / TSR!612 _______________________________________________________________________ _______________________________________________________________________ "CYBERPUNKS" VS. THE MEDIA: TSR (s.t 2\27) The following article can from a newspaper local to myself. The newspaper is the "Star and Tribune." I, The Sensei, usually don't print up verbatim copies of articles, but this articles was very interesting and entertaining. Some of the information presented in insulting to most Hackers/Phreaks, etc., so I'm going to comment on parts of the article. Comments will be in designated brackets, like this: [ Blah, Blah...Har Har -TS ] _____________________________________________________________ Silicon Valley -- A local Cop patrolling after midnight witnessed an unusual sight, even for this center of high technology: Two teenagers wedged in a phone booth, laboring over the keyboard of a laptop computer clipped into the telephone line. [ This is very humorous for me...I can't help wondering what technique these guys are using to access Bell Fone's, heh. ] The youths, who were arrested for telephone fraud and computer abuse, belong to a shadowy culture of computer vandals committed to illegally entering and frequently tampering with the computer networks on which society has come to rely. Those in this expanding underground -- known as CYBERPUNKS to themselves and some social scientists -- have broken into corporate and military computers and tampered with telephone billing switching equipment, sometimes altering services and monitoring telephone lines. Some have boasted of illicitly entering computer used in stock-market trading. [ First of all, I protest to the term, "Cyberpunks." No hacker I know of as called themselves Cyberpunks. If anyone reading this does, your probably not a considered a hacker by most. Second, Social Scientists don't know anything about hackers -- they're just another worthless clan of scientists trying to shape society as they wish. ] [ The newspaper then goes on to refresh our memories about the Morris Jr. Unix WORM, haven't we heard enough about his guy. And it was a really complicated set of code he set for his so-called CSci Project. ] Articles describing how to write viruses have appeared in several publications that are widely circulated within the underground. Writing in the journal 2600, which says it speaks for the computer underground, an author using the pseudonym "The Plague" described how to create a virus. "If people's data is destroyed, then so be it," he wrote. "If people are stupid enough to accept pirated software, then they deserve to be punished," says Plague. [ Well, The Plague has it all wrong. Viruses are not ONLY in pirated software, my friend, they creep within all types of programs. Your just adding to the problem. It's goes against 'Hacker Ethics,' but the information should not to suppressed from the hacking community. ] The term CYBERPUNK is a reference to a popular science fiction genre that deals with an intersecting world of high technology and outlaw society. "This is the case of art driving reality," said one Social Scientist at the Institute for the Future, Calif. "You have a small group who is actually going it, and a large pool that is buying into what they are doing and redefining reality." [ Yet another scientist from a corrupt institution, making conclusions based on a small fraction of neo-hackers. ] Cyberpunks often are called HACKERS, but computer scientists are careful to note that not all hackers are malicious. The term originally referred to researchers who were committed to designing advanced computer hardware and software. [ This is the first decent statement I've read. ] Another often-heard term is "PHREAKING," which is the illegal use of telephone systems. "Phreaking is moral," said an 18 year-old hacker who calls himself, "Frank Drake" in messages on the bulletin boards. "There is no theft involved. It's not theft of services, because this equipment would otherwise be idle." [ It's about time these Media-Types informed the public of my favorite hobby, Phreaking. And about the definition Frank Drake gave. "Illegal use of Fone System." ? Sorry, not all of the uses by phreaks is illegal. More than anything, phreaking is basically composed of "Learning about the Bell system, along with illegal use." ] Computer experts working in the industry who have become involved with malicious hackers see them as computer addicts possessed by an antisocial obsession. "They're misfits, losers or troubled individuals lacking a sense of duty or morals," said a computer researcher at a Silicon Valley institution. [ Misfits? Losers? Antisocial individuals? This is another scientist shooting his mouth off with little support. The idea of hackers being social outcasts, or losers is a common misconception by many. Most malicious computer hackers are party animals when given the right conditions. And if one was told he is labeled an, "Outcast, Loser etc.", the person talking would get an entire new face of the word MALICIOUS. Namely a 99e99 dollar fone bill, credit check and unchecked, and maybe a subscription to every magazine on the face of the Earth. ] In recent years this researcher has offered four underground hackers programming jobs to try to channel their energy away from destructive use of computers. In each case the experiment ended in failure, the scientists said. The researcher asked not to be indentified, and his reason is revealing. He fears that the CYBERPUNKS/Hackers are so skilled at tampering with computers that they might be able to alter his credit rating or have his electricity turned off. [ Oh my. Will these guys never learn? Hackers are not stupid "Lab Rats." They want a challenge, away from sitting at a computer programming for another person. And this scientist is concluding his entire experiment on just a few hackers. Yes, his fear of hackers is valid. I am now thinking of ways to find out who this guy might be. The credit rating would be no problem, same with the electricity. A scientist without electricity, is like a hacker without Telenet. ] "Every single one of them had deep psychological problems," he said. Some members of the hacker underground appear to agree with this psychological assessment. [ Hah! No comment...for obvious reasons. ] "They have this crazed need to find the answer," said Eric Corley, edit of 2600 Magazine. Corley, whose personal hacking resulted in three brushed with the law before he started the publication in 1984, said: "They keep exploring where they know they shouldn't go. A true hacker won't stop just because he gets in trouble." [ Corley is totally correct here, of course. But I think some hackers don't stop hacking, because some are just over powered with the need to learn. I never stopped hacking after by bust for many reasons. I the primary reason was because I'm not a quitter, and I looked back on how much had I learned. With the learning, fun followed. ] Although computer experts believe the number of outlaw hackers is growing, the behavior they exhibit is not new to the high-tech world. For example, a computer programmer, John Draper, spent six months in jail during the 1970s for illegal use of the telephone network. Draper's nickname, "Captain Crunch," derived from his discovery that a whistle that came as a prize in a cereal box was tuned to the correct frequency to unlawfully manipulate fone company switch gear. [ Hmmm. Every hacker knows all this already. At least a true hacker should know his/her past. But the thing I can't help wondering is, what was Captain Crunch doing with a whistle from the "Captain Crunch cereal" box? And why was he blowing it into the fone. Makes me laugh if you think about it. Another thing, anyone with two front teeth can blow a 2600 Hz tone whistle. ] ;The Sensei / TSR!612 _______________________________________________________________________ _______________________________________________________________________ BUSTING TELEPHONE SOLICITORS: TSR (st.cit 2\27) Join to fight telephone solicitors! How you ask? Read on... :::: Illustration, Exampling :::: "Have you ever off and had a fantasy of going to the library and finding out who owns the companies that call YOU, interrupt you, and calling THEM back? It makes you happy for a while. Particularly when working 11 to 7 shift, you'd think of the companies that had awoken you (using YOUR private fone) at noon." "One nurse I know did something like that to a persistent insurance salesman. One day she got awake and alert enough to get his name and number and promised to call back. She did. At 2 AM, announcing that it was HER working day, and she was now awake and would like to discuss the policy....He never called her back." -TS :::: Tips Offs to a Fone Scam :::: If it sounds too good to be true, it's probably a scam. Some of the most popular promotions among telephone con artists include prize offers to get you to buy water purifiers or vitamins, magazine subscriptions, PENNY STOCKS, precious metals, travel and cellular telephone lottery applications. Be skeptical of says such as, "This is the best deal you'll ever find," or "Double your money, no risk!" The government, Federal Trade Commission estimates that Americans lose 1$ billion a year from the deceptive peddling of goods and services over the fone. Other organizations say it's much higher. One might suggest lobbying for stricter FED laws governing 'telemarketing businesses.' :::: Striking Back at 'The Solicitor' :::: o Do NOT hang up on telephone solicitors. This just allows them to make another call 200 milliseconds later. Listen to them. Ask stupid questions. Drag out conversation. Contemplate placing an order, then don't. Or start to place an order, then change your mind. o Try wasting their time as much as possible, cackle insanely and hang up. Or give them the raspberry and yell, "Only f00ling!121!!&!" o Remember always, that these twits are partially paid on commission. The more of their time you waste, the less they are gonna earn. Eventually they may quit, and if we're persistent enough, maybe someday nobody will WANT to work for these cretins. o Why not add "May I speak to your supervisor?" for no good reason... o "Just a sec., I'll get my wife, she's really interested in this sort of thing..." and leave the phone on the table for 10 minutes... o Blow him some nice tones. 1000 Hz is nice. o If it's a girl, start to BS with her. Ask her out. Even better, make like to you who she is, and your going to strange things to her body. 90% are ugly college chics, so you might not be able to hang up on one with this approach. Use your own judgement. o Turn the bell off on the phone, and hook up an answering machine, and sleep, sleep. :::: Ethics one should abide by :::: o Don't go after the lower echelons of the company by terrorizing the telemarketer. They have no effect on the company. All you do is ruin somebody else's night. With few exceptions, he is just as unhappy about bothering you as you are about being interrupted. o Lash back at the company, not the peon. He's paid to do that. 4 out of 5 people wouldn't do that unless they were paid. :::: REMEMBER :::: The organizing principal of modern society is, "The only people in contact with the public are the ones with no authority". Keeps we, the people, fighting with each other while leaving the Bosses free to play power games with lives. :::::::::::: Information written by The Sensei / TSR Editor ::::::::::: _______________________________________________________________________ _______________________________________________________________________ TELCOMMUNICATIONS EVENTS, TSR (c.c 2\28) CONFERENCES, SEMINARS, and SHOWS: This is a list of meetins and show in the up coming month. I'm providing this list for you and your friends to rob, cheat, and swindle the angered companies that participate in there events. You are likely to find your dreams come true in telephone accessories and other wonderful equipment. Many things will be on show, so take items as you please. There could be butt sets, testing equipment, and other stuff at your disposal. Remember, their parking lots are usually filled with BELL trucks, just waiting for you to clean them out. ________________________________________ Mar. 3-4 Exchange Carriers of Utah St. George, UT Holiday Inn Phone: 801-298-4242 Mar. 6-8 Voice '89 Santa Clara, CA Convention Center Phone: 713-974-6637 Mar. 6-10 MFOC '89 Washington, DC Hyatt Crystal City Phone: 800-323-1088 Mar. 7-9 REA Telecomm. Eng. & Mgmt. Seminar Minneapolis, MN Marriott City Center Phone: 202-382-8663 Mar. 8-15 Hannover Fair CeBit '89 Hannover, West Germany Hannover Fairgrounds Phone: 609-987-1202 Mar. 12-15 Minnesota Telephone Bloomington, MN Radisson South Hotel Phone: 612-291-7311 Mar. 13-16 Interface '89 New York City, NY Javits Conention Center Phone: 617-449-6600 Mar. 14-17 Carolina-Virginias Spring Mtg. Releigh, NC Marriot Hotel Phone: 919-592-5751 Mar. 15-16 InterCom '89 Miami, FL Hyatt Regency Hotel Phone: 305-446-5150 Mar. 19-22 South Carolina Telephone Charleston, SC Omni Hotel Phone: 803-722-4900 Mar. 19-22 Entelec '89 New Orleans, LA Louisiana Superdome Phone: 504-561-4530 Mar. 28-30 TBT West '89 Long Beach, CA Long Beach Convention Ctr. Phone: 800-243-6002 Mar. 29-Apr. 1 Communications Indonesia Jakarta, Indonesia Jakarta Fairgrounds Phone: 301-656-2942 Well all that's all for this month. For more, read up coming Reports! ::::::::::::::::::::::::: Seymour Lecker / TWA ::::::::::::::::::::::: _______________________________________________________________________ _______________________________________________________________________ SOFTWARE LINKS UNIX SYSTEM TO ATOMIC CLOCK: TSR (i.w 2\28) Precision Standard Time Inc. recently placed in the public domain software that synchronizes nodes on a Unix TCP/IP network to the atomic clock that U.S. Government uses to keep official time. On Unix networks, a number of time-sensitive applications require careful synchronization, both between network elements and in relation to an absolute time standard. Now inconsistencies need not occur. The software continually synchronizes nodes on a network to within 100 milliseconds on the atomic clock at the National Institute for Standards and Technology. US NO 202-653-0351. The software consists of University of Maryland's Time Demon, "ntpd," which implements the Network Time Protocol and synchronizes the host computer to Coordinated Universal Time, the international time standard. The software can be operated with or without a Time Source radio receiver sold by Precision ST. Without an external time standard, however, no provision exists to correct inaccuracies caused by the drift of computer calendar clocks or by errors introduced in manual clock setting. _______________________________________________________________________ _______________________________________________________________________ ::::::::::::::::::::::SYNDICATE REPORT BRIEF NOTES::::::::::::::::::::: // Callers Must be Told the Cost // The FCC yesterday ordered 5 companies that charge customers 20% to 80% more than AT&T, MCI or Sprint to toe the line. The alternative operators must now tell callers how much the call will cost and which company is placing it before it goes through. The high rates usually are placed on hotel, airport or hospital phones. :: UPDATE :: As stated above, alternative long-distance operators must: Put a sticker on the phone with price information or tell the caller the price verbally; give callers an chance to hang up without any charge; offer callers a chance to go through AT&T or another phone service. Right now many alternative operators stop you from using another carrier. _____________________________________________________________ // Bell Goes To College // Bell Atlanticom Systems said yesterday it has signed a contract with the College of William and Mary in Williamsburg, Va., for a fully integrated voice and data communications system. The campus-wide system will provide resale of communications services to students, a management system, and a universal wiring plan to provide voice and data transmission. The communications system obtained by the College of William and Mary yesterday will provide 300 trunks, 3,800 faculty and student lines, 150 voice/data faculty users and 1,050 host data ports. It includes more than 5,000 inside wiring runs and several miles of fiber optics. Also included: A 1,000- user Aspen Voice Mail System and the Alex-IS Telecommunications Management System. _____________________________________________________________ // Hackers Fail Raiding ATMs // TSR If authorities hadn't been tipped, a computer hackers could have cracked one cash-machine network of more than 14$ million over a single weekend, of Feb. 18. Charged in the plot were GTE Corp. consultant Mark Koenig, and 4 other hackers. Federal Agents said the hackers pulled the personal ATM codes from GTE telephone lines. The lines transmit transactions from account at Bank of America and thousands of other banks linked to the Plus System, a national network of shared ATMs. The Hackers put the data in magnetic strips on 5,500 pieces of card board. They planned to use the bogus cards to make withdrawals around the country. If it were not for a "TIPOFF", authorities wouldn't have known what hit them. [ Now this is a sad story. These -hackers- have a chance to break 14 MILLION in tax-free cash, and they blow it. I bet one of them bragged about it to a girl friend. That's the only way computer hackers get caught...they have to see some limelight. ] --TS ::::::::: Information provided by John "Scij" / 612 ::::::::: _____________________________________________________________ // Speaking of ATM Heists... // Recently, a crook used a Security Pacific National Bank ATM master card, which tapped into virtually all accounts. The heist resulted in a 237,000$ win for the hacker. The bank reimbursed depositors but still have not found the culprit. Alarmed by the incident, the American Bankers Assoc. plans to urge its 13,500 members to strictly limit access to ATM master cards and personal indentification codes. _______________________________________________________________________ _______________________________________________________________________ :::::::::::::::::::::::: TSR "Quote of the Month" ::::::::::::::::::::: "They [Hackers] have this need to find the answer." To subscribe to the 2600 Magazine send 15$ to: 2600 Magazine P.O. BOX 752 Middle Island N.Y. 11953 --Corley, Editor 2600 Magazine _______________________________________________________________________ _______________________________________________________________________ TSR will accept additional sponsor/support Systems. If you have a certain interest in the Report, and wish to provide support to TSR -- Leave your BBS number -- and any other information on RADIO WAVES Bulletin Board Systems. _______________________________________________________________________ _______________________________________________________________________ Pheonix Proj. LODH :: 512-441-3088 ----- Lunatic Labs :: 415-278-7421 At Login: Any UNIX Default PW P/H System Tiamats Temple Pvt :: 612-731-0296 ----- Hack Shack @ :: 214-422-4307 P/H-Files BBS Login: Any UNIX Default Pass RADIO WAVES System :: 612-471-0060 - Syndicate Report Support BBS - _______________________________________________________________________ _______________________________________________________________________ This concludes this Transmittal No. 21 (Part 2 of 2) Released March 2nd, 1989 by The Sensei Editor of The Syndicate Report _______________________________________________________________________ _______________________________________________________________________ -= EOF =-